T0X1Cx / CVE-2021-36396-Exploit
This script demonstrates a time-based blind SQL injection on Moodle platforms, exploiting response delays to extract data.
☆18Updated 10 months ago
Alternatives and similar repositories for CVE-2021-36396-Exploit
Users that are interested in CVE-2021-36396-Exploit are comparing it to the libraries listed below
Sorting:
- ScanExp automates the scanning of any machine's open ports via the ip address and performs a brute force attack on ports 20, 21 for the F…☆26Updated last year
- CVE-2024-24919 [Check Point Security Gateway Information Disclosure]☆32Updated 11 months ago
- Probuster : A Python based Web Application Penetration testing tool for Information Gathering⚡.☆60Updated 5 months ago
- Simple-XSS is a multiplatform cross-site scripting (XSS) vulnerability exploitation tool.☆48Updated 11 months ago
- SidePeek.js is a curated set of JavaScript payloads for browser-based recon. Run them in DevTools or as bookmarklets to uncover hidden AP…☆19Updated this week
- Certina is an OSINT tool for red teamers and bug hunters to discover subdomains from web certificate data☆55Updated last year
- "XSS automation tool helps hackers identify and exploit cross-site scripting vulnerabilities in web apps. Tests for reflected and persist…☆92Updated 9 months ago
- It is a tool for scanning and exploiting the famous SQL injection vulnerability in more than millions of sites. The exploit was programme…☆68Updated 10 months ago
- CVE-2024-32640 | Automated SQLi Exploitation PoC☆64Updated last year
- A simple utility to quickly gather historic Port and CVE exposures from an IP range.☆38Updated last year
- FireHawk: The Elite Firebase Security Testing Utility☆21Updated 11 months ago
- ScopeHunter is a command-line tool for finding in scope targets for bug bounty programs.☆67Updated 8 months ago
- Red teaming is an attack technique used in cyber security to test how an organisation would respond to a genuine cyber attack. It is done…☆21Updated last month
- CVE-2024-28955 Exploitation PoC☆34Updated 10 months ago
- Backup Files Wordlist Generator - generate a comprehensive list of potential backup file Wordlist based on a given list URL and backup fi…☆58Updated 6 months ago
- A Tool for Bug Bounty Hunters that uses Passive and Active Techniques to fetch URLs as a strong Recon, so you can then create Attack Vect…☆75Updated 8 months ago
- Checks for SSRF using built-in custom Payloads after fetching URLs from Multiple Passive Sources & applying complex patterns aimed at SSR…☆121Updated 8 months ago
- Passive Web Vulnerability Detection Tool☆33Updated 2 weeks ago
- This project explores secure remote access using Metasploit's reverse TCP payloads. Ethically and responsibly, we showcase potential risk…☆30Updated last year
- CrlfiX☆19Updated 3 months ago
- 🪄 XSSDynaGen is a tool designed to analyze URLs with parameters, identify the characters allowed by the server, and generate advanced XS…☆51Updated 4 months ago
- Filter URLs to save your time.☆60Updated 2 years ago
- ParamFirstCheck identifies in a list of urls those containing a parameter of the top 25 of the most vulnerable parameters for SQLi, LFI, …☆35Updated last year
- PassBreaker☆61Updated last year
- A powerful and sophisticated tool for detecting and exploiting open redirect vulnerabilities using the sed utility and a selected list of…☆43Updated 8 months ago
- DomainTrail is a fast subdomain enumeration tool that uses effective passive and active techniques.☆40Updated last year
- Bypass Reset Password Code Lead to Account Takeover☆25Updated 8 months ago
- Red Teaming tools and techniques☆52Updated 2 years ago
- a simple discovery script that uses popular tools like subfinder, amass, puredns, alterx, massdns and others☆77Updated last year
- Chrome extension tool for OSINT & Recon☆53Updated last year