alexoslabs2 / injector
Injector a.k.a tr4c1l0rds is a tool to run simultaneous sql injections attacks anonymously using containers.
☆16Updated last year
Alternatives and similar repositories for injector:
Users that are interested in injector are comparing it to the libraries listed below
- Cross-Site-Scripting (XSS) Automatic Scanner☆43Updated 4 years ago
- best framework for information gathering ,pentesting and web aplication scanner☆9Updated 6 years ago
- dork scanner with Sqli and Lfi testing☆29Updated 6 years ago
- SubR3con is a script written in python. It uses Sublist3r to enumerate all subdomains of a specific target and then it checks for status …☆18Updated 5 years ago
- Check arbitrary file download vulnerability in the WordPress☆21Updated 5 years ago
- Automated NoSQL database enumeration and web application exploitation tool.☆25Updated 5 years ago
- RDP EXPLOİT☆12Updated 5 years ago
- Tool that checks for path traversal traces in a given web application url, plus it is capable of multi-threading, set timeout and 5-layer…☆46Updated 6 years ago
- This tool will scan all the URL's in the file and will provide Content-Length, Status-Code, Server and more.☆36Updated 3 years ago
- Collection of scripts that aid in penetration testing of JSON Web Tokens☆58Updated 6 years ago
- Common Wordlists☆53Updated 8 years ago
- A Burp Suite content discovery plugin that add the smart into the Buster!☆31Updated 7 years ago
- Escalation Servers and Scripts for Priv Escalation☆19Updated 5 years ago
- O Scanner vai procurar erros padrões do script SQLI(MySQL,MS ACCESS,Microsoft SQL Server,ORACLE,POSTGRESQL) OU ERROS DE PROGRAMAÇÃO. …☆26Updated 10 years ago
- Discovers and exploits hosts vulnerable to MS08-067/MS17-010☆41Updated 7 years ago
- This is very basic automated recon script tool.☆19Updated 8 months ago
- Google Chrome Extension automates testing fundamental Web Problems via Chrome☆21Updated 4 years ago
- Automated Google dorking with custom search engines☆27Updated 4 years ago
- A tool written in python for scraping firebase data☆42Updated 4 years ago
- Windows Reverse TCP backdoor☆29Updated 5 years ago
- ☆24Updated 5 years ago
- A modular framework designed to chain and automate security tests.☆44Updated 4 years ago
- A CRLF ( Carriage Return Line Feed ) Injection attack occurs when a user manages to submit a CRLF into an application. This is most commo…☆46Updated 2 years ago
- Unique wordlist generator of unique wordlists.☆43Updated last year
- Find unreferenced AWS S3 buckets which have CloudFront CNAME records pointing to them☆37Updated 6 years ago
- A Burp Suite Extender that recognize CAPTCHA and use for intruder payload