3a7 / SQLi-Hunter-v2
The second version of SQL Hunter. SQLi Hunter is a URL (Blind) SQL injection checker for multiple pages.
☆90Updated last year
Related projects: ⓘ
- Huge Collection of Wordpress Exploits and CVES☆121Updated last year
- Unofficial Acunetix CLI tool for automated pentesting and bug hunting across large scopes.☆70Updated 10 months ago
- CVE Collection of jQuery UI XSS Payloads☆110Updated last year
- Encoder PHP webshell to bypass WAF using XOR operations.☆52Updated last year
- Fetches JavaScript files quickly and comprehensively.☆97Updated last year
- Mass Exploit - CVE-2023-38388 < Unauthenticated < Arbitrary File Upload☆20Updated last year
- CVE-2023-35078 Remote Unauthenticated API Access Vulnerability Exploit POC☆117Updated last year
- Burp Suite extension to encode an IP address focused to bypass application IP / domain blacklist.☆41Updated 6 months ago
- Bypass 403 pages☆99Updated 2 months ago
- An Exploitation tool to exploit the confluence server that are vulnerable to CVE-2023-22518 Improper Authorization☆44Updated 10 months ago
- Python tool to test known techniques to bypass 403 and 401 HTTP responses.☆36Updated last year
- Reverse shell that can bypass windows defender detection☆151Updated 7 months ago
- ☆69Updated last year
- ☆110Updated 7 months ago
- Apache HugeGraph Server RCE Scanner ( CVE-2024-27348 )☆55Updated 3 months ago
- ☆23Updated this week
- ☆30Updated last year
- Web API for nuclei and subfinder will help you automate your entire security testing workflow since you can host it anywhere and make it …☆58Updated 2 years ago
- ☆61Updated last month
- Wordlist for web fuzzing, made from a variety of reliable sources including: result from my pentests, git.rip, ChatGPT, Lex, nuclei templ…☆91Updated last month
- Advanced Tool To Scan And Exploit Local File Inclusion (LFI) Vulnerabilities☆31Updated last year
- CVE Collection of jQuery XSS Payloads☆64Updated last year
- Steal/Inject Chrome cookies over the DevTools (--remote-debugging-port) protocol.☆97Updated last year
- it is malicious technique used by hackers to hide malware payloads in an encoded script in a specially crafted HTML attachment or web pag…☆117Updated last year
- Will attempt to retrieve DB details for FastAdmin instances☆62Updated 3 weeks ago
- CVE-2024-3400-RCE☆78Updated 4 months ago
- Scanner for CVE-2023-22515 - Broken Access Control Vulnerability in Atlassian Confluence☆73Updated 11 months ago
- download/Install all kali linux missing RTO/BBH tools☆18Updated 2 months ago
- CVE-2023-32243 - Essential Addons for Elementor 5.4.0-5.7.1 - Unauthenticated Privilege Escalation☆84Updated last year
- ☆29Updated this week