redrays-io / SAP-Threat-ModelingLinks
The SAP Threat Modeling Tool is an on-premises open-source web application designed to analyze and visualize connections between SAP systems, helping users identify security risks and vulnerabilities. With features like inputting SAP credentials, scanning for connections, and visualizing the network.
☆51Updated 10 months ago
Alternatives and similar repositories for SAP-Threat-Modeling
Users that are interested in SAP-Threat-Modeling are comparing it to the libraries listed below
Sorting:
- This repository contains scripts about ACL abuse and any other active directory attacking methods.☆37Updated 2 years ago
- Tool for analyzing SAP Secure Network Communications (SNC).☆56Updated last year
- ☆35Updated 2 years ago
- A graphical automation to monitor if backdoors/default settings are still active on the compromised machines over time.☆45Updated last year
- A tool to dump users's .plist on a Mac OS system and to convert them into a crackable hash☆51Updated last year
- Detects CanaryTokens in Office docs and PDFs (docx, xlsx, pptx, pdf) without triggering alerts☆125Updated 3 weeks ago
- GATOR - GCP Attack Toolkit for Offensive Research, a tool designed to aid in research and exploiting Google Cloud Environments☆89Updated last year
- exfiltration/infiltration toolkit☆23Updated 2 years ago
- ☆76Updated last year
- SANS Workshop: Active Directory Privilege Escalation with Empire!☆33Updated 2 months ago
- Repo for all my exploits/PoCs☆51Updated 8 months ago
- NullSection is an Anti-Reversing tool that applies a technique that overwrites the section header with nullbytes.☆67Updated last year
- FWT is a security analysis and file monitoring tool that utilizes Sysmon events.☆28Updated last year
- The tool that bypasses the firewall's Application Based Rules and lets you connect to anywhere, ANY IP, ANY PORT and ANY APPLICATION.☆61Updated last year
- PfSense Stored XSS lead to Arbitrary Code Execution exploit☆49Updated last year
- ☆31Updated 2 years ago
- ☆62Updated last month
- vulnlab.com reaper writeup☆27Updated 2 years ago
- ☆23Updated last year
- Small Script that permits to enumerate folders in Windows Defender Exclusion List with no Administrative privileges☆27Updated last year
- A Project dedicated to documenting various attack and detection vectors that can be encountered within Google Cloud Platform (GCP).☆60Updated last year
- A tool for quickly evaluating IAM permissions in AWS.☆60Updated 2 years ago
- CIS Benchmark testing of Windows SIEM configuration☆45Updated 2 years ago
- A small executable to trick a user to authenticate using code matching MFA☆69Updated 2 years ago
- An Vulnerability detection and Exploitation tool for CVE-2024-24919☆25Updated last year
- A Proof-Of-Concept for the CVE-2023-43770 vulnerability.☆33Updated 2 years ago
- SAP Penetration Testing: A Comprehensive Analysis of SAP Security Issues☆40Updated 2 years ago
- Exploits with pwntools library in Python3. ROP, BOF, SHELLCODE.☆20Updated last year
- Check for CVE-2024-22024 vulnerability in Ivanti Connect Secure☆30Updated last year
- Basic brute-force script targeting the standard Keycloak Admin/User Console browser login flow.☆24Updated 9 months ago