Coalfire-Research / sqlinatorView external linksLinks
Automatically forward HTTP GET & POST requests to SQLMap's API to test for SQLi and XSS
☆80Dec 8, 2022Updated 3 years ago
Alternatives and similar repositories for sqlinator
Users that are interested in sqlinator are comparing it to the libraries listed below
Sorting:
- Async'ly gather unique usernames thru null SMB sessions and bruteforce them with 2 passwords☆51Oct 24, 2017Updated 8 years ago
- TheDoc is a simple but very useful SQLMAP automator with built in admin finder, hash cracker(using hashca) and more!☆97May 12, 2018Updated 7 years ago
- Bash Bunny fun!☆53May 24, 2018Updated 7 years ago
- A Python3 based single-file subdomain enumerator☆91Oct 5, 2019Updated 6 years ago
- Powershell script to setup windows port forwarding using native netsh client☆124Aug 6, 2018Updated 7 years ago
- POC: Heap buffer overflow in the networking code in the XNU operating system kernel☆14Feb 25, 2024Updated last year
- Remote Recon and Collection☆459Nov 23, 2017Updated 8 years ago
- A Metasploit auto auxiliary script☆103Oct 11, 2022Updated 3 years ago
- FWRF is a open source tool for firmware web-side analysis.☆11Aug 27, 2015Updated 10 years ago
- The Gruqg's old hacking harness, from times of old before github☆14Mar 10, 2018Updated 7 years ago
- advanced Perl Backdoor☆13Jun 6, 2015Updated 10 years ago
- Automate creating resilient, disposable, secure and agile infrastructure for Red Teams.☆921Apr 6, 2021Updated 4 years ago
- InsecurePowerShellHost is a .NET Core host process for InsecurePowerShell, a version of PowerShell Core v6.0.0 with key security features…☆31Dec 19, 2017Updated 8 years ago
- ☆12Jan 13, 2018Updated 8 years ago
- Run remote system commands from Oracle connection - oracle exec command perl☆12Jun 6, 2015Updated 10 years ago
- A Tool for cross-platform System Enumeration☆12Mar 20, 2017Updated 8 years ago
- Watchdog - A Comprehensive Security Scanning and a Vulnerability Management Tool.☆422Jul 18, 2018Updated 7 years ago
- Vampire is an aggressor script which integrates with BloodHound to mark nodes as owned.☆79Apr 6, 2021Updated 4 years ago
- Kerberos accounts enumeration taking advantage of AS-REQ☆43Apr 25, 2018Updated 7 years ago
- A multithreaded tool designed to identify if credentials are valid, invalid, or local admin valid credentials within a network at-scale v…☆449May 25, 2022Updated 3 years ago
- ☆23Oct 14, 2013Updated 12 years ago
- [CVE-2020-14882] Oracle WebLogic Server Authenticated Remote Code Execution (RCE)☆13Nov 9, 2020Updated 5 years ago
- A fuzzing script for MitmProxy☆24May 15, 2015Updated 10 years ago
- PoC code for crashing windows active directory☆35Sep 19, 2018Updated 7 years ago
- Burplay is a Burp Extension allowing for replaying any number of requests using same modifications definition. Its main purpose is to aid…☆83Sep 19, 2017Updated 8 years ago
- SMB MiTM tool with a focus on attacking clients through file content swapping, lnk swapping, as well as compromising any data passed over…☆383Aug 17, 2018Updated 7 years ago
- Parse X509 certificates to get the (sub)domains in it.☆28Jun 14, 2018Updated 7 years ago
- linux rootkit☆162Feb 12, 2018Updated 8 years ago
- Subdomain brute force focused on speed and data serialization☆75Dec 27, 2022Updated 3 years ago
- We store attacks and exploits that we've found useful in our research☆13Jun 4, 2015Updated 10 years ago
- ☆50Sep 25, 2017Updated 8 years ago
- a simple portforwarder in ps1 with embeded c# code☆90Jun 30, 2018Updated 7 years ago
- Feed the tool a .nessus file and it will automatically get you MSF shell☆238Dec 8, 2022Updated 3 years ago
- Automated enumeration☆30Apr 14, 2021Updated 4 years ago
- Kerberos / Windows AD / Linux PAM password change check against breached lists (HIBP), and other rules☆161Feb 2, 2023Updated 3 years ago
- Monitor arbitrary TCP traffic using your HTTP interception proxy of choice☆48Sep 13, 2017Updated 8 years ago
- Cgiemail - Source Code Disclosure/LFI☆16Oct 21, 2016Updated 9 years ago
- Powershell C2 Server and Implants☆574Nov 11, 2019Updated 6 years ago
- Respounder detects presence of responder in the network.☆322Jun 15, 2019Updated 6 years ago