atiilla / sqlmap-aiLinks
This script automates SQL injection testing using SQLMap with AI-powered decision making.
☆201Updated last month
Alternatives and similar repositories for sqlmap-ai
Users that are interested in sqlmap-ai are comparing it to the libraries listed below
Sorting:
- ☆187Updated 3 months ago
- Frogy 2.0 is an automated external reconnaissance and Attack Surface Management (ASM) toolkit☆109Updated 2 months ago
- SAST and DAST Scan Supported with 400 plus rules available for secrets and allow you add your own wordlist as well. lightweight source c…☆101Updated 3 months ago
- Search for all leaked keys/secrets using one regex! bugbounty☆134Updated 4 months ago
- A New Approach to Directory Bruteforce with WaybackLister v1.0☆191Updated last month
- ☆94Updated 4 months ago
- Ultimate Tasks Automation Framework for Hackers, DevSecOps, Pentesters, and Bug-bounty hunters!☆150Updated 8 months ago
- DockerSpy searches for images on Docker Hub and extracts sensitive information such as authentication secrets, private keys, and more.☆234Updated last year
- The Most Advanced Client-Side Prototype Pollution Scanner☆226Updated last week
- Advanced CORS Header Checker Tool with Vulnerability Detection and Bypass Attempts☆61Updated 2 months ago
- IDOR Forge is an advanced and versatile tool designed to detect Insecure Direct Object Reference (IDOR) vulnerabilities in web applicatio…☆164Updated 2 months ago
- SubSnipe is a tool designed to help find subdomains that are vulnerable to takeover.☆124Updated 6 months ago
- Search for sensitive data in Postman public library.☆209Updated 2 weeks ago
- Subprober is a powerful and efficient subdomain scanning tool written in Python. With the ability to handle large lists of subdomains. Th…☆257Updated last month
- ☆117Updated last month
- A Go-based utility that processes input through multiple AI models concurrently (OpenAI, Claude, and Gemini) and provides a summarized co…☆74Updated last month
- GBounty is a multi-step website vulnerability scanner developed in Golang designed to help companies, pentesters, and bug hunters identif…☆141Updated 3 months ago
- Abuse trust-boundaries to bypass firewalls and network controls☆351Updated last week
- JWT Auditor – Analyze, break, and understand your tokens like a pro.☆105Updated this week
- AI/LLM local model integration for analysis of reconftw results☆72Updated 3 months ago
- 🔍 LFIer is a powerful and efficient tool for detecting Local File Inclusion (LFI) vulnerabilities in web applications.☆53Updated 7 months ago
- 🪄 XSSDynaGen is a tool designed to analyze URLs with parameters, identify the characters allowed by the server, and generate advanced XS…☆52Updated 7 months ago
- A collection of config files for linux focusing on hackthebox theme☆49Updated 7 months ago
- ☆171Updated 2 months ago
- ☆136Updated 4 months ago
- Blinks is a powerful Burp Suite extension that automates active scanning with Burp Suite Pro and enhances its functionality. With the int…☆136Updated 7 months ago
- AI-powered ffuf wrapper☆521Updated 8 months ago
- ZeroTrace is a powerful ethical hacking tool for anonymization, routing all your system network traffic through the Tor network, making i…☆123Updated last week
- 🤖 LLM-powered agent for automated Google Dorking in bug hunting & pentesting.☆60Updated 2 months ago
- hauditor is a tool designed to analyze the security headers returned by a web page.☆175Updated last year