SAP Penetration Testing: A Comprehensive Analysis of SAP Security Issues
☆41Nov 23, 2023Updated 2 years ago
Alternatives and similar repositories for SAP-Penetration-Testing
Users that are interested in SAP-Penetration-Testing are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- The SAP Threat Modeling Tool is an on-premises open-source web application designed to analyze and visualize connections between SAP syst…☆52Mar 7, 2025Updated last year
- RedRays ABAP Code Analyzer: Open-Source Security Scanner for SAP ABAP☆13Jun 2, 2025Updated 10 months ago
- SAP security maturity model☆15Mar 6, 2024Updated 2 years ago
- Tool for analyzing SAP Secure Network Communications (SNC).☆60Apr 16, 2024Updated 2 years ago
- GTFO Command Line Interface for easy binaries search commands that can be used to bypass local security restrictions in misconfigured sys…☆18Jan 26, 2026Updated 3 months ago
- Deploy to Railway using AI coding agents - Free Credits Offer • AdUse Claude Code, Codex, OpenCode, and more. Autonomous software development now has the infrastructure to match with Railway.
- Scan websites CSP policies and visualise their vunlnerabilities from a dashboard☆13Mar 11, 2025Updated last year
- Exploit tool for CVE-2023-4911, targeting the 'Looney Tunables' glibc vulnerability in various Linux distributions.☆42Oct 18, 2023Updated 2 years ago
- ☆168Feb 29, 2024Updated 2 years ago
- Exploit for CVE-2024-3273, supports single and multiple hosts☆13Apr 7, 2024Updated 2 years ago
- Training course materials and notes related to SAP security audit and penetration testing☆90Feb 21, 2025Updated last year
- a simple discovery script that uses popular tools like subfinder, amass, puredns, alterx, massdns and others☆87Nov 22, 2023Updated 2 years ago
- vulnerability reporting tool powered by vulners.com and wpvulndb.com☆12Aug 31, 2022Updated 3 years ago
- Powershell Scripts for Blue Team members☆11Dec 1, 2023Updated 2 years ago
- A GUI wrapper inside of Havoc to interact with bloodhound CE☆71Feb 3, 2024Updated 2 years ago
- Managed Kubernetes at scale on DigitalOcean • AdDigitalOcean Kubernetes includes the control plane, bandwidth allowance, container registry, automatic updates, and more for free.
- Instant negative hash cracking wordlist lookup☆13Apr 14, 2026Updated 2 weeks ago
- DFSCoerce exe revisited version with custom authentication☆43Jan 13, 2024Updated 2 years ago
- aiohttp LFI (CVE-2024-23334)☆27Mar 19, 2024Updated 2 years ago
- SuperGenPass, spiced up with bcrypt and special character support!☆27Oct 28, 2020Updated 5 years ago
- AWS Cloud Landscape Search Engine☆20Nov 29, 2023Updated 2 years ago
- Gouge is a simple Burp extension to extract or gouge all URLs which are seen in JS files as you visit different websites/webpages in Burp…☆29Jul 21, 2024Updated last year
- Mitigation validation utility for the Ivanti Connect Around attack chain. Runs multiple checks. CVE-2023-46805, CVE-2024-21887.☆12Feb 3, 2024Updated 2 years ago
- Exploits with pwntools library in Python3. ROP, BOF, SHELLCODE.☆20Feb 2, 2024Updated 2 years ago
- The perfect butler for pentesters, bug-bounty hunters and security researchers☆93Apr 15, 2026Updated 2 weeks ago
- Wordpress hosting with auto-scaling - Free Trial Offer • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- Service that scans your Infrastructure as Code for common vulnerabilities☆49Dec 14, 2023Updated 2 years ago
- A modified version of TomNomNom's anew, allowing for multiple files to be defined as parameters.☆13Jun 17, 2023Updated 2 years ago
- The authentication bypass vulnerability in GitHub Enterprise Server (GHES) allows an unauthorized attacker to access an instance of GHES …☆50May 21, 2024Updated last year
- ☆26Apr 30, 2010Updated 16 years ago
- ☆32Feb 19, 2026Updated 2 months ago
- Analysis of the Enterprise SAST/DAST product landscape☆38Feb 28, 2024Updated 2 years ago
- Crack passwords with Hashcat using a Discord Bot.☆29Oct 30, 2023Updated 2 years ago
- Powershell tools used for Red Team / Pentesting.☆83Jan 8, 2024Updated 2 years ago
- Source code and examples for PassiveAggression☆64Jun 6, 2024Updated last year
- Deploy to Railway using AI coding agents - Free Credits Offer • AdUse Claude Code, Codex, OpenCode, and more. Autonomous software development now has the infrastructure to match with Railway.
- Atlassian Companion RCE Vulnerability Proof of Concept☆25Dec 15, 2023Updated 2 years ago
- CVE-2024-30056 Microsoft Edge (Chromium-based) Information Disclosure Vulnerability☆17May 27, 2024Updated last year
- burp suite插件☆13Jul 9, 2023Updated 2 years ago
- An interactive shell to spoof some LOLBins command line☆187Jan 27, 2024Updated 2 years ago
- Converts Half-WPA handshake to hashcat☆19Oct 29, 2018Updated 7 years ago
- An adaptation of timwhitez's proxycall that uses kernelbase.dll!Beep.☆16Nov 1, 2023Updated 2 years ago
- Nuclei template for CVE-2024-23897 (Jenkins LFI Vulnerability)☆21Feb 5, 2024Updated 2 years ago