SAP Penetration Testing: A Comprehensive Analysis of SAP Security Issues
☆41Nov 23, 2023Updated 2 years ago
Alternatives and similar repositories for SAP-Penetration-Testing
Users that are interested in SAP-Penetration-Testing are comparing it to the libraries listed below
Sorting:
- The SAP Threat Modeling Tool is an on-premises open-source web application designed to analyze and visualize connections between SAP syst…☆51Mar 7, 2025Updated last year
- SAP security maturity model☆14Mar 6, 2024Updated 2 years ago
- Tool for analyzing SAP Secure Network Communications (SNC).☆60Apr 16, 2024Updated last year
- GTFO Command Line Interface for easy binaries search commands that can be used to bypass local security restrictions in misconfigured sys…☆18Jan 26, 2026Updated last month
- Exploit tool for CVE-2023-4911, targeting the 'Looney Tunables' glibc vulnerability in various Linux distributions.☆42Oct 18, 2023Updated 2 years ago
- ☆168Feb 29, 2024Updated 2 years ago
- Exploit for CVE-2024-3273, supports single and multiple hosts☆13Apr 7, 2024Updated last year
- Training course materials and notes related to SAP security audit and penetration testing☆88Feb 21, 2025Updated last year
- a simple discovery script that uses popular tools like subfinder, amass, puredns, alterx, massdns and others☆85Nov 22, 2023Updated 2 years ago
- Powershell Scripts for Blue Team members☆11Dec 1, 2023Updated 2 years ago
- A GUI wrapper inside of Havoc to interact with bloodhound CE☆71Feb 3, 2024Updated 2 years ago
- Instant negative hash cracking wordlist lookup☆13Jul 7, 2017Updated 8 years ago
- DFSCoerce exe revisited version with custom authentication☆42Jan 13, 2024Updated 2 years ago
- aiohttp LFI (CVE-2024-23334)☆27Mar 19, 2024Updated 2 years ago
- SuperGenPass, spiced up with bcrypt and special character support!☆27Oct 28, 2020Updated 5 years ago
- Gouge is a simple Burp extension to extract or gouge all URLs which are seen in JS files as you visit different websites/webpages in Burp…☆28Jul 21, 2024Updated last year
- Mitigation validation utility for the Ivanti Connect Around attack chain. Runs multiple checks. CVE-2023-46805, CVE-2024-21887.☆12Feb 3, 2024Updated 2 years ago
- Exploits with pwntools library in Python3. ROP, BOF, SHELLCODE.☆20Feb 2, 2024Updated 2 years ago
- The perfect butler for pentesters, bug-bounty hunters and security researchers☆93Feb 20, 2026Updated last month
- A modified version of TomNomNom's anew, allowing for multiple files to be defined as parameters.☆13Jun 17, 2023Updated 2 years ago
- Service that scans your Infrastructure as Code for common vulnerabilities☆49Dec 14, 2023Updated 2 years ago
- The authentication bypass vulnerability in GitHub Enterprise Server (GHES) allows an unauthorized attacker to access an instance of GHES …☆50May 21, 2024Updated last year
- ☆26Apr 30, 2010Updated 15 years ago
- ☆31Feb 19, 2026Updated last month
- Analysis of the Enterprise SAST/DAST product landscape☆38Feb 28, 2024Updated 2 years ago
- Crack passwords with Hashcat using a Discord Bot.☆28Oct 30, 2023Updated 2 years ago
- Powershell tools used for Red Team / Pentesting.☆81Jan 8, 2024Updated 2 years ago
- Source code and examples for PassiveAggression☆64Jun 6, 2024Updated last year
- Atlassian Companion RCE Vulnerability Proof of Concept☆25Dec 15, 2023Updated 2 years ago
- CVE-2024-30056 Microsoft Edge (Chromium-based) Information Disclosure Vulnerability☆17May 27, 2024Updated last year
- burp suite插件☆13Jul 9, 2023Updated 2 years ago
- Converts Half-WPA handshake to hashcat☆19Oct 29, 2018Updated 7 years ago
- An interactive shell to spoof some LOLBins command line☆188Jan 27, 2024Updated 2 years ago
- An adaptation of timwhitez's proxycall that uses kernelbase.dll!Beep.☆16Nov 1, 2023Updated 2 years ago
- Nuclei template for CVE-2024-23897 (Jenkins LFI Vulnerability)☆21Feb 5, 2024Updated 2 years ago
- ☆26Jan 7, 2024Updated 2 years ago
- 针对多个框架的高度自定义的内存马一键打入工具 | A highly customized memory shell one-click injection tool for multiple frameworks☆49Feb 6, 2024Updated 2 years ago
- A remote unauthenticated DOS POC exploit that targets the authentication implementation of Havoc.☆37Nov 16, 2023Updated 2 years ago
- OWASP SAPKiln is a graphical user interface (GUI) tool designed to facilitate securing and auditing SAP systems effectively.☆27Jul 29, 2023Updated 2 years ago