alexoslabs2 / injectorLinks
Injector a.k.a tr4c1l0rds is a tool to run simultaneous sql injections attacks anonymously using containers.
☆20Updated 2 years ago
Alternatives and similar repositories for injector
Users that are interested in injector are comparing it to the libraries listed below
Sorting:
- Tool that checks for path traversal traces in a given web application url, plus it is capable of multi-threading, set timeout and 5-layer…☆46Updated 7 years ago
- Collection My Wordlist☆121Updated 8 years ago
- Tool for exploiting SQL injection vulnerabilities that sqlmap can't find.☆96Updated 7 years ago
- Hacking tools☆147Updated 10 months ago
- Script to automate PUT HTTP method exploitation to get shell☆125Updated 5 years ago
- This repository contains the source code of the web panel I have used in my book series of books: Cyber and Penetration Testing – Web Pen…☆48Updated 2 years ago
- Windows Reverse TCP backdoor☆29Updated 6 years ago
- Collection of scripts that aid in penetration testing of JSON Web Tokens☆59Updated 6 years ago
- Cross-Site-Scripting (XSS) Automatic Scanner☆44Updated 5 years ago
- HTTP fuzzer engine security oriented☆59Updated 2 weeks ago
- A tool written in python for scraping firebase data☆44Updated 5 years ago
- A better version of my xssfinder tool - scans for different types of xss on a list of urls.☆188Updated 6 years ago
- OpenSSH 2.3 up to 7.4 Mass Username Enumeration (CVE-2018-15473).☆153Updated 6 years ago
- subdomain bruteforce list☆102Updated last year
- BugBounty Tool☆40Updated 6 years ago
- CPH:SEC WAES: Web Auto Enum & Scanner - Auto enums website(s) and dumps files as result☆70Updated 2 years ago
- Enumerate a target Based off of Nmap Results☆76Updated 2 years ago
- Exploits by 1N3 @CrowdShield @xer0dayz @XeroSecurity☆202Updated 4 years ago
- This tool will scan all the URL's in the file and will provide Content-Length, Status-Code, Server and more.☆36Updated 3 years ago
- dork scanner with Sqli and Lfi testing☆28Updated 7 years ago
- Takeover script extracts CNAME record of all subdomains at once. TakeOver saves researcher time and increase the chance of finding subdom…☆101Updated 2 years ago
- This tool is for automate the initial things that we usually do in daily pentesting. So you can focus more on the main target.☆76Updated 6 years ago
- A simple Cherry Tree template that can be used to organize bug bounties☆39Updated 6 years ago
- Detect, manage and exploit Blind Cross-site scripting (XSS) vulnerabilities.☆40Updated 2 years ago
- Notes/Tools for pentesting☆79Updated 2 years ago
- VPN pentest tools and scripts☆126Updated 8 years ago
- Common Wordlists☆54Updated 9 years ago
- ☆46Updated 6 years ago
- Framework for rapid development of offensive security tools☆108Updated 3 weeks ago
- Hello my friends, it is my repo about sql injections. Call me in Telegram: @anakein☆43Updated 4 years ago