redrays-io / SAP-Threat-ModelingLinks
The SAP Threat Modeling Tool is an on-premises open-source web application designed to analyze and visualize connections between SAP systems, helping users identify security risks and vulnerabilities. With features like inputting SAP credentials, scanning for connections, and visualizing the network.
☆49Updated 3 months ago
Alternatives and similar repositories for SAP-Threat-Modeling
Users that are interested in SAP-Threat-Modeling are comparing it to the libraries listed below
Sorting:
- Tool for analyzing SAP Secure Network Communications (SNC).☆52Updated last year
- SANS Workshop: Active Directory Privilege Escalation with Empire!☆30Updated 2 months ago
- This repository contains scripts about ACL abuse and any other active directory attacking methods.☆36Updated last year
- SAP Penetration Testing: A Comprehensive Analysis of SAP Security Issues☆39Updated last year
- A graphical automation to monitor if backdoors/default settings are still active on the compromised machines over time.☆44Updated last year
- ☆32Updated 2 years ago
- PfSense Stored XSS lead to Arbitrary Code Execution exploit☆47Updated 5 months ago
- exfiltration/infiltration toolkit☆23Updated last year
- A tool to dump users's .plist on a Mac OS system and to convert them into a crackable hash☆51Updated 8 months ago
- ☆35Updated last year
- Detects CanaryTokens in Office docs and PDFs (docx, xlsx, pptx, pdf) without triggering alerts.☆120Updated last year
- ☆59Updated 8 months ago
- ☆77Updated last year
- List of MurmurHash3 favicon hashes of widely used technologies by vendor to search with Shodan.☆24Updated last year
- A Proof-Of-Concept for the CVE-2023-43770 vulnerability.☆33Updated last year
- This Python tool enables network node command and exfiltration while applying OPSEC to ensure the process is hidden by transmitting comma…☆34Updated last year
- Small Script that permits to enumerate folders in Windows Defender Exclusion List with no Administrative privileges☆23Updated 7 months ago
- Nmapurls parses Nmap xml reports from either piped input or command line arg and outputs a list of http(s) URL's to be used in an automat…☆41Updated last week
- Repo for all my exploits/PoCs☆51Updated last month
- A Moodle Scanner☆42Updated 7 months ago
- Fast Path Traversal exploitation tool☆21Updated last year
- Exploits with pwntools library in Python3. ROP, BOF, SHELLCODE.☆21Updated last year
- Python tool to compare and analyse Nmap XML files to create a spreadsheet with results. Can also be used to create a markdown report usin…☆20Updated 7 months ago
- Scripts that automate portions of pentests.☆51Updated last month
- Invoke-AtomicAssessment is a powerful tool designed to facilitate adversary emulation by leveraging Atomic Red Team.☆39Updated 5 months ago
- ☆51Updated last year
- APT hub, It help's research to collect information and data on the latest APT activities. It collects data on APT profiles, IOCs(1 yr), a…☆51Updated 3 months ago
- Exploit for Symfony CVE-2024-50340 (forked eos)☆29Updated 7 months ago
- A tool for quickly evaluating IAM permissions in AWS.☆57Updated last year
- Shellcode Tester Pro is a graphical interface tool for analysis, simulated execution, and reverse engineering of malicious shellcodes.☆29Updated 2 months ago