connorjaydunn / SQLiFLinks
SQL injection vulnerability scanner
☆27Updated 4 months ago
Alternatives and similar repositories for SQLiF
Users that are interested in SQLiF are comparing it to the libraries listed below
Sorting:
- Living Off The Land (LOTL) persistent Reverse shell☆101Updated last year
- POC | Steal user WhatsApp information/data☆65Updated last month
- Here are +200 different rats some with source code☆100Updated last year
- capNcook - a dark web exploration tool☆102Updated 8 months ago
- SpiderCat is an advanced reconnaissance payload that aims to concatanate targets into an Obsidian spider web framework. It allows securit…☆104Updated 2 years ago
- A curated collection of CVEs, tools 🛠️, and scripts 📜 for vulnerability research, exploit testing, and cybersecurity analysis—perfect f…☆13Updated 3 weeks ago
- Modular framework for automating triaging, malware analysis, and analyst workflows☆41Updated last month
- Infiltrax is a post-exploitation reconnaissance tool for penetration testers and red teams, designed to capture screenshots, retrieve cli…☆78Updated 9 months ago
- A Discord bot that searches the dark web for your query and returns links and screenshots of the results to your discord channel using ah…☆85Updated 10 months ago
- This repository contains a few leaked files of HookBot.☆104Updated last year
- Operation Archive - Saving the history behind Cybercriminal Arrests, Documentation, Raids, Seizures, and more!☆51Updated last week
- Stuxnet extracted binaries by reversing & Stuxnet Rootkit Analysis☆59Updated 9 months ago
- ☆40Updated 6 months ago
- A spy pixel which can be emedded into web pages or emails.☆101Updated 10 months ago
- A collection of tools that I use in CTF's or for assessments☆100Updated 4 months ago
- A list of different misc resources from the discord. PDF's, websites, tools, and everything else you could fathom. Here to aid in your go…☆58Updated last year
- A web based OSINT ressource and tool☆116Updated 2 months ago
- Cover your tracks during Linux Exploitation by leaving zero traces on system logs and filesystem timestamps.☆65Updated last year
- To perform OSINT on an instagram profile☆75Updated 10 months ago
- LummaC2 extracted binaries by reversing & LummaC2 Stealer Analysis☆62Updated 4 months ago
- capNcook - a dark web exploration tool☆71Updated last year
- Detects CanaryTokens in Office docs and PDFs (docx, xlsx, pptx, pdf) without triggering alerts.☆120Updated last year
- Phone Radar is a simple tool that allows you to scan mobile phone numbers and display the provider tied to the number, can be usefull to …☆12Updated 6 months ago
- ☆109Updated last year
- Shodan Dorks for Advanced OSINT☆28Updated 6 months ago
- 🕵️ Email osint tool☆62Updated last year
- Tools and Resources for Physical Security Red Teaming☆32Updated 2 months ago
- A powershell module for hiding payloads in the pixels of images☆61Updated 11 months ago
- Advanced web fuzzer with machine learning capabilities, stealth features, and intelligent pattern generation.☆17Updated 2 months ago
- Tool designed to exfiltrate OneDrive Business OCR Data☆113Updated 5 months ago