alexoslabs2 / injectorLinks
Injector a.k.a tr4c1l0rds is a tool to run simultaneous sql injections attacks anonymously using containers.
☆16Updated 2 years ago
Alternatives and similar repositories for injector
Users that are interested in injector are comparing it to the libraries listed below
Sorting:
- Tool that checks for path traversal traces in a given web application url, plus it is capable of multi-threading, set timeout and 5-layer…☆46Updated 7 years ago
- OpenSSH 2.3 up to 7.4 Mass Username Enumeration (CVE-2018-15473).☆151Updated 5 years ago
- Exploits by 1N3 @CrowdShield @xer0dayz @XeroSecurity☆204Updated 3 years ago
- dork scanner with Sqli and Lfi testing☆29Updated 7 years ago
- Collection My Wordlist☆122Updated 8 years ago
- Tool for exploiting SQL injection vulnerabilities that sqlmap can't find.☆96Updated 7 years ago
- Automatic remote/local file inclusion vulnerability analysis and exploit tool☆60Updated 6 years ago
- CPH:SEC WAES: Web Auto Enum & Scanner - Auto enums website(s) and dumps files as result☆72Updated last year
- Automating Jenkins Hacking using Shodan API☆94Updated 7 years ago
- BugBounty Tool☆40Updated 5 years ago
- Script to automate PUT HTTP method exploitation to get shell☆125Updated 5 years ago
- Albatar is a SQLi exploitation framework in Python☆137Updated 6 months ago
- SubR3con is a script written in python. It uses Sublist3r to enumerate all subdomains of a specific target and then it checks for status …☆18Updated 6 years ago
- Damn Vulnerable File Upload V 1.1☆101Updated 7 years ago
- Cross-Site-Scripting (XSS) Automatic Scanner☆43Updated 4 years ago
- Notes/Tools for pentesting☆82Updated last year
- This tool is for automate the initial things that we usually do in daily pentesting. So you can focus more on the main target.☆75Updated 5 years ago
- subdomain bruteforce list☆101Updated 9 months ago
- Collection of scripts that aid in penetration testing of JSON Web Tokens☆59Updated 6 years ago
- A blind SQL injection module that uses bitshfting to calculate characters.☆129Updated 3 years ago
- A little collection of fun and creative proof of concepts to demonstrate the potential impact of a security vulnerability.☆164Updated 5 years ago
- Actarus is a custom tool for bug bounty☆76Updated 5 years ago
- VPN pentest tools and scripts☆126Updated 8 years ago
- Some wordpress user enumeration scripts.☆39Updated 8 years ago
- A simple python script that exploits blind SQL Injections. Useful for PoCs.☆24Updated 12 years ago
- Local File Inclusion Exploitation Tool (mirror)☆127Updated 8 years ago
- Takeover script extracts CNAME record of all subdomains at once. TakeOver saves researcher time and increase the chance of finding subdom…☆101Updated 2 years ago
- ☆47Updated 5 years ago
- A tool to hunt for publicly accessible DigitalOcean Spaces☆158Updated 5 years ago
- This repository for training application security.☆26Updated 6 years ago