This script automates SQL injection testing using SQLMap with AI-powered decision making.
☆403Feb 7, 2026Updated 3 weeks ago
Alternatives and similar repositories for sqlmap-ai
Users that are interested in sqlmap-ai are comparing it to the libraries listed below
Sorting:
- APT Emulation tool to exfiltrate sensitive .docx, .pptx, .xlsx, .pdf files☆96Apr 2, 2025Updated 11 months ago
- Feed it a number. Your cloned voice does the social engineering, while you sip your coffee. A ghost that talks on the phone for you.☆109May 30, 2025Updated 9 months ago
- AI-powered ffuf wrapper☆646Dec 4, 2025Updated 2 months ago
- A Moodle Scanner☆43Nov 16, 2024Updated last year
- Scripts that automate portions of pentests.☆57Feb 13, 2026Updated 2 weeks ago
- Autonomous AI C2☆33Jul 23, 2024Updated last year
- Additional active scan checks for BURP☆28Oct 3, 2024Updated last year
- AutoPwnKey is a red teaming framework and testing tool using AutoHotKey (AHK), which at the time of creation proves to be quite evasive. …☆111Jul 21, 2025Updated 7 months ago
- A fast WordPress plugin enumeration tool☆783Feb 17, 2026Updated last week
- This is the latest version of XenoRAT, updated with configurations and capable of bypassing all system securities. It will be maintained …☆23Apr 16, 2025Updated 10 months ago
- An OpenAI API Compatible Honeypot Gateway☆17Mar 17, 2025Updated 11 months ago
- A smarter web fuzzing tool that combines local LLM models and ffuf to optimize directory and file discovery☆383Nov 26, 2024Updated last year
- .NET tool used to enrich RPC telemetry☆101Jan 24, 2026Updated last month
- ai-based domain name generation☆120Feb 3, 2025Updated last year
- Script to check Azure Front Door WAF for insecure RemoteAddr variable☆27Jul 11, 2025Updated 7 months ago
- This is a python wrapper around the amazing KNOXSS API by Brute Logic☆280Jan 12, 2026Updated last month
- A tool which bypasses AMSI (AntiMalware Scan Interface) and PowerShell CLM (Constrained Language Mode) and gives you a FullLanguage Power…☆814Mar 28, 2025Updated 11 months ago
- A fast, minimalistic scanner for time-based SQL injection (SQLi) detection – built in Go.☆138May 7, 2025Updated 9 months ago
- ☆772May 7, 2025Updated 9 months ago
- Azure Post Exploitation Framework☆244Oct 27, 2025Updated 4 months ago
- Exploit for CVE-2024-20767 - Adobe ColdFusion☆34Dec 19, 2024Updated last year
- An offensive postexploitation tool that will give you complete control over the Outlook desktop application and therefore to the emails c…☆166Oct 9, 2024Updated last year
- Burpsuite Extension for Jsmon☆22Feb 5, 2026Updated 3 weeks ago
- IDOR Scanner is a Burp Suite extension that automates the detection and enumeration of potentially vulnerable numeric fields to identify …☆43Feb 24, 2025Updated last year
- Looks for parameters in urls☆34Oct 14, 2024Updated last year
- ScriptSentry finds misconfigured and dangerous logon scripts.☆624Feb 16, 2026Updated last week
- 🖥️ Windows 🚀 A Windows tool for emergency privacy: instantly deletes sensitive data and active logins to protect my information during …☆54Jan 26, 2026Updated last month
- Chrome extension for automating CSPT discovery☆137Dec 23, 2025Updated 2 months ago
- A research project to add some brrrrrr to Burp☆207Feb 16, 2026Updated last week
- Verizon Burp Extensions: AI Suite☆142Apr 22, 2025Updated 10 months ago
- SANS Workshop: Active Directory Privilege Escalation with Empire!☆36Nov 12, 2025Updated 3 months ago
- A utility to fetch and display dns names from the SSL/TLS cert data☆16Aug 11, 2023Updated 2 years ago
- .NET post-exploitation toolkit for Active Directory reconnaissance and exploitation☆400Jul 23, 2025Updated 7 months ago
- ☆163Nov 19, 2025Updated 3 months ago
- A lightweight PowerShell tool for assessing the security posture of Microsoft Entra ID environments. It helps identify privileged object…☆317Feb 8, 2026Updated 3 weeks ago
- An automation tool that enumerates subdomains then filters out xss, sqli, open redirect, lfi, ssrf and rce parameters and then scans for …☆1,267Jul 18, 2024Updated last year
- Tool for discovering the origin host behind a reverse proxy. Useful for bypassing cloud WAFs!☆978Jan 12, 2024Updated 2 years ago
- AllForOne allows bug bounty hunters and security researchers to collect all Nuclei YAML templates from various public repositories,☆732Mar 21, 2024Updated last year
- NucleiFuzzer is a robust automation tool that efficiently detects web application vulnerabilities, including XSS, SQLi, SSRF, and Open Re…☆1,823Aug 20, 2025Updated 6 months ago