redrays-io / SAP-Threat-Modeling
The SAP Threat Modeling Tool is an on-premises open-source web application designed to analyze and visualize connections between SAP systems, helping users identify security risks and vulnerabilities. With features like inputting SAP credentials, scanning for connections, and visualizing the network.
☆47Updated 6 months ago
Related projects ⓘ
Alternatives and complementary repositories for SAP-Threat-Modeling
- Tool for analyzing SAP Secure Network Communications (SNC).☆50Updated 6 months ago
- This repository contains scripts about ACL abuse and any other active directory attacking methods.☆35Updated last year
- SAP Penetration Testing: A Comprehensive Analysis of SAP Security Issues☆36Updated 11 months ago
- ☆77Updated 7 months ago
- Various AD tools needed for penetration testing in one place.☆21Updated last year
- RedInfraCraft automates the deployment of powerful red team infrastructures! It streamlines the setup of C2s, makes it easy to create adv…☆63Updated this week
- A graphical automation to monitor if backdoors/default settings are still active on the compromised machines over time.☆43Updated 8 months ago
- ☆35Updated 11 months ago
- A collection of tools that I use in CTF's or for assessments☆55Updated last month
- A tool to dump users's .plist on a Mac OS system and to convert them into a crackable hash☆47Updated 3 weeks ago
- ☆53Updated last month
- A tool for quickly evaluating IAM permissions in AWS.☆57Updated last year
- exfiltration/infiltration toolkit☆23Updated 10 months ago
- Fast Path Traversal exploitation tool☆21Updated 6 months ago
- This Python tool enables network node command and exfiltration while applying OPSEC to ensure the process is hidden by transmitting comma…☆33Updated 11 months ago
- Automates the network enumeration process in a fire-and-forget manner, among many more functions. Aims to be the illest Nmap/masscan wrap…☆46Updated this week
- ☆29Updated last year
- dauthi is a tool that takes advantage of API functionality across a variety of MDM solutions to perform user enumeration and single-facto…☆36Updated 6 months ago
- BloodHound PowerShell client☆44Updated 3 weeks ago
- Top 400 passwords as per HaveIBeenPwned☆20Updated 3 weeks ago
- Tools used for Pentesting☆22Updated last year
- Repository with quick triggers to help during Pentest in an Active Directory environment.☆36Updated last week
- Generate password spraying lists based on the pwdLastSet-attribute of users.☆54Updated 11 months ago
- PrestaXSRF is a script designed to escalate a Cross-Site Scripting (XSS) vulnerability to Remote Code Execution (RCE) or other's critical…☆30Updated 10 months ago
- Dump Kerberos tickets from the KCM database of SSSD☆49Updated 2 months ago
- This is a simulation of attack by Fancy Bear group (APT28) targeting high-ranking government officials Western Asia and Eastern Europe☆28Updated 4 months ago
- A small red team course☆32Updated last year
- MSSprinkler is a password spraying utility for organizations to test their Microsoft Online accounts from an external perspective. It emp…☆66Updated 2 weeks ago
- ☆27Updated last year
- HashKitty is a user-friendly cross-platform Python wrapper for Hashcat designed to provide an easy password cracking experience for both …☆39Updated 3 months ago