B1gN0Se / BSQLiView external linksLinks
☆13Sep 8, 2024Updated last year
Alternatives and similar repositories for BSQLi
Users that are interested in BSQLi are comparing it to the libraries listed below
Sorting:
- 403 Bypasser With auto payload generation☆12Aug 8, 2024Updated last year
- this repo contains all nuclei templates for particular vulnerability that i used mosty while hunting..☆10Aug 15, 2024Updated last year
- ☆11Aug 25, 2023Updated 2 years ago
- This PowerShell script applies a memory patch to bypass the Antimalware Scan Interface (AMSI), allowing unrestricted execution of PowerSh…☆13Jun 2, 2024Updated last year
- AI modular structure that provides automation-based attack and penetration☆14May 10, 2024Updated last year
- Quick tool to create custom wordlists like how fuzzers work☆10Sep 29, 2023Updated 2 years ago
- Trojan written in C++ for Windows☆20Mar 12, 2024Updated last year
- Red Team list and cheat sheets☆11Jul 7, 2024Updated last year
- web based c2 🏴☠️☆15Aug 10, 2024Updated last year
- [CVE-2024-4956] Nexus Repository Manager 3 Unauthenticated Path Traversal Bulk Scanner☆17Sep 26, 2024Updated last year
- this nuclei template finds back up files☆22Aug 25, 2025Updated 5 months ago
- Extension to log postMessage()☆15Jan 31, 2026Updated last week
- AzureAD Pentest☆25Mar 24, 2022Updated 3 years ago
- Malware campaigns and APTs research by BlackArrow☆19Apr 30, 2020Updated 5 years ago
- A 1 Liner SQL Injection Attack using SQLMAP and various parameters that helps quickly check for a vulnerabilities during Bug Bounty☆41Sep 6, 2024Updated last year
- A PoC C2 tool utilizing Google Calendar events as a covert channel for communication between attacker and target.☆19Jun 22, 2023Updated 2 years ago
- ☆138Feb 3, 2025Updated last year
- A repo for tools, utils, and wrappers that are to small to put in their own repo.☆23Mar 18, 2023Updated 2 years ago
- Xss payload for bypassing waf☆18Apr 18, 2020Updated 5 years ago
- ☆24Jan 15, 2024Updated 2 years ago
- Attempting to Hook LSASS APIs to Retrieve Plaintext Credentials☆54May 12, 2025Updated 9 months ago
- ☆168Sep 20, 2024Updated last year
- A powerful and sophisticated tool for detecting and exploiting open redirect vulnerabilities using the sed utility and a selected list of…☆47Sep 6, 2024Updated last year
- ☆15Sep 21, 2019Updated 6 years ago
- This repo for Windows x32-x64 Kernel/User Mode Exploitation writeups and exploits☆24Oct 20, 2025Updated 3 months ago
- ☆23Sep 19, 2024Updated last year
- LogSnare: A playground for testing, preventing, and logging IDOR vulnerabilities.☆33Mar 4, 2024Updated last year
- my own 2fa bypass methodolgy☆27Sep 22, 2023Updated 2 years ago
- CVE-2024-4879 - Jelly Template Injection Vulnerability in ServiceNow☆26Jul 13, 2024Updated last year
- A second brain for storing knowledge gained from academic pursuits, certifications, and technical projects in a clear, bite-sized format …☆26Jan 6, 2026Updated last month
- The Swiss army knife of evasion tool that bypasses AMSI, Applocker, and CLM mode simultaneously.☆26Mar 9, 2024Updated last year
- Detect SSRF within Caido☆42Dec 23, 2025Updated last month
- Final assignment for the course Data Visualization with Python, part of IBM Data Science Professional Certification on Coursera☆11Jun 22, 2020Updated 5 years ago
- Community curated list of templates for the nuclei engine to find security vulnerabilities.☆81Nov 24, 2025Updated 2 months ago
- This tool is just after the first refactoring pushed. Original is from Will Vandevanter (BuffaloWill). Only rearrange the code which will…☆32Jun 10, 2016Updated 9 years ago
- A solid recon tool I use personally.☆30May 12, 2023Updated 2 years ago
- A simple python script to dump remote files through a local file read or local file inclusion web vulnerability.☆77Mar 16, 2024Updated last year
- Windows Signature Thief is a program designed to steal the digital signature of one file and install it on another.☆21Dec 9, 2025Updated 2 months ago
- ☆15Mar 21, 2025Updated 10 months ago