pysap - Python library for crafting SAP's network protocols packets
SECUREAUTH LABS. Copyright (C) 2021 SecureAuth Corporation. All rights reserved.
Version 0.1.20.dev0 (XXX 2021)
SAP Netweaver and SAP HANA are technology platforms for building and integrating SAP business applications. Communication between components uses different network protocols and some services and tools make use of custom file formats as well. While some of them are standard and well-known protocols, others are proprietaries and public information is generally not available.
is an open source Python 2 library that provides modules for crafting and sending packets
protocols. In addition, support for creating and parsing different proprietary file
formats is included. The modules are built on top of Scapy and are
based on information acquired at researching the different protocols, file formats
Dissection and crafting of the following network protocols:
- SAP Network Interface (
- SAP Message Server (
- SAP Secure Network Connection (
- SAP Internet Graphic Server (
- SAP Remote Function Call (
- SAP HANA SQL Command Network (
- SAP Network Interface (
Client interfaces for handling the following file formats:
- SAP Personal Security Environment (
- SAP SSO Credential (
- SAP Secure Storage in File System (
Library implementing SAP's
Automatic compression/decompression of payloads with SAP's algorithms.
Client, proxy and server classes implemented for some of the protocols.
Example scripts to illustrate the use of the different modules and protocols.
To install pysap simply run:
$ python -m pip install pysap
Documentation is available at Read the Docs.
This library is distributed under the GPLv2 license. Check the COPYING file for more details.
The library was designed and developed by Martin Gallo from SecureAuth's Innovation Labs team, with the help of a large number of contributors.
Contributions made by:
- Florian Grunow (@0x79)
- Scott Walsh (@invisiblethreat)
- Joris van de Vis (@jvis)
- Victor Portal Gonzalez
- Dmitry Yudin (@ret5et)
- Hans-Christian Esperer (@hce)
- Vahagn Vardanyan (@vah13)
- Mathieu Geli (@gelim)
- Yvan Genuer (@iggy38)
- Malte Heinzelmann (@hnzlmnn)
- Albert Zedlitz
- Dmitry Chastuhin (@_chipik)
- Andreas Hornig
- Jennifer Hornig (@gloomicious)
The spirit of this Open Source initiative is to help security researchers, and the community, speed up research and educational activities related to the implementation of networking protocols and stacks.
The information in this repository is for research and educational purposes only and is not intended to be used in production environments and/or as part of commercial products.
If you desire to use this tool or some part of it for your own uses, we recommend applying proper security development life cycle and secure coding practices, as well as generate and track the respective indicators of compromise according to your needs.
Whether you want to report a bug, send a patch, or give some suggestions on this package, drop us a few lines at email@example.com.
For security-related questions check our security policy.