☆21Aug 3, 2022Updated 3 years ago
Alternatives and similar repositories for ScanMySQLiErrorBased-Nuclei
Users that are interested in ScanMySQLiErrorBased-Nuclei are comparing it to the libraries listed below
Sorting:
- ☆46Nov 5, 2025Updated 3 months ago
- ☆14Mar 16, 2024Updated last year
- ☆124Aug 24, 2025Updated 6 months ago
- An SSRF detector tool written in golang. I have fixed some errors and added some more payloads to it. But the tool credits go to z0idsec.☆45Feb 10, 2021Updated 5 years ago
- XSS Finder Via SSTI☆56Sep 14, 2023Updated 2 years ago
- psychoPATH - hunting file uploads & LFI in the dark. This tool is a customisable payload generator designed for blindly detecting LFI & w…☆19Jun 28, 2018Updated 7 years ago
- Template Nuclei SSTI☆34Nov 18, 2025Updated 3 months ago
- Windows Stack Based Auto Buffer Overflow Exploiter☆21Feb 19, 2021Updated 5 years ago
- A Collection of Proof of Concepts for non-published Web Exploits and Common CVEs☆10Nov 29, 2020Updated 5 years ago
- ☆12Apr 17, 2022Updated 3 years ago
- Supporting material for the "Hunting Bugs In The Tropics" DEFCON 30 talk☆10Aug 18, 2022Updated 3 years ago
- Python Reverse Shell Builder with some advanced functionalities☆10Feb 16, 2021Updated 5 years ago
- ☆49Mar 25, 2022Updated 3 years ago
- Automation: Bash script wrapper to find and verify time base sql injection☆10Aug 25, 2022Updated 3 years ago
- ☆12Jun 20, 2022Updated 3 years ago
- GetSimple CMS Custom JS Plugin Exploit RCE Chain☆11Mar 8, 2023Updated 2 years ago
- ☆11Oct 7, 2022Updated 3 years ago
- CONTROL C2 is a command and control framework designed for red teamers and penetration testers.☆15Oct 16, 2024Updated last year
- This script is to build Wazuh 4.3 environment☆11May 30, 2022Updated 3 years ago
- This repository provides examples of Vulnerable and Mitigated code as per CWE Categorization.☆23May 4, 2024Updated last year
- MetaX - Advanced XSS Vulnerability Detector☆15Dec 30, 2025Updated 2 months ago
- ☆38Feb 9, 2025Updated last year
- Automated tool for domains & Subdomains Gathering☆14Feb 25, 2024Updated 2 years ago
- SQLi Hunter is a tool designed to find potential SQL injection vulnerabilities by fetching URLs from the Wayback Machine and checking for…☆14Jun 4, 2025Updated 8 months ago
- My own Custom nuclei templates☆26Dec 8, 2021Updated 4 years ago
- ☆13Mar 15, 2022Updated 3 years ago
- Learn what is NoSQL injection and how to find them ?☆10Jul 22, 2021Updated 4 years ago
- PowerShell script to DCSync NT-Hashes from an Active Directory Domain Controller (DC)☆17Feb 6, 2026Updated 3 weeks ago
- ☆12Jan 4, 2022Updated 4 years ago
- I collected it to help the bug hunter get a reward☆57Sep 7, 2022Updated 3 years ago
- ⚡ Golang library for quick make pentest tools☆15Apr 7, 2025Updated 10 months ago
- The Repository contains various payloads, tools, tips and tricks from various hackers around the world. Please take a quick look down her…☆15May 15, 2025Updated 9 months ago
- Burp Extension to manipulate AES encrypted payloads☆13Feb 4, 2022Updated 4 years ago
- scanner-s3-buckets with list of sites☆18Jun 30, 2019Updated 6 years ago
- All kind of frida stuff when needed in pentesting or reverse engineering of an android app - The perfect starter kit☆18Jun 2, 2020Updated 5 years ago
- Collection of templates (nuclei/jaeles..)☆16Jun 9, 2021Updated 4 years ago
- gup aka Get All Urls parameters to create wordlists for brute forcing parameters.☆18Dec 4, 2021Updated 4 years ago
- The list of files through which we can pop-up the java script alert box☆40Mar 5, 2018Updated 7 years ago
- ParamFirstCheck identifies in a list of urls those containing a parameter of the top 25 of the most vulnerable parameters for SQLi, LFI, …☆35Dec 13, 2023Updated 2 years ago