3a7 / SQLi-Hunter-v2
The second version of SQL Hunter. SQLi Hunter is a URL (Blind) SQL injection checker for multiple pages.
☆89Updated 2 years ago
Alternatives and similar repositories for SQLi-Hunter-v2:
Users that are interested in SQLi-Hunter-v2 are comparing it to the libraries listed below
- Unofficial Acunetix CLI tool for automated pentesting and bug hunting across large scopes.☆80Updated last year
- Huge Collection of Wordpress Exploits and CVES☆122Updated 2 years ago
- CVE Collection of jQuery UI XSS Payloads☆118Updated 2 years ago
- ☆68Updated 2 years ago
- Wordlist for web fuzzing, made from a variety of reliable sources including: result from my pentests, git.rip, ChatGPT, Lex, nuclei templ…☆97Updated last month
- Encoder PHP webshell to bypass WAF using XOR operations.☆53Updated last year
- ☆64Updated 7 months ago
- Burp Suite extension to encode an IP address focused to bypass application IP / domain blacklist.☆44Updated last year
- Fetches JavaScript files quickly and comprehensively.☆112Updated last year
- Advanced Tool To Scan And Exploit Local File Inclusion (LFI) Vulnerabilities☆31Updated last year
- an exploit of Server-side request forgery (SSRF)☆49Updated 7 months ago
- ☆48Updated 9 months ago
- This tool is designed to test for file upload and XXE vulnerabilities by poisoning XLSX files.☆75Updated last year
- An Exploitation tool to exploit the confluence server that are vulnerable to CVE-2023-22518 Improper Authorization☆43Updated last year
- CVE-2023-32243 - Essential Addons for Elementor 5.4.0-5.7.1 - Unauthenticated Privilege Escalation☆82Updated last year
- ☆118Updated last year
- Bypass 403 pages☆111Updated 8 months ago
- CVE Collection of jQuery XSS Payloads☆70Updated 2 years ago
- Web API for nuclei and subfinder will help you automate your entire security testing workflow since you can host it anywhere and make it …☆59Updated 2 years ago
- Scanner for CVE-2023-22515 - Broken Access Control Vulnerability in Atlassian Confluence☆75Updated last year
- Python tool to test known techniques to bypass 403 and 401 HTTP responses.☆35Updated last year
- CVE-2023-35078 Remote Unauthenticated API Access Vulnerability Exploit POC☆117Updated last year
- It is a tool for scanning and exploiting the famous SQL injection vulnerability in more than millions of sites. The exploit was programme…☆68Updated 8 months ago
- Collection of Exploit, CVES(Unauthenticated) and Wordpress Scanners☆83Updated 2 years ago
- it is malicious technique used by hackers to hide malware payloads in an encoded script in a specially crafted HTML attachment or web pag…☆122Updated last year
- A Complete SSRF (Server Side Request Forgery) Scanner.☆31Updated last month
- Will attempt to retrieve DB details for FastAdmin instances☆61Updated 6 months ago
- 403-bypass tool to bypass 403 responses.☆118Updated 2 years ago
- CVE-2024-32640 | Automated SQLi Exploitation PoC☆62Updated 9 months ago