Onapsis / onapsis_icmad_scanner
☆45Updated 2 years ago
Related projects ⓘ
Alternatives and complementary repositories for onapsis_icmad_scanner
- PoC for CVE-2020-6207 (Missing Authentication Check in SAP Solution Manager)☆81Updated 3 years ago
- SAP memory pipes(MPI) desynchronization vulnerability CVE-2022-22536.☆50Updated 2 years ago
- A fingerprint generation helper for nuclei network templates☆71Updated last year
- F5 BIG-IP RCE exploitation (CVE-2022-1388)☆87Updated 2 years ago
- Determine the running software version of a remote F5 BIG-IP management interface.☆63Updated 10 months ago
- ☆64Updated 6 years ago
- Spring Framework RCE (CVE-2022-22965) Nmap (NSE) Checker (Non-Intrusive)☆101Updated 2 years ago
- Utility for creating ZipSlip archives☆66Updated last year
- Repository of CVE found by OCD people☆73Updated 4 months ago
- BurpSuite Extension: A one-stop pen testing checklist and logger tool☆74Updated 2 years ago
- A tool for performing light brute-forcing of HTTP servers to identify commonly accessible NTLM authentication endpoints.☆79Updated 11 months ago
- Recurrent Neural Network SubDomain Discovery Tool☆89Updated 2 years ago
- A simple remote scanner for Atlassian Jira☆118Updated last year
- CVE-2021-38647 - POC to exploit unauthenticated RCE #OMIGOD☆68Updated 3 years ago
- RCE for Pega Infinity >= 8.2.1, Pega Infinity <= 8.5.2☆60Updated 3 years ago
- ☆54Updated 3 years ago
- SAP Gateway RCE exploits☆150Updated 4 years ago
- PoC for CVE-2020-6287, CVE-2020-6286 (SAP RECON vulnerability)☆215Updated 4 years ago
- RmiTaste allows security professionals to detect, enumerate, interact and exploit RMI services by calling remote methods with gadgets fro…☆106Updated 4 years ago
- ☆32Updated 2 years ago
- Static code analysis tool based on Elasticsearch☆130Updated 3 years ago
- Python script for SAP secure storage decrypton☆13Updated 6 years ago
- ☆99Updated 3 years ago
- Exploit and Check Script for CVE 2022-1388☆58Updated 2 years ago
- Perform TE.CL HTTP Request Smuggling attacks by crafting HTTP Request automatically.☆67Updated 2 years ago
- ☆26Updated 2 years ago
- A selection of rebuilt and from scratch exploits, scripts and ideas that can be used in red-teaming scenarios.☆6Updated 9 months ago
- ☆28Updated 2 years ago
- PickleC2 is a post-exploitation and lateral movements framework☆83Updated 3 years ago