SAP security analysis (using sap gui scripting)
☆19Jun 28, 2020Updated 5 years ago
Alternatives and similar repositories for sap-security
Users that are interested in sap-security are comparing it to the libraries listed below
Sorting:
- SAP security maturity model☆14Mar 6, 2024Updated last year
- Templates for SAP HANA audit policies of SAP S/4HANA systems.☆19Jul 23, 2025Updated 7 months ago
- Training course materials and notes related to SAP security audit and penetration testing☆88Feb 21, 2025Updated last year
- SAP Message Server research presented at OPCDE 2019☆35Aug 18, 2020Updated 5 years ago
- Python script for SAP secure storage decrypton☆13Mar 14, 2018Updated 7 years ago
- SAP Report Source Decompressor☆14Jun 7, 2018Updated 7 years ago
- Get Hands-On Security Recommendations for Your SAP BTP Environment☆23May 22, 2025Updated 9 months ago
- ☆19Jun 11, 2013Updated 12 years ago
- If you use security-related services and tools such as EWA, SOS, System Recommendations, Configuration Validation, or a security dashboar…☆62Jul 24, 2025Updated 7 months ago
- HoneySAP: SAP Low-interaction research honeypot☆51May 1, 2023Updated 2 years ago
- OWASP SAPKiln is a graphical user interface (GUI) tool designed to facilitate securing and auditing SAP systems effectively.☆27Jul 29, 2023Updated 2 years ago
- An enumeration and exploitation toolkit using RFC calls to SAP☆40Jan 8, 2020Updated 6 years ago
- Process Herpaderping proof of concept, tool, and technical deep dive. Process Herpaderping bypasses security products by obscuring the in…☆20Oct 26, 2020Updated 5 years ago
- ☆28Feb 17, 2022Updated 4 years ago
- ☆32Jun 19, 2024Updated last year
- Repository for the wireshark plugin development project of the AMOS 16 course☆10Jan 6, 2017Updated 9 years ago
- A monitoring script to automatically execute the SAP HANA's mini-checks and send alert emails☆39Dec 19, 2025Updated 2 months ago
- IPED Digital Forensic Tool. It is an open source software that can be used to process and analyze digital evidence, often seized at crime…☆12Sep 10, 2020Updated 5 years ago
- Offline Security Client☆12Feb 10, 2026Updated 3 weeks ago
- PoC for CVE-2020-6207 (Missing Authentication Check in SAP Solution Manager)☆81Jan 15, 2021Updated 5 years ago
- PoC for CVE-2020-6287, CVE-2020-6286 (SAP RECON vulnerability)☆226Sep 29, 2020Updated 5 years ago
- CVE-2023-22527 - RCE (Remote Code Execution) Vulnerability In Confluence Data Center and Confluence Server PoC☆25Jan 23, 2024Updated 2 years ago
- Containerization by IBM for SAP S/4HANA with Red Hat OpenShift☆13Sep 17, 2025Updated 5 months ago
- ☆11Oct 17, 2024Updated last year
- Curso optativo de Deep Learning para UNICEN☆11Aug 25, 2021Updated 4 years ago
- SAP Gateway RCE exploits☆159Sep 7, 2020Updated 5 years ago
- Skill Endpoint for Amazon Echo Alexa Skills Kit (AKS)☆10Sep 23, 2016Updated 9 years ago
- ☆13May 30, 2017Updated 8 years ago
- Oyedata is a tool to perform OData assessments☆13Aug 3, 2012Updated 13 years ago
- ☆11Apr 28, 2021Updated 4 years ago
- convert VMWare and VirtualBox VM files to QEMU-KVM VM disk files☆10Jul 27, 2020Updated 5 years ago
- ☆12Apr 8, 2025Updated 10 months ago
- Plugin for Joplin, the note-taking software. Makes all the possible links in a note.☆12Dec 25, 2023Updated 2 years ago
- A cross-platform, collaborative C2 for red-teaming. Agents are cross-compilable (e.g, you can generate Windows DLLs on Linux), cross-comp…☆24Mar 7, 2025Updated 11 months ago
- Apache Superset Auth Bypass (CVE-2023-27524)☆11May 9, 2023Updated 2 years ago
- pysap SAPMS+SAPRFC patches for Gateway / MS research☆11Apr 30, 2019Updated 6 years ago
- A simple 2-field fuzzer for the telnet protocol☆11Apr 4, 2017Updated 8 years ago
- ☆10Nov 24, 2018Updated 7 years ago
- Animated pokemon gif files (can be used for PokeAlarm)☆11Feb 12, 2019Updated 7 years ago