EX - SQLi is an advanced tool for scanning and detecting SQL Injection vulnerabilities in websites. The tool provides fast and efficient scanning using modern techniques and features. It supports batch processing of multiple URLs and excels in accurately detecting vulnerabilities using common SQL error patterns.
☆22Jul 2, 2024Updated last year
Alternatives and similar repositories for Ex-SQLi
Users that are interested in Ex-SQLi are comparing it to the libraries listed below
Sorting:
- A Python Script to find admin panel of a site☆10Apr 10, 2022Updated 3 years ago
- Mass Scaning vulnerability in Cpanel [XSS]☆12Aug 25, 2024Updated last year
- This library is an advanced artificial intelligence library to help with advanced and fast software and solutions☆11Jan 22, 2024Updated 2 years ago
- Come on a tool to decode "MD5" + "Sha1" + "Sha256" even if it is very difficult☆13Oct 9, 2022Updated 3 years ago
- Artificial intelligence that transcends all laws and without any restrictions☆39Feb 28, 2024Updated 2 years ago
- It is a tool for hunting Instagram accounts from nine Arab countries☆10Jun 28, 2022Updated 3 years ago
- URLs very strong obfuscation tool (can be used in requests too)☆16Oct 3, 2024Updated last year
- A quick and quadruple Instagram account hunting tool, you just have to put the bot token and hand your account and you will start hunting…☆12Jun 11, 2022Updated 3 years ago
- Ini adalah kumpulan webshell atau backdoor yang lengkap☆18Aug 18, 2024Updated last year
- It is the best proxy checker, super fast!☆31Nov 16, 2025Updated 3 months ago
- The best discord companion for your Server☆12Jan 11, 2025Updated last year
- It is a tool for scanning and exploiting the famous SQL injection vulnerability in more than millions of sites. The exploit was programme…☆66Jul 1, 2024Updated last year
- Automate bug bounty recon using bash alias☆15Aug 6, 2024Updated last year
- Websites Vulnerability Scanner☆80May 27, 2025Updated 9 months ago
- Reverse And Dorking Tools☆26Apr 30, 2021Updated 4 years ago
- Beelzebub all in one Hacking Tools, Shell finder, Zone-H Grabber, ReverseIP, SMTP Finder, XMLRPC BF and more☆38May 27, 2025Updated 9 months ago
- A professional, asynchronous CLI tool to automate XRP claims from Faucetearner.org. Built with modern Python standards for efficiency and…☆10Aug 20, 2025Updated 6 months ago
- Sec-Payloads, It's a collection of multiple types of lists used during security assessments & used for bug bounty hunting or penetration …☆10Nov 17, 2025Updated 3 months ago
- simple bash script to earn bounties☆36Apr 27, 2024Updated last year
- ☆10Jul 16, 2024Updated last year
- Fast path fuzzing for hidden web directories.☆19Aug 6, 2025Updated 6 months ago
- ☆12Aug 10, 2022Updated 3 years ago
- ☆10Sep 28, 2021Updated 4 years ago
- WordPress auto exploit☆29Dec 28, 2017Updated 8 years ago
- A good tool to hide phishing traps or cut links.☆40Nov 29, 2023Updated 2 years ago
- WhatsApp Bot UI offers a user-friendly and responsive interface for managing a WhatsApp bot, empowering users to manage conversations, ad…☆14Nov 8, 2024Updated last year
- ☆15Dec 3, 2020Updated 5 years ago
- Tool CTF Forensik File extract/convert☆15Mar 22, 2024Updated last year
- ☆10Apr 18, 2019Updated 6 years ago
- Exploiting Android devices☆10Sep 12, 2022Updated 3 years ago
- Telegram BOT AUTOSHOP (Payment Gateway Tripay)☆23Aug 14, 2025Updated 6 months ago
- An Exploitation script developed to exploit the CVE-2023-4966 bleed citrix information disclosure vulnerability☆10Oct 29, 2023Updated 2 years ago
- This is a Packet flooder python program, This tool is created by 47hxl-53r, This tool is created only for educational purposes, Creator …☆10May 5, 2022Updated 3 years ago
- a program can dump all marshal in obf code by KhanhNguyen9872☆18Feb 17, 2026Updated last week
- Distributed Denial of Service - Website Stress☆43Oct 13, 2024Updated last year
- Google dorks for bug bounty hunting☆12Jul 28, 2021Updated 4 years ago
- Python program for installing many tools automatically☆15Dec 31, 2021Updated 4 years ago
- A python library for search data on shodan, google, duckduckgo☆10Sep 30, 2022Updated 3 years ago
- Local File Inclusion (LFI) in FHEM 6.0 allows an attacker to include a file, it can lead to sensitive information disclosure.☆12Jan 20, 2021Updated 5 years ago