freelancermijan / bsqliLinks
☆9Updated 8 months ago
Alternatives and similar repositories for bsqli
Users that are interested in bsqli are comparing it to the libraries listed below
Sorting:
- ☆27Updated this week
- A collection of slides and presentations from BSides Ahmedabad 2024, held on October 12th and 13th. This repository features key insights…☆37Updated 8 months ago
- ☆11Updated 9 months ago
- YesWiki is a wiki system written in PHP. The squelette parameter is vulnerable to path traversal attacks, enabling read access to arbitra…☆12Updated 2 months ago
- ex-param is an automated tool designed for finding reflected parameters for XSS vulnerabilities. It crawls a target website, extracts GET…☆61Updated 4 months ago
- ☆73Updated 9 months ago
- A passive way to find backups/ sensitive information.☆82Updated last month
- ☆37Updated 4 months ago
- Bypass Reset Password Code Lead to Account Takeover☆25Updated 9 months ago
- ☆33Updated 2 months ago
- TimeVault is a specialized automated tool designed to detect potential information disclosure vulnerabilities in web applications by leve…☆31Updated 4 months ago
- Find The Admin Panel & SQL Injection Endpoints, Using Google Dorks !!!☆19Updated 7 months ago
- Contains nuclei templates for security testing and POCs.☆17Updated 8 months ago
- ☆59Updated 6 months ago
- ☆23Updated 9 months ago
- Grep subdomains from web pages.☆42Updated 4 months ago
- ☆25Updated 2 months ago
- ☆94Updated 2 months ago
- shef - extract/scrape IPs from shodan without any API key☆53Updated 5 months ago
- my nuclei templates☆40Updated last year
- Oneliner Bug Bounty Collection collected from GitHub to all bug bounty hunters☆33Updated last year
- ☆24Updated 2 months ago
- A Powerful Recon Engine☆65Updated 7 months ago
- ☆19Updated last week
- Community curated list of nuclei templates for finding "unknown" security vulnerabilities.☆37Updated 11 months ago
- ☆27Updated last year
- collect robots.txt endpoint for allowed and disallowed endpoints from a list of subdomains☆15Updated 2 years ago
- a powerful tool designed to automate the detection of Server-Side Request Forgery (SSRF) and Open Redirect vulnerabilities☆19Updated 8 months ago
- This PoC showcases how an attacker can exploit a CSRF vulnerability to upload a file to a victim's account without their knowledge. The a…☆10Updated last year
- Host Header Vulnerability Scanner Automated Tool☆23Updated 2 months ago