pondoksiber / SAP-Pentest-Cheatsheet
SAP penetration testing Web and network cheatsheet
☆16Updated 2 years ago
Alternatives and similar repositories for SAP-Pentest-Cheatsheet:
Users that are interested in SAP-Pentest-Cheatsheet are comparing it to the libraries listed below
- Template used for my OSCP exam.☆26Updated 2 years ago
- ☆20Updated 3 years ago
- This repository is intended for sharing files/tools/tutorials..etc that related to eWPTXv2 from eLearnSecurity☆14Updated 4 years ago
- Enhanced 403 bypass header☆21Updated 2 years ago
- This repository has workflows created for https://github.com/RikunjSindhwad/Task-Ninja☆23Updated 5 months ago
- Script for Bug Bounty☆28Updated 3 years ago
- A simple automation tool to detect lfi, rce and ssti vulnerability☆55Updated 2 years ago
- A solid recon tool I use personally.☆30Updated last year
- Perform TE.CL HTTP Request Smuggling attacks by crafting HTTP Request automatically.☆67Updated 2 years ago
- ☆19Updated 3 years ago
- Create your own recon & vulnerability scanner with Trickest and GitHub☆49Updated last year
- Damn Vulnerable PHP Application (DVPA) - It is Lab Written in The PHP lang, Which Contains PHP Type Juggling - RCE Challenges☆32Updated 2 years ago
- Intentionally Vulnerable Nodejs Application & APIs☆22Updated 2 years ago
- All The Notes And Tips I FOund In Github And Twitter I Put Them Here☆34Updated 4 years ago
- This repository is intended for sharing files/tools/tutorials..etc that related to eWPTXv1 from eLearnSecurity☆23Updated 4 years ago
- Python script to launch burp scans automatically☆32Updated 3 years ago
- A BurpSuite extension to deploy an OpenVPN config file to DigitalOcean and set up a SOCKS proxy to route traffic through it☆48Updated 11 months ago
- A repository to host the subdomain wordlists from my blog https://medium.com/@nynan/what-i-learnt-from-reading-217-subdomain-takeover-bug…☆40Updated 2 years ago
- ☆42Updated 3 years ago
- These Repositories About My Recon Methodology To Give Some Idea For Other Hunter How To Do Recon☆44Updated 2 years ago
- ☆21Updated 2 years ago
- Extract endpoints marked as disallow in robots files to generate wordlists.☆56Updated 2 years ago
- ☆22Updated 3 years ago
- XSS Finder Via SSTI☆54Updated last year
- Regex patterns for manual application source code review☆26Updated 4 years ago
- ☆12Updated 3 years ago
- ☆25Updated 2 years ago
- Web CTF CheatSheet 🐈☆33Updated 5 years ago
- Exploit scripts☆12Updated 2 years ago
- BBSSRF - Bug Bounty SSRF is a powerful tool to check SSRF OOB connection☆38Updated last year