3a7 / SQLi-Hunter-v2Links
The second version of SQL Hunter. SQLi Hunter is a URL (Blind) SQL injection checker for multiple pages.
☆92Updated 2 years ago
Alternatives and similar repositories for SQLi-Hunter-v2
Users that are interested in SQLi-Hunter-v2 are comparing it to the libraries listed below
Sorting:
- Huge Collection of Wordpress Exploits and CVES☆124Updated 3 years ago
- Unofficial Acunetix CLI tool for automated pentesting and bug hunting across large scopes.☆84Updated 2 years ago
- A Complete SSRF (Server Side Request Forgery) Scanner.☆41Updated 2 months ago
- 403-bypass tool to bypass 403 responses.☆124Updated 3 years ago
- Collection of Exploit, CVES(Unauthenticated) and Wordpress Scanners☆106Updated 3 years ago
- Log4jScanner is a Log4j Related CVEs Scanner, Designed to Help Penetration Testers to Perform Black Box Testing on given subdomains.☆49Updated 5 months ago
- CVE Collection of jQuery UI XSS Payloads☆121Updated 3 years ago
- Wordlist for web fuzzing, made from a variety of reliable sources including: result from my pentests, git.rip, ChatGPT, Lex, nuclei templ…☆101Updated 3 months ago
- an exploit of Server-side request forgery (SSRF)☆51Updated last year
- Advanced Tool To Scan And Exploit Local File Inclusion (LFI) Vulnerabilities☆36Updated 2 years ago
- An Exploitation tool to exploit the confluence server that are vulnerable to CVE-2023-22518 Improper Authorization☆43Updated 2 years ago
- CVE-2023-35078 Remote Unauthenticated API Access Vulnerability Exploit POC☆118Updated 2 years ago
- Burp Suite extension to encode an IP address focused to bypass application IP / domain blacklist.☆46Updated last year
- Origin IP scanning utility developed with ChatGPT☆69Updated 2 years ago
- Web API for nuclei and subfinder will help you automate your entire security testing workflow since you can host it anywhere and make it …☆61Updated 3 years ago
- Scanner for CVE-2023-22515 - Broken Access Control Vulnerability in Atlassian Confluence☆77Updated 2 years ago
- Encoder PHP webshell to bypass WAF using XOR operations.☆55Updated 2 years ago
- A collection of useful lists for Penetration Testing & Bug Bounty - Content Discovery, Payloads, Variables, Sandbox Escaping, etc☆102Updated 11 months ago
- Bypass 403 pages☆130Updated last year
- CVE-2023-32243 - Essential Addons for Elementor 5.4.0-5.7.1 - Unauthenticated Privilege Escalation☆81Updated 2 years ago
- An automation tool to install the most popular tools for bug bounty or pentesting.☆123Updated last month
- All Type of Payloads☆141Updated last year
- CVE Collection of jQuery XSS Payloads☆75Updated 3 years ago
- Lfi Scan Tool☆108Updated 2 years ago
- ☆47Updated last year
- Exploit for CVE-2023-3460. Unauthorized admin access for Ultimate Member plugin < v2.6.7☆35Updated 2 years ago
- CVE-2023-26255_POC,CVE-2023-26256_POC☆32Updated 2 years ago
- ☆109Updated 11 months ago
- This tool is designed to test for file upload and XXE vulnerabilities by poisoning XLSX files.☆83Updated 2 years ago
- Will attempt to retrieve DB details for FastAdmin instances☆69Updated last year