arpeetrathii / 50-Days-Of-SQLiView external linksLinks
Learning and hunting SQL injection bugs for 50 continuous days
☆76Aug 19, 2022Updated 3 years ago
Alternatives and similar repositories for 50-Days-Of-SQLi
Users that are interested in 50-Days-Of-SQLi are comparing it to the libraries listed below
Sorting:
- S3 Recon tips and tricks collected from different resources,Sorry if i missed to mention all resources owners☆27Nov 13, 2021Updated 4 years ago
- CVE-2022-22978 Spring-Security bypass Demo☆16Jun 2, 2022Updated 3 years ago
- basic bbtools , buggy , not recommended to use☆35Jan 22, 2025Updated last year
- PoC of CVE-2022-24707☆13May 3, 2022Updated 3 years ago
- A curated list of resources for learning web3 hacking/Security☆196Jan 19, 2023Updated 3 years ago
- Attack Surface Discovery Tool☆110Sep 17, 2024Updated last year
- ☆40Jul 24, 2022Updated 3 years ago
- ☆87May 27, 2021Updated 4 years ago
- Jeeves SQLI Finder☆218May 13, 2022Updated 3 years ago
- ⚡Chrome extension allows you to create lists of Google and Github dork to open multiple tabs with one click, import "scope/out of scope" …☆137Dec 1, 2023Updated 2 years ago
- Script for Reconnaissance(Bug Bounty)☆18May 15, 2022Updated 3 years ago
- ☆172Nov 20, 2025Updated 2 months ago
- This is GitHub_Dorks and some tips i collect from different resources.Recon_Api is tip when you find token or api without knowing what to…☆21Sep 15, 2021Updated 4 years ago
- ☆36Jun 23, 2022Updated 3 years ago
- A collection oneliner scripts for bug bounty☆183Mar 21, 2024Updated last year
- ☆46Oct 7, 2021Updated 4 years ago
- A collection of notes, checklists, writeups on bug bounty hunting and web application security.☆152Jun 30, 2022Updated 3 years ago
- A Burp Suite plugin/extension that offers a shell in Burp. Both useful for OS Command injection and LFI exploration☆78Sep 11, 2020Updated 5 years ago
- Simple python script supported with BurpBouty profile that helps you to detect SQL injection "Error based" by sending multiple requests w…☆631Jan 4, 2026Updated last month
- Astra is a tool to find URLs and secrets inside a webpage/files☆212Mar 14, 2023Updated 2 years ago
- All Nuclei Templates☆82Dec 31, 2025Updated last month
- ☆10Jun 13, 2024Updated last year
- Zed Attack Proxy Scripts for finding CVEs and Secrets.☆128Jun 2, 2022Updated 3 years ago
- OSCP Study Guide☆42Oct 10, 2022Updated 3 years ago
- Bug Bounty ~ Awesomes | Books | Cheatsheets | Checklists | Tools | Wordlists | More☆513Oct 27, 2025Updated 3 months ago
- ☆18Apr 26, 2021Updated 4 years ago
- a lightweight, flexible and novel open source poc verification framework☆237May 21, 2022Updated 3 years ago
- ☆249May 25, 2021Updated 4 years ago
- An aggressor script for Cobalt Strike to query Windows' GetLastError messages☆18Sep 25, 2022Updated 3 years ago
- ☆40Jun 5, 2021Updated 4 years ago
- It contain google dork to find the wsdl file.☆13May 27, 2020Updated 5 years ago
- Prototype-Pollution-Lab to chain the vulnerabilities between multiple accounts.☆13Sep 11, 2021Updated 4 years ago
- Steganography Reverse Shell☆10Apr 22, 2023Updated 2 years ago
- 检测host头攻击的Burpsuite被动扫描插件,Burpsuite passive scanning plugin responsible for detecting host header attack☆11Apr 28, 2023Updated 2 years ago
- Visualizing Path Finding using A* algorithm☆14Nov 7, 2022Updated 3 years ago
- Released alongside with a talk at REcon 2023, TheRestarter is an interactive command-line tool is designed to interact with the Windows …☆15Jun 8, 2023Updated 2 years ago
- URL Encode Injection List☆13Sep 20, 2021Updated 4 years ago
- XSScope is one of the most powerful and advanced GUI Framework for Modern Browser exploitation via XSS.☆315Jun 1, 2022Updated 3 years ago
- Simple recon using multiple tools!☆165Jan 10, 2022Updated 4 years ago