awnumar / blind-sql-bitshifting
A blind SQL injection module that uses bitshfting to calculate characters.
☆111Updated 2 years ago
Related projects: ⓘ
- Local File Inclusion Exploitation Tool (mirror)☆121Updated 7 years ago
- A tool to hunt for publicly accessible DigitalOcean Spaces☆154Updated 4 years ago
- XSS Hunter Burp Plugin☆148Updated 6 years ago
- subdomain bruteforce list☆96Updated 2 years ago
- Paramalyzer - Burp extension for parameter analysis of large-scale web application penetration tests.☆153Updated last year
- Tool for exploiting SQL injection vulnerabilities that sqlmap can't find.☆95Updated 6 years ago
- Albatar is a SQLi exploitation framework in Python☆132Updated 3 years ago
- Server-side request forgery detector☆146Updated 7 years ago
- Getting BlindElephant into a working state, and updating the plugin files☆75Updated 4 years ago
- ☆119Updated 7 years ago
- A simple XSS finding tool☆108Updated 5 years ago
- Script to automate PUT HTTP method exploitation to get shell☆124Updated 4 years ago
- Notes/Tools for pentesting☆82Updated 9 months ago
- A Blind SQL Exploitation application☆79Updated 12 years ago
- SQLiPy is a Python plugin for Burp Suite that integrates SQLMap using the SQLMap API.☆252Updated 3 months ago
- Repo of useful scripts☆104Updated 4 years ago
- Takeover script extracts CNAME record of all subdomains at once. TakeOver saves researcher time and increase the chance of finding subdom…☆101Updated last year
- A tool used to check if a CNAME resolves to the scope address. If the CNAME resolves to a non-scope address it might be worth checking ou…☆130Updated last year
- Brute force AWS bucket finder☆58Updated last year
- Hashmash is a tool to aid in generating hashes from user supplied values and Epochs☆62Updated 8 years ago
- Wordlist for content(directory) bruteforce discovering with Burp or dirsearch☆210Updated 2 years ago
- A little collection of fun and creative proof of concepts to demonstrate the potential impact of a security vulnerability.☆162Updated 4 years ago
- Vulnerable OS Collection is a collection of four Ubuntu based OSes containing real world vulnerable web applications.☆57Updated 6 years ago
- Tool to help identify timing attacks☆68Updated 13 years ago
- A collection of web pages, vulnerable to command injection flaws.☆172Updated last year
- An exploitation shell focusing on exploiting command injection vulnerabilities, eg., LFI, RFI, SSTI, etc.☆166Updated 7 months ago
- Common password pattern generator using strings list☆129Updated 3 years ago
- Actarus is a custom tool for bug bounty☆75Updated 4 years ago
- This tool is for automate the initial things that we usually do in daily pentesting. So you can focus more on the main target.☆77Updated 4 years ago
- All-in-one AWS S3 bucket tool for pentesters.☆70Updated 5 years ago