connorjaydunn / SQLiFLinks
SQL injection vulnerability scanner
☆28Updated 6 months ago
Alternatives and similar repositories for SQLiF
Users that are interested in SQLiF are comparing it to the libraries listed below
Sorting:
- Here are +200 different rats some with source code☆113Updated last year
- Living Off The Land (LOTL) persistent Reverse shell☆101Updated last year
- What the name says....☆101Updated 11 months ago
- A project that demonstrates embedding shellcode payloads into image files (like PNGs) using Python and extracting them using C/C++. Paylo…☆187Updated 6 months ago
- Stuxnet extracted binaries by reversing & Stuxnet Rootkit Analysis☆65Updated 11 months ago
- Generate an undetectable PE ( .exe ), which bypasses windows defender / AV☆121Updated 3 months ago
- Phone: A Mobile Phone Forensic Framework ( Android )☆200Updated 5 months ago
- Intelligent Malware that takes screenshots for entire monitors and exfiltrate them through Trusted Channel Slack to the C2 server that's …☆124Updated 5 months ago
- :')☆46Updated last week
- ☆40Updated 8 months ago
- Cross platform (Linux / Windows) shellcode packer for CTFs and pentest / red team exams aiming for AV evasion !☆76Updated 2 weeks ago
- Injectra is a Python-based tool for injecting custom payloads into various file types using their magic numbers. It supports file types l…☆139Updated 7 months ago
- A powershell module for hiding payloads in the pixels of images☆73Updated last year
- Mavoc is an Automated c2 Windows and Linux Pentesting Tool used to generate reverse shell and deploy attacking scripts to host machines…☆38Updated last year
- Embed a payload inside a PNG file☆345Updated 10 months ago
- ☆65Updated last year
- ZTrace 11 is Continuation of the zerotrace.☆21Updated 2 months ago
- Abusing VirusTotal API to host our C2 traffic, usefull for bypassing blocking firewall rules if VirusTotal is in the target white list , …☆28Updated 2 years ago
- A curated compilation of extensive resources dedicated to bootkit and rootkit development.☆101Updated 3 weeks ago
- The easiest way to achieve a reverse shell bypassing Windows Defender. Windows Evasion | Windows Defender Evasion | Windows Defender Bypa…☆27Updated this week
- LummaC2 extracted binaries by reversing & LummaC2 Stealer Analysis☆79Updated 6 months ago
- Infiltrax is a post-exploitation reconnaissance tool for penetration testers and red teams, designed to capture screenshots, retrieve cli…☆80Updated 11 months ago
- POC | Steal user WhatsApp information/data☆72Updated 3 months ago
- ShadowPhish is an advanced APT awareness toolkit designed to simulate real-world phishing, malware delivery, deepfakes, smishing/vishing,…☆204Updated 4 months ago
- execute PE in memory Filelessly☆44Updated 7 months ago
- I-Espresso is a tool that enables users to generate Portable Executable (PE) files from batch scripts. Leveraging IExpress, it demonstrat…☆84Updated 10 months ago
- Self-spreading Java malware targeting Minecraft servers. Infected servers are capable of scanning for other vulnerable servers, encryptin…☆123Updated 8 months ago
- Polymorphic Command & Control☆89Updated 6 months ago
- 🏴☠️ Hacking Guides, Demos and Proof-of-Concepts 🥷☆203Updated this week
- ☆161Updated 6 months ago