T0X1Cx / CVE-2021-36396-ExploitLinks
This script demonstrates a time-based blind SQL injection on Moodle platforms, exploiting response delays to extract data.
☆18Updated 11 months ago
Alternatives and similar repositories for CVE-2021-36396-Exploit
Users that are interested in CVE-2021-36396-Exploit are comparing it to the libraries listed below
Sorting:
- CVE-2024-24919 [Check Point Security Gateway Information Disclosure]☆32Updated last year
- Probuster : A Python based Web Application Penetration testing tool for Information Gathering⚡.☆60Updated 6 months ago
- ScanExp automates the scanning of any machine's open ports via the ip address and performs a brute force attack on ports 20, 21 for the F…☆26Updated last year
- Passive Web Vulnerability Detection Tool☆33Updated last month
- SidePeek.js is a curated set of JavaScript payloads for browser-based recon. Run them in DevTools or as bookmarklets to uncover hidden AP…☆19Updated 3 weeks ago
- It is a tool for scanning and exploiting the famous SQL injection vulnerability in more than millions of sites. The exploit was programme…☆67Updated 11 months ago
- CrlfiX☆19Updated 4 months ago
- ParamFirstCheck identifies in a list of urls those containing a parameter of the top 25 of the most vulnerable parameters for SQLi, LFI, …☆35Updated last year
- Simple-XSS is a multiplatform cross-site scripting (XSS) vulnerability exploitation tool.☆48Updated last year
- Certina is an OSINT tool for red teamers and bug hunters to discover subdomains from web certificate data☆56Updated last year
- CVE-2024-32640 | Automated SQLi Exploitation PoC☆64Updated last year
- POC for CVE-2024-40348. Will attempt to read /etc/passwd from target☆31Updated 10 months ago
- Nuclei template for CVE-2024-23897 (Jenkins LFI Vulnerability)☆18Updated last year
- A powerful and sophisticated tool for detecting and exploiting open redirect vulnerabilities using the sed utility and a selected list of…☆44Updated 9 months ago
- ☆35Updated 6 months ago
- Red Teaming tools and techniques☆52Updated 2 years ago
- A 1 Liner SQL Injection Attack using SQLMAP and various parameters that helps quickly check for a vulnerabilities during Bug Bounty☆40Updated 9 months ago
- "XSS automation tool helps hackers identify and exploit cross-site scripting vulnerabilities in web apps. Tests for reflected and persist…☆92Updated 10 months ago
- reverse engineered and improved BSQLi script from Coffinxp☆12Updated 9 months ago
- FireHawk: The Elite Firebase Security Testing Utility☆21Updated last year
- A simple utility to quickly gather historic Port and CVE exposures from an IP range.☆38Updated last year
- Tool for bypassing logins vulnerable against SQL injection☆46Updated last year
- Tips, Tricks, and Scripts for Linux Post Exploitation☆38Updated 2 years ago
- This repository contains the best fuzzing wordlist files☆33Updated 6 months ago
- subBruter is a tool designed to efficiently probe for alive subdomins from a provided wordlist.☆27Updated last year
- DomainTrail is a fast subdomain enumeration tool that uses effective passive and active techniques.☆41Updated last year
- Red teaming is an attack technique used in cyber security to test how an organisation would respond to a genuine cyber attack. It is done…☆21Updated last month
- ☆27Updated 11 months ago
- CVE-2024-28955 Exploitation PoC☆34Updated 11 months ago
- This project explores secure remote access using Metasploit's reverse TCP payloads. Ethically and responsibly, we showcase potential risk…☆30Updated last year