SAP-samples / frun-csa-policies-best-practices
Best practices check examples for creating CSA policies in SAP Focused Run
☆34Updated 3 weeks ago
Alternatives and similar repositories for frun-csa-policies-best-practices:
Users that are interested in frun-csa-policies-best-practices are comparing it to the libraries listed below
- SAP security maturity model☆13Updated last year
- If you use security-related services and tools such as EWA, SOS, System Recommendations, Configuration Validation, or a security dashboar…☆57Updated 2 weeks ago
- Training course materials and notes related to SAP security audit and penetration testing☆75Updated last month
- SAP security analysis (using sap gui scripting)☆19Updated 4 years ago
- OWASP Foundation Web Respository☆8Updated last month
- Templates for SAP HANA audit policies of SAP S/4HANA systems.☆17Updated 3 weeks ago
- OWASP SAPKiln is a graphical user interface (GUI) tool designed to facilitate securing and auditing SAP systems effectively.☆23Updated last year
- Python script for SAP secure storage decrypton☆13Updated 7 years ago
- ☆20Updated last week
- SAP Message Server research presented at OPCDE 2019☆34Updated 4 years ago
- ☆45Updated 3 years ago
- Configuration security analyzer for network devices. Pynipper-ng is an evolution of nipper-ng, updated and translated to python. [ALPHA v…☆26Updated 3 weeks ago
- ☆28Updated 3 years ago
- 🛡️ A curated collection of awesome resources, tools, and other shiny things for cybersecurity blue teams.☆12Updated 5 years ago
- ☆36Updated 3 years ago
- Cloud, CDN, and marketing services leveraged by cybercriminals and APT groups☆59Updated 2 years ago
- Colection of different JUMPSEC advisories, guidance, and scripts for all of the latest vulnerabilities and adversaries☆13Updated 3 years ago
- The SAP Threat Modeling Tool is an on-premises open-source web application designed to analyze and visualize connections between SAP syst…☆47Updated 3 weeks ago
- gundog - guided hunting in Microsoft Defender☆52Updated 3 years ago
- Get Hands-On Security Recommendations for Your SAP BTP Environment☆18Updated 3 weeks ago
- This Wireshark plugin provides dissection of SAP's NI, Message Server, Router, Diag, Enqueue, IGS, SNC and HDB protocols.☆106Updated 2 years ago
- ☆19Updated 11 years ago
- Helping Incident Responders hunt for potential persistence mechanisms on UNIX-based systems.☆15Updated last year
- OMLASP (Ideas Locas)☆22Updated 2 years ago
- Invoke-Forensics provides PowerShell commands to simplify working with the forensic tools KAPE and RegRipper.☆114Updated last year
- Sigma detection rules for hunting with the threathunting-keywords project☆55Updated last month
- M365 Defender SOC Playbooks☆23Updated 2 years ago
- ☆26Updated 6 months ago
- ☆66Updated 6 years ago
- A collection of various SIEM rules relating to malware family groups.☆65Updated 9 months ago