An sql vulnerability website and admin page finder
☆23May 9, 2018Updated 7 years ago
Alternatives and similar repositories for sql-drive-by
Users that are interested in sql-drive-by are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- This is a phishing ready platform. Unlike other phishing methods, EvilnoVNC allows you to bypass 2FA using a real browser via noVNC conn…☆10Apr 7, 2023Updated 3 years ago
- Virtualization Security Audit Tool - Security assess CIS compliance of a Virtualization environments☆15Nov 21, 2023Updated 2 years ago
- ☆11Apr 28, 2017Updated 9 years ago
- The script specializes in collecting information about sites, protocols and servers, facilitating work on the Metasploit project and repa…☆13Oct 31, 2018Updated 7 years ago
- Android Google Map 2 Project to find friend location with live movement.☆10Feb 9, 2015Updated 11 years ago
- End-to-end encrypted cloud storage - Proton Drive • AdSpecial offer: 40% Off Yearly / 80% Off First Month. Protect your most important files, photos, and documents from prying eyes.
- using VBS to download and install a powershell malware☆37Jun 28, 2019Updated 6 years ago
- Listen to the soothing sounds of attacks and anomalies detected by the Signal Sciences web protection platform.☆10Oct 1, 2018Updated 7 years ago
- Results of a recent FOIA for NIST documents related to the design of Dual EC DRBG. Via EFF and Rep. Grayson's office. See README for deta…☆24Feb 10, 2015Updated 11 years ago
- A collection of short scripts for analysis, encryption and forensics, that can be used for CTF and/or security assessments☆10Sep 22, 2015Updated 10 years ago
- A fluent SQLite Query API for Android☆20Jun 12, 2016Updated 9 years ago
- ☆16Apr 1, 2022Updated 4 years ago
- 🐚ᴠʟᴀɴɢ ʀᴇᴠᴇʀsᴇ sʜᴇʟʟ🐚☆11Apr 28, 2022Updated 4 years ago
- Protect your sensitive HTML content with this AES encryption HTML loader. User will need to key in password in order to view the HTML con…☆11May 5, 2015Updated 11 years ago
- AutoIt HackTool, Shortcuts .lnk Payloads Generator As LNK-KISSER.☆104Feb 6, 2018Updated 8 years ago
- Simple, predictable pricing with DigitalOcean hosting • AdAlways know what you'll pay with monthly caps and flat pricing. Enterprise-grade infrastructure trusted by 600k+ customers.
- A tool to visually snapshot a website by supplying multiple user-agent. Designed to aid in discovery of different entry points into an ap…☆31May 6, 2016Updated 9 years ago
- dragonscan is a information gathering tool coded in python cloning in /root/ folder is recommended☆13Aug 31, 2019Updated 6 years ago
- Vendont is a Venmo transaction finder/scraper. It uses Venmo's own public API system to fetch all transactions at a given time.☆10Jun 16, 2019Updated 6 years ago
- AES GCM : Authenticated Encryption with Associated Data (AEAD) algorithm in Go language☆11Jan 5, 2016Updated 10 years ago
- Extract username and passwords from IPTV urls☆12Nov 8, 2025Updated 5 months ago
- Wi-Fi Hacking Workshop☆14Dec 27, 2020Updated 5 years ago
- Scan a Magento site for information☆15Aug 24, 2015Updated 10 years ago
- Tool scan EternalBlue by golang☆21Sep 13, 2019Updated 6 years ago
- Magnetic Pentesting tool for Raspberry Pi☆65Jul 6, 2020Updated 5 years ago
- Deploy to Railway using AI coding agents - Free Credits Offer • AdUse Claude Code, Codex, OpenCode, and more. Autonomous software development now has the infrastructure to match with Railway.
- A wrapper library around native windows sytem APIs☆10Dec 23, 2019Updated 6 years ago
- Yet Another ASGI Toolkit☆10Jun 1, 2022Updated 3 years ago
- Looks up details on a public IPV4 address against ip-info and blacklist-search sites. Providing a reputation check.☆11Oct 16, 2021Updated 4 years ago
- Using Shodan to get a breakdown of the most common key names in public Redis servers.☆13Dec 10, 2017Updated 8 years ago
- Creates a .lnk file with unicode chars that reverse the file extension and adds a .txt to the end to make it appear as a textfile. Paylo…☆115Dec 19, 2020Updated 5 years ago
- Scrape emails, phone numbers and social media accounts from a website. You can use the found information to gather more information or ju…☆16Dec 6, 2021Updated 4 years ago
- A Python/Django-based Captive Portal System for LAN Parties. (Linux)☆38Aug 13, 2017Updated 8 years ago
- Python OSINT Tool to retrieve pictures from a specific location using Instagram API☆37Jun 28, 2015Updated 10 years ago
- [Checker Emails Twitter + Login API Twitter] - API REST Twitter☆10Aug 18, 2018Updated 7 years ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- Fast, native*, cross-platform Slack client, develop with React QML☆21Mar 30, 2020Updated 6 years ago
- Magspoof R3 - Wireless magnetic stripe emulator☆69Oct 25, 2018Updated 7 years ago
- Protect your Wireless Network from Evil Access Points!☆184Jul 18, 2023Updated 2 years ago
- Maltego transform to detect the OpenSSL Heartbleed vulnerability (CVE-2014-0160)☆18May 1, 2014Updated 12 years ago
- NSA Playset implant for bridging airgaps without radio☆17Sep 28, 2015Updated 10 years ago
- Analysis of Hearthstone replays☆11May 18, 2017Updated 8 years ago
- MagSpoof is a portable device that can spoof/emulate any magnetic stripe or credit card "wirelessly", even on standard magstripe readers.☆16Nov 25, 2015Updated 10 years ago