redrays-io / SAP-Threat-ModelingLinks
The SAP Threat Modeling Tool is an on-premises open-source web application designed to analyze and visualize connections between SAP systems, helping users identify security risks and vulnerabilities. With features like inputting SAP credentials, scanning for connections, and visualizing the network.
☆49Updated 8 months ago
Alternatives and similar repositories for SAP-Threat-Modeling
Users that are interested in SAP-Threat-Modeling are comparing it to the libraries listed below
Sorting:
- This repository contains scripts about ACL abuse and any other active directory attacking methods.☆36Updated 2 years ago
- Tool for analyzing SAP Secure Network Communications (SNC).☆53Updated last year
- A graphical automation to monitor if backdoors/default settings are still active on the compromised machines over time.☆44Updated last year
- A tool to dump users's .plist on a Mac OS system and to convert them into a crackable hash☆51Updated last year
- ☆79Updated last year
- Detects CanaryTokens in Office docs and PDFs (docx, xlsx, pptx, pdf) without triggering alerts.☆124Updated last year
- ☆35Updated last year
- Repo for all my exploits/PoCs☆53Updated 6 months ago
- SAP Penetration Testing: A Comprehensive Analysis of SAP Security Issues☆39Updated last year
- GATOR - GCP Attack Toolkit for Offensive Research, a tool designed to aid in research and exploiting Google Cloud Environments☆89Updated last year
- SANS Workshop: Active Directory Privilege Escalation with Empire!☆33Updated this week
- vulnlab.com reaper writeup☆27Updated 2 years ago
- Exploits with pwntools library in Python3. ROP, BOF, SHELLCODE.☆20Updated last year
- Nmapurls parses Nmap xml reports from either piped input or command line arg and outputs a list of http(s) URL's to be used in an automat…☆42Updated 4 months ago
- Check for CVE-2024-22024 vulnerability in Ivanti Connect Secure☆30Updated last year
- List of MurmurHash3 favicon hashes of widely used technologies by vendor to search with Shodan.☆35Updated last year
- The tool that bypasses the firewall's Application Based Rules and lets you connect to anywhere, ANY IP, ANY PORT and ANY APPLICATION.☆61Updated last year
- ☆22Updated last year
- ☆61Updated last year
- FWT is a security analysis and file monitoring tool that utilizes Sysmon events.☆28Updated last year
- Top 400 passwords as per HaveIBeenPwned☆22Updated last year
- exfiltration/infiltration toolkit☆23Updated last year
- CIS Benchmark testing of Windows SIEM configuration☆45Updated 2 years ago
- A Proof-Of-Concept for the CVE-2023-43770 vulnerability.☆33Updated 2 years ago
- Python tool to compare and analyse Nmap XML files to create a spreadsheet with results. Can also be used to create a markdown report usin…☆24Updated last year
- quick and dirty proof-of-concept to hide shells in images☆52Updated last year
- Monitor your target continuously for new subdomains!☆25Updated 2 years ago
- Azure AD (Entra ID) enumeration tool. Find related domains and tenant information in a simple way.☆35Updated last year
- NullSection is an Anti-Reversing tool that applies a technique that overwrites the section header with nullbytes.☆68Updated last year
- PfSense Stored XSS lead to Arbitrary Code Execution exploit☆48Updated 10 months ago