redrays-io / SAP-Threat-Modeling
The SAP Threat Modeling Tool is an on-premises open-source web application designed to analyze and visualize connections between SAP systems, helping users identify security risks and vulnerabilities. With features like inputting SAP credentials, scanning for connections, and visualizing the network.
☆48Updated 2 months ago
Alternatives and similar repositories for SAP-Threat-Modeling:
Users that are interested in SAP-Threat-Modeling are comparing it to the libraries listed below
- Tool for analyzing SAP Secure Network Communications (SNC).☆52Updated last year
- SANS Workshop: Active Directory Privilege Escalation with Empire!☆29Updated last month
- SAP Penetration Testing: A Comprehensive Analysis of SAP Security Issues☆38Updated last year
- ☆35Updated last year
- This repository contains scripts about ACL abuse and any other active directory attacking methods.☆35Updated last year
- ☆32Updated 2 years ago
- Small Script that permits to enumerate folders in Windows Defender Exclusion List with no Administrative privileges☆22Updated 5 months ago
- A tool to dump users's .plist on a Mac OS system and to convert them into a crackable hash☆51Updated 6 months ago
- A graphical automation to monitor if backdoors/default settings are still active on the compromised machines over time.☆44Updated last year
- A Moodle Scanner☆40Updated 5 months ago
- ☆77Updated last year
- exfiltration/infiltration toolkit☆23Updated last year
- Tools used for Pentesting☆22Updated 2 years ago
- Fast Path Traversal exploitation tool☆21Updated last year
- PfSense Stored XSS lead to Arbitrary Code Execution exploit☆47Updated 3 months ago
- Cobalt Strike BOFS☆16Updated last year
- Exploits with pwntools library in Python3. ROP, BOF, SHELLCODE.☆20Updated last year
- A Proof-Of-Concept for the CVE-2023-43770 vulnerability.☆33Updated last year
- Scripts that automate portions of pentests.☆50Updated last week
- ☆58Updated 7 months ago
- Source code and examples for PassiveAggression☆56Updated 11 months ago
- This is a repository for Penetration Test, Purple Team Exercise and Red Team☆17Updated last year
- A tool for quickly evaluating IAM permissions in AWS.☆57Updated last year
- APT Emulation tool to exfiltrate sensitive .docx, .pptx, .xlsx, .pdf files☆86Updated last month
- ☆26Updated 8 months ago
- ☆22Updated 11 months ago
- The tool that bypasses the firewall's Application Based Rules and lets you connect to anywhere, ANY IP, ANY PORT and ANY APPLICATION.☆61Updated 8 months ago
- ☆51Updated last year
- Shellcode Tester Pro is a graphical interface tool for analysis, simulated execution, and reverse engineering of malicious shellcodes.☆29Updated last month
- Retrieve LAPS passwords from a domain. The tools is inspired in pyLAPS.☆82Updated 2 months ago