3a7 / SQLi-Hunter-v2Links
The second version of SQL Hunter. SQLi Hunter is a URL (Blind) SQL injection checker for multiple pages.
☆90Updated 2 years ago
Alternatives and similar repositories for SQLi-Hunter-v2
Users that are interested in SQLi-Hunter-v2 are comparing it to the libraries listed below
Sorting:
- Unofficial Acunetix CLI tool for automated pentesting and bug hunting across large scopes.☆82Updated last year
- Huge Collection of Wordpress Exploits and CVES☆123Updated 2 years ago
- Bypass 403 pages☆112Updated 11 months ago
- an exploit of Server-side request forgery (SSRF)☆50Updated 10 months ago
- CVE Collection of jQuery UI XSS Payloads☆119Updated 2 years ago
- ☆68Updated 2 years ago
- Log4jScanner is a Log4j Related CVEs Scanner, Designed to Help Penetration Testers to Perform Black Box Testing on given subdomains.☆51Updated 3 years ago
- Python tool to test known techniques to bypass 403 and 401 HTTP responses.☆37Updated 2 years ago
- CVE Collection of jQuery XSS Payloads☆71Updated 2 years ago
- Burp Suite extension to encode an IP address focused to bypass application IP / domain blacklist.☆44Updated last year
- ☆62Updated 3 months ago
- Wordlist for web fuzzing, made from a variety of reliable sources including: result from my pentests, git.rip, ChatGPT, Lex, nuclei templ…☆101Updated 2 months ago
- ☆73Updated 2 months ago
- An Exploitation tool to exploit the confluence server that are vulnerable to CVE-2023-22518 Improper Authorization☆43Updated last year
- CVE-2023-26255_POC,CVE-2023-26256_POC☆31Updated last year
- Encoder PHP webshell to bypass WAF using XOR operations.☆53Updated last year
- Simple-XSS is a multiplatform cross-site scripting (XSS) vulnerability exploitation tool.☆48Updated last year
- Scanner for CVE-2023-22515 - Broken Access Control Vulnerability in Atlassian Confluence☆75Updated last year
- CVE-2024-32640 | Automated SQLi Exploitation PoC☆64Updated last year
- ZeusLeak is a browser extension that automatically detects leaked secrets and credentials in code while browsing.☆42Updated 2 months ago
- Nodesub is a command-line tool for finding subdomains in bug bounty programs☆148Updated 10 months ago
- 403-bypass tool to bypass 403 responses.☆119Updated 2 years ago
- Payload for bug bounty☆93Updated 10 months ago
- CVE-2023-32243 - Essential Addons for Elementor 5.4.0-5.7.1 - Unauthenticated Privilege Escalation☆81Updated 2 years ago
- A Complete SSRF (Server Side Request Forgery) Scanner.☆37Updated 4 months ago
- ☆48Updated last year
- CVE-2023-35078 Remote Unauthenticated API Access Vulnerability Exploit POC☆118Updated last year
- ☆119Updated last year
- Will attempt to retrieve DB details for FastAdmin instances☆66Updated 9 months ago
- Collect XSS vulnerable parameters from entire domain.☆151Updated 2 years ago