3a7 / SQLi-Hunter-v2Links
The second version of SQL Hunter. SQLi Hunter is a URL (Blind) SQL injection checker for multiple pages.
☆90Updated 2 years ago
Alternatives and similar repositories for SQLi-Hunter-v2
Users that are interested in SQLi-Hunter-v2 are comparing it to the libraries listed below
Sorting:
- Huge Collection of Wordpress Exploits and CVES☆124Updated 2 years ago
- Unofficial Acunetix CLI tool for automated pentesting and bug hunting across large scopes.☆82Updated last year
- 403-bypass tool to bypass 403 responses.☆119Updated 2 years ago
- CVE Collection of jQuery UI XSS Payloads☆119Updated 2 years ago
- A Complete SSRF (Server Side Request Forgery) Scanner.☆37Updated 6 months ago
- Collection of Exploit, CVES(Unauthenticated) and Wordpress Scanners☆99Updated 2 years ago
- an exploit of Server-side request forgery (SSRF)☆51Updated last year
- Bypass 403 pages☆118Updated last year
- Wordlist for web fuzzing, made from a variety of reliable sources including: result from my pentests, git.rip, ChatGPT, Lex, nuclei templ…☆101Updated 5 months ago
- Log4jScanner is a Log4j Related CVEs Scanner, Designed to Help Penetration Testers to Perform Black Box Testing on given subdomains.☆52Updated 3 years ago
- CVE-2023-35078 Remote Unauthenticated API Access Vulnerability Exploit POC☆118Updated 2 years ago
- CVE Collection of jQuery XSS Payloads☆71Updated 2 years ago
- Burp Suite extension to encode an IP address focused to bypass application IP / domain blacklist.☆44Updated last year
- CVE-2023-32243 - Essential Addons for Elementor 5.4.0-5.7.1 - Unauthenticated Privilege Escalation☆81Updated 2 years ago
- Web API for nuclei and subfinder will help you automate your entire security testing workflow since you can host it anywhere and make it …☆62Updated 2 years ago
- An Exploitation tool to exploit the confluence server that are vulnerable to CVE-2023-22518 Improper Authorization☆43Updated last year
- Custom wordlist, updated regularly☆71Updated this week
- A collection of useful lists for Penetration Testing & Bug Bounty - Content Discovery, Payloads, Variables, Sandbox Escaping, etc☆103Updated 5 months ago
- A fast subdomain takeover tool☆82Updated last year
- Fetches JavaScript files quickly and comprehensively.☆125Updated 2 years ago
- Python tool to test known techniques to bypass 403 and 401 HTTP responses.☆37Updated 2 years ago
- ☆70Updated 6 months ago
- ☆74Updated 4 months ago
- Parse FFUF results in GUI with option to sort based by response code , size , keyword☆98Updated 11 months ago
- A burp suite extension that reviews backup, old, temporary and unreferenced files on web server for sensitive information (OWASP WSTG-CON…☆163Updated last year
- This tool is designed to test for file upload and XXE vulnerabilities by poisoning XLSX files.☆78Updated last year
- A command-line utility designed to discover subdomains for a given domain in a simple, efficient way. It works by gathering information f…☆113Updated last week
- ☆68Updated 2 years ago
- Advanced Tool To Scan And Exploit Local File Inclusion (LFI) Vulnerabilities☆33Updated 2 years ago
- Will attempt to retrieve DB details for FastAdmin instances☆67Updated last year