Skip to main content
OverflowMyBuffers
  • Home
  • Active Directory1
  • Appian5
  • Cloud4
  • Code Reviews1
  • CRTO Notes4
  • Docker1
  • General2
  • Keycloak1
  • Mendix1
  • Mobile1
  • OSED4
  • OSEP Notes3
  • OSINT1
  • OSMR1
  • OSWA1
  • OSWE Notes6
  • Pentesting AI2
  • Reverse Engineering1
  • SAP9
  • Sap Security1
  • Sliver1
  • Tools1
  • Web5
  • Wifi7
Did you know?

Sleep obfuscation techniques like Ekko and Zilean encrypt the beacon's memory during sleep intervals using timers and APCs, with the encryption key stored in a separate region that is also encrypted on a different timer cycle.

OverflowMyBuffers / Sap Security

Index

General

Ports and services https://help.sap.com/docs/Security/575a9f0e56f34c6e8138439eefc32b16/616a3c0b1cc748238de9c0341b15c63c.html

Tools

https://github.com/OWASP/pysap

https://github.com/chipik/SAP_RECON/tree/master

On this page

  • General
  • Tools
Privacy PolicyManage cookie preferences