A few SQL and XSS attack tools
☆39Dec 17, 2019Updated 6 years ago
Alternatives and similar repositories for SQL-XSS
Users that are interested in SQL-XSS are comparing it to the libraries listed below
Sorting:
- This tool is embeds an android application with a msfvenom payload by using a embed ruby script it's just make the embeding more easier a…☆11May 3, 2017Updated 8 years ago
- OhNo - The Evil Image Builder & Meta Manipulator☆11Jun 5, 2014Updated 11 years ago
- "HeaderScan" Burp Plugin☆16Apr 26, 2014Updated 11 years ago
- Tool to obtain information about IP or domain: Geolocation, network, whois and opened ports.☆17Feb 11, 2018Updated 8 years ago
- ☆15Jul 30, 2022Updated 3 years ago
- 针对struts2的漏洞检测工具(可批量)☆23Sep 25, 2017Updated 8 years ago
- A tool to mass scan SQL Injection Vulnerable websites from a file.☆70Feb 2, 2017Updated 9 years ago
- ☄️ Fast, 100% Accurate, Anti Honeypot SSH Cracker 🔑☆15May 1, 2022Updated 3 years ago
- Brute force your iOS Restrictions Passcode from the key & salt☆15Aug 27, 2019Updated 6 years ago
- Cross Site Scripting Cheat sheet.☆12Apr 3, 2021Updated 4 years ago
- LibSSH Authentication Bypass Exploit using RCE☆11Oct 25, 2018Updated 7 years ago
- Bash Scripting Examples☆23Jan 21, 2022Updated 4 years ago
- CVE-2017-10366: Oracle PeopleSoft 8.54, 8.55, 8.56 Java deserialization exploit☆25Sep 4, 2018Updated 7 years ago
- Open source tools mentioned in Advanced Penetration Testing Hacking the World's Most Secure Networks☆11Feb 12, 2018Updated 8 years ago
- Some POCs or Exploits for vulnerabilities☆12Feb 17, 2019Updated 7 years ago
- burp extender for fuzzing☆10Aug 10, 2018Updated 7 years ago
- CVE-2018-15982_EXP_IE☆12Dec 12, 2018Updated 7 years ago
- A tool that can help detect and takeover subdomains with dead DNS records☆12Aug 23, 2018Updated 7 years ago
- A small collection of Burp Suite extensions, written in Python☆10Nov 19, 2016Updated 9 years ago
- ☆12Apr 21, 2020Updated 5 years ago
- cloudsafe 云安全扫描☆23Dec 30, 2013Updated 12 years ago
- ☆11May 10, 2017Updated 8 years ago
- Fake AccessPoint Attack☆31Jul 27, 2018Updated 7 years ago
- steal cookies from website using xss☆12Mar 25, 2020Updated 5 years ago
- THIS POC NO LONGER WORKS WITH THE NEW SNAPCHAT API☆17Jun 11, 2024Updated last year
- Download and Inject code into Google Chrome extensions☆13Nov 16, 2017Updated 8 years ago
- ExtendedMacro - BurpSuite plugin providing extended macro functionality☆15Jan 13, 2021Updated 5 years ago
- 可能有一些你没见过的端口扫描脚本☆12Nov 28, 2018Updated 7 years ago
- IRC bot providing assemble / disassemble for various architectures, powered by Capstone / Keystone☆15Mar 21, 2023Updated 2 years ago
- Python3 Samples For Penetration Testing / Ethical Hacking (Offensive Side of The Python)☆15Feb 20, 2020Updated 6 years ago
- 打造一台翻墙路由器,ShadowSocks翻墙,OpenWrt路由器☆11Jan 17, 2016Updated 10 years ago
- RTSPServer Code Execution Vulnerability CVE-2018-4013☆15Nov 26, 2018Updated 7 years ago
- Collection of scripts that aid in penetration testing of JSON Web Tokens☆59Feb 2, 2019Updated 7 years ago
- Create lists from nmap output.☆13Jan 27, 2021Updated 5 years ago
- Simple Server Side Request Forgery services enumeration tool.☆56Aug 23, 2018Updated 7 years ago
- ☆27Apr 16, 2017Updated 8 years ago
- Automated XSS Finder☆63Aug 7, 2013Updated 12 years ago
- 常用系统服务默认端口列表☆13Apr 25, 2017Updated 8 years ago
- Useful tips on how to maximize and balance security and privacy on iOS☆12Oct 9, 2018Updated 7 years ago