{"id":16136,"date":"2021-07-07T16:49:46","date_gmt":"2021-07-07T14:49:46","guid":{"rendered":"https:\/\/herolab-usd.formwandler.rocks\/unsere-plattformen-und-tools\/"},"modified":"2025-08-07T09:21:14","modified_gmt":"2025-08-07T07:21:14","slug":"our-platforms-and-tools","status":"publish","type":"page","link":"https:\/\/herolab.usd.de\/en\/our-platforms-and-tools\/","title":{"rendered":"Our Platforms and Tools"},"content":{"rendered":"<p>[et_pb_section fb_built=\"1\" _builder_version=\"4.16\" _module_preset=\"default\" background_color=\"#2E353D\" global_colors_info=\"{}\"][et_pb_row _builder_version=\"4.16\" _module_preset=\"default\" custom_padding=\"37px||0px||false|\" global_colors_info=\"{}\"][et_pb_column type=\"4_4\" _builder_version=\"4.16\" _module_preset=\"default\" global_colors_info=\"{}\"][et_pb_text _builder_version=\"4.16\" _module_preset=\"cc5ac6f4-ebbd-4b3f-bc92-4dfc1f15fe2c\" custom_margin=\"||83px||false|false\" custom_padding=\"0px||0px||true|\" global_colors_info=\"{}\"]<\/p>\n<h1 style=\"text-align: center\">usd HeroLab Toolchain<\/h1>\n<p>&nbsp;<\/p>\n<p style=\"text-align: left\">We place the highest demands on the quality of our work. To ensure that security analyses are always carried out with constant efficiency and quality, our own tools are subject to strict quality management and optimization processes, taking into account the results of our research.<\/p>\n<p>[\/et_pb_text][et_pb_text _builder_version=\"4.16\" _module_preset=\"cc5ac6f4-ebbd-4b3f-bc92-4dfc1f15fe2c\" header_3_text_color=\"#FFFFFF\" header_3_font_size=\"20px\" global_colors_info=\"{}\"]<\/p>\n<h2>usd Icebreaker<\/h2>\n<h3>Analysis tool for all team members &amp; knowledge database.<\/h3>\n<p>[\/et_pb_text][\/et_pb_column][\/et_pb_row][et_pb_row column_structure=\"1_3,1_3,1_3\" _builder_version=\"4.16\" _module_preset=\"default\" custom_margin=\"|auto|50px|auto||\" custom_padding=\"1px|||||\" global_colors_info=\"{}\"][et_pb_column type=\"1_3\" _builder_version=\"4.16\" _module_preset=\"default\" global_colors_info=\"{}\"][et_pb_text _builder_version=\"4.16\" _module_preset=\"default\" text_line_height=\"1.5em\" header_6_font_size=\"5px\" background_color=\"RGBA(0,0,0,0)\" global_colors_info=\"{}\"]<\/p>\n<table border=\"0\" style=\"border-collapse: collapse;width: 100%;padding: 0;border-color: #2e353d\">\n<tbody>\n<tr>\n<td style=\"width: 3%;padding-left: 0;padding-right: 0;padding-top: 2;border-color: #2e353d;vertical-align: top\"><i class=\"fas fa-cog\"><\/i><\/td>\n<td style=\"width: 97%;padding-left: 10;padding-right: 0;padding-top: 0;border-color: #2e353d\">Implementation of plugins &amp; self developed scripts<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<h6>\u00a0<\/h6>\n<table border=\"0\" style=\"border-collapse: collapse;width: 100%;padding: 0;border-color: #2e353d\">\n<tbody>\n<tr>\n<td style=\"width: 3%;padding-left: 0;padding-right: 0;padding-top: 2;border-color: #2e353d;vertical-align: top\"><i class=\"fas fa-globe\"><\/i><\/td>\n<td style=\"width: 97%;padding-left: 10;padding-right: 0;padding-top: 0;border-color: #2e353d\">Analysis tool for all team members &amp; knowledge database<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<h6>\u00a0<\/h6>\n<table border=\"0\" style=\"border-collapse: collapse;width: 100%;padding: 0;border-color: #2e353d\">\n<tbody>\n<tr>\n<td style=\"width: 3%;padding-left: 0;padding-right: 0;padding-top: 2;border-color: #2e353d;vertical-align: top\"><i class=\"fas fa-code-branch\"><\/i><\/td>\n<td style=\"width: 97%;padding-left: 10;padding-right: 0;padding-top: 0;border-color: #2e353d\">Continuous development and adaption to research results<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<p>[\/et_pb_text][\/et_pb_column][et_pb_column type=\"1_3\" _builder_version=\"4.16\" _module_preset=\"default\" global_colors_info=\"{}\"][et_pb_text _builder_version=\"4.16\" _module_preset=\"default\" text_line_height=\"1.5em\" header_6_font_size=\"5px\" background_color=\"RGBA(0,0,0,0)\" global_colors_info=\"{}\"]<\/p>\n<table border=\"0\" style=\"border-collapse: collapse;width: 100%;padding: 0;border-color: #2e353d\">\n<tbody>\n<tr>\n<td style=\"width: 3%;padding-left: 0;padding-right: 0;padding-top: 2;border-color: #2e353d;vertical-align: top\"><i class=\"fas fa-cogs\"><\/i><\/td>\n<td style=\"width: 97%;padding-left: 10;padding-right: 0;padding-top: 0;border-color: #2e353d\">High level of automation of manual processes<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<h6><\/h6>\n<table border=\"0\" style=\"border-collapse: collapse;width: 100%;padding: 0;border-color: #2e353d\">\n<tbody>\n<tr>\n<td style=\"width: 3%;padding-left: 0;padding-right: 0;padding-top: 2;border-color: #2e353d;vertical-align: top\"><i class=\"fas fa-search\"><\/i><\/td>\n<td style=\"width: 97%;padding-left: 10;padding-right: 0;padding-top: 0;border-color: #2e353d\">\u201cScanner\u201d\/automation engine<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<p>[\/et_pb_text][\/et_pb_column][et_pb_column type=\"1_3\" _builder_version=\"4.16\" _module_preset=\"default\" global_colors_info=\"{}\"][et_pb_text _builder_version=\"4.16\" _module_preset=\"default\" text_line_height=\"1.5em\" header_6_font_size=\"5px\" background_color=\"RGBA(0,0,0,0)\" global_colors_info=\"{}\"]<\/p>\n<table border=\"0\" style=\"border-collapse: collapse;width: 100%;padding: 0;border-color: #2e353d\">\n<tbody>\n<tr>\n<td style=\"width: 3%;padding-left: 0;padding-right: 0;padding-top: 2;border-color: #2e353d;vertical-align: top\"><i class=\"fas fa-wrench\"><\/i><\/td>\n<td style=\"width: 97%;padding-left: 10;padding-right: 0;padding-top: 0;border-color: #2e353d\"><span>Combines the best publicly available tools and usd in-house developments<\/span><\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<h6><\/h6>\n<table border=\"0\" style=\"border-collapse: collapse;width: 100%;padding: 0;border-color: #2e353d\">\n<tbody>\n<tr>\n<td style=\"width: 3%;padding-left: 0;padding-right: 0;padding-top: 2;border-color: #2e353d;vertical-align: top\"><i class=\"fas fa-clipboard-check\"><\/i><\/td>\n<td style=\"width: 97%;padding-left: 10;padding-right: 0;padding-top: 0;border-color: #2e353d\"><span>Consistently high quality level<\/span><\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<p>[\/et_pb_text][\/et_pb_column][\/et_pb_row][et_pb_row _builder_version=\"4.16\" _module_preset=\"default\" custom_padding=\"||0px|||\" global_colors_info=\"{}\"][et_pb_column type=\"4_4\" _builder_version=\"4.16\" _module_preset=\"default\" global_colors_info=\"{}\"][et_pb_text _builder_version=\"4.16\" _module_preset=\"cc5ac6f4-ebbd-4b3f-bc92-4dfc1f15fe2c\" header_3_text_color=\"#FFFFFF\" header_3_font_size=\"20px\" global_colors_info=\"{}\"]<\/p>\n<h2 class=\"h-custom-headline h2\"><span>usd ExPeRT<\/span><\/h2>\n<h3>Project planning and collaboration support for all team members.<\/h3>\n<p>[\/et_pb_text][\/et_pb_column][\/et_pb_row][et_pb_row column_structure=\"1_3,1_3,1_3\" _builder_version=\"4.16\" _module_preset=\"default\" custom_margin=\"||50px||false|false\" global_colors_info=\"{}\"][et_pb_column type=\"1_3\" _builder_version=\"4.16\" _module_preset=\"default\" global_colors_info=\"{}\"][et_pb_text _builder_version=\"4.16\" _module_preset=\"default\" text_line_height=\"1.5em\" header_6_font_size=\"5px\" background_color=\"RGBA(0,0,0,0)\" global_colors_info=\"{}\"]<\/p>\n<table border=\"0\" style=\"border-collapse: collapse;width: 100%;padding: 0;border-color: #2e353d\">\n<tbody>\n<tr>\n<td style=\"width: 3%;padding-left: 0;padding-right: 0;padding-top: 2;border-color: #2e353d;vertical-align: top\"><i class=\"fas fa-cogs\"><\/i><\/td>\n<td style=\"width: 97%;padding-left: 10;padding-right: 0;padding-top: 0;border-color: #2e353d\"><span>Mapping of our long-standing and proven internal processes<\/span><\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<p>&nbsp;<\/p>\n<table border=\"0\" style=\"border-collapse: collapse;width: 100%;padding: 0;border-color: #2e353d\">\n<tbody>\n<tr>\n<td style=\"width: 3%;padding-left: 0;padding-right: 0;padding-top: 2;border-color: #2e353d;vertical-align: top\"><i class=\"fas fa-clipboard-check\"><\/i><\/td>\n<td style=\"width: 97%;padding-left: 10;padding-right: 0;padding-top: 0;border-color: #2e353d\">Integrated checklists<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<p>[\/et_pb_text][\/et_pb_column][et_pb_column type=\"1_3\" _builder_version=\"4.16\" _module_preset=\"default\" global_colors_info=\"{}\"][et_pb_text _builder_version=\"4.16\" _module_preset=\"default\" text_line_height=\"1.5em\" header_6_font_size=\"5px\" background_color=\"RGBA(0,0,0,0)\" global_colors_info=\"{}\"]<\/p>\n<table border=\"0\" style=\"border-collapse: collapse;width: 100%;padding: 0;border-color: #2e353d\">\n<tbody>\n<tr>\n<td style=\"width: 3%;padding-left: 0;padding-right: 0;padding-top: 2;border-color: #2e353d;vertical-align: top\"><i class=\"fas fa-chart-line\"><\/i><\/td>\n<td style=\"width: 97%;padding-left: 10;padding-right: 0;padding-top: 0;border-color: #2e353d\">Status tracking &amp; resource management<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<p>&nbsp;<\/p>\n<table border=\"0\" style=\"border-collapse: collapse;width: 100%;padding: 0;border-color: #2e353d\">\n<tbody>\n<tr>\n<td style=\"width: 3%;padding-left: 0;padding-right: 0;padding-top: 2;border-color: #2e353d;vertical-align: top\"><span class=\"fas fa-users\"><\/span><\/td>\n<td style=\"width: 97%;padding-left: 10;padding-right: 0;padding-top: 0;border-color: #2e353d\"><span>Project planning &amp; collaboration<\/span><\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<p>[\/et_pb_text][\/et_pb_column][et_pb_column type=\"1_3\" _builder_version=\"4.16\" _module_preset=\"default\" global_colors_info=\"{}\"][et_pb_text _builder_version=\"4.16\" _module_preset=\"default\" text_line_height=\"1.5em\" header_6_font_size=\"5px\" background_color=\"RGBA(0,0,0,0)\" global_colors_info=\"{}\"]<\/p>\n<table border=\"0\" style=\"border-collapse: collapse;width: 100%;padding: 0;border-color: #2e353d\">\n<tbody>\n<tr>\n<td style=\"width: 3%;padding-left: 0;padding-right: 0;padding-top: 2;border-color: #2e353d;vertical-align: top\"><i class=\"fas fa-file-import\"><\/i><\/td>\n<td style=\"width: 97%;padding-left: 10;padding-right: 0;padding-top: 0;border-color: #2e353d\"><span>Importing data from usd Icebreaker<\/span><\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<p>[\/et_pb_text][\/et_pb_column][\/et_pb_row][et_pb_row _builder_version=\"4.16\" _module_preset=\"default\" custom_margin=\"64px|auto||auto||\" custom_padding=\"||0px|||\" global_colors_info=\"{}\"][et_pb_column type=\"4_4\" _builder_version=\"4.16\" _module_preset=\"default\" global_colors_info=\"{}\"][et_pb_text _builder_version=\"4.16\" _module_preset=\"cc5ac6f4-ebbd-4b3f-bc92-4dfc1f15fe2c\" header_3_text_color=\"#FFFFFF\" header_3_font_size=\"20px\" global_colors_info=\"{}\"]<\/p>\n<h2 class=\"h-custom-headline h2\">usd Reporting Tool<\/h2>\n<h3>Results prepared by our analysts.<\/h3>\n<p>[\/et_pb_text][\/et_pb_column][\/et_pb_row][et_pb_row column_structure=\"1_3,1_3,1_3\" _builder_version=\"4.16\" _module_preset=\"default\" custom_margin=\"||50px||false|false\" global_colors_info=\"{}\"][et_pb_column type=\"1_3\" _builder_version=\"4.16\" _module_preset=\"default\" global_colors_info=\"{}\"][et_pb_text _builder_version=\"4.16\" _module_preset=\"default\" text_line_height=\"1.5em\" header_6_font_size=\"5px\" background_color=\"RGBA(0,0,0,0)\" global_colors_info=\"{}\"]<\/p>\n<table border=\"0\" style=\"border-collapse: collapse;width: 100%;padding: 0;border-color: #2e353d\">\n<tbody>\n<tr>\n<td style=\"width: 3%;padding-left: 0;padding-right: 0;padding-top: 2;border-color: #2e353d;vertical-align: top\"><i class=\"fas fa-file\"><\/i><\/td>\n<td style=\"width: 97%;padding-left: 10;padding-right: 0;padding-top: 0;border-color: #2e353d\"><span>Consistent high quality reports<\/span><\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<p>&nbsp;<br \/>\n&nbsp;<\/p>\n<table border=\"0\" style=\"border-collapse: collapse;width: 100%;padding: 0;border-color: #2e353d\">\n<tbody>\n<tr>\n<td style=\"width: 3%;padding-left: 0;padding-right: 0;padding-top: 2;border-color: #2e353d;vertical-align: top\"><i class=\"fas fa-comments\"><\/i><\/td>\n<td style=\"width: 97%;padding-left: 10;padding-right: 0;padding-top: 0;border-color: #2e353d\"><span>Detailed explanation of identified vulnerabilities<\/span><\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<p>[\/et_pb_text][\/et_pb_column][et_pb_column type=\"1_3\" _builder_version=\"4.16\" _module_preset=\"default\" global_colors_info=\"{}\"][et_pb_text _builder_version=\"4.16\" _module_preset=\"default\" text_line_height=\"1.5em\" header_6_font_size=\"5px\" background_color=\"RGBA(0,0,0,0)\" global_colors_info=\"{}\"]<\/p>\n<table border=\"0\" style=\"border-collapse: collapse;width: 100%;padding: 0;border-color: #2e353d\">\n<tbody>\n<tr>\n<td style=\"width: 3%;padding-left: 0;padding-right: 0;padding-top: 2;border-color: #2e353d;vertical-align: top\"><i class=\"fas fa-tv\"><\/i><\/td>\n<td style=\"width: 97%;padding-left: 10;padding-right: 0;padding-top: 0;border-color: #2e353d\"><span>Instructions on how to verify the vulnerability<\/span><\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<p>&nbsp;<\/p>\n<table border=\"0\" style=\"border-collapse: collapse;width: 100%;padding: 0;border-color: #2e353d\">\n<tbody>\n<tr>\n<td style=\"width: 3%;padding-left: 0;padding-right: 0;padding-top: 2;border-color: #2e353d;vertical-align: top\"><i class=\"fas fa-file-import\"><\/i><\/td>\n<td style=\"width: 97%;padding-left: 10;padding-right: 0;padding-top: 0;border-color: #2e353d\"><span>Data import from usd ExPeRT<\/span><\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<p>[\/et_pb_text][\/et_pb_column][et_pb_column type=\"1_3\" _builder_version=\"4.16\" _module_preset=\"default\" global_colors_info=\"{}\"][et_pb_text _builder_version=\"4.16\" _module_preset=\"default\" text_line_height=\"1.5em\" header_6_font_size=\"5px\" background_color=\"RGBA(0,0,0,0)\" global_colors_info=\"{}\"]<\/p>\n<table border=\"0\" style=\"border-collapse: collapse;width: 100%;padding: 0;border-color: #2e353d\">\n<tbody>\n<tr>\n<td style=\"width: 3%;padding-left: 0;padding-right: 0;padding-top: 2;border-color: #2e353d;vertical-align: top\"><i class=\"fas fa-file-alt\"><\/i><\/td>\n<td style=\"width: 97%;padding-left: 10;padding-right: 0;padding-top: 0;border-color: #2e353d\"><span>Concrete recommendation of measures to remedy the vulnerability<\/span><\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<p>[\/et_pb_text][\/et_pb_column][\/et_pb_row][et_pb_row _builder_version=\"4.16\" _module_preset=\"default\" custom_margin=\"64px|auto||auto||\" custom_padding=\"||0px|||\" global_colors_info=\"{}\"][et_pb_column type=\"4_4\" _builder_version=\"4.16\" _module_preset=\"default\" global_colors_info=\"{}\"][et_pb_text _builder_version=\"4.16\" _module_preset=\"cc5ac6f4-ebbd-4b3f-bc92-4dfc1f15fe2c\" global_colors_info=\"{}\"]<\/p>\n<h2 class=\"h-custom-headline h2\">Cyber Security Transformation Chef (CSTC)<\/h2>\n<p>[\/et_pb_text][\/et_pb_column][\/et_pb_row][et_pb_row column_structure=\"2_5,3_5\" _builder_version=\"4.16\" _module_preset=\"default\" global_colors_info=\"{}\"][et_pb_column type=\"2_5\" _builder_version=\"4.16\" _module_preset=\"default\" global_colors_info=\"{}\"][et_pb_image src=\"https:\/\/herolab.usd.de\/wp-content\/uploads\/sites\/9\/2021\/07\/News-Beitragsbild-CSTC.png\" title_text=\"News-Beitragsbild-CSTC\" _builder_version=\"4.16.1\" _module_preset=\"default\" global_colors_info=\"{}\"][\/et_pb_image][et_pb_button button_url=\"https:\/\/www.youtube.com\/watch?v=BUXvWfb_YWU\" url_new_window=\"on\" button_text=\"Watch Video on YouTube\" button_alignment=\"center\" _builder_version=\"4.16.1\" _module_preset=\"default\" button_text_color=\"#FFFFFF\" button_bg_color=\"rgba(134,204,207,0.74)\" global_colors_info=\"{}\"][\/et_pb_button][\/et_pb_column][et_pb_column type=\"3_5\" _builder_version=\"4.16\" _module_preset=\"default\" global_colors_info=\"{}\"][et_pb_text _builder_version=\"4.16\" _module_preset=\"default\" global_colors_info=\"{}\"]<\/p>\n<p><span>This\u00a0<\/span><a href=\"https:\/\/github.com\/usdAG\/cstc\" target=\"_blank\" rel=\"noopener\">Burp Suite plugin<\/a><span>\u00a0enables penetration testers to efficiently analyze complex web appliactions.<\/span><\/p>\n<p>[\/et_pb_text][et_pb_button button_url=\"\/en\/news-cyber-security-transformation-chef\/\" button_text=\"Read more\" _builder_version=\"4.16\" _module_preset=\"default\" global_colors_info=\"{}\"][\/et_pb_button][\/et_pb_column][\/et_pb_row][et_pb_row _builder_version=\"4.16\" _module_preset=\"default\" custom_margin=\"64px|auto||auto||\" custom_padding=\"||0px|||\" global_colors_info=\"{}\"][et_pb_column type=\"4_4\" _builder_version=\"4.16\" _module_preset=\"default\" global_colors_info=\"{}\"][et_pb_text _builder_version=\"4.16\" _module_preset=\"cc5ac6f4-ebbd-4b3f-bc92-4dfc1f15fe2c\" global_colors_info=\"{}\"]<\/p>\n<h2 class=\"h-custom-headline h2\">remote-method-guesser: A Java RMI Vulnerability Scanner<\/h2>\n<p>[\/et_pb_text][\/et_pb_column][\/et_pb_row][et_pb_row column_structure=\"3_5,2_5\" _builder_version=\"4.16\" _module_preset=\"default\" global_colors_info=\"{}\"][et_pb_column type=\"3_5\" _builder_version=\"4.16\" _module_preset=\"default\" global_colors_info=\"{}\"][et_pb_text _builder_version=\"4.16\" _module_preset=\"default\" global_colors_info=\"{}\"]<\/p>\n<p>The open source tool \"remote-method-guesser (rmg)\" is a Java RMI vulnerability scanner looking for misconfigurations in Java RMI endpoints.<\/p>\n<p>[\/et_pb_text][et_pb_button button_url=\"https:\/\/www.usd.de\/en\/presentation-black-hat-usa-2021\/\" button_text=\"Read more\" _builder_version=\"4.16\" _module_preset=\"default\" global_colors_info=\"{}\"][\/et_pb_button][\/et_pb_column][et_pb_column type=\"2_5\" _builder_version=\"4.16\" _module_preset=\"default\" global_colors_info=\"{}\"][et_pb_image src=\"https:\/\/herolab.usd.de\/wp-content\/uploads\/sites\/9\/2022\/04\/remote-method-guesser.jpg\" title_text=\"remote-method-guesser\" _builder_version=\"4.16.1\" _module_preset=\"default\" global_colors_info=\"{}\"][\/et_pb_image][et_pb_button button_url=\"https:\/\/www.youtube.com\/watch?v=t_aw1mDNhzI\" url_new_window=\"on\" button_text=\"Watch Video on YouTube\" button_alignment=\"center\" _builder_version=\"4.16.1\" _module_preset=\"default\" button_text_color=\"#FFFFFF\" button_bg_color=\"rgba(134,204,207,0.74)\" global_colors_info=\"{}\"][\/et_pb_button][\/et_pb_column][\/et_pb_row][et_pb_row _builder_version=\"4.16\" _module_preset=\"default\" custom_margin=\"64px|auto||auto||\" custom_padding=\"||0px|||\" global_colors_info=\"{}\"][et_pb_column type=\"4_4\" _builder_version=\"4.16\" _module_preset=\"default\" global_colors_info=\"{}\"][et_pb_text _builder_version=\"4.23\" _module_preset=\"cc5ac6f4-ebbd-4b3f-bc92-4dfc1f15fe2c\" global_colors_info=\"{}\"]<\/p>\n<h2 class=\"h-custom-headline h2\">SNC Scan<\/h2>\n<p>[\/et_pb_text][\/et_pb_column][\/et_pb_row][et_pb_row column_structure=\"2_5,3_5\" _builder_version=\"4.16\" _module_preset=\"default\" global_colors_info=\"{}\"][et_pb_column type=\"2_5\" _builder_version=\"4.16\" _module_preset=\"default\" global_colors_info=\"{}\"][et_pb_image src=\"https:\/\/herolab.usd.de\/wp-content\/uploads\/sites\/9\/2023\/11\/usd-herolab-sncscan-logo.png\" title_text=\"usd-herolab-sncscan-logo\" _builder_version=\"4.23\" _module_preset=\"default\" global_colors_info=\"{}\"][\/et_pb_image][\/et_pb_column][et_pb_column type=\"3_5\" _builder_version=\"4.16\" _module_preset=\"default\" global_colors_info=\"{}\"][et_pb_text _builder_version=\"4.23\" _module_preset=\"default\" global_colors_info=\"{}\"]<\/p>\n<p>The SNC Scan enables the analysis of the SAP Secure Network Communication (SNC) protocol and identifies insecure configurations.<\/p>\n<p>[\/et_pb_text][et_pb_button button_url=\"https:\/\/github.com\/usdAG\/sncscan\" button_text=\"Read more\" _builder_version=\"4.23\" _module_preset=\"default\" global_colors_info=\"{}\"][\/et_pb_button][\/et_pb_column][\/et_pb_row][et_pb_row _builder_version=\"4.16\" _module_preset=\"default\" custom_margin=\"64px|auto||auto||\" custom_padding=\"||0px|||\" global_colors_info=\"{}\"][et_pb_column type=\"4_4\" _builder_version=\"4.16\" _module_preset=\"default\" global_colors_info=\"{}\"][et_pb_text _builder_version=\"4.23\" _module_preset=\"cc5ac6f4-ebbd-4b3f-bc92-4dfc1f15fe2c\" global_colors_info=\"{}\"]<\/p>\n<h2 class=\"h-custom-headline h2\">FlowMate<\/h2>\n<p>[\/et_pb_text][\/et_pb_column][\/et_pb_row][et_pb_row column_structure=\"3_5,2_5\" _builder_version=\"4.16\" _module_preset=\"default\" global_colors_info=\"{}\"][et_pb_column type=\"3_5\" _builder_version=\"4.16\" _module_preset=\"default\" global_colors_info=\"{}\"][et_pb_text _builder_version=\"4.23\" _module_preset=\"default\" global_colors_info=\"{}\"]<\/p>\n<p>The BurpSuite plugin FlowMate increases coverage in web pentests through data flow analysis and automated evaluation.<\/p>\n<p>[\/et_pb_text][et_pb_button button_url=\"https:\/\/github.com\/usdAG\/FlowMate\" button_text=\"Read more\" _builder_version=\"4.23\" _module_preset=\"default\" global_colors_info=\"{}\"][\/et_pb_button][\/et_pb_column][et_pb_column type=\"2_5\" _builder_version=\"4.16\" _module_preset=\"default\" global_colors_info=\"{}\"][et_pb_image src=\"https:\/\/herolab.usd.de\/wp-content\/uploads\/sites\/9\/2023\/11\/usd-herolab-flowmate-logo.png\" title_text=\"usd-herolab-flowmate-logo\" _builder_version=\"4.23\" _module_preset=\"default\" global_colors_info=\"{}\"][\/et_pb_image][\/et_pb_column][\/et_pb_row][et_pb_row _builder_version=\"4.16\" _module_preset=\"default\" custom_margin=\"64px|auto||auto||\" custom_padding=\"||0px|||\" global_colors_info=\"{}\"][et_pb_column type=\"4_4\" _builder_version=\"4.16\" _module_preset=\"default\" global_colors_info=\"{}\"][et_pb_text _builder_version=\"4.27.4\" _module_preset=\"cc5ac6f4-ebbd-4b3f-bc92-4dfc1f15fe2c\" hover_enabled=\"0\" global_colors_info=\"{}\" sticky_enabled=\"0\"]<\/p>\n<h2 class=\"h-custom-headline h2\">Static Analyis Hero<\/h2>\n<p>[\/et_pb_text][\/et_pb_column][\/et_pb_row][et_pb_row column_structure=\"2_5,3_5\" _builder_version=\"4.16\" _module_preset=\"default\" global_colors_info=\"{}\"][et_pb_column type=\"2_5\" _builder_version=\"4.16\" _module_preset=\"default\" global_colors_info=\"{}\"][et_pb_image src=\"https:\/\/herolab.usd.de\/wp-content\/uploads\/sites\/9\/2025\/08\/usd-herolab-static-analysis-hero-logo.png\" title_text=\"usd-herolab-static-analysis-hero-logo\" _builder_version=\"4.27.4\" _module_preset=\"default\" hover_enabled=\"0\" global_colors_info=\"{}\" width=\"80%\" sticky_enabled=\"0\"][\/et_pb_image][\/et_pb_column][et_pb_column type=\"3_5\" _builder_version=\"4.16\" _module_preset=\"default\" global_colors_info=\"{}\"][et_pb_text _builder_version=\"4.27.4\" _module_preset=\"default\" hover_enabled=\"0\" global_colors_info=\"{}\" sticky_enabled=\"0\"]Static Analysis Hero is a Visual Studio Code extension for efficient and effective security code reviews. It integrates external code scanning tools (e.g. semgrep \/ opengrep) and provides a toolbox for reviewing source code for security vulnerabilities.[\/et_pb_text][et_pb_button button_url=\"https:\/\/github.com\/usdAG\/SAH\" button_text=\"Read more\" _builder_version=\"4.27.4\" _module_preset=\"default\" hover_enabled=\"0\" global_colors_info=\"{}\" url_new_window=\"on\" sticky_enabled=\"0\"][\/et_pb_button][\/et_pb_column][\/et_pb_row][et_pb_row _builder_version=\"4.16\" _module_preset=\"default\" custom_margin=\"64px|auto||auto||\" custom_padding=\"||0px|||\" global_colors_info=\"{}\"][et_pb_column type=\"4_4\" _builder_version=\"4.16\" _module_preset=\"default\" global_colors_info=\"{}\"][et_pb_text _builder_version=\"4.16\" _module_preset=\"cc5ac6f4-ebbd-4b3f-bc92-4dfc1f15fe2c\" header_3_text_color=\"#FFFFFF\" header_3_font_size=\"20px\" global_colors_info=\"{}\"]<\/p>\n<h2 class=\"h-custom-headline h2\">usd PentestLab<\/h2>\n<h3>Our training and education environment<\/h3>\n<p>[\/et_pb_text][\/et_pb_column][\/et_pb_row][et_pb_row column_structure=\"1_3,1_3,1_3\" _builder_version=\"4.16\" _module_preset=\"default\" global_colors_info=\"{}\"][et_pb_column type=\"1_3\" _builder_version=\"4.16\" _module_preset=\"default\" global_colors_info=\"{}\"][et_pb_image src=\"https:\/\/herolab.usd.de\/wp-content\/uploads\/sites\/9\/2021\/07\/usd-pentestlab-darstellung-en.png\" title_text=\"usd-pentestlab-darstellung-en\" url=\"\/wie-wir-arbeiten\/#ucp\" _builder_version=\"4.16\" _module_preset=\"default\" global_colors_info=\"{}\"][\/et_pb_image][\/et_pb_column][et_pb_column type=\"1_3\" _builder_version=\"4.16\" _module_preset=\"default\" custom_css_main_element=\"width: 15%!important;\" global_colors_info=\"{}\" custom_css_main_element_last_edited=\"on|phone\" custom_css_main_element_phone=\"width: 20%!important;\" custom_css_main_element_tablet=\"width: 15%!important;\"][et_pb_image src=\"https:\/\/herolab.usd.de\/wp-content\/uploads\/sites\/9\/2021\/07\/usd-herolab-certified-pro-badge.png\" title_text=\"usd-herolab-certified-pro-badge\" url=\"\/unser-pentestlab\/\" _builder_version=\"4.16\" _module_preset=\"default\" global_colors_info=\"{}\"][\/et_pb_image][\/et_pb_column][et_pb_column type=\"1_3\" _builder_version=\"4.16\" _module_preset=\"default\" custom_padding_tablet=\"|||45px|false|false\" custom_padding_phone=\"|||24px|false|false\" custom_padding_last_edited=\"on|desktop\" custom_css_main_element=\"width: 43%!important;\" global_colors_info=\"{}\" custom_css_main_element_last_edited=\"on|phone\" custom_css_main_element_tablet=\"width: 70%!important;\" custom_css_main_element_phone=\"width: 80%!important;\"][et_pb_text _builder_version=\"4.16\" _module_preset=\"default\" global_colors_info=\"{}\"]<\/p>\n<p><span>Pentesters can train their methodical skills, creativity and endurance in real life pentesting, using a continuously growing number of preconfigured server environments, various technologies and vulnerabilities of varying difficulty levels. No isolated tasks. No reports. No jury. Only skill counts. The PentestLab is not only used by our own pentesters, but also serves as a training environment for our clients during\u00a0<\/span><a href=\"https:\/\/www.usd.de\/en\/cst-academy\/events\/\" target=\"_blank\" rel=\"noopener\">CST Academy events<\/a><span>, and is the basis for our regular Hackers\u2019 Days designed for students and universities.<\/span><\/p>\n<p>[\/et_pb_text][et_pb_button button_url=\"\/en\/our-pentestlab\/\" button_text=\"Learn more\" _builder_version=\"4.16\" _module_preset=\"default\" global_colors_info=\"{}\"][\/et_pb_button][\/et_pb_column][\/et_pb_row][et_pb_row column_structure=\"2_5,3_5\" _builder_version=\"4.16\" _module_preset=\"default\" custom_margin=\"90px|auto||auto||\" global_colors_info=\"{}\"][et_pb_column type=\"2_5\" _builder_version=\"4.16\" _module_preset=\"default\" global_colors_info=\"{}\"][et_pb_image src=\"https:\/\/herolab.usd.de\/wp-content\/uploads\/sites\/9\/2021\/07\/usd-herolab-Plattformen.jpeg\" title_text=\"usd-herolab-Plattformen\" url=\"https:\/\/www.usd.de\/kontaktformular-analysis-pentests\/\" _builder_version=\"4.16\" _module_preset=\"default\" global_colors_info=\"{}\"][\/et_pb_image][\/et_pb_column][et_pb_column type=\"3_5\" _builder_version=\"4.16\" _module_preset=\"default\" global_colors_info=\"{}\"][et_pb_text _builder_version=\"4.16\" _module_preset=\"default\" global_colors_info=\"{}\"]<\/p>\n<h3>Optimal support<\/h3>\n<p>The basis for an efficient process and vulnerability management is the integration of the platform into your company. Your assets, primary contacts and the status of your pentests are displayed here. We are happy to support you during the rollout and train your employees if desired. Acting as partners. Transparent, secure and efficient.<\/p>\n<p>[\/et_pb_text][et_pb_button button_url=\"https:\/\/www.usd.de\/en\/contact-form-analysis-pentests\/\" button_text=\"Contact\" _builder_version=\"4.16\" _module_preset=\"default\" global_colors_info=\"{}\"][\/et_pb_button][\/et_pb_column][\/et_pb_row][\/et_pb_section]<\/p>\n","protected":false},"excerpt":{"rendered":"<p>usd HeroLab Toolchain &nbsp; We place the highest demands on the quality of our work. To ensure that security analyses are always carried out with constant efficiency and quality, our own tools are subject to strict quality management and optimization processes, taking into account the results of our research.usd Icebreaker Analysis tool for all team [&hellip;]<\/p>\n","protected":false},"author":96,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"_et_pb_use_builder":"on","_et_pb_old_content":"","_et_gb_content_width":"","inline_featured_image":false,"footnotes":""},"class_list":["post-16136","page","type-page","status-publish","hentry"],"_links":{"self":[{"href":"https:\/\/herolab.usd.de\/en\/wp-json\/wp\/v2\/pages\/16136","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/herolab.usd.de\/en\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/herolab.usd.de\/en\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/herolab.usd.de\/en\/wp-json\/wp\/v2\/users\/96"}],"replies":[{"embeddable":true,"href":"https:\/\/herolab.usd.de\/en\/wp-json\/wp\/v2\/comments?post=16136"}],"version-history":[{"count":4,"href":"https:\/\/herolab.usd.de\/en\/wp-json\/wp\/v2\/pages\/16136\/revisions"}],"predecessor-version":[{"id":24307,"href":"https:\/\/herolab.usd.de\/en\/wp-json\/wp\/v2\/pages\/16136\/revisions\/24307"}],"wp:attachment":[{"href":"https:\/\/herolab.usd.de\/en\/wp-json\/wp\/v2\/media?parent=16136"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}