Payloads for SQLi
☆19May 2, 2020Updated 5 years ago
Alternatives and similar repositories for SQL-Injection-Payload-List-
Users that are interested in SQL-Injection-Payload-List- are comparing it to the libraries listed below
Sorting:
- ☆15Mar 21, 2025Updated 11 months ago
- A set of tools, procedures, and playbooks for performing bug bounties☆17Dec 2, 2018Updated 7 years ago
- A tool which allows HackerOne researchers to download their reports into a local, indexed, and searchable repository☆19Sep 29, 2022Updated 3 years ago
- Translating human input as kubectl commands using LLMs powered by Yacana☆12Feb 4, 2026Updated 3 weeks ago
- Collection of multiple types of lists used during security assessments, collected in one place. List types include usernames, passwords, …☆27May 9, 2022Updated 3 years ago
- web cache poison - Top 1 web hacking technique of 2019☆25Feb 24, 2020Updated 6 years ago
- A desktop application in CSharp app with good gui that is Hospital Management System.☆10Apr 7, 2022Updated 3 years ago
- 简单记录下自己在挖掘SRC☆33Sep 21, 2020Updated 5 years ago
- ☆11Sep 15, 2024Updated last year
- Sec-Payloads, It's a collection of multiple types of lists used during security assessments & used for bug bounty hunting or penetration …☆10Nov 17, 2025Updated 3 months ago
- simple bash script to earn bounties☆36Apr 27, 2024Updated last year
- ☆10Sep 10, 2025Updated 5 months ago
- Fast path fuzzing for hidden web directories.☆19Aug 6, 2025Updated 6 months ago
- At this repo you can find any tools, tricks or templates for general penetration testing assesment☆15Apr 27, 2024Updated last year
- ☆13Feb 26, 2021Updated 5 years ago
- Converts Python3 .py files into .exe and makes it so the file can run on any environment without installing python3.☆11Jun 7, 2018Updated 7 years ago
- FELICS Framework☆11Dec 5, 2019Updated 6 years ago
- Take control of a remote machine using reverse shells in python(The hacking side of python)☆10May 23, 2023Updated 2 years ago
- A list of all projects by UW CSE students.☆11Feb 8, 2016Updated 10 years ago
- Tooll for sql injections scan☆11Jul 17, 2018Updated 7 years ago
- The SPARX family of lightweight block ciphers☆11Jun 29, 2018Updated 7 years ago
- A curated list of awesome curated lists of many topics.☆12Jan 29, 2020Updated 6 years ago
- Find unicode codepoints to use in normalisation and transformation attacks.☆11Mar 15, 2021Updated 4 years ago
- Cross-Site Scripting (XSS) is one of the most well known web application vulnerabilities. It even has a dedicated chapter in the OWASP To…☆12Jan 30, 2023Updated 3 years ago
- Collection of tools, scripts, one-liners, templates, dorks and more☆12Dec 13, 2025Updated 2 months ago
- ☆13Jun 26, 2025Updated 8 months ago
- USB library for ChipWhisperer devices☆15Jan 22, 2026Updated last month
- Cross Site Scripting Cheat sheet.☆12Apr 3, 2021Updated 4 years ago
- ☆10Jun 26, 2017Updated 8 years ago
- Notes Template/Checklist for PEN-300 OSEP☆16Nov 20, 2021Updated 4 years ago
- XSS Payload Cheat Sheet☆11Sep 1, 2024Updated last year
- bypass 401/403☆13Sep 13, 2022Updated 3 years ago
- An automated toolkit to analyze and detect changes in secure hardware and cryptographic libraries. SCRUTINY provides high-level framework…☆16Feb 12, 2026Updated 2 weeks ago
- ☆12Aug 17, 2020Updated 5 years ago
- ChipJabber-Unplugged does new-school attacks with old-school logic.☆14Sep 16, 2020Updated 5 years ago
- RepoToStoreBugBountyInfo☆11Mar 11, 2020Updated 5 years ago
- ☆13Aug 10, 2022Updated 3 years ago
- Describe how to use ffuf different options with examples☆13Jun 13, 2022Updated 3 years ago
- ☆11Jun 2, 2015Updated 10 years ago