lazaars / SAP-Pentest
☆66Updated 6 years ago
Alternatives and similar repositories for SAP-Pentest:
Users that are interested in SAP-Pentest are comparing it to the libraries listed below
- A list of "secrets" from JWT sample code and readme files.☆54Updated 4 years ago
- This script is a multi-threaded Okta password sprayer.☆70Updated last year
- learning case to prepare OSWE☆37Updated 5 years ago
- Python3 tool to perform password spraying against Microsoft Online service using various methods☆85Updated 2 years ago
- A tool to password spray Jenkins instances☆56Updated 5 years ago
- Local File Inclusion Burp-Suite Intruder Payload Generator Plugin☆39Updated 4 years ago
- A Red Team tool for exfiltrating sensitive data from Jira tickets.☆84Updated 2 years ago
- ☆14Updated 4 years ago
- A Burp Suite extension for headless, unattended scanning.☆36Updated 4 years ago
- User enumeration and password spraying tool for testing Azure AD☆69Updated 3 years ago
- Creates and sends fake meeting invite☆58Updated 3 years ago
- "Powershell script assisting with domain enumerating and in finding quick wins" - Basically written while doing the 'Advanced Red Team' l…☆80Updated 3 years ago
- JavaScript functions intended to be used as an XSS payload against a WordPress admin account.☆54Updated 4 years ago
- Another Subdomain ENumeration Tool☆11Updated 2 years ago
- ☆147Updated 3 years ago
- Jenkins pre-auth RCE exploit. More info at https://jenkins.io/security/advisory/2019-01-08/#SECURITY-1266 https://blog.orange.tw/2019/02/…☆10Updated 5 years ago
- cvet is a Python utility for pulling actionable vulnerabilities from cvetrends.com☆39Updated 2 years ago
- Azur3Alph4 is a PowerShell module that automates red-team tasks for ops on objective. This module situates in a post-breach (RCE achieved…☆62Updated 3 years ago
- SMB Auto Relay provides the automation of SMB/NTLM Relay technique for pentesting and red teaming exercises in active directory environme…☆47Updated 4 years ago
- A simple program to query nmap xml files in the terminal.☆27Updated 4 years ago
- ☆26Updated 2 years ago
- SQL injection script for MSSQL that extracts domain users from an Active Directory environment based on RID bruteforcing☆93Updated 4 years ago
- Any presentation we've given at FortyNorth Security☆34Updated 3 years ago
- ☆54Updated 4 years ago
- RCE for Pega Infinity >= 8.2.1, Pega Infinity <= 8.5.2☆60Updated 3 years ago
- Cisco Adaptive Security Appliance and FTD Unauthorized Remote File Reading☆17Updated 4 years ago
- Kubernetes Scanner☆40Updated 3 years ago
- Extensive code infrastructure for finding unintended information leaks in files, git repositories and much more.☆28Updated 2 years ago
- Use normal web pentest tools to hack Websockets☆18Updated 5 years ago
- Report and finding templates used by the Serpico reporting tool☆16Updated 6 years ago