redrays-io / SAP-Threat-ModelingLinks
The SAP Threat Modeling Tool is an on-premises open-source web application designed to analyze and visualize connections between SAP systems, helping users identify security risks and vulnerabilities. With features like inputting SAP credentials, scanning for connections, and visualizing the network.
☆50Updated 5 months ago
Alternatives and similar repositories for SAP-Threat-Modeling
Users that are interested in SAP-Threat-Modeling are comparing it to the libraries listed below
Sorting:
- A graphical automation to monitor if backdoors/default settings are still active on the compromised machines over time.☆45Updated last year
- A tool to dump users's .plist on a Mac OS system and to convert them into a crackable hash☆51Updated 10 months ago
- Tool for analyzing SAP Secure Network Communications (SNC).☆52Updated last year
- This repository contains scripts about ACL abuse and any other active directory attacking methods.☆36Updated 2 years ago
- ☆35Updated last year
- ☆78Updated last year
- Detects CanaryTokens in Office docs and PDFs (docx, xlsx, pptx, pdf) without triggering alerts.☆121Updated last year
- SANS Workshop: Active Directory Privilege Escalation with Empire!☆33Updated 3 weeks ago
- ☆59Updated 10 months ago
- ☆22Updated last year
- The tool that bypasses the firewall's Application Based Rules and lets you connect to anywhere, ANY IP, ANY PORT and ANY APPLICATION.☆62Updated last year
- Exploits with pwntools library in Python3. ROP, BOF, SHELLCODE.☆21Updated last year
- ☆32Updated 2 years ago
- Repo for all my exploits/PoCs☆51Updated 3 months ago
- FWT is a security analysis and file monitoring tool that utilizes Sysmon events.☆27Updated last year
- SAP Penetration Testing: A Comprehensive Analysis of SAP Security Issues☆40Updated last year
- A Proof-Of-Concept for the CVE-2023-43770 vulnerability.☆33Updated last year
- exfiltration/infiltration toolkit☆24Updated last year
- A Project dedicated to documenting various attack and detection vectors that can be encountered within Google Cloud Platform (GCP).☆61Updated last year
- List of MurmurHash3 favicon hashes of widely used technologies by vendor to search with Shodan.☆25Updated last year
- Python tool to compare and analyse Nmap XML files to create a spreadsheet with results. Can also be used to create a markdown report usin…☆21Updated 9 months ago
- A C2 framework for all your God Complex. A fully functional and integrated Botnet for remote command execution through user friendly UI.☆45Updated last year
- Small Script that permits to enumerate folders in Windows Defender Exclusion List with no Administrative privileges☆25Updated 9 months ago
- GATOR - GCP Attack Toolkit for Offensive Research, a tool designed to aid in research and exploiting Google Cloud Environments☆90Updated last year
- CIS Benchmark testing of Windows SIEM configuration☆44Updated 2 years ago
- Check for CVE-2024-22024 vulnerability in Ivanti Connect Secure☆30Updated last year
- Nmapurls parses Nmap xml reports from either piped input or command line arg and outputs a list of http(s) URL's to be used in an automat…☆42Updated 2 months ago
- Automates the network enumeration process in a fire-and-forget manner, among many more functions. Aims to be the illest Nmap/masscan wrap…☆53Updated 4 months ago
- ServiceLens is a Python tool for analyzing services linked to Microsoft 365 domains. It scans DNS records like SPF and DMARC to identify …☆77Updated 10 months ago
- Top 400 passwords as per HaveIBeenPwned☆22Updated 10 months ago