Onapsis / onapsis_icmad_scannerView external linksLinks
☆44Feb 10, 2022Updated 4 years ago
Alternatives and similar repositories for onapsis_icmad_scanner
Users that are interested in onapsis_icmad_scanner are comparing it to the libraries listed below
Sorting:
- SAP memory pipes(MPI) desynchronization vulnerability CVE-2022-22536.☆51Feb 21, 2022Updated 3 years ago
- Interactsh deployment to AWS EC2 Instance with Terraform☆11Dec 29, 2021Updated 4 years ago
- SAP security analysis (using sap gui scripting)☆19Jun 28, 2020Updated 5 years ago
- Best practices check examples for creating CSA policies in SAP Focused Run☆40Jan 16, 2026Updated 3 weeks ago
- All about CVE-2018-14667; From what it is to how to successfully exploit it.☆50Nov 30, 2018Updated 7 years ago
- A Python Library designed to facilitate interaction with Synack's undocumented API endpoints☆26Mar 4, 2025Updated 11 months ago
- A project demonstrating an app that is vulnerable to Spring Security authorization bypass CVE-2022-31692☆35Nov 7, 2022Updated 3 years ago
- The original slurp source☆33Nov 25, 2018Updated 7 years ago
- Scripts to integrate DFIR-IRIS, MISP and TimeSketch☆34Feb 2, 2022Updated 4 years ago
- ABAP syntax highlighting for Visual Studio Code☆33Jul 17, 2024Updated last year
- Training course materials and notes related to SAP security audit and penetration testing☆84Feb 21, 2025Updated 11 months ago
- Material do Grupo de Estudos em Ciência de Dados☆13Jan 25, 2021Updated 5 years ago
- SAML2 Burp Extension☆33Jan 22, 2026Updated 3 weeks ago
- PoC for CVE-2020-6207 (Missing Authentication Check in SAP Solution Manager)☆81Jan 15, 2021Updated 5 years ago
- A tool that can take a URL or list of URL and prints back SAML consume URL.☆36Feb 4, 2019Updated 7 years ago
- A security assessment tool for Hitachi Vantara's Pentaho Business Analytics platform.☆14Oct 31, 2021Updated 4 years ago
- Java DNS Post Exploitation Tool☆11Jul 21, 2024Updated last year
- Containerization by IBM for SAP S/4HANA with Red Hat OpenShift☆13Sep 17, 2025Updated 4 months ago
- Reproducible Analytical Pipeline of the Hospital Standardised Mortality Ratio (HSMR) quarterly publication☆11Jun 21, 2024Updated last year
- dockerfile of Acunetix Web Vulnerability Scanner14(210615184)☆14Jun 24, 2021Updated 4 years ago
- ☆66Oct 19, 2021Updated 4 years ago
- learning case to prepare OSWE☆37Nov 4, 2019Updated 6 years ago
- This repository offers insights and a proof-of-concept tool to exploit two significant deserialization vulnerabilities in Inductive Autom…☆46Dec 22, 2023Updated 2 years ago
- SMB Auto Relay provides the automation of SMB/NTLM Relay technique for pentesting and red teaming exercises in active directory environme…☆47Dec 20, 2020Updated 5 years ago
- Show differences between UI5 Versions☆12Updated this week
- String extraction and classification tool for binary files, designed to extract only the strings that can be considered relevant (i.e. no…☆10Aug 9, 2020Updated 5 years ago
- Truly unique, provable Certificates for Companies and Universities☆11Jun 28, 2022Updated 3 years ago
- repo do Diego☆10Nov 7, 2023Updated 2 years ago
- Review and audit all shares☆13Updated this week
- ☆20Jan 12, 2022Updated 4 years ago
- BSides, OWASP, DEFCON, RSAC, SANS Talk Material, References and Extra Bits☆14Jul 19, 2025Updated 6 months ago
- Active Directory Tiered Administration Model☆18Aug 2, 2025Updated 6 months ago
- Template for living data workflow☆13Jan 30, 2019Updated 7 years ago
- Postador Automático de Imagens no Facebook.☆10Feb 13, 2021Updated 5 years ago
- Repositório da Disciplina de Geoprocessamento - UFRPE☆13Mar 2, 2020Updated 5 years ago
- The repository contains Criminal IP Asset Search data in STIX 2.1 JSON format, enabling a quick understanding of threat information for s…☆11Jan 29, 2024Updated 2 years ago
- Apache Superset Auth Bypass (CVE-2023-27524)☆11May 9, 2023Updated 2 years ago
- Collection of generative art made by me.☆10Jul 8, 2018Updated 7 years ago
- My configurations (dotfiles) and Fedora Workstation setup with ansible☆10Aug 16, 2021Updated 4 years ago