A script for automatize boolean-based blind SQL injections (MVP).
☆54Aug 29, 2022Updated 3 years ago
Alternatives and similar repositories for SQLbit
Users that are interested in SQLbit are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- ☆12Sep 22, 2022Updated 3 years ago
- We can Use this tool to find out sensitive data such as API keys, hardcoded credentials etc.☆23Dec 18, 2021Updated 4 years ago
- An exotic service bruteforce tool.☆13Apr 12, 2025Updated last year
- Small python script to look for common vulnerabilities on SMTP server.☆47Dec 17, 2023Updated 2 years ago
- Windows Reverse TCP Shell for Hacking and Pentesting☆24Aug 13, 2024Updated last year
- End-to-end encrypted email - Proton Mail • AdSpecial offer: 40% Off Yearly / 80% Off First Month. All Proton services are open source and independently audited for security.
- Perform OSINT on external targets using Shodan☆24Feb 7, 2024Updated 2 years ago
- ☆17Jan 2, 2020Updated 6 years ago
- There is my vuln POC and EXP. Some of POC were collected, most of POC and EXP were written by myself.☆13May 28, 2022Updated 3 years ago
- mift - a mobile image forensic toolkit☆47Nov 14, 2023Updated 2 years ago
- Probe: This is a special tool for bug hunter for automated recon process smoothly.☆25Jan 29, 2024Updated 2 years ago
- Just another vulnerable web application.☆36Jul 27, 2024Updated last year
- Coyote is a standalone C# post-exploitation implant for maintaining access to compromised Windows infrastructure during red team engageme…☆22May 15, 2022Updated 4 years ago
- Simple API for storing all incoming XSS requests and various XSS templates.☆49Jul 18, 2024Updated last year
- ☆15May 6, 2023Updated 3 years ago
- Simple, predictable pricing with DigitalOcean hosting • AdAlways know what you'll pay with monthly caps and flat pricing. Enterprise-grade infrastructure trusted by 600k+ customers.
- The long shadow to emerge as other Git repositories☆18Feb 25, 2026Updated 2 months ago
- Application with SQL Injection vulnerability and possible privilege escalation. Free vulnerable app for ethical hacking / penetration tes…☆82Sep 15, 2022Updated 3 years ago
- Hackers Hunter : Hunt down and track CTF Players & Bug Hunters etc accounts by username across in most places where you can find them☆17Feb 1, 2021Updated 5 years ago
- Fast, cross-platform PowerShell module to find files & folders, grep file content, and measure sizes—Linux-style find/grep/du made simple…☆22Apr 8, 2026Updated last month
- Bypass 4xx HTTP response status codes and more. The tool is based on Python Requests, PycURL, and HTTP Client.☆255Feb 25, 2026Updated 2 months ago
- A ZAPROXY Add-on that allows testing of web application vulnerabilities by recording complex multi-step sequences. You can test applica…☆22May 14, 2025Updated last year
- [Discontinued] Transform your payload into fake powerpoint (.ppt)☆43Dec 2, 2020Updated 5 years ago
- Browser extension that finds HTML comments.☆12Aug 8, 2024Updated last year
- PathBuster - multiple hosts Web path scanner☆23Jun 3, 2024Updated last year
- GPUs on demand by Runpod - Special Offer Available • AdRun AI, ML, and HPC workloads on powerful cloud GPUs—without limits or wasted spend. Deploy GPUs in under a minute and pay by the second.
- A wacky exploitation framework written in pure python3.☆23Mar 24, 2024Updated 2 years ago
- This a Complete tool contained box for Capture The Flag competition. Mostly I have inserted all the necessary tools. Some of the people h…☆11Apr 16, 2022Updated 4 years ago
- Store and retrieve your passwords from a secure offline database. Check if your passwords has leaked previously to prevent targeted passw…☆33Mar 4, 2023Updated 3 years ago
- ☆10Apr 2, 2022Updated 4 years ago
- Subdomain Enumeration and Scanner☆35Jun 8, 2020Updated 5 years ago
- Script that performs a scan of a specific domain, using the following tools: Subfinder, assetfinder, amass and httpx. The result is merge…☆24Apr 20, 2022Updated 4 years ago
- A listing of the most common vuln that you can link in your PoCs☆28Oct 27, 2018Updated 7 years ago
- AWS Security Tool☆29Jan 1, 2024Updated 2 years ago
- Post-Exploitation module for Penetration Tester and Hackers.☆28Dec 29, 2021Updated 4 years ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- This tool is useful to find a particular string in a list of URLs using tesseract's OCR (Optical Character Recognition) capabilities☆31Jan 17, 2022Updated 4 years ago
- Yet another web recon tool☆60Aug 9, 2023Updated 2 years ago
- wsvuls - website vulnerability scanner detect issues [ outdated server software and insecure HTTP headers.]☆57Mar 26, 2022Updated 4 years ago
- A file system forensics analysis scanner and threat hunting tool. Scans file systems at the MFT and OS level and stores data in SQL, SQL…☆82Apr 7, 2026Updated last month
- Repository of useful payloads and tips for pentesting/bug bounty.☆31Apr 5, 2026Updated last month
- A proof-of-concept Node.js ransomware☆20Mar 27, 2022Updated 4 years ago
- Development of Botnet Detection Module for Traffic-Based IoT Devices Using Deep Learning☆14Dec 26, 2022Updated 3 years ago