A wiki focusing on aggregating and documenting various SQL injection methods
☆794Apr 1, 2026Updated last month
Alternatives and similar repositories for SQLInjectionWiki
Users that are interested in SQLInjectionWiki are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- PowerUpSQL: A PowerShell Toolkit for Attacking SQL Server☆2,708Dec 12, 2024Updated last year
- PowerShell module to check if a Windows binary (EXE/DLL) has been compiled with ASLR, DEP, SafeSEH, StrongNaming, and Authenticode.☆665Jul 31, 2024Updated last year
- A collection of curated Java Deserialization Exploits☆592May 16, 2021Updated 4 years ago
- SSRF (Server Side Request Forgery) testing resources☆2,489Oct 12, 2024Updated last year
- MSDAT: Microsoft SQL Database Attacking Tool☆995Aug 1, 2023Updated 2 years ago
- Wordpress hosting with auto-scaling - Free Trial Offer • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- Remote Recon and Collection☆460Nov 23, 2017Updated 8 years ago
- The cheat sheet about Java Deserialization vulnerabilities☆3,175May 26, 2023Updated 2 years ago
- Red Team Tips as posted by @vysecurity on Twitter☆1,116Apr 26, 2020Updated 6 years ago
- Forward local or remote tcp ports through SMB pipes.☆297Mar 7, 2021Updated 5 years ago
- Wiki to collect Red Team infrastructure hardening resources☆4,476Oct 1, 2025Updated 7 months ago
- goddi (go dump domain info) dumps Active Directory domain information☆428May 31, 2022Updated 3 years ago
- Run PowerShell command without invoking powershell.exe☆1,551Apr 9, 2026Updated 3 weeks ago
- Stealing CSRF tokens with CSS injection (without iFrames)☆324Feb 7, 2018Updated 8 years ago
- Ip Vulnerability check to Eternal Blue , Romance , Synergy , Champion , Erraticgopher & Eagerlever☆124Nov 18, 2023Updated 2 years ago
- AI Agents on DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- Automatically identify deserialisation issues in Java and .NET applications by using active and passive scans☆584Sep 7, 2021Updated 4 years ago
- A collection of Burpsuite Intruder payloads, BurpBounty payloads, fuzz lists, malicious file uploads and web pentesting methodologies and…☆3,929Sep 27, 2021Updated 4 years ago
- ✍️ A curated list of CVE PoCs.☆3,500Jan 4, 2022Updated 4 years ago
- A code demonstrating CVE-2018-0886☆269Aug 14, 2020Updated 5 years ago
- Python3 Burp History parsing tool to discover potential SQL injection points. To be used in tandem with SQLmap.☆472Nov 14, 2019Updated 6 years ago
- Loader, dropper generator with multiple features for bypassing client-side and network-side countermeasures.☆944May 8, 2019Updated 6 years ago
- RedSnarf is a pen-testing / red-teaming tool for Windows environments☆1,212Sep 14, 2020Updated 5 years ago
- Portia aims to automate a number of techniques commonly performed on internal network penetration tests after a low privileged account ha…☆501Aug 7, 2020Updated 5 years ago
- Windows passwords decryption from dump files☆513Feb 2, 2023Updated 3 years ago
- Deploy on Railway without the complexity - Free Credits Offer • AdConnect your repo and Railway handles the rest with instant previews. Quickly provision container image services, databases, and storage volumes.
- PowerShell Script to Dump Windows Credentials from the Credential Manager☆734Dec 12, 2017Updated 8 years ago
- ☆2,323Dec 8, 2023Updated 2 years ago
- A tool to elevate privilege with Windows Tokens☆1,066Oct 6, 2023Updated 2 years ago
- Burp Bounty (Scan Check Builder in BApp Store) is a extension of Burp Suite that allows you, in a quick and simple way, to improve the ac…☆1,799Apr 26, 2024Updated 2 years ago
- some pocs for antivirus evasion☆129Aug 28, 2023Updated 2 years ago
- Basics of Windows privilege escalation☆134Sep 30, 2017Updated 8 years ago
- Pop shells like a master.☆1,486Apr 2, 2019Updated 7 years ago
- Socks proxy, and reverse socks server using powershell.☆805Dec 9, 2025Updated 4 months ago
- ReverShellGenerator - A tool to generate various ways to do a reverse shell☆566May 3, 2024Updated last year
- Wordpress hosting with auto-scaling - Free Trial Offer • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- UAC bypass, Elevate, Persistence methods☆2,744Feb 13, 2023Updated 3 years ago
- A Tool for Domain Flyovers☆5,927May 22, 2022Updated 3 years ago
- My musings with PowerShell☆2,715Nov 19, 2021Updated 4 years ago
- This repository contains all the material from the talk "Esoteric sub-domain enumeration techniques" given at Bugcrowd LevelUp 2017 virtu…☆628Feb 5, 2019Updated 7 years ago
- Exploitation for XSS☆734Aug 5, 2021Updated 4 years ago
- XSS payloads for exploiting Markdown syntax☆491Oct 12, 2024Updated last year
- PowerShell Empire Web Interface☆329May 20, 2023Updated 2 years ago