Training course materials and notes related to SAP security audit and penetration testing
☆88Feb 21, 2025Updated last year
Alternatives and similar repositories for SAP-Security-Audit
Users that are interested in SAP-Security-Audit are comparing it to the libraries listed below
Sorting:
- SAP security maturity model☆14Mar 6, 2024Updated last year
- SAP security analysis (using sap gui scripting)☆19Jun 28, 2020Updated 5 years ago
- ☆73Nov 5, 2018Updated 7 years ago
- If you use security-related services and tools such as EWA, SOS, System Recommendations, Configuration Validation, or a security dashboar…☆62Jul 24, 2025Updated 7 months ago
- OWASP SAPKiln is a graphical user interface (GUI) tool designed to facilitate securing and auditing SAP systems effectively.☆27Jul 29, 2023Updated 2 years ago
- The SAP Threat Modeling Tool is an on-premises open-source web application designed to analyze and visualize connections between SAP syst…☆51Mar 7, 2025Updated 11 months ago
- SAP Message Server research presented at OPCDE 2019☆35Aug 18, 2020Updated 5 years ago
- pysap is an open source Python library that provides modules for crafting and sending packets using SAP's NI, Diag, Enqueue, Router, MS, …☆242Dec 4, 2024Updated last year
- ☆19Jun 11, 2013Updated 12 years ago
- Nmap custom probes for better detecting SAP services☆142Mar 8, 2024Updated last year
- pysap SAPMS+SAPRFC patches for Gateway / MS research☆11Apr 30, 2019Updated 6 years ago
- Tool for obtaining information about PPL processes☆16Feb 12, 2024Updated 2 years ago
- SAP Penetration Testing: A Comprehensive Analysis of SAP Security Issues☆41Nov 23, 2023Updated 2 years ago
- Best practices check examples for creating CSA policies in SAP Focused Run☆41Feb 13, 2026Updated 2 weeks ago
- SAP Gateway RCE exploits☆159Sep 7, 2020Updated 5 years ago
- Templates for SAP HANA audit policies of SAP S/4HANA systems.☆19Jul 23, 2025Updated 7 months ago
- An enumeration and exploitation toolkit using RFC calls to SAP☆40Jan 8, 2020Updated 6 years ago
- Tool for analyzing SAP Secure Network Communications (SNC).☆59Apr 16, 2024Updated last year
- Powershell SAP assessment tool☆199Aug 13, 2018Updated 7 years ago
- ☆22Mar 24, 2025Updated 11 months ago
- A quick methodology on testing / hacking SAP Applications for n00bz and bug bounty hunters☆254Oct 26, 2022Updated 3 years ago
- Containerization by IBM for SAP S/4HANA with Red Hat OpenShift☆13Sep 17, 2025Updated 5 months ago
- Regex based secret scanner for sccm deployment points sccmcontentlib$ shares. Find secrets automatically and download entire packages for…☆18Aug 13, 2025Updated 6 months ago
- Items related to the RedELK workshop given at security conferences☆29Sep 28, 2023Updated 2 years ago
- Technical notes, AD pentest methodology, list of tools, scripts and Windows commands that are useful for internal penetration tests and a…☆301Jan 1, 2026Updated 2 months ago
- Oyedata is a tool to perform OData assessments☆13Aug 3, 2012Updated 13 years ago
- wtftp.py is a tool to attack Microsoft Deployment Toolkit (MDT) and Windows Deployment Services (WDS).☆30Jan 22, 2026Updated last month
- bladeRF driver for SDR#☆11Oct 16, 2018Updated 7 years ago
- InfoSec Notes☆60Mar 23, 2024Updated last year
- Zoho ManageEngine Desktop Central CVEs☆15Oct 5, 2020Updated 5 years ago
- VLAN attacks toolkit☆12Sep 1, 2022Updated 3 years ago
- SAP memory pipes(MPI) desynchronization vulnerability CVE-2022-22536.☆51Feb 21, 2022Updated 4 years ago
- CONTROL C2 is a command and control framework designed for red teamers and penetration testers.☆15Oct 16, 2024Updated last year
- Python script for SAP secure storage decrypton☆13Mar 14, 2018Updated 7 years ago
- Implementation of USENIX'2024 paper "Racing for TLS Certificate Validation: A Hijacker’s Guide to the Android TLS Galaxy"☆20Apr 4, 2024Updated last year
- ☆32Feb 13, 2026Updated 2 weeks ago
- PoC for CVE-2020-6287, CVE-2020-6286 (SAP RECON vulnerability)☆226Sep 29, 2020Updated 5 years ago
- Tous les trucs utilisés dans les Tutos, les shellcodes, les templates, les notes...☆14Jan 15, 2024Updated 2 years ago
- Threat Hunt Investigation Methodology and Procedure☆15Jul 11, 2022Updated 3 years ago