SAP-samples / frun-csa-policies-best-practicesLinks
Best practices check examples for creating CSA policies in SAP Focused Run
☆40Updated 3 weeks ago
Alternatives and similar repositories for frun-csa-policies-best-practices
Users that are interested in frun-csa-policies-best-practices are comparing it to the libraries listed below
Sorting:
- Training course materials and notes related to SAP security audit and penetration testing☆83Updated 10 months ago
- SAP security maturity model☆13Updated last year
- SAP security analysis (using sap gui scripting)☆19Updated 5 years ago
- ☆45Updated 3 years ago
- ☆28Updated 3 years ago
- Python script for SAP secure storage decrypton☆13Updated 7 years ago
- Shodan Monitoring integration for TheHive.☆130Updated last year
- ☆36Updated 3 years ago
- M365 Defender SOC Playbooks☆24Updated 2 years ago
- gundog - guided hunting in Microsoft Defender☆52Updated 4 years ago
- SAP Message Server research presented at OPCDE 2019☆35Updated 5 years ago
- Colection of different JUMPSEC advisories, guidance, and scripts for all of the latest vulnerabilities and adversaries☆13Updated 4 years ago
- Actively hunt for attacker infrastructure by filtering Shodan results with URLScan data.☆63Updated last year
- SECMON is a web-based tool for the automation of infosec watching and vulnerability management with a web interface.☆218Updated 3 years ago
- OWASP SAPKiln is a graphical user interface (GUI) tool designed to facilitate securing and auditing SAP systems effectively.☆26Updated 2 years ago
- ☆86Updated 3 years ago
- A runbook for handling security incidents in cooperation with 0xsyr0☆52Updated 3 years ago
- A Github scanning tool that identifies hardcoded credentials while filtering the false positive data through machine learning models☆357Updated 2 months ago
- Tool for quickly gathering information from Shodan.io about the number of IPs which satisfy large number of different queries☆52Updated 2 years ago
- A Collection of Email and Landing Page Templates for Use with Gophish☆31Updated 8 years ago
- OWASP Amass Docker Compose for setting up a full instance of the infrastructure☆51Updated this week
- MONARC - Method for an Optimised aNAlysis of Risks by @NC3-LU☆115Updated 3 weeks ago
- AIL project training materials☆38Updated 5 months ago
- ☆34Updated 2 years ago
- ☆19Updated 3 years ago
- Crawlector is a threat hunting framework designed for scanning websites for malicious objects.☆124Updated 3 weeks ago
- ☆81Updated last year
- Ingesting Shodan Monitor Alerts to Microsoft Sentinel☆34Updated 2 years ago
- GUI tool which enables you to parse nessus scan files from Nessus and Tenable.SC by (C) Tenable, Inc. and exports results to a spreadshee…☆108Updated 2 months ago
- POSIX script for mail security checks of domain names☆75Updated 2 years ago