SAP penetration testing Web and network cheatsheet
☆17May 15, 2022Updated 3 years ago
Alternatives and similar repositories for SAP-Pentest-Cheatsheet
Users that are interested in SAP-Pentest-Cheatsheet are comparing it to the libraries listed below
Sorting:
- ☆12Jun 24, 2022Updated 3 years ago
- All-in-One WP Migration-Backup-Finder☆15Nov 5, 2025Updated 4 months ago
- ☆27Jul 30, 2021Updated 4 years ago
- Pulse SSL VPN Arbitrary File Read burp extension☆24Sep 24, 2019Updated 6 years ago
- Binary Exploitation and Reverse-Engineering (from assembly into C)☆28Apr 3, 2021Updated 4 years ago
- XSS scanning with Dalfox on Github-action☆26Nov 26, 2023Updated 2 years ago
- ☆28Apr 3, 2021Updated 4 years ago
- ☆74Nov 5, 2018Updated 7 years ago
- ☆10Jul 21, 2021Updated 4 years ago
- Config files for my GitHub profile.☆10Dec 16, 2025Updated 2 months ago
- ☆10Jun 13, 2024Updated last year
- A Collection of Proof of Concepts for non-published Web Exploits and Common CVEs☆10Nov 29, 2020Updated 5 years ago
- ☆11Dec 5, 2020Updated 5 years ago
- multi-threaded script uses VirusTotal and AbuseIPDB APIs and generate an excel with all needed data☆10Mar 14, 2023Updated 2 years ago
- Offensive recon with GitHub Actions☆11Aug 25, 2024Updated last year
- Quick Command Cheatsheet, you can import/open directly to you ONE NOTE.☆10Updated this week
- A wireless playground using mac80211 hwsim devices and docker containers.☆10May 19, 2023Updated 2 years ago
- YARA rule-based automation system to detect network attacks at byte-level☆13May 12, 2021Updated 4 years ago
- Get top quality resources from this repo. (Beginner Specific)☆13Jul 18, 2023Updated 2 years ago
- ☆13Jun 6, 2023Updated 2 years ago
- ☆13Feb 26, 2021Updated 5 years ago
- CVE-2025-68428 Proof of Concept☆24Jan 8, 2026Updated 2 months ago
- How to Get Started into Bug Bounty Complete Beginner Guide ( Part 1 Web Pentesting ) Hello guys, after a lot of requests and questions o…☆11May 30, 2021Updated 4 years ago
- Aspose.Email for Python via .NET Examples: https://products.aspose.com/email/python-net☆10Oct 9, 2025Updated 5 months ago
- Jupyter Notebooks for Digital Forensics & Incident Response☆10Nov 23, 2021Updated 4 years ago
- Supporting material for the "Hunting Bugs In The Tropics" DEFCON 30 talk☆10Aug 18, 2022Updated 3 years ago
- Small wiki for Mobile Application Penetration Testing Tools☆12Apr 8, 2021Updated 4 years ago
- Exploit for Joomla JCK Editor 6.4.4 (CVE-2018-17254)☆10Apr 17, 2021Updated 4 years ago
- Prototype-Pollution-Lab to chain the vulnerabilities between multiple accounts.☆13Sep 11, 2021Updated 4 years ago
- Hands-on challenges for learning how to reverse engineer Flutter applications.☆41Jan 31, 2026Updated last month
- Android webviews and securiy☆23Sep 18, 2025Updated 5 months ago
- It contain google dork to find the wsdl file.☆13May 27, 2020Updated 5 years ago
- ☆16Jan 23, 2026Updated last month
- CVE-2025-55182-bypass-waf☆31Jan 8, 2026Updated 2 months ago
- My eJPT exam cheatSheet☆12Nov 9, 2021Updated 4 years ago
- my templates for the nuclei engine to find security vulnerabilities.☆10Aug 19, 2024Updated last year
- Modern cybersecurity tools platform built with React and TypeScript. This provides a collection of essential security tools with a sleek,…☆24Jul 19, 2025Updated 7 months ago
- 🤖 The Modern Port Scanner 🤖☆14Nov 5, 2024Updated last year
- SAPLAR - LFI & Path Traversal Scanner☆15Mar 11, 2025Updated 11 months ago