connorjaydunn / SQLiFLinks
SQL injection vulnerability scanner
☆33Updated 11 months ago
Alternatives and similar repositories for SQLiF
Users that are interested in SQLiF are comparing it to the libraries listed below
Sorting:
- A spy pixel which can be emedded into web pages or emails.☆107Updated last year
- Stuxnet extracted binaries by reversing & Stuxnet Rootkit Analysis☆85Updated last year
- LummaC2 extracted binaries by reversing & LummaC2 Stealer Analysis☆99Updated 11 months ago
- Here are +200 different rats some with source code☆146Updated 2 years ago
- A powershell module for hiding payloads in the pixels of images☆77Updated last year
- SpiderCat is an advanced reconnaissance payload that aims to concatanate targets into an Obsidian spider web framework. It allows securit…☆109Updated 2 years ago
- DorkEye is a Python OSINT and reconnaissance tool designed for ethical dorking. It automates searches to detect unintentionally exposed r…☆72Updated this week
- This is a collection of RATs for educational purposes☆58Updated 5 months ago
- Over 50 of The Most Deceptive Phishing Templates, Pages & Links for GoPhish!☆61Updated last year
- Mavoc is an Automated c2 Windows and Linux Pentesting Tool used to generate reverse shell and deploy attacking scripts to host machines…☆45Updated 2 years ago
- Living Off The Land (LOTL) persistent Reverse shell☆104Updated 2 years ago
- Tool designed to exfiltrate OneDrive Business OCR Data☆125Updated last year
- Intelligent Malware that takes screenshots for entire monitors and exfiltrate them through Trusted Channel Slack to the C2 server that's …☆130Updated 10 months ago
- NetProbe: Network Probe☆173Updated last year
- Polymorphic Command & Control☆102Updated 11 months ago
- Keklick - C2 Hunting, Reporting and Visualization Tool☆63Updated 6 months ago
- 🕵️ Email osint tool☆64Updated 2 years ago
- What the name says....☆104Updated last year
- ☆72Updated last year
- IoT Camera Reconnaissance and Live Viewer☆170Updated last year
- Phone: A Mobile Phone Forensic Framework ( Android )☆208Updated 10 months ago
- A list of useful tools for Malware Analysis (will be updated regularly)☆157Updated 6 months ago
- Hacking Hotspots: Pre-Auth Remote Code Execution, Arbitrary SMS & Adjacent Attacks on 5G & 4G/LTE Routers☆96Updated 4 months ago
- POC | Steal user WhatsApp information/data☆75Updated 8 months ago
- A project that demonstrates embedding shellcode payloads into image files (like PNGs) using Python and extracting them using C/C++. Paylo…☆215Updated 3 months ago
- ☆44Updated last year
- payload Execution by Fake Windows SmartScreen with requires Administrator privileges & Turn off real SmartScreen Filter☆113Updated 2 years ago
- This repository contains a few leaked files of HookBot.☆105Updated 2 years ago
- Operation Archive - Saving the history behind Cybercriminal Arrests, Documentation, Raids, Seizures, and more!☆64Updated 3 months ago
- Modular framework for automating triaging, malware analysis, and analyst workflows☆44Updated 9 months ago