Nmap custom probes for better detecting SAP services
☆142Mar 8, 2024Updated last year
Alternatives and similar repositories for nmap-sap
Users that are interested in nmap-sap are comparing it to the libraries listed below
Sorting:
- SAP Message Server research presented at OPCDE 2019☆35Aug 18, 2020Updated 5 years ago
- SAP Gateway RCE exploits☆159Sep 7, 2020Updated 5 years ago
- pysap is an open source Python library that provides modules for crafting and sending packets using SAP's NI, Diag, Enqueue, Router, MS, …☆242Dec 4, 2024Updated last year
- Powershell SAP assessment tool☆199Aug 13, 2018Updated 7 years ago
- ☆19Jun 11, 2013Updated 12 years ago
- Training course materials and notes related to SAP security audit and penetration testing☆88Feb 21, 2025Updated last year
- A quick methodology on testing / hacking SAP Applications for n00bz and bug bounty hunters☆254Oct 26, 2022Updated 3 years ago
- pysap SAPMS+SAPRFC patches for Gateway / MS research☆11Apr 30, 2019Updated 6 years ago
- Fuzzing tool written in Golang. Insane monkey not included.☆12Feb 22, 2018Updated 8 years ago
- PoC for CVE-2020-6207 (Missing Authentication Check in SAP Solution Manager)☆82Jan 15, 2021Updated 5 years ago
- PoC for CVE-2020-6287, CVE-2020-6286 (SAP RECON vulnerability)☆226Sep 29, 2020Updated 5 years ago
- Brute forcer and shell deployer for WildFly☆100Mar 10, 2018Updated 7 years ago
- Python code to query the Censys public scan database.☆153Jun 15, 2021Updated 4 years ago
- a passive scanner based on Mitmproxy and Arachni☆108Aug 17, 2017Updated 8 years ago
- An enumeration and exploitation toolkit using RFC calls to SAP☆40Jan 8, 2020Updated 6 years ago
- DoS PoC's for SAP products☆51Jan 23, 2018Updated 8 years ago
- Baseline IoT security checklist. Consider security as early in development as possible and reap the rewards.☆30Aug 25, 2017Updated 8 years ago
- PoC of Remote Command Execution via Log injection on SAP NetWeaver AS JAVA CRM☆52Mar 14, 2018Updated 7 years ago
- 分布式互联网开放端口与协议扫描☆18Jul 20, 2016Updated 9 years ago
- tool to extract passwords from TeamViewer memory using Frida☆464Jul 17, 2018Updated 7 years ago
- ☆13Feb 25, 2014Updated 12 years ago
- st2-048☆40Jul 7, 2017Updated 8 years ago
- Proof-of-Concept exploit for CVE-2017-7494(Samba RCE from a writable share)☆181Jul 26, 2017Updated 8 years ago
- Collection of exploits/POC for PrestaShop cookie vulnerabilities (CVE-2018-13784)☆48Jul 17, 2018Updated 7 years ago
- Enumerate subdomains through Virustotal☆32Nov 2, 2019Updated 6 years ago
- Penetration Test Vulnerabilities Manager is an extension for Burp Suite, written in Jython. It was developed by Barak Tawily in order to …☆31Jul 25, 2021Updated 4 years ago
- All-in-one plugin for Burp Suite for the detection and the exploitation of Java deserialization vulnerabilities☆799Nov 7, 2021Updated 4 years ago
- Monitor arbitrary TCP traffic using your HTTP interception proxy of choice☆48Sep 13, 2017Updated 8 years ago
- Zoho ManageEngine Desktop Central CVEs☆15Oct 5, 2020Updated 5 years ago
- ☆28Oct 16, 2017Updated 8 years ago
- WS-Attacker is a modular framework for web services penetration testing. It is developed by the Chair of Network and Data Security, Ruhr …☆490Oct 3, 2024Updated last year
- Tool written in python3 to determine where the AV signature is located in a binary/payload☆315Mar 24, 2018Updated 7 years ago
- A collection of PowerShell Modules for BloodHound/Empire Orchestration☆109Sep 26, 2017Updated 8 years ago
- Query Active Directory for Workstations and then pull their Wireless Network Passwords☆46Jun 14, 2017Updated 8 years ago
- ☆73Nov 5, 2018Updated 7 years ago
- This Wireshark plugin provides dissection of SAP's NI, Message Server, Router, Diag, Enqueue, IGS, SNC and HDB protocols.☆110Nov 11, 2022Updated 3 years ago
- ☆13Jun 13, 2017Updated 8 years ago
- ☆14May 17, 2018Updated 7 years ago
- Some ICS Vulnerabilities I've found will be listed here.☆13Nov 18, 2016Updated 9 years ago