redrays-io / SAP-Threat-Modeling
The SAP Threat Modeling Tool is an on-premises open-source web application designed to analyze and visualize connections between SAP systems, helping users identify security risks and vulnerabilities. With features like inputting SAP credentials, scanning for connections, and visualizing the network.
☆47Updated 9 months ago
Alternatives and similar repositories for SAP-Threat-Modeling:
Users that are interested in SAP-Threat-Modeling are comparing it to the libraries listed below
- SAP Penetration Testing: A Comprehensive Analysis of SAP Security Issues☆38Updated last year
- Tool for analyzing SAP Secure Network Communications (SNC).☆51Updated 10 months ago
- Small Script that permits to enumerate folders in Windows Defender Exclusion List with no Administrative privileges☆21Updated 3 months ago
- Invoke-AtomicAssessment is a powerful tool designed to facilitate adversary emulation by leveraging Atomic Red Team.☆33Updated 3 weeks ago
- ☆34Updated last year
- A Moodle Scanner☆39Updated 3 months ago
- exfiltration/infiltration toolkit☆23Updated last year
- A graphical automation to monitor if backdoors/default settings are still active on the compromised machines over time.☆44Updated 11 months ago
- ServiceLens is a Python tool for analyzing services linked to Microsoft 365 domains. It scans DNS records like SPF and DMARC to identify …☆74Updated 3 months ago
- ☆32Updated last year
- Source code and examples for PassiveAggression☆55Updated 8 months ago
- Automation of Active Directory penetration testing tasks on top of BloodHound CE☆34Updated last year
- This repository contains scripts about ACL abuse and any other active directory attacking methods.☆35Updated last year
- ☆51Updated last year
- APT hub, It help's research to collect information and data on the latest APT activities. It collects data on APT profiles, IOCs(1 yr), a…☆48Updated 3 months ago
- BloodHound PowerShell client☆49Updated this week
- MSSprinkler is a password spraying utility for organizations to test their Microsoft Online accounts from an external perspective. It emp…☆74Updated 2 months ago
- Tools used for Pentesting☆22Updated last year
- CIS Benchmark testing of Windows SIEM configuration☆44Updated last year
- ☆36Updated 10 months ago
- A tool to dump users's .plist on a Mac OS system and to convert them into a crackable hash☆50Updated 4 months ago
- Various AD tools needed for penetration testing in one place.☆24Updated last year
- This Python tool enables network node command and exfiltration while applying OPSEC to ensure the process is hidden by transmitting comma…☆33Updated last year
- 🌩️ Collection of BloodHound queries for Azure☆57Updated last month
- Scraping Kit is made up of several tools for scraping services for keywords, useful for initial enumeration of Domain Controllers or if y…☆97Updated last year
- ☆52Updated last year