jimmythompson / entLinks
An attack tree generator built on electron
☆62Updated 9 years ago
Alternatives and similar repositories for ent
Users that are interested in ent are comparing it to the libraries listed below
Sorting:
- Security Payload Unit Test Repository (SPUTR)☆86Updated 2 years ago
- Content for 'JIRA Risk Project' book published at LeanPub☆57Updated 7 years ago
- Portcullis Computer Security Co-ordinated Disclosure Toolkit☆25Updated 4 months ago
- Minion☆355Updated 6 years ago
- User, contributor and developer friendly vulnerability database☆128Updated 6 years ago
- Content for OWASP Summit 2017 site☆128Updated 4 years ago
- SWAMP-in-a-Box☆62Updated 4 years ago
- SeaSponge is an accessible threat modelling tool from Mozilla☆279Updated 7 years ago
- a grep -r for secrets☆178Updated 3 years ago
- ☆67Updated 8 years ago
- ☆90Updated 3 weeks ago
- A project designed to parse public source code repositories and find various types of vulnerabilities.☆192Updated 7 years ago
- AWS EC2 and S3 Security Auditing Tool☆41Updated 11 years ago
- Repoguard is a simple tool to check and alert on interesting changes in a git repository.☆48Updated 8 years ago
- GitPwnd is a network penetration tool that lets you use a git repo for command and control of compromised machines☆145Updated 2 years ago
- AutoTriageBot automatically verifies, deduplicates, and suggests payouts for incoming HackerOne reports.☆56Updated 3 years ago
- A test framework for testing SSL/TLS client certificate validation.☆94Updated 4 years ago
- Common Vulnerabilities and Exposures - Portal. Archived and now replaced by vulnerability-lookup.org☆86Updated 6 months ago
- The currently released SimpleRisk source code.☆97Updated 3 weeks ago
- A static-code-analysis tool for performing security-focused code reviews. It enables an auditor to swiftly map the attack-surface of a la…☆141Updated last year
- Continuous Integration and Development ExploiteR☆86Updated 2 years ago
- Exfiltrate files via DNS☆95Updated 12 years ago
- Defcon24 Workshop Contents : Ninja Level Infrastructure Monitoring☆126Updated 8 years ago
- INACTIVE - Collection of Tools & Procedures for double checking GitHub configurations☆137Updated last year
- A toolkit to generate an offline Chrome extension to detect phishing attacks using a bespoke convolutional neural network.☆131Updated 8 years ago
- Use burp's JS static code analysis on code from your local system.☆42Updated 8 years ago
- Material related to my talks at various conferences on using Continuous Integration tools (Jenkins, Teamcity, Go, Hudson, CruiseControl) …☆119Updated 8 years ago
- Write simple security regression tests for your network infrastructure.☆19Updated 13 years ago
- A tool for discovering subdomains via third party services and wordlists.☆75Updated 9 years ago
- NIST/NCCoE Mobile Threat Catalogue☆149Updated last month