JFR-C / SAP-Security-AuditLinks
Training course materials and notes related to SAP security audit and penetration testing
☆84Updated 11 months ago
Alternatives and similar repositories for SAP-Security-Audit
Users that are interested in SAP-Security-Audit are comparing it to the libraries listed below
Sorting:
- Traditional AD RedTeam Full Enumeration Script used to query all aspects of your target Forest.☆43Updated last year
- Review of AWAE.OSWE☆31Updated 3 years ago
- Notes for CRTP☆42Updated 5 years ago
- ☆73Updated 7 years ago
- Enumerate AWS permissions and resources.☆71Updated 3 years ago
- ☆39Updated 4 years ago
- My Offensive Security OSWA certification experience and my personal opinion what helps in preparation for the exam☆42Updated 2 years ago
- ☆22Updated last year
- ☆42Updated 3 years ago
- a map for the azure oriented pentests☆70Updated 2 years ago
- A Azure Exploitation Toolkit for Red Team & Pentesters☆166Updated 2 years ago
- ☆37Updated 4 years ago
- Network penetration testing toolset wrapper☆81Updated 3 years ago
- CoWitness is a powerful web application testing tool that enhances the accuracy and efficiency of your testing efforts. It allows you to …☆126Updated last year
- The great Microsoft exchange hack: A penetration tester’s guide (exchange penetration testing)☆129Updated 5 months ago
- Repo containing my personal walkthroughs of PMAT Labs i.e. PMAT Malware Samples.☆43Updated 3 years ago
- Publicly availalbe vulnarble by desgin vm/machines☆43Updated 3 years ago
- OWASP SAPKiln is a graphical user interface (GUI) tool designed to facilitate securing and auditing SAP systems effectively.☆26Updated 2 years ago
- Repository with quick triggers to help during Pentest in an Active Directory environment.☆47Updated 6 months ago
- ☆55Updated last month
- This repo will contain some basic pentest/RT commands.☆37Updated 3 years ago
- User enumeration and password spraying tool for testing Azure AD☆71Updated 3 years ago
- "Terrible Thick Client" is a vulnerable application developed in C# .NET framework.☆20Updated 2 years ago
- A fast enumeration tool for publicly exposed Azure Storage blobs.☆116Updated 2 years ago
- Docker network containing many vulnerable targets for practicing Red Teaming concepts (initial access, priv esc, persistence, lateral, C2…☆86Updated 2 years ago
- Vulnerable thick client applications used as examples in the Introduction to Hacking Desktop Applications blog series☆107Updated 2 years ago
- This lab is created to demonstrate pass-the-hash, blind sql and SSTI vulnerabilities☆93Updated 2 years ago
- SAP Penetration Testing: A Comprehensive Analysis of SAP Security Issues☆40Updated 2 years ago
- InfoSec Notes☆61Updated last year
- Offensive Security OSWE Prep 2022☆76Updated 3 years ago