3a7 / SQLi-Hunter-v2Links
The second version of SQL Hunter. SQLi Hunter is a URL (Blind) SQL injection checker for multiple pages.
☆90Updated 2 years ago
Alternatives and similar repositories for SQLi-Hunter-v2
Users that are interested in SQLi-Hunter-v2 are comparing it to the libraries listed below
Sorting:
- Huge Collection of Wordpress Exploits and CVES☆124Updated 2 years ago
- Unofficial Acunetix CLI tool for automated pentesting and bug hunting across large scopes.☆83Updated last year
- Log4jScanner is a Log4j Related CVEs Scanner, Designed to Help Penetration Testers to Perform Black Box Testing on given subdomains.☆52Updated 3 years ago
- 403-bypass tool to bypass 403 responses.☆119Updated 2 years ago
- an exploit of Server-side request forgery (SSRF)☆51Updated last year
- CVE Collection of jQuery UI XSS Payloads☆119Updated 2 years ago
- A Complete SSRF (Server Side Request Forgery) Scanner.☆37Updated 6 months ago
- ☆69Updated 5 months ago
- Bypass 403 pages☆117Updated last year
- Collection of Exploit, CVES(Unauthenticated) and Wordpress Scanners☆97Updated 2 years ago
- Wordlist for web fuzzing, made from a variety of reliable sources including: result from my pentests, git.rip, ChatGPT, Lex, nuclei templ…☆101Updated 4 months ago
- Web API for nuclei and subfinder will help you automate your entire security testing workflow since you can host it anywhere and make it …☆61Updated 2 years ago
- CVE-2023-32243 - Essential Addons for Elementor 5.4.0-5.7.1 - Unauthenticated Privilege Escalation☆81Updated 2 years ago
- CVE-2023-35078 Remote Unauthenticated API Access Vulnerability Exploit POC☆118Updated 2 years ago
- Custom wordlist, updated regularly☆63Updated this week
- Burp Suite extension to encode an IP address focused to bypass application IP / domain blacklist.☆44Updated last year
- An Exploitation tool to exploit the confluence server that are vulnerable to CVE-2023-22518 Improper Authorization☆42Updated last year
- Encoder PHP webshell to bypass WAF using XOR operations.☆53Updated 2 years ago
- A collection of useful lists for Penetration Testing & Bug Bounty - Content Discovery, Payloads, Variables, Sandbox Escaping, etc☆103Updated 5 months ago
- Origin IP scanning utility developed with ChatGPT☆69Updated 2 years ago
- ☆74Updated 4 months ago
- CVE Collection of jQuery XSS Payloads☆71Updated 2 years ago
- Advanced Tool To Scan And Exploit Local File Inclusion (LFI) Vulnerabilities☆33Updated 2 years ago
- Fetches JavaScript files quickly and comprehensively.☆126Updated 2 years ago
- A fast subdomain takeover tool☆81Updated last year
- ☆68Updated 2 years ago
- Python tool to test known techniques to bypass 403 and 401 HTTP responses.☆37Updated 2 years ago
- Scanner for CVE-2023-22515 - Broken Access Control Vulnerability in Atlassian Confluence☆75Updated last year
- Simple script realizado en bash, para revisión de múltiples hosts para CVE-2022-1388 (F5)☆25Updated 3 years ago
- Inside403 is a powerful and versatile web security testing tool designed to assess the robustness of web pages and directories against 40…☆31Updated last year