Automatically forward HTTP GET & POST requests to SQLMap's API to test for SQLi and XSS
☆79Dec 8, 2022Updated 3 years ago
Alternatives and similar repositories for sqlinator
Users that are interested in sqlinator are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- TheDoc is a simple but very useful SQLMAP automator with built in admin finder, hash cracker(using hashca) and more!☆97May 12, 2018Updated 7 years ago
- Async'ly gather unique usernames thru null SMB sessions and bruteforce them with 2 passwords☆51Oct 24, 2017Updated 8 years ago
- A fuzzing script for MitmProxy☆25May 15, 2015Updated 10 years ago
- Vampire is an aggressor script which integrates with BloodHound to mark nodes as owned.☆79Apr 6, 2021Updated 5 years ago
- A Python3 based single-file subdomain enumerator☆89Oct 5, 2019Updated 6 years ago
- Wordpress hosting with auto-scaling - Free Trial • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- FWRF is a open source tool for firmware web-side analysis.☆11Aug 27, 2015Updated 10 years ago
- Bash Bunny fun!☆52May 24, 2018Updated 7 years ago
- it's quite self explanatory: a crawler with sqlmap☆13Jul 13, 2017Updated 8 years ago
- Powershell script to setup windows port forwarding using native netsh client☆124Aug 6, 2018Updated 7 years ago
- Remote Recon and Collection☆460Nov 23, 2017Updated 8 years ago
- Automate creating resilient, disposable, secure and agile infrastructure for Red Teams.☆921Apr 6, 2021Updated 5 years ago
- A Tool for cross-platform System Enumeration☆12Mar 20, 2017Updated 9 years ago
- ☆23Oct 14, 2013Updated 12 years ago
- Automated enumeration☆30Apr 14, 2021Updated 5 years ago
- Virtual machines for every use case on DigitalOcean • AdGet dependable uptime with 99.99% SLA, simple security tools, and predictable monthly pricing with DigitalOcean's virtual machines, called Droplets.
- A multithreaded tool designed to identify if credentials are valid, invalid, or local admin valid credentials within a network at-scale v…☆449May 25, 2022Updated 3 years ago
- InsecurePowerShellHost is a .NET Core host process for InsecurePowerShell, a version of PowerShell Core v6.0.0 with key security features…☆31Dec 19, 2017Updated 8 years ago
- Obfuscated Invoke-Mimikatz☆52Oct 23, 2018Updated 7 years ago
- Burplay is a Burp Extension allowing for replaying any number of requests using same modifications definition. Its main purpose is to aid…☆83Sep 19, 2017Updated 8 years ago
- [CVE-2020-14882] Oracle WebLogic Server Authenticated Remote Code Execution (RCE)☆13Nov 9, 2020Updated 5 years ago
- A Metasploit auto auxiliary script☆103Oct 11, 2022Updated 3 years ago
- 自动化被动扫描系统分为数据源、数据处理、漏洞验证等三个子系统,本系统属于漏洞验证部分,根据提供的数据进行分布式安全验证,确定是否包含相关严重漏洞。☆49Dec 26, 2017Updated 8 years ago
- A simple SOCKS5 server written in Go☆31Nov 7, 2016Updated 9 years ago
- ☆12Jan 13, 2018Updated 8 years ago
- Wordpress hosting with auto-scaling - Free Trial • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- latest version-无需Python环境的Sqlmap及制作方法☆11Jul 18, 2016Updated 9 years ago
- Run remote system commands from Oracle connection - oracle exec command perl☆12Jun 6, 2015Updated 10 years ago
- The Gruqg's old hacking harness, from times of old before github☆14Mar 10, 2018Updated 8 years ago
- linux rootkit☆161Feb 12, 2018Updated 8 years ago
- SMB MiTM tool with a focus on attacking clients through file content swapping, lnk swapping, as well as compromising any data passed over…☆383Aug 17, 2018Updated 7 years ago
- POC: Heap buffer overflow in the networking code in the XNU operating system kernel☆14Feb 25, 2024Updated 2 years ago
- Watchdog - A Comprehensive Security Scanning and a Vulnerability Management Tool.☆426Jul 18, 2018Updated 7 years ago
- simple http(s) proxy with python based sqlmapapi wrapper☆10Jul 20, 2015Updated 10 years ago
- Kerberos accounts enumeration taking advantage of AS-REQ☆43Apr 25, 2018Updated 7 years ago
- GPUs on demand by Runpod - Special Offer Available • AdRun AI, ML, and HPC workloads on powerful cloud GPUs—without limits or wasted spend. Deploy GPUs in under a minute and pay by the second.
- Libgore☆13Apr 14, 2023Updated 3 years ago
- ☆98Mar 16, 2016Updated 10 years ago
- A collection of curated Java Deserialization Exploits☆592May 16, 2021Updated 4 years ago
- Kerberos / Windows AD / Linux PAM password change check against breached lists (HIBP), and other rules☆161Feb 2, 2023Updated 3 years ago
- PoC code for crashing windows active directory☆35Sep 19, 2018Updated 7 years ago
- A golang library designed to interact with Metasploit☆43Mar 27, 2021Updated 5 years ago
- a simple portforwarder in ps1 with embeded c# code☆90Jun 30, 2018Updated 7 years ago