Sqlmap for lazy people
☆19Oct 1, 2020Updated 5 years ago
Alternatives and similar repositories for LazySQLi
Users that are interested in LazySQLi are comparing it to the libraries listed below
Sorting:
- A scanner to scan ports and extra..☆12Nov 12, 2021Updated 4 years ago
- it's quite self explanatory: a crawler with sqlmap☆13Jul 13, 2017Updated 8 years ago
- A good tool to hide phishing traps or cut links.☆40Nov 29, 2023Updated 2 years ago
- AdamsScan is an automated subdomain enumeration script that utilizes multiple popular tools and APIs like Sublist3r, Amass, Subfinder, cr…☆26Mar 3, 2025Updated 11 months ago
- A simple program to quickly and efficiently check accounts on snapchat,☆11Feb 5, 2023Updated 3 years ago
- Troyano espía, Keylogger para Windows, se replica en el sistema y se inicia automaticamente al iniciar sesión. Envía los datos mediante G…☆12May 9, 2020Updated 5 years ago
- ☆12Nov 18, 2020Updated 5 years ago
- instagram bot reports spam☆10Oct 19, 2020Updated 5 years ago
- ☆15Jul 30, 2022Updated 3 years ago
- Subscan is a simple tool for subdomain scanner, it can scan subdomains fast.☆39Aug 9, 2023Updated 2 years ago
- 🛠️ Tool to bypass my school's security system to get sudo privileges on MacOS☆41Jan 22, 2020Updated 6 years ago
- python script that hide phishing url like a pro "masking url technique"☆43Jul 21, 2021Updated 4 years ago
- Uses Go net/http library to distinguish alive hosts from a give list of hosts/urls☆12Dec 23, 2019Updated 6 years ago
- fofa+xray vul scan golang☆10Sep 19, 2021Updated 4 years ago
- Advance Google Dorker and Vulnerability Scanner☆50Oct 29, 2018Updated 7 years ago
- This bot attends the online classes held on Microsoft teams, according to the given timetable.Informs if bot is successfully joined the m…☆11Feb 2, 2022Updated 4 years ago
- A collection of hacks and one-off scripts☆11Apr 6, 2020Updated 5 years ago
- 一致性哈希工具类 Implementing Consistent Hashing in Kotlin☆10Jun 20, 2018Updated 7 years ago
- Credax - Fuzzing Tool with Slack Notifications. Also removes false positive responses.☆10Oct 14, 2021Updated 4 years ago
- Utilize IBM Cloud Functions with OAuth 2.0 to enable authentication and authorization☆11Feb 14, 2022Updated 4 years ago
- ☆13Apr 10, 2022Updated 3 years ago
- Brute force your iOS Restrictions Passcode from the key & salt☆15Aug 27, 2019Updated 6 years ago
- Metasploit Framework☆11Apr 18, 2019Updated 6 years ago
- A simple application that shows how to exploit the CVE-2022-42889 vulnerability☆10Nov 6, 2022Updated 3 years ago
- Find alive hosts by scanning IP addresses☆12Jun 18, 2020Updated 5 years ago
- ☄️ Fast, 100% Accurate, Anti Honeypot SSH Cracker 🔑☆15May 1, 2022Updated 3 years ago
- Nexus Repository Manager3 - 远程执行代码漏洞回显payload☆13Sep 29, 2020Updated 5 years ago
- zentao Getshell☆10Oct 27, 2020Updated 5 years ago
- Play 2048 in notepad.exe☆13Feb 16, 2015Updated 11 years ago
- Ready to launch service framework built on Vert.x☆12Oct 13, 2020Updated 5 years ago
- 用于辅助安全工程师漏洞挖掘、测试、复现,集合了mock、httplog、dns tools、xss,可用于测试各类无回显、无法直观判断或特定场景下的漏洞。☆11Apr 2, 2021Updated 4 years ago
- FASTBOOT UNBRICK MAKER☆10Jun 1, 2022Updated 3 years ago
- A super dope tool, that generates "corrupted" .PDF files of randomly unique file sizes (no two files of the same size or byte combination…☆14Oct 12, 2021Updated 4 years ago
- A powerful reporting tool on Facebook from different protocols☆12Sep 17, 2023Updated 2 years ago
- mkbootfs binary used in Horizon Kernel Flasher☆10Sep 25, 2021Updated 4 years ago
- ☆11Feb 16, 2024Updated 2 years ago
- ☆14Jan 31, 2026Updated last month
- Blog☆10Oct 22, 2025Updated 4 months ago
- TCP Data Transfer Tool By ClumsyLulz☆12Feb 25, 2023Updated 3 years ago