Dosk3n / sql-drive-byLinks
An sql vulnerability website and admin page finder
☆21Updated 7 years ago
Alternatives and similar repositories for sql-drive-by
Users that are interested in sql-drive-by are comparing it to the libraries listed below
Sorting:
- PwnSTAR (Pwn SofT-Ap scRipt) - for all your fake-AP needs!☆256Updated 8 years ago
- Payload for teensy like a rubber ducky but the syntax is different. this Human interfaes device ( HID attacks ). Penetration With Teensy☆145Updated 8 years ago
- Python2 / BASH / VBS- UAC D&E Rubber Ducky☆68Updated 7 years ago
- Poison, reset, spoof, redirect MITM script☆126Updated 2 years ago
- Offensives network security framework for Wireless and MiTM style hacking☆61Updated 8 years ago
- Passive Vulnerability Auditor☆135Updated 9 years ago
- Scripts to create your own MITM'ing, packet sniffing WiFi access point☆150Updated 10 years ago
- Reliable Teensy Penetration Testing Payload☆182Updated 13 years ago
- Opens 1K+ IPs or Shodan search results and attempts to login☆148Updated 4 years ago
- ☆153Updated 2 years ago
- Custom Fake Portal To Harvest Users Social Media Accounts☆59Updated 3 years ago
- Useful pentesting scripts☆85Updated 11 months ago
- Social engineering tool for human hacking☆125Updated 9 years ago
- Credentials recovery project☆44Updated 9 years ago
- This tool allows you mass play any YouTube video, terminate apps and rename Chromecast device(s) obtained from Shodan.io☆163Updated 3 years ago
- A simple bash based metasploit automation tool!☆125Updated 2 years ago
- Take full control of a OSX user or root account via command line.☆100Updated 7 years ago
- Pentest dropbox setup scripts for Kali Linux☆90Updated 9 years ago
- Linux RDP Scanner and Bruteforcer Scripts☆59Updated 10 years ago
- MiniPwner's website and forums aren't exactly clear on what you need to do. I'm here to help!☆20Updated 9 years ago
- USB Attack to Decrypt Wi-Fi Communications☆32Updated 10 years ago
- usbWatchdog - monitor changes to your usb ports, and if anything is plugged in or removed, wipe RAM and shut down.☆49Updated 8 years ago
- Harvest FTP/POP/IMAP/HTTP/IRC creds☆168Updated 10 years ago
- Advanced Hash Manipulation☆175Updated 6 years ago
- Creating a wireless rifle de-authentication gun, which utilized a yagi antenna and a Raspberry Pi.☆68Updated 10 years ago
- Generate Payloads and Control Remote Machines. [Discontinued]☆225Updated 4 years ago
- Pyxiewps is a wireless attack tool to retrieve the WPS pin in seconds.☆138Updated 6 years ago
- IP Cam Shell is a command line script for testing and exploiting a wide range of IP cameras as demonstrated by Craig Heffner in "Exploiti…☆143Updated 8 years ago
- A swiss army knife for pentesting Windows/Active Directory environments☆50Updated 9 years ago
- Powershell Reverse Rubber Ducky☆57Updated 10 years ago