HlaingPhyoAung / sqlmap
Usage: python sqlmap.py [options] Options: -h, --help Show basic help message and exit -hh Show advanced help message and exit --version Show program's version number and exit -v VERBOSE Verbosity level: 0-6 (default 1) Target: At least one of these options has to be provided to define the target(s) -d DIRECT Connection string for direct databas…
☆12Updated 6 years ago
Alternatives and similar repositories for sqlmap:
Users that are interested in sqlmap are comparing it to the libraries listed below
- #!/bin/bash ########## DEBUG Mode ########## if [ -z ${FLUX_DEBUG+x} ]; then FLUX_DEBUG=0 else FLUX_DEBUG=1 fi #####################…☆14Updated 7 years ago
- This is a repo for android spyware☆15Updated 6 years ago
- Java client library for the OpenCellID API☆25Updated 8 years ago
- MEGA SDK - Client Access Engine Coverity Scan Build Status MEGA --- The Privacy Company --- is a Secure Cloud Storage provider that prote…☆16Updated 9 years ago
- Spyware Android App☆19Updated 7 years ago
- Windows Auto Post Exploitation - For ReD Team☆15Updated 5 years ago
- Some concept code for bypassing the Android lock screen from recovery mode☆16Updated 14 years ago
- Sniff every types of files you want on your network interface and save it.☆16Updated 9 years ago
- HBHC is a tool writeen in Python3 for Cracking the hashes in speed, it's small and handy tools required only 2 arguments. 🏡 🍪 🔑 🔨☆20Updated 3 years ago
- ECE 209 Security of Embedded Systems Project☆14Updated 7 years ago
- to grab or steal the password of systemAutomated sticky keys hack. Post exploitation it grabs browser passwords, history, and network pas…☆53Updated 7 years ago
- check if device contains Pegasus Spyware files☆38Updated 8 years ago
- ESP8266 ROM Bootloader utility☆11Updated 4 years ago
- GPLv2 tool that auto-reverse-engineers Android applications and rips out sensitive API calls. Its awesome.☆21Updated 12 years ago
- Simple spy app for Android☆15Updated 7 years ago
- SIP hacking tools and scripts☆22Updated 4 years ago
- Juice Jacking / Automatic Android Rooting based on Intel Edison using dirty c0w☆11Updated 8 years ago
- ############################################################ # +------------------------------------------------------+ # # | …☆10Updated 11 years ago
- Linux kernel release 3.x <http://kernel.org/> These are the release notes for Linux version 3. Read them carefully, as they tell you …☆15Updated 3 years ago
- These are favored by companies who deal with sensitive information to prevent leaks. The 5GHz WiFi jammer is effective up to 40 meters an…☆14Updated 4 years ago
- ############################################################ # +------------------------------------------------------+ # # | …☆9Updated 6 years ago
- ☆17Updated 10 years ago
- Gear61 / Random-Number-Generator Code Issues 5 Pull requests 0 Projects 0 Wiki Pulse projectFilesBackup/.idea/workspace.xml <?xml versi…☆19Updated 3 years ago
- Pentesting Hacking Tools, Scripts, Windows, Linux,☆28Updated 9 years ago
- cSploit traffic manipulator☆29Updated 7 years ago
- NetSaver Pro ======== Please scroll down if you want to ask a question, request a feature or report a bug. Frequently Asked Questions (…☆12Updated 2 years ago
- PassWord List Maker☆17Updated 6 years ago
- ☆29Updated 4 years ago
- A mobile phone jammer is an instrument used to prevent cellular phones from receiving signals from base stations. When used, the jammer e…☆22Updated 7 years ago
- GoldenEye Mobile Android Layer 7 HTTP DoS Test Tool☆34Updated 12 years ago