a7t0fwa7 / BSQLi-2.0View external linksLinks
reverse engineered and improved BSQLi script from Coffinxp
☆15Aug 30, 2024Updated last year
Alternatives and similar repositories for BSQLi-2.0
Users that are interested in BSQLi-2.0 are comparing it to the libraries listed below
Sorting:
- ☆15Mar 21, 2025Updated 10 months ago
- custom nuclei templates☆14Sep 27, 2022Updated 3 years ago
- Reversing Citrix Gateway for XSS☆17Jul 3, 2023Updated 2 years ago
- ☆15Feb 5, 2025Updated last year
- This Repository consists all Public Cheatsheets created by BlackPerl DFIR Content Team☆20Oct 9, 2024Updated last year
- Realistic Data Generation tool for Big Data Appliances and AI Solutions☆13Dec 16, 2022Updated 3 years ago
- web cache poison - Top 1 web hacking technique of 2019☆25Feb 24, 2020Updated 5 years ago
- Red Team Stored XSS SVG phishing-companion tool with the ability to serve a malicious login page, or clone an html page and implement cus…☆30Mar 31, 2023Updated 2 years ago
- SubOwner - A Simple tool check for subdomain takeovers.☆116Oct 18, 2024Updated last year
- Host Header Vulnerability Scanner Automated Tool☆28Apr 18, 2025Updated 9 months ago
- This is the repo of the Flutter Bootcamp by Dev Community Nepal☆14May 25, 2023Updated 2 years ago
- ☆36Nov 26, 2024Updated last year
- SPAMer work☆10Oct 18, 2019Updated 6 years ago
- Check Your IP Address☆10Mar 12, 2022Updated 3 years ago
- A collection of slides and presentations from BSides Ahmedabad 2024, held on October 12th and 13th. This repository features key insights…☆38Oct 17, 2024Updated last year
- Phishing Framework for OTP codes☆47Nov 24, 2025Updated 2 months ago
- ☆25Jan 19, 2026Updated 3 weeks ago
- Subdomain Recon Tool☆13Sep 11, 2022Updated 3 years ago
- k8s ConfigMaps and Secrets Usage.☆11Jan 24, 2025Updated last year
- I'll be starting a 30 days of code mainly focused on the backend part. I'll make sure that I will code at least 1 hour a day and consiste…☆11Apr 2, 2023Updated 2 years ago
- A controlled environment for demonstrating and understanding buffer overflow vulnerabilities in web applications. This project is designe…☆24Jan 27, 2025Updated last year
- ☆47Jan 14, 2024Updated 2 years ago
- ☆11Mar 12, 2020Updated 5 years ago
- 🐙 Yusher Web Browsers☆12Nov 2, 2021Updated 4 years ago
- Take control of a remote machine using reverse shells in python(The hacking side of python)☆10May 23, 2023Updated 2 years ago
- ☆11Nov 11, 2023Updated 2 years ago
- 🔐 EntroPy Password Generator A powerful Python-based password generator with 20+ modes, producing high-entropy passwords (15–128 chars, …☆19Nov 23, 2025Updated 2 months ago
- Python script to create CSV, HTML & PDF filtered for repo tags☆13Jul 26, 2024Updated last year
- You'll find all the resources and presentations I have used in my talks and workshops☆12Nov 16, 2024Updated last year
- Simple Autopilt built using dronekit and MAVLink protocol☆10Nov 2, 2018Updated 7 years ago
- A semantic analysis tool for debugging python code☆24Jan 12, 2026Updated last month
- ☆21May 19, 2024Updated last year
- CVE-2024-43451 is a Windows NTLM vulnerability that allows an attacker to force authentication and capture NTLM hashes by using malicious…☆15Jan 21, 2025Updated last year
- This script checks the status of URLs to see if they are alive or not.☆13Nov 22, 2024Updated last year
- Shell Scripting with Bash, by EC-Council☆11Jun 4, 2021Updated 4 years ago
- Enterprise SOC Lab with automated threat detection, SOAR orchestration, and incident response☆28Jan 21, 2026Updated 3 weeks ago
- A simple python script to follow stock market papers in your portfolio☆12Jun 29, 2020Updated 5 years ago
- Tooll for sql injections scan☆11Jul 17, 2018Updated 7 years ago
- A curated list of awesome AI tools for generating and manipulating 3D models using text, images, or AI-enhanced modeling engines.☆13Apr 19, 2025Updated 9 months ago