☆43Feb 10, 2022Updated 4 years ago
Alternatives and similar repositories for onapsis_icmad_scanner
Users that are interested in onapsis_icmad_scanner are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- SAP memory pipes(MPI) desynchronization vulnerability CVE-2022-22536.☆51Feb 21, 2022Updated 4 years ago
- ☆28Feb 17, 2022Updated 4 years ago
- Interactsh deployment to AWS EC2 Instance with Terraform☆12Dec 29, 2021Updated 4 years ago
- SAP security analysis (using sap gui scripting)☆20Jun 28, 2020Updated 5 years ago
- SAP Message Server research presented at OPCDE 2019☆35Aug 18, 2020Updated 5 years ago
- Deploy open-source AI quickly and easily - Special Bonus Offer • AdRunpod Hub is built for open source. One-click deployment and autoscaling endpoints without provisioning your own infrastructure.
- Go module that returns supported regions for a service or supported services for a region☆18Dec 12, 2025Updated 4 months ago
- Training course materials and notes related to SAP security audit and penetration testing☆90Feb 21, 2025Updated last year
- UDP reverse shells for *nix systems, plaintext and over DTLS.☆13Jun 27, 2019Updated 6 years ago
- Demo webapp with Selenium, Docker, Django, Postgresql, Celery, RabbitMQ, Django channels and Redis.☆13Jul 17, 2021Updated 4 years ago
- Best practices check examples for creating CSA policies in SAP Focused Run☆41Apr 16, 2026Updated 2 weeks ago
- Java DNS Post Exploitation Tool☆11Jul 21, 2024Updated last year
- Templates for SAP HANA audit policies of SAP S/4HANA systems.☆19Jul 23, 2025Updated 9 months ago
- C2 redirector as a web API☆10May 22, 2021Updated 4 years ago
- Public Disclosures☆92Feb 13, 2022Updated 4 years ago
- Wordpress hosting with auto-scaling - Free Trial Offer • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- 🐍 Python Exploit for CVE-2022-23935☆11Feb 10, 2023Updated 3 years ago
- The original slurp source☆32Nov 25, 2018Updated 7 years ago
- ☆16Sep 9, 2021Updated 4 years ago
- ☆10Apr 2, 2022Updated 4 years ago
- Binary, Analysis, and Disassembler Radare2 Plugins for Dan32 architechture binaries☆18Aug 21, 2017Updated 8 years ago
- A project demonstrating an app that is vulnerable to Spring Security authorization bypass CVE-2022-31692☆35Nov 7, 2022Updated 3 years ago
- An authenticator that implements two-step verification service using the Time-base OTP algorithm. (CSE Project)☆13Apr 9, 2025Updated last year
- A folder to serve tools from during PT/Red Team engagements. Contains common executables and scripts for privesc, recon, pivoting and CVE…☆15Mar 15, 2024Updated 2 years ago
- This Guidance demonstrates how to set up the SAP ABAP Assistant, a plugin that integrates with Amazon Bedrock in the Eclipse integrated d…☆14May 15, 2025Updated 11 months ago
- Deploy on Railway without the complexity - Free Credits Offer • AdConnect your repo and Railway handles the rest with instant previews. Quickly provision container image services, databases, and storage volumes.
- Pure-Rust DTLS☆12Nov 12, 2022Updated 3 years ago
- Exploit for win10 SMB3.1☆17Apr 5, 2020Updated 6 years ago
- Confluence Hardcoded Password POC☆15Jul 30, 2022Updated 3 years ago
- Oyedata is a tool to perform OData assessments☆13Aug 3, 2012Updated 13 years ago
- ☆11Feb 11, 2022Updated 4 years ago
- Show differences between UI5 Versions☆12Updated this week
- donLoader is a shellcode loader creation tool that uses donut to convert executable payloads into shellcode to evade detection on disk.☆20Nov 24, 2021Updated 4 years ago
- This includes CVE-2022-22963, a Spring SpEL / Expression Resource Access Vulnerability, as well as CVE-2022-22965, the spring-webmvc/spri…☆14Mar 31, 2022Updated 4 years ago
- Plugin for Joplin, the note-taking software. Makes all the possible links in a note.☆12Dec 25, 2023Updated 2 years ago
- Serverless GPU API endpoints on Runpod - Get Bonus Credits • AdSkip the infrastructure headaches. Auto-scaling, pay-as-you-go, no-ops approach lets you focus on innovating your application.
- A Python port of the R implementation of Kleinberg's burst detection algorithm☆12Apr 11, 2022Updated 4 years ago
- ☆34Mar 19, 2022Updated 4 years ago
- Repo for MGraph project☆13Jan 10, 2026Updated 3 months ago
- Tool to exploit CVE-2018-13341 and recover hidden account password on Crestron devices☆25Dec 13, 2019Updated 6 years ago
- All about CVE-2018-14667; From what it is to how to successfully exploit it.☆50Nov 30, 2018Updated 7 years ago
- Fast and stealth WordPress scanner, no api-key, no limitation. Use the top-notch free open-source API www.wpvulnerability.net I'm lookin…☆19Jul 14, 2024Updated last year
- A simple and light-weight file manager written in ASP☆24May 2, 2013Updated 13 years ago