☆19Jun 11, 2013Updated 12 years ago
Alternatives and similar repositories for SAP-Stuff
Users that are interested in SAP-Stuff are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- SAPProx is a proof of concept tool for intercepting and modifying SAP GUI (DIAG protocol) traffic.☆13Apr 20, 2017Updated 8 years ago
- Powershell SAP assessment tool☆199Aug 13, 2018Updated 7 years ago
- pysap SAPMS+SAPRFC patches for Gateway / MS research☆11Apr 30, 2019Updated 6 years ago
- A quick methodology on testing / hacking SAP Applications for n00bz and bug bounty hunters☆255Oct 26, 2022Updated 3 years ago
- Python script for SAP secure storage decrypton☆13Mar 14, 2018Updated 8 years ago
- Simple, predictable pricing with DigitalOcean hosting • AdAlways know what you'll pay with monthly caps and flat pricing. Enterprise-grade infrastructure trusted by 600k+ customers.
- This Wireshark plugin provides dissection of SAP's NI, Message Server, Router, Diag, Enqueue, IGS, SNC and HDB protocols.☆110Nov 11, 2022Updated 3 years ago
- SAP Message Server research presented at OPCDE 2019☆35Aug 18, 2020Updated 5 years ago
- SAP security maturity model☆14Mar 6, 2024Updated 2 years ago
- Run DependencyCheck Against Your Orgs GitHub Repos.☆14Jan 5, 2018Updated 8 years ago
- Templates for SAP HANA audit policies of SAP S/4HANA systems.☆19Jul 23, 2025Updated 8 months ago
- Code Snippets and Other Resources Used To Manage Apple Devices in the Enterprise.☆22Feb 11, 2026Updated last month
- An enumeration and exploitation toolkit using RFC calls to SAP☆40Jan 8, 2020Updated 6 years ago
- Offsec PWB Lab Tools☆13Nov 14, 2013Updated 12 years ago
- Exploit Pack for Metasploit - Collection of modules gathered across time and internets☆248Aug 12, 2014Updated 11 years ago
- DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- Recon-ng modules that won't get accepted into the main distribution because of 3rd party dependencies.☆18Feb 1, 2014Updated 12 years ago
- SAP security analysis (using sap gui scripting)☆20Jun 28, 2020Updated 5 years ago
- ☆10Sep 28, 2014Updated 11 years ago
- Training course materials and notes related to SAP security audit and penetration testing☆88Feb 21, 2025Updated last year
- Exploits a stack buffer overflow in AT-TFTP v1.9, by sending a request (get/write) for an overly long file name.☆11Jun 22, 2015Updated 10 years ago
- Denial of Service PoC for CVE-2020-1350 (SIGRed)☆18Jul 16, 2020Updated 5 years ago
- OWASP SAPKiln is a graphical user interface (GUI) tool designed to facilitate securing and auditing SAP systems effectively.☆27Jul 29, 2023Updated 2 years ago
- If you use security-related services and tools such as EWA, SOS, System Recommendations, Configuration Validation, or a security dashboar…☆62Jul 24, 2025Updated 8 months ago
- Oyedata is a tool to perform OData assessments☆13Aug 3, 2012Updated 13 years ago
- Bare Metal GPUs on DigitalOcean Gradient AI • AdPurpose-built for serious AI teams training foundational models, running large-scale inference, and pushing the boundaries of what's possible.
- Markdown source for the Best Practices Guide for SAP BTP. Enables feedback and contributions to improve the documentation.☆26Jan 8, 2026Updated 2 months ago
- VirtualBox Virtual Machines used for IPv6 training☆11Jun 6, 2016Updated 9 years ago
- A modified version of Mike Czumak's enumeration scanner☆19Nov 9, 2018Updated 7 years ago
- Plugin for Joplin, the note-taking software. Makes all the possible links in a note.☆12Dec 25, 2023Updated 2 years ago
- Here you can get full exploit for SAP NetWeaver AS JAVA☆78Jan 18, 2018Updated 8 years ago
- WD My Cloud PoC exploit☆42May 22, 2019Updated 6 years ago
- Containerization by IBM for SAP S/4HANA with Red Hat OpenShift☆13Sep 17, 2025Updated 6 months ago
- Review and audit all shares☆13Updated this week
- Some Of Huawei Routers Exploits☆13Sep 1, 2016Updated 9 years ago
- NordVPN Threat Protection Pro™ • AdTake your cybersecurity to the next level. Block phishing, malware, trackers, and ads. Lightweight app that works with all browsers.
- ☆19May 31, 2017Updated 8 years ago
- TP-Link TL-WR1043ND - Authenticated Remote Code Execution☆16Jul 29, 2025Updated 7 months ago
- PoC for CVE-2020-6207 (Missing Authentication Check in SAP Solution Manager)☆82Jan 15, 2021Updated 5 years ago
- ☆13Oct 27, 2020Updated 5 years ago
- Office365 Tenants List☆16Jun 12, 2018Updated 7 years ago
- CVE-2018-11311 | mySCADA myPRO 7 Hardcoded FTP Username and Password Vulnerability☆12Jul 2, 2018Updated 7 years ago
- OhNo - The Evil Image Builder & Meta Manipulator☆11Jun 5, 2014Updated 11 years ago