alexoslabs2 / injectorLinks
Injector a.k.a tr4c1l0rds is a tool to run simultaneous sql injections attacks anonymously using containers.
☆16Updated 2 years ago
Alternatives and similar repositories for injector
Users that are interested in injector are comparing it to the libraries listed below
Sorting:
- Cross-Site-Scripting (XSS) Automatic Scanner☆44Updated 5 years ago
- Tool that checks for path traversal traces in a given web application url, plus it is capable of multi-threading, set timeout and 5-layer…☆46Updated 7 years ago
- NodeXP - A Server Side Javascript Injection tool capable of detecting and exploiting Node.js vulnerabilities☆106Updated 8 months ago
- dork scanner with Sqli and Lfi testing☆28Updated 7 years ago
- Exploits by 1N3 @CrowdShield @xer0dayz @XeroSecurity☆201Updated 4 years ago
- Collection My Wordlist☆123Updated 8 years ago
- Tool for exploiting SQL injection vulnerabilities that sqlmap can't find.☆95Updated 7 years ago
- Automating Jenkins Hacking using Shodan API☆94Updated 7 years ago
- OpenSSH 2.3 up to 7.4 Mass Username Enumeration (CVE-2018-15473).☆153Updated 5 years ago
- Script to automate PUT HTTP method exploitation to get shell☆125Updated 5 years ago
- Some wordpress user enumeration scripts.☆38Updated 8 years ago
- Collection of scripts that aid in penetration testing of JSON Web Tokens☆59Updated 6 years ago
- BugBounty Tool☆41Updated 6 years ago
- subdomain bruteforce list☆101Updated 11 months ago
- Hacking tools☆148Updated 8 months ago
- Local File Inclusion Exploitation Tool (mirror)☆127Updated 8 years ago
- Exploiting misconfigured firebase databases☆124Updated 6 years ago
- Common Wordlists☆54Updated 9 years ago
- Wordlist for content(directory) bruteforce discovering with Burp or dirsearch☆214Updated 11 months ago
- This tool will scan all the URL's in the file and will provide Content-Length, Status-Code, Server and more.☆36Updated 3 years ago
- CPH:SEC WAES: Web Auto Enum & Scanner - Auto enums website(s) and dumps files as result☆71Updated 2 years ago
- A little collection of fun and creative proof of concepts to demonstrate the potential impact of a security vulnerability.☆164Updated 5 years ago
- VPN pentest tools and scripts☆126Updated 8 years ago
- Takeover script extracts CNAME record of all subdomains at once. TakeOver saves researcher time and increase the chance of finding subdom…☆101Updated 2 years ago
- This tool is for automate the initial things that we usually do in daily pentesting. So you can focus more on the main target.☆76Updated 5 years ago
- Damn Vulnerable File Upload V 1.1☆101Updated 7 years ago
- Fuzzing for LFI using Burpsuite☆65Updated 9 years ago
- Burp Suite extension to discover assets from HTTP response.☆230Updated 8 months ago
- Albatar is a SQLi exploitation framework in Python☆137Updated 8 months ago
- A sub-domain enumeration tool☆20Updated 5 years ago