redrays-io / SAP-Threat-Modeling
The SAP Threat Modeling Tool is an on-premises open-source web application designed to analyze and visualize connections between SAP systems, helping users identify security risks and vulnerabilities. With features like inputting SAP credentials, scanning for connections, and visualizing the network.
☆47Updated 2 weeks ago
Alternatives and similar repositories for SAP-Threat-Modeling:
Users that are interested in SAP-Threat-Modeling are comparing it to the libraries listed below
- Tool for analyzing SAP Secure Network Communications (SNC).☆52Updated 11 months ago
- Small Script that permits to enumerate folders in Windows Defender Exclusion List with no Administrative privileges☆22Updated 4 months ago
- ☆77Updated 11 months ago
- SAP Penetration Testing: A Comprehensive Analysis of SAP Security Issues☆38Updated last year
- ☆34Updated last year
- This repository contains scripts about ACL abuse and any other active directory attacking methods.☆35Updated last year
- Fast Path Traversal exploitation tool☆21Updated 11 months ago
- A tool for quickly evaluating IAM permissions in AWS.☆57Updated last year
- 🌩️ Collection of BloodHound queries for Azure☆60Updated 2 months ago
- A Moodle Scanner☆39Updated 4 months ago
- ☆32Updated 2 years ago
- A graphical automation to monitor if backdoors/default settings are still active on the compromised machines over time.☆44Updated last year
- Exploit for Symfony CVE-2024-50340 (forked eos)☆28Updated 4 months ago
- RDE1 (Rusty Data Exfiltrator) is client and server tool allowing auditor to extract files from DNS and HTTPS protocols written in Rust. �…☆39Updated last year
- Generate password spraying lists based on the pwdLastSet-attribute of users.☆55Updated last year
- Dump Kerberos tickets from the KCM database of SSSD☆50Updated 6 months ago
- ☆51Updated last year
- exfiltration/infiltration toolkit☆23Updated last year
- ☆58Updated 5 months ago
- Source code and examples for PassiveAggression☆55Updated 9 months ago
- Various AD tools needed for penetration testing in one place.☆24Updated last year
- ☆21Updated 9 months ago
- HashKitty is a user-friendly cross-platform Python wrapper for Hashcat designed to provide an easy password cracking experience for both …☆41Updated 8 months ago
- Invoke-AtomicAssessment is a powerful tool designed to facilitate adversary emulation by leveraging Atomic Red Team.☆36Updated 2 months ago
- dauthi is a tool that takes advantage of API functionality across a variety of MDM solutions to perform user enumeration and single-facto…☆41Updated 11 months ago
- This Python tool enables network node command and exfiltration while applying OPSEC to ensure the process is hidden by transmitting comma…☆33Updated last year
- Fully automated windows credentials dumper, for SAM (classic passwords) and WINHELLO (pins). Requires to be run from a linux machine with…☆74Updated 4 months ago
- Tools used for Pentesting☆22Updated last year
- PfSense Stored XSS lead to Arbitrary Code Execution exploit☆47Updated 2 months ago
- ☆37Updated 11 months ago