A quick methodology on testing / hacking SAP Applications for n00bz and bug bounty hunters
☆254Oct 26, 2022Updated 3 years ago
Alternatives and similar repositories for mySapAdventures
Users that are interested in mySapAdventures are comparing it to the libraries listed below
Sorting:
- Powershell SAP assessment tool☆199Aug 13, 2018Updated 7 years ago
- ☆19Jun 11, 2013Updated 12 years ago
- Nmap custom probes for better detecting SAP services☆142Mar 8, 2024Updated last year
- Viewgen is a ViewState tool capable of generating both signed and encrypted payloads with leaked validation keys☆659Feb 1, 2025Updated last year
- PoC for CVE-2020-6287, CVE-2020-6286 (SAP RECON vulnerability)☆226Sep 29, 2020Updated 5 years ago
- Some scripts and exploits☆148Jul 9, 2018Updated 7 years ago
- locate and attack Lync/Skype for Business☆346Oct 1, 2024Updated last year
- Red Team Tips as posted by @vysecurity on Twitter☆1,068Apr 26, 2020Updated 5 years ago
- Issues to consider when planning a red team exercise.☆616Aug 23, 2017Updated 8 years ago
- pysap is an open source Python library that provides modules for crafting and sending packets using SAP's NI, Diag, Enqueue, Router, MS, …☆242Dec 4, 2024Updated last year
- An exploit for Apache Struts CVE-2017-9805☆247Nov 7, 2017Updated 8 years ago
- Burp Extender plugin that generates a sitemap of a website using Wayback Machine☆227May 8, 2018Updated 7 years ago
- Here you can get full exploit for SAP NetWeaver AS JAVA☆77Jan 18, 2018Updated 8 years ago
- Lazykatz is an automation developed to extract credentials from remote targets protected with AV and/or application whitelisting software…☆200Nov 19, 2017Updated 8 years ago
- SAP Message Server research presented at OPCDE 2019☆35Aug 18, 2020Updated 5 years ago
- AWS Extender (Cloud Storage Tester) is a Burp plugin to assess permissions of cloud storage containers on AWS, Google Cloud and Azure.☆256Feb 23, 2022Updated 4 years ago
- This is a Firefox WebExtension that monitors the browsing activity and automatically perform an automated XSS vulnerability scan by submi…☆18Jan 21, 2017Updated 9 years ago
- sqlc - Universal DBMS/SQL client with exfiltration features :)☆18Dec 19, 2023Updated 2 years ago
- A script that monitors and extracts requested URLs and clients connected to the service by exploiting publicly accessible Apache server-s…☆441Sep 19, 2021Updated 4 years ago
- Windows Privesc Check☆20May 20, 2014Updated 11 years ago
- Tater is a PowerShell implementation of the Hot Potato Windows Privilege Escalation exploit from @breenmachine and @foxglovesec☆453Apr 22, 2016Updated 9 years ago
- Hunting for Microsoft Exchange the LDAP Way.☆35Oct 30, 2019Updated 6 years ago
- In case you didn't now how to restore the user password after a password reset (get the previous hash with DCSync)☆168Jun 8, 2017Updated 8 years ago
- ☆73Nov 5, 2018Updated 7 years ago
- A place to store my own wordlists, and link to others that are useful☆108Nov 15, 2023Updated 2 years ago
- Material for the training "Developing Burp Suite Extensions – From Manual Testing to Security Automation"☆356Oct 14, 2020Updated 5 years ago
- A WebDAV PROPFIND covert channel to deliver payloads☆52Nov 14, 2017Updated 8 years ago
- A simple tool that aims to efficiently and quickly parse the outputs of web scraping tools like gau☆12Jun 28, 2021Updated 4 years ago
- Fuzzing tool written in Golang. Insane monkey not included.☆12Feb 22, 2018Updated 8 years ago
- BountyDash is a tool to combine your rewards from all platforms, giving you insights about your progress and bug hunting patterns.☆163Apr 24, 2025Updated 10 months ago
- Enumerate usernames on a domain where you have no creds by using SMB Relay with low priv.☆399May 20, 2020Updated 5 years ago
- A tool used to check if a CNAME resolves to the scope address. If the CNAME resolves to a non-scope address it might be worth checking ou…☆134Aug 14, 2023Updated 2 years ago
- A tool for automatically gathering sensitive information from exposed Jenkins servers☆104Dec 8, 2022Updated 3 years ago
- SSRF (Server Side Request Forgery) testing resources☆2,483Oct 12, 2024Updated last year
- The cheat sheet about Java Deserialization vulnerabilities☆3,164May 26, 2023Updated 2 years ago
- A tool designed to assist with finding all sinks and sources of a web application and display these results in a digestible manner.☆558Mar 6, 2023Updated 2 years ago
- Interview questions to screen offensive (red team/pentest) candidates☆890Mar 6, 2019Updated 6 years ago
- Remote Recon and Collection☆459Nov 23, 2017Updated 8 years ago
- Notes about attacking Jenkins servers☆2,090Jul 10, 2024Updated last year