Dosk3n / sql-drive-byLinks
An sql vulnerability website and admin page finder
☆21Updated 7 years ago
Alternatives and similar repositories for sql-drive-by
Users that are interested in sql-drive-by are comparing it to the libraries listed below
Sorting:
- PwnSTAR (Pwn SofT-Ap scRipt) - for all your fake-AP needs!☆255Updated 7 years ago
- Generate Payloads and Control Remote Machines. [Discontinued]☆223Updated 4 years ago
- Poison, reset, spoof, redirect MITM script☆127Updated 2 years ago
- Command-line Google dork tool. This is an early predecessor to dorkbot, which may be more useful: https://github.com/utiso/dorkbot☆150Updated 8 years ago
- The Credential Mapper☆448Updated 7 years ago
- Python2 / BASH / VBS- UAC D&E Rubber Ducky☆69Updated 7 years ago
- ☆53Updated 13 years ago
- Payload for teensy like a rubber ducky but the syntax is different. this Human interfaes device ( HID attacks ). Penetration With Teensy☆145Updated 8 years ago
- usbWatchdog - monitor changes to your usb ports, and if anything is plugged in or removed, wipe RAM and shut down.☆49Updated 8 years ago
- This is an open source tool to dump the wifi profiles and cleartext passwords of the connected access points on the Windows machine. This…☆290Updated 8 years ago
- Useful pentesting scripts☆84Updated 9 months ago
- Find your wireless network password in Windows , Linux and Mac OS☆354Updated 5 years ago
- The Hacker's ToolBox☆189Updated 8 years ago
- information gathering via dorks☆393Updated 3 years ago
- Opens 1K+ IPs or Shodan search results and attempts to login☆148Updated 4 years ago
- A script written lazily for generating cross-platform backdoors on the go :)☆190Updated 7 years ago
- php-cli vulnerability scanner☆78Updated 10 years ago
- Detect, capture, crack WPA/2 handshakes, WEP Keys and geotag with Android GPS☆195Updated 10 years ago
- This tool allows you mass play any YouTube video, terminate apps and rename Chromecast device(s) obtained from Shodan.io☆163Updated 3 years ago
- A few simple scripts and templates I have used during various phishing engagements.☆61Updated 10 years ago
- Exploit pack for pentesters and ethical hackers.☆115Updated 8 years ago
- Passive Vulnerability Auditor☆135Updated 9 years ago
- Offensives network security framework for Wireless and MiTM style hacking☆61Updated 8 years ago
- A simple bash based metasploit automation tool!☆124Updated 2 years ago
- Social engineering tool for human hacking☆122Updated 9 years ago
- Scripts to create your own MITM'ing, packet sniffing WiFi access point☆148Updated 10 years ago
- search for hosts info with shodan☆233Updated 4 years ago
- A ctypes powered python keylogger.☆109Updated 5 years ago
- Linux RDP Scanner and Bruteforcer Scripts☆60Updated 10 years ago
- ☆150Updated 2 years ago