Working on a small SQL Injection framework
☆17Aug 30, 2025Updated 6 months ago
Alternatives and similar repositories for SQL-Injection-Scanner
Users that are interested in SQL-Injection-Scanner are comparing it to the libraries listed below
Sorting:
- Havij based SQL Injection Tool. It's a SqlMap GUI version.☆17Feb 3, 2026Updated last month
- WordPress WP_Query SQL Injection POC☆28Mar 11, 2023Updated 3 years ago
- Joomla 3.2 to 3.4.4 Remote SQL Injection Mass Exploit☆29Aug 17, 2021Updated 4 years ago
- Burp Suite extension for extracting metadata from files☆20Dec 29, 2020Updated 5 years ago
- exploit-database-papers☆13Nov 27, 2017Updated 8 years ago
- Nmap & SQL injection automation tool☆40Oct 14, 2024Updated last year
- Mole is a framework for identifying and exploiting out-of-band application vulnerabilities.☆58Aug 6, 2020Updated 5 years ago
- Simple tools to handle string and generate subdomain permutations☆15Jun 8, 2022Updated 3 years ago
- ☆10Feb 25, 2021Updated 5 years ago
- A simple Python tool to harvest email addresses from Google.☆17Jan 8, 2015Updated 11 years ago
- A parallel scanner that utilises axiom to spin up servers and parallel scan using masscan.☆16Jul 1, 2020Updated 5 years ago
- VMware Workspace ONE Access and Identity Manager RCE via SSTI - Test script for shodan, file or manual.☆16Feb 13, 2024Updated 2 years ago
- Just simple log4j scanner☆12Dec 13, 2021Updated 4 years ago
- ☆12Jan 4, 2022Updated 4 years ago
- NSA EquationGroup C&C Hunter using the Shodan API☆29Jul 8, 2015Updated 10 years ago
- Wordlist generator☆16Aug 18, 2020Updated 5 years ago
- ☆13Jul 12, 2021Updated 4 years ago
- ☆11Aug 27, 2020Updated 5 years ago
- Tool useful to discover services behind unknown ports☆14May 20, 2021Updated 4 years ago
- ☆13Jul 19, 2017Updated 8 years ago
- ☆13Jul 14, 2020Updated 5 years ago
- IDS/IPS malware download evasion☆15Feb 21, 2019Updated 7 years ago
- Script will enumerate domain name using horizontal enumeration, reverse lookup. Each horziontal domain will then be vertically enumerated…☆31Aug 2, 2019Updated 6 years ago
- Automate Recon process using Shell Scripting☆11Nov 26, 2021Updated 4 years ago
- ☆14Feb 7, 2024Updated 2 years ago
- Virtual host wordlist☆52Jan 12, 2021Updated 5 years ago
- A simple tool to check subdomains for clickjacking attack.☆12Mar 30, 2021Updated 4 years ago
- This includes all the templates of nuclei collected from different sources☆18Dec 30, 2022Updated 3 years ago
- Exploits for TRENDNet routers☆13Apr 21, 2020Updated 5 years ago
- ☆19Feb 14, 2022Updated 4 years ago
- Get latest Exploit Databases notification on your Desktop☆16Jan 29, 2020Updated 6 years ago
- IronWASP module to test security of SSL services. Ported from http://www.bolet.org/TestSSLServer/☆12Sep 2, 2013Updated 12 years ago
- Alias for storing ffuf results☆20May 23, 2020Updated 5 years ago
- String or worldlist encoder for use in fuzzing or web application testing☆19Sep 2, 2019Updated 6 years ago
- A Tool to find subdomains from hackerone reports.☆17Jun 23, 2021Updated 4 years ago
- Fully-featured spear-phishing toolkit - sample docker setup (Linux-compatible)☆13Jan 12, 2025Updated last year
- This repository contains links to all the 100 days tweets that I posted during the #100DaysOfHacking challenge.☆17Apr 11, 2022Updated 3 years ago
- Perform vulnerabilities lookup on Vulners, the largest vulnerabilities & exploits database☆17Dec 8, 2019Updated 6 years ago
- AES Ransomware in batch☆11Jun 25, 2024Updated last year