Sql injection vulnerability scanner
☆12Aug 27, 2020Updated 5 years ago
Alternatives and similar repositories for sql-dex
Users that are interested in sql-dex are comparing it to the libraries listed below
Sorting:
- Sample SecOps scripts and Utilities☆12Jun 19, 2024Updated last year
- morphHTA - Morphing Cobalt Strike's evil.HTA☆10Jun 3, 2017Updated 8 years ago
- This is a mirror of the main Bitbucket repository. Issue tracking is done on Bitbucket☆12Jun 29, 2022Updated 3 years ago
- Network Shredder IDS☆11Aug 14, 2024Updated last year
- YaraSploit is a collection of Yara rules generated from Metasploit framework shellcodes.☆45Nov 7, 2023Updated 2 years ago
- Vijos: Vijos Isn't Just an Operating System☆10May 31, 2020Updated 5 years ago
- A curated compilation of national CERT alerts & advisories sources (for cybersecurity).☆13Sep 6, 2019Updated 6 years ago
- edumeet - multiparty web-meetings using mediasoup and WebRTC☆11Mar 3, 2022Updated 3 years ago
- Collection of Cyber Threat Intelligence sources from the deep and dark web☆11Sep 21, 2022Updated 3 years ago
- List of links and resources referred to in my SANS OSINT Summit 2024 Talk "OSINT On The Russian Internet"☆11Feb 29, 2024Updated 2 years ago
- bctf2017 challenges☆11Apr 20, 2017Updated 8 years ago
- Help deobfuscate VBScript☆18Jul 1, 2022Updated 3 years ago
- RFC 2047 MIME Message Header decoder Rust library.☆12Feb 6, 2026Updated 3 weeks ago
- Malicious traffic detection system☆11Nov 2, 2022Updated 3 years ago
- A plugin that integrate MOSS and JPlag to Moodle and provide other useful features☆11May 23, 2019Updated 6 years ago
- RepoToStoreBugBountyInfo☆11Mar 11, 2020Updated 5 years ago
- Puppet Guide☆10Jan 2, 2022Updated 4 years ago
- Mobile application for Gophie☆12Jan 5, 2023Updated 3 years ago
- RisingSun: Decoding SUNBURST C2 to identify infected hosts without network telemetry.☆10Jan 14, 2021Updated 5 years ago
- Volatility 3 plugins to extract a module as complete as possible☆12Jun 13, 2023Updated 2 years ago
- forerunner of ydiff - a structural comparison tool for Python☆14Jul 6, 2013Updated 12 years ago
- Download all the HIBP passwords☆12Apr 6, 2023Updated 2 years ago
- Hide the memory of the process in the Linux kernel.☆10Dec 8, 2020Updated 5 years ago
- Run program in a sandbox-like environment☆10Jan 1, 2015Updated 11 years ago
- Wrapper for TSK (Sleuth Kit) Bindings☆12Jan 10, 2023Updated 3 years ago
- A one stop shop for all cyber tooling, frameworks and hacking methodologies☆11Jul 25, 2021Updated 4 years ago
- VMware Guide☆14Dec 14, 2021Updated 4 years ago
- snake-core - the real snake☆15Jul 11, 2023Updated 2 years ago
- TLD records archive. Revisiting the original TLDR project by mandatoryprogrammer, on the hunt for more root nameserver changes.☆11Dec 4, 2022Updated 3 years ago
- ☆11Mar 19, 2022Updated 3 years ago
- C++03 compile-time ray tracer☆10Feb 22, 2018Updated 8 years ago
- Lightweight RPC framework based on AsyncIO and Protocol Buffers☆11Jun 6, 2018Updated 7 years ago
- Search for secrets left in git history☆14Sep 22, 2018Updated 7 years ago
- NTFS Security Descriptor Stream ($Secure:$SDS) parser☆14Jan 9, 2023Updated 3 years ago
- Minimal, dependency free implementation of the ctor crate☆17Aug 1, 2024Updated last year
- Windows DPAPI laboratory☆12Mar 5, 2018Updated 7 years ago
- Brutteforce for stego CTFs☆16Nov 2, 2022Updated 3 years ago
- F-Secure Lightweight Acqusition for Incident Response (FLAIR)☆16Jul 5, 2021Updated 4 years ago
- Go package for using Go pointers in external code☆14Oct 30, 2021Updated 4 years ago