blackhatethicalhacking / SQLMutantLinks
SQLMutant is a powerful SQL injection testing tool that includes both passive and active reconnaissance processes for any given domain. It filters URLs to identify those with parameters susceptible to SQL injection formats and then performs injection attacks. These attacks include pattern matching, error analysis, and timing attacks.
☆152Updated 8 months ago
Alternatives and similar repositories for SQLMutant
Users that are interested in SQLMutant are comparing it to the libraries listed below
Sorting:
- Welcome to the Bug Hunter's Wordlists repository! 🐛🔍 This repository serves as a comprehensive collection of essential wordlists utiliz…☆149Updated last year
- Dnsbruter is a powerful tool designed to perform active subdomain enumeration and discovery. It uses DNS resolution to efficiently brutef…☆123Updated 8 months ago
- Subprober is a powerful and efficient subdomain scanning tool written in Python. With the ability to handle large lists of subdomains. Th…☆258Updated last month
- ☆121Updated this week
- IDOR Forge is an advanced and versatile tool designed to detect Insecure Direct Object Reference (IDOR) vulnerabilities in web applicatio…☆167Updated 3 months ago
- Checks for SSRF using built-in custom Payloads after fetching URLs from Multiple Passive Sources & applying complex patterns aimed at SSR…☆125Updated 11 months ago
- LFI-FINDER is an open-source tool available on GitHub that focuses on detecting Local File Inclusion (LFI) vulnerabilities☆299Updated last year
- SpideyX a multipurpose Web Penetration Testing tool with asynchronous concurrent performance with multiple mode and configurations.☆179Updated 5 months ago
- Helios: Automated XSS Testing☆154Updated last year
- "XSS automation tool helps hackers identify and exploit cross-site scripting vulnerabilities in web apps. Tests for reflected and persist…☆91Updated last year
- ☆151Updated last year
- Nodesub is a command-line tool for finding subdomains in bug bounty programs☆148Updated last year
- Parse FFUF results in GUI with option to sort based by response code , size , keyword☆98Updated 11 months ago
- ☆167Updated 10 months ago
- LEAKEY is a bash script which checks and validates for leaked credentials. The idea behind LEAKEY is to make it highly customizable and e…☆351Updated last year
- A passive way to find backups/ sensitive information.☆86Updated last month
- Bypass-Four03 is a powerful bash tool designed to help testers bypass HTTP 403 forbidden errors through various path and header manipulat…☆149Updated 3 months ago
- AutoRecon-XSS is a script designed for automated reconnaissance of XSS vulnerabilities. It crawls the target URL or alive domains, extrac…☆134Updated last year
- Collect XSS vulnerable parameters from entire domain.☆152Updated 3 years ago
- Automated Tool for Testing Header Based Blind SQL Injection☆284Updated 2 years ago
- Nucleimonst3r is a powerful vulnerability scanner that can help Bug Bounty Hunters find low hanging fruit vulnerabilities for known CVEs …☆256Updated 4 months ago
- SecretOpt1c is a Red Team tool that helps uncover sensitive information in websites using ACTIVE and PASSIVE Techniques for Superior Accu…☆238Updated 11 months ago
- GoogleDorker - Unleash the power of Google dorking for ethical hackers with custom search precision.☆229Updated 8 months ago
- This tool will check for Sensitive Data Leakage with some useful patterns/RegEx. The patterns are mostly targeted on waybackdata and filt…☆231Updated 3 months ago
- A New Approach to Directory Bruteforce with WaybackLister v1.0☆195Updated 2 months ago
- 🪄 XSSDynaGen is a tool designed to analyze URLs with parameters, identify the characters allowed by the server, and generate advanced XS…☆54Updated 7 months ago
- Advanced CORS Header Checker Tool with Vulnerability Detection and Bypass Attempts☆61Updated 2 months ago
- Nuclei-AI-Prompts☆232Updated 2 months ago
- 🚀 XSSFUZZ - A tool for detecting XSS vulnerabilities in web applications.☆111Updated 11 months ago
- CHOMTE.SH is a powerful shell script designed to automate reconnaissance tasks during penetration testing. It utilizes various Go-based t…☆130Updated 8 months ago