JFR-C / SAP-Security-AuditLinks
Training course materials and notes related to SAP security audit and penetration testing
☆84Updated 11 months ago
Alternatives and similar repositories for SAP-Security-Audit
Users that are interested in SAP-Security-Audit are comparing it to the libraries listed below
Sorting:
- ☆73Updated 7 years ago
- CoWitness is a powerful web application testing tool that enhances the accuracy and efficiency of your testing efforts. It allows you to …☆126Updated last year
- Enumerate AWS permissions and resources.☆71Updated 3 years ago
- OWASP SAPKiln is a graphical user interface (GUI) tool designed to facilitate securing and auditing SAP systems effectively.☆26Updated 2 years ago
- Notes for CRTP☆42Updated 5 years ago
- Review of AWAE.OSWE☆31Updated 3 years ago
- Network penetration testing toolset wrapper☆81Updated 3 years ago
- Find the remote website version based on a git repository☆126Updated 4 years ago
- ☆120Updated 3 years ago
- Lookup for interesting stuff in SMB shares☆151Updated 2 years ago
- A Azure Exploitation Toolkit for Red Team & Pentesters☆166Updated 2 years ago
- Traditional AD RedTeam Full Enumeration Script used to query all aspects of your target Forest.☆43Updated last year
- ☆45Updated 3 years ago
- Upload files done during my research.☆169Updated last month
- The great Microsoft exchange hack: A penetration tester’s guide (exchange penetration testing)☆128Updated 5 months ago
- A Python implementation of dafthack's MSOLSpray. A password spraying tool for Microsoft Online accounts (Azure/O365). The script logs if …☆97Updated last year
- a map for the azure oriented pentests☆70Updated 2 years ago
- A fast enumeration tool for publicly exposed Azure Storage blobs.☆116Updated 2 years ago
- Collaborative vulnerability database for Pentesting & Pwndoc-Ng☆21Updated 2 years ago
- WhereToGo - is a list of popular services that might be used in organizations. By having an account of the user - you can try to find ent…☆128Updated 3 years ago
- ☆94Updated 3 years ago
- ☆24Updated 6 years ago
- ☆22Updated last year
- ☆16Updated 4 years ago
- Use the GCP testIamPermissions functionality to bruteforce and discover your permissions☆45Updated 7 months ago
- "Terrible Thick Client" is a vulnerable application developed in C# .NET framework.☆20Updated 2 years ago
- Collection of offensive tools targeting Microsoft Azure☆216Updated 3 years ago
- ☆55Updated 3 weeks ago
- ☆42Updated 3 years ago
- ☆29Updated 4 years ago