## https://sploitus.com/exploit?id=AEE2594F-431E-523F-A69E-4DB3ADB6D334
## Info
โโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโ
โโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโ
โโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโ
N U L L T R A C E
// NullTrace :: No logs. No noise. Just signal. //
----- SIGNATURE-----
Key: ssh-rsa AAAAB3...NullKey...KFA==
Fingerprint: 88:11:00:BE:HM:00:82:NULL:TR:ACE
Motto: "Privacy is not a crime. Silence is a weapon."
---
<p align="center">
<img src="Screenshot.png" alt="SAP Exploit PoC Demo" width="600"/>
</p>
---
## ๐ก๏ธ SAP Vulnerability Disclosure
- ๐ Title : [CVE-2025-31324]
- ๐ข Target : SAP [Product]
- ๐ ๏ธ Type : [ Remote Code Execution ]
---
## โ๏ธ How TO Use
- USE: python CVE-2025-31324.py
<p align="center">
<img src="Screenshot .png" alt="SAP Exploit PoC Demo" width="600"/>
</p>
---
## ๐ Shodan Dorks
- "SAP NetWeaver"
- http.title:"SAP"
- port:50001
---
## Note
- https://t.me/NULLTRACE0X
- wait for SAP Exploit V.2