connorjaydunn / SQLiFLinks
SQL injection vulnerability scanner
☆28Updated 5 months ago
Alternatives and similar repositories for SQLiF
Users that are interested in SQLiF are comparing it to the libraries listed below
Sorting:
- Living Off The Land (LOTL) persistent Reverse shell☆101Updated last year
- Here are +200 different rats some with source code☆106Updated last year
- A project that demonstrates embedding shellcode payloads into image files (like PNGs) using Python and extracting them using C/C++. Paylo…☆186Updated 5 months ago
- Keklick - C2 Hunting, Reporting and Visualization Tool☆48Updated 2 weeks ago
- Stuxnet extracted binaries by reversing & Stuxnet Rootkit Analysis☆64Updated 10 months ago
- A spy pixel which can be emedded into web pages or emails.☆100Updated 11 months ago
- Cross platform (Linux / Windows) shellcode packer for CTFs and pentest / red team exams aiming for AV evasion !☆71Updated last month
- A powershell module for hiding payloads in the pixels of images☆65Updated last year
- Intelligent Malware that takes screenshots for entire monitors and exfiltrate them through Trusted Channel Slack to the C2 server that's …☆121Updated 4 months ago
- Phone: A Mobile Phone Forensic Framework ( Android )☆200Updated 4 months ago
- A curated compilation of extensive resources dedicated to bootkit and rootkit development.☆69Updated 3 months ago
- Obfuscate the bytes of your payload with an association dictionary☆68Updated 2 months ago
- Tool designed to exfiltrate OneDrive Business OCR Data☆121Updated 6 months ago
- LummaC2 extracted binaries by reversing & LummaC2 Stealer Analysis☆79Updated 5 months ago
- payload Execution by Fake Windows SmartScreen with requires Administrator privileges & Turn off real SmartScreen Filter☆106Updated last year
- Polymorphic Command & Control☆86Updated 5 months ago
- LazyOwn RedTeam/APT Framework is the first RedTeam Framework with an AI-powered C&C, featuring rootkits to conceal campaigns, undetectabl…☆88Updated this week
- Generate an undetectable PE ( .exe ), which bypasses windows defender / AV☆122Updated 3 months ago
- ☆40Updated 7 months ago
- What the name says....☆101Updated 10 months ago
- ReflectUnhook - Tool designed to neutralize AV/EDR hooks.☆11Updated 8 months ago
- POC | Steal user WhatsApp information/data☆71Updated 3 months ago
- Self-spreading Java malware targeting Minecraft servers. Infected servers are capable of scanning for other vulnerable servers, encryptin…☆122Updated 7 months ago
- ☆64Updated last year
- :)))))☆46Updated last month
- Embed a payload inside a PNG file☆334Updated 9 months ago
- Infiltrax is a post-exploitation reconnaissance tool for penetration testers and red teams, designed to capture screenshots, retrieve cli…☆78Updated 10 months ago
- execute PE in memory Filelessly☆44Updated 6 months ago
- SpiderFoot automates OSINT for threat intelligence and mapping your attack surface. Codename Mirage☆89Updated this week
- Tools and Resources for Physical Security Red Teaming☆37Updated 4 months ago