cr0hn / nosqlinjection_wordlistsView external linksLinks
This repository contains payload to test NoSQL Injections
☆375May 5, 2021Updated 4 years ago
Alternatives and similar repositories for nosqlinjection_wordlists
Users that are interested in nosqlinjection_wordlists are comparing it to the libraries listed below
Sorting:
- Automated NoSQL database enumeration and web application exploitation tool.☆3,230Aug 26, 2025Updated 5 months ago
- A lab for playing with NoSQL Injection☆134Jul 22, 2020Updated 5 years ago
- Broken Link Hijacking Burp Extension☆57Sep 13, 2019Updated 6 years ago
- A Burp Suite content discovery plugin that add the smart into the Buster!☆378Oct 12, 2020Updated 5 years ago
- A unique automated LFi Exploiter with Bind/Reverse Shells☆298Jun 25, 2015Updated 10 years ago
- psychoPATH - an advanced path traversal tool. Features: evasive techniques, dynamic web root list generation, output encoding, site map-s…☆277Feb 12, 2021Updated 5 years ago
- This code is vulnerable to SQL Injection and having SQLite database. For SQLite database, SQL Injection payloads are different so it is f…☆160Dec 9, 2021Updated 4 years ago
- WePWNise generates architecture independent VBA code to be used in Office documents or templates and automates bypassing application cont…☆351Aug 27, 2018Updated 7 years ago
- View screenshots as a slideshow over http☆15Mar 13, 2020Updated 5 years ago
- A Burp Extension designed to identify argument injection vulnerabilities.☆122Apr 16, 2019Updated 6 years ago
- JShell - Get a JavaScript shell with XSS.☆532May 5, 2019Updated 6 years ago
- An automated script that download potential exploit for linux kernel from exploitdb, and compile them automatically☆496Sep 21, 2021Updated 4 years ago
- A collection of Burpsuite Intruder payloads, BurpBounty payloads, fuzz lists, malicious file uploads and web pentesting methodologies and…☆3,901Sep 27, 2021Updated 4 years ago
- This tool can be used to brute discover GET and POST parameters☆1,390Aug 24, 2019Updated 6 years ago
- Enumerate subdomains through Virustotal☆32Nov 2, 2019Updated 6 years ago
- A script to enumerate virtual hosts on a server.☆691Dec 28, 2017Updated 8 years ago
- ☆276Oct 19, 2021Updated 4 years ago
- Collection of Proof of Concepts and Potential Targets for #ShellShocker☆891May 16, 2020Updated 5 years ago
- A Python Framework For NoSQL Scanning and Exploitation☆601Dec 6, 2024Updated last year
- SSRF (Server Side Request Forgery) testing resources☆2,484Oct 12, 2024Updated last year
- web-based-fuzzer☆32Jun 26, 2020Updated 5 years ago
- Exploitation for XSS☆730Aug 5, 2021Updated 4 years ago
- Windows exploits, mostly precompiled. Not being updated. Check https://github.com/SecWiki/windows-kernel-exploits instead.☆1,917Sep 7, 2020Updated 5 years ago
- Tool for automatic exploitation of XXE vulnerability using direct and different out of band methods.☆1,704Dec 1, 2024Updated last year
- Utils☆274Jan 11, 2016Updated 10 years ago
- ☆332Jan 8, 2018Updated 8 years ago
- PowerShell script to quickly find missing software patches for local privilege escalation vulnerabilities.☆1,987Oct 10, 2018Updated 7 years ago
- Server-Side Template Injection and Code Injection Detection and Exploitation Tool☆4,117Apr 21, 2024Updated last year
- WebApp for BugBounty Hunters☆14Mar 24, 2017Updated 8 years ago
- The cheat sheet about Java Deserialization vulnerabilities☆3,167May 26, 2023Updated 2 years ago
- Remote Recon and Collection☆459Nov 23, 2017Updated 8 years ago
- Dictionary of attack patterns and primitives for black-box application fault injection and resource discovery.☆8,810Nov 10, 2023Updated 2 years ago
- Viewgen is a ViewState tool capable of generating both signed and encrypted payloads with leaked validation keys☆661Feb 1, 2025Updated last year
- locate and attack Lync/Skype for Business☆346Oct 1, 2024Updated last year
- A tool to capture all the git secrets by leveraging multiple open source git searching tools☆1,143Jun 25, 2019Updated 6 years ago
- ☆612Oct 4, 2024Updated last year
- A tool for embedding XXE/XML exploits into different filetypes☆1,129Dec 16, 2024Updated last year
- Create tar/zip archives that can exploit directory traversal vulnerabilities☆1,033Jun 3, 2021Updated 4 years ago
- Fuzzapi is a tool used for REST API pentesting and uses API_Fuzzer gem☆668Feb 25, 2021Updated 4 years ago