Hakumarachi / SQL_loose_comparisonLinks
A list of weird comparison in SQL
☆15Updated 3 years ago
Alternatives and similar repositories for SQL_loose_comparison
Users that are interested in SQL_loose_comparison are comparing it to the libraries listed below
Sorting:
- an Evil Java RMI Registry.☆52Updated 2 years ago
- ☆11Updated 7 months ago
- Perform TE.CL HTTP Request Smuggling attacks by crafting HTTP Request automatically.☆72Updated 3 years ago
- Make better use of the embedded browser that comes by default with Burp☆45Updated last year
- php7.4.26-internalog☆13Updated 2 years ago
- ☆27Updated 2 years ago
- Utility for creating ZipSlip archives☆74Updated 2 years ago
- Proof of Concept for Path Traversal in Apache Struts ("CVE-2023-50164")☆57Updated last year
- User enumeration and password spraying tool for testing Azure AD☆70Updated 3 years ago
- bbs is a router for SOCKS and HTTP proxies. It exposes a SOCKS5 (or HTTP CONNECT) service and forwards incoming requests to proxies or ch…☆90Updated 2 months ago
- ☆39Updated 2 months ago
- CVE-2023-34362: MOVEit Transfer Unauthenticated RCE☆64Updated last year
- Pwndoc local file inclusion to remote code execution of Node.js code on the server☆47Updated 6 months ago
- Just some random small tools for dealing with asp.net Forms Authentication Cookies☆25Updated 4 years ago
- A proof-of-concept tool for generating payloads that exploit unsafe Java object deserialization.☆29Updated last year
- Pre-Auth Blind NoSQL Injection leading to Remote Code Execution in Rocket Chat 3.12.1☆58Updated 2 years ago
- ☆47Updated 6 months ago
- Additional resources for leaking and exploiting ObjRefs via HTTP .NET Remoting (CVE-2024-29059)☆89Updated last year
- A tool for performing light brute-forcing of HTTP servers to identify commonly accessible NTLM authentication endpoints.☆95Updated last year
- The ldapconsole script allows you to perform custom LDAP requests to a Windows domain.☆64Updated 6 months ago
- Binary and CrackMapExec module to impersonate tokens on a windows machine☆46Updated 3 years ago
- POC for Veeam Backup and Replication CVE-2023-27532☆65Updated 2 years ago
- Arbitrary File Disclosure Vulnerability in Icinga Web 2 <2.8.6, <2.9.6, <2.10☆13Updated 2 years ago
- A powerful AWS Cognito analysis and session hijacking toolkit designed for security researchers and penetration testers. CognitoHunter sp…☆20Updated 7 months ago
- CVE-2021-38647 - POC to exploit unauthenticated RCE #OMIGOD☆68Updated 3 years ago
- Java archive implant toolkit.☆61Updated 4 months ago
- ☆26Updated 3 years ago
- The following package is the standalone wordlist-only component to flask-unsign.☆40Updated last year
- Bypass Constrained Language Mode in PowerShell☆30Updated 6 years ago
- ☆21Updated 3 months ago