This repository contains payload to test NoSQL Injections
☆375May 5, 2021Updated 4 years ago
Alternatives and similar repositories for nosqlinjection_wordlists
Users that are interested in nosqlinjection_wordlists are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Automated NoSQL database enumeration and web application exploitation tool.☆3,263Feb 20, 2026Updated last month
- A lab for playing with NoSQL Injection☆134Feb 23, 2026Updated last month
- A Burp Suite content discovery plugin that add the smart into the Buster!☆378Oct 12, 2020Updated 5 years ago
- Broken Link Hijacking Burp Extension☆57Sep 13, 2019Updated 6 years ago
- psychoPATH - an advanced path traversal tool. Features: evasive techniques, dynamic web root list generation, output encoding, site map-s…☆278Feb 12, 2021Updated 5 years ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting with the flexibility to host WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Cloudways by DigitalOcean.
- View screenshots as a slideshow over http☆15Mar 13, 2020Updated 6 years ago
- An automated script that download potential exploit for linux kernel from exploitdb, and compile them automatically☆497Sep 21, 2021Updated 4 years ago
- Compilation of JavaScript XSS oneliners payloads that rocks your nuts!☆24Jul 14, 2017Updated 8 years ago
- A collection of Burpsuite Intruder payloads, BurpBounty payloads, fuzz lists, malicious file uploads and web pentesting methodologies and…☆3,912Sep 27, 2021Updated 4 years ago
- A unique automated LFi Exploiter with Bind/Reverse Shells☆303Jun 25, 2015Updated 10 years ago
- This code is vulnerable to SQL Injection and having SQLite database. For SQLite database, SQL Injection payloads are different so it is f…☆160Dec 9, 2021Updated 4 years ago
- SSRF (Server Side Request Forgery) testing resources☆2,486Oct 12, 2024Updated last year
- WePWNise generates architecture independent VBA code to be used in Office documents or templates and automates bypassing application cont…☆351Aug 27, 2018Updated 7 years ago
- This tool can be used to brute discover GET and POST parameters☆1,395Aug 24, 2019Updated 6 years ago
- Managed Database hosting by DigitalOcean • AdPostgreSQL, MySQL, MongoDB, Kafka, Valkey, and OpenSearch available. Automatically scale up storage and focus on building your apps.
- JShell - Get a JavaScript shell with XSS.☆534May 5, 2019Updated 6 years ago
- Server-Side Template Injection and Code Injection Detection and Exploitation Tool☆4,135Apr 21, 2024Updated last year
- A Burp Extension designed to identify argument injection vulnerabilities.☆123Apr 16, 2019Updated 6 years ago
- ☆276Oct 19, 2021Updated 4 years ago
- Dictionary of attack patterns and primitives for black-box application fault injection and resource discovery.☆8,869Nov 10, 2023Updated 2 years ago
- A script to enumerate virtual hosts on a server.☆690Dec 28, 2017Updated 8 years ago
- The cheat sheet about Java Deserialization vulnerabilities☆3,173May 26, 2023Updated 2 years ago
- ☆332Jan 8, 2018Updated 8 years ago
- Tool for automatic exploitation of XXE vulnerability using direct and different out of band methods.☆1,733Dec 1, 2024Updated last year
- Managed Database hosting by DigitalOcean • AdPostgreSQL, MySQL, MongoDB, Kafka, Valkey, and OpenSearch available. Automatically scale up storage and focus on building your apps.
- PowerShell script to quickly find missing software patches for local privilege escalation vulnerabilities.☆2,001Oct 10, 2018Updated 7 years ago
- web-based-fuzzer☆32Jun 26, 2020Updated 5 years ago
- Exploitation for XSS☆730Aug 5, 2021Updated 4 years ago
- ☆128Oct 19, 2016Updated 9 years ago
- CORS checking☆34Jul 16, 2018Updated 7 years ago
- 🔥 A powerful MongoDB auditing and pentesting tool 🔥☆1,334Apr 17, 2023Updated 2 years ago
- A Python Framework For NoSQL Scanning and Exploitation☆602Dec 6, 2024Updated last year
- Windows exploits, mostly precompiled. Not being updated. Check https://github.com/SecWiki/windows-kernel-exploits instead.☆1,919Sep 7, 2020Updated 5 years ago
- Enumerate subdomains through Virustotal☆32Nov 2, 2019Updated 6 years ago
- Proton VPN Special Offer - Get 70% off • AdSpecial partner offer. Trusted by over 100 million users worldwide. Tested, Approved and Recommended by Experts.
- Collection of Proof of Concepts and Potential Targets for #ShellShocker☆891May 16, 2020Updated 5 years ago
- A tool to capture all the git secrets by leveraging multiple open source git searching tools☆1,141Jun 25, 2019Updated 6 years ago
- Utils☆274Jan 11, 2016Updated 10 years ago
- A tool for embedding XXE/XML exploits into different filetypes☆1,139Dec 16, 2024Updated last year
- Web shells for PHP/ASP/ASP.NET using the least number of characters☆14Sep 27, 2023Updated 2 years ago
- A mini webserver with FTP support for XXE payloads☆341Jan 3, 2024Updated 2 years ago
- Automatically identify deserialisation issues in Java and .NET applications by using active and passive scans☆583Sep 7, 2021Updated 4 years ago