SQLMutant is a powerful SQL injection testing tool that includes both passive and active reconnaissance processes for any given domain. It filters URLs to identify those with parameters susceptible to SQL injection formats and then performs injection attacks. These attacks include pattern matching, error analysis, and timing attacks.
☆163Nov 28, 2024Updated last year
Alternatives and similar repositories for SQLMutant
Users that are interested in SQLMutant are comparing it to the libraries listed below
Sorting:
- A 1 Liner SQL Injection Attack using SQLMAP and various parameters that helps quickly check for a vulnerabilities during Bug Bounty☆42Sep 6, 2024Updated last year
- Take potentially dangerous PDFs, office documents, or images and convert them to safe PDFs☆12Jan 4, 2023Updated 3 years ago
- A powerful and sophisticated tool for detecting and exploiting open redirect vulnerabilities using the sed utility and a selected list of…☆47Sep 6, 2024Updated last year
- Find secrets and passwords in container images and file systems☆15Nov 16, 2022Updated 3 years ago
- A bash and powershell script to download the latest version of Burp-Suite Professional and use it for free.☆20May 7, 2023Updated 2 years ago
- XSSRocket it is a tool designed for offensive security and XSS (Cross-Site Scripting) attacks.☆162Oct 11, 2024Updated last year
- ScopeHunter is a command-line tool for finding in scope targets for bug bounty programs.☆74Sep 6, 2024Updated last year
- Talk2Me interacts with OpenAI's language model to generate text responses and saves the conversation for future reference.☆15Sep 6, 2024Updated last year
- TerminatorZ is a highly sophisticated and efficient web security tool that scans for top potential vulnerabilities with known CVEs in you…☆299Mar 9, 2026Updated last week
- A Tool for Bug Bounty Hunters that uses Passive and Active Techniques to fetch URLs as a strong Recon, so you can then create Attack Vect…☆76Sep 6, 2024Updated last year
- SecretOpt1c is a Red Team tool that helps uncover sensitive information in websites using ACTIVE and PASSIVE Techniques for Superior Accu…☆243Sep 6, 2024Updated last year
- Nucleimonst3r is a powerful vulnerability scanner that can help Bug Bounty Hunters find low hanging fruit vulnerabilities for known CVEs …☆259Apr 3, 2025Updated 11 months ago
- Subdomain Bruteforce - Bounty Quick Code☆31Sep 6, 2024Updated last year
- Collect XSS vulnerable parameters from entire domain.☆13Jul 29, 2022Updated 3 years ago
- An AIO Tool to check for Vulnerable Amazon S3 Buckets as part of Bug Bounty, the uniqueness of this tool is that it can take a file full …☆44Sep 6, 2024Updated last year
- This bash script tool, will perform advanced subdomain enumeration, save the results, it will then probe the subdomains into urls, save t…☆26Sep 6, 2024Updated last year
- This tool will resolve a list of Domains, IPs, Hosts, URLs and save the results for valid/invalid fast!☆16Aug 19, 2022Updated 3 years ago
- Who We Are☆22Sep 6, 2024Updated last year
- A tool for generating reverse shell payloads on the fly.☆10Jun 18, 2022Updated 3 years ago
- Checks for SSRF using built-in custom Payloads after fetching URLs from Multiple Passive Sources & applying complex patterns aimed at SSR…☆132Sep 6, 2024Updated last year
- crawl a website for links and expose all the vulnerable parameters.☆14Oct 2, 2022Updated 3 years ago
- SubCerts is a simple tool that uses certificate transparency logs (via crt.sh) to extract subdomains of a given domain.☆75Jan 6, 2026Updated 2 months ago
- 🪄 XSSDynaGen is a tool designed to analyze URLs with parameters, identify the characters allowed by the server, and generate advanced XS…☆55Dec 30, 2024Updated last year
- pagodo (Passive Google Dork) - Automate Google Hacking Database scraping and searching☆12Jun 4, 2022Updated 3 years ago
- Bug Bounty Tools used on Twitch - Recon☆324Sep 6, 2024Updated last year
- ProtOSINT is a Python script that helps you investigate Protonmail accounts and ProtonVPN IP addresses☆13Sep 2, 2022Updated 3 years ago
- Automating Juicy Potato Local Privilege Escalation CMD exploit for penetration testers.☆48Dec 13, 2022Updated 3 years ago
- External recon toolkit☆55Dec 29, 2024Updated last year
- Nuclei templates to run on urls☆17Sep 14, 2023Updated 2 years ago
- Multi-target unauthenticated RCE scanner for CVE-2025-34085 affecting WordPress Simple File List plugin. Uploads, renames, and triggers P…☆33Jul 13, 2025Updated 8 months ago
- An OSINT tool to search for accounts by username in social networks.☆19Aug 8, 2022Updated 3 years ago
- NucleiFuzzer is a robust automation tool that efficiently detects web application vulnerabilities, including XSS, SQLi, SSRF, and Open Re…☆1,826Aug 20, 2025Updated 7 months ago
- A python-based vulnerability scanner designed to identify open redirect flaws in website applications.☆24Updated this week
- My own Custom nuclei templates☆26Dec 8, 2021Updated 4 years ago
- Red Teaming Tactics and Techniques☆13Feb 10, 2022Updated 4 years ago
- ☆10Jun 16, 2021Updated 4 years ago
- Automated Recon Tool Installer☆16Jun 29, 2022Updated 3 years ago
- Open-source security research tool for identifying origin IP exposure of websites protected by Cloudflare and similar reverse proxy servi…☆2,113Jan 6, 2026Updated 2 months ago
- Cross platform (Linux / Windows) shellcode packer for CTFs and pentest / red team exams aiming for AV evasion !☆116Mar 8, 2026Updated last week