Icegram Express - Email Subscribers, Newsletters and Marketing Automation Plugin <= 5.7.14 - Unauthenticated SQL Injection
☆21Sep 15, 2024Updated last year
Alternatives and similar repositories for SQL_Injection
Users that are interested in SQL_Injection are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Proof of concept : CVE-2024-1071: WordPress Vulnerability Exploited☆22Aug 30, 2024Updated last year
- Poc of using youtube comments for C2 communications☆10Jul 6, 2021Updated 4 years ago
- Anontwi is a tool for OAuth2 applications (such as: GNUSocial, Twitter) that provides different layers of encryption, privacy methods and…☆32Sep 1, 2015Updated 10 years ago
- OpenRedirector is a powerful automation tool for detecting Open Redirect vulnerabilities in web applications☆18Oct 30, 2025Updated 5 months ago
- Exploiting the xmlrpc.php on all WordPress versions☆26Nov 4, 2022Updated 3 years ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click. Zero configuration with optimized deployments.
- Webdav Mass Exploiter With Python Programming Language☆13Jul 19, 2025Updated 9 months ago
- This is an AI Agent for Students☆11Jan 26, 2025Updated last year
- A penetration testing tool to help in Infrastructure pentesting process.☆12Sep 19, 2023Updated 2 years ago
- ☆10Apr 3, 2023Updated 3 years ago
- ☆37May 31, 2023Updated 2 years ago
- ☆172Feb 11, 2025Updated last year
- Alternative Mimikatz LSASS DUMPER☆14Apr 2, 2020Updated 6 years ago
- Analyst Tool to automate some of an analyst's daily investigation tasks. In both python script and Jupyter Notebook format.☆16Nov 24, 2025Updated 5 months ago
- POC for CVE-2020-9484☆13Feb 10, 2021Updated 5 years ago
- Virtual machines for every use case on DigitalOcean • AdGet dependable uptime with 99.99% SLA, simple security tools, and predictable monthly pricing with DigitalOcean's virtual machines, called Droplets.
- A Python3 discord trojan, utilizing discord webhooks for sending information. Silent stealer, meaning this is intended for the person to …☆13Feb 8, 2022Updated 4 years ago
- Checklists☆16Sep 22, 2016Updated 9 years ago
- ☆12Sep 10, 2025Updated 7 months ago
- Automate your C2 creation with Azure Frontdoor and randomly generated options☆15Sep 20, 2024Updated last year
- ⚡️ A curated list of awesome things related to Infisical☆23Oct 16, 2023Updated 2 years ago
- Strong Python Protector & Obfuscator☆10Oct 23, 2020Updated 5 years ago
- GhostSec Scam Detection Tool☆16Feb 11, 2021Updated 5 years ago
- Standalone man-in-the-middle attack framework used for phishing login credentials along with session cookies, allowing for the bypass of …☆16Sep 9, 2022Updated 3 years ago
- Collection of scripts to automate the Malware Analysis process☆33Oct 27, 2025Updated 6 months ago
- Wordpress hosting with auto-scaling - Free Trial Offer • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- Cross-Site Scripting (XSS) is a common vulnerability that allows attackers to inject malicious scripts into web pages viewed by users. In…☆11Sep 10, 2024Updated last year
- This repository contains a Python script to automate the process of testing for a vulnerability known as Text4Shell, referenced under the…☆14Jun 27, 2023Updated 2 years ago
- rootX is a modern, feature-rich IRC client built with Python and Tkinter, offering a clean and intuitive graphical interface while mainta…☆13Dec 8, 2025Updated 4 months ago
- crawl a website for links and expose all the vulnerable parameters.☆14Oct 2, 2022Updated 3 years ago
- A Python Script to Get Subdomain using https://crt.sh☆96Aug 4, 2024Updated last year
- Argument injection vulnerability in PHP☆13Jun 15, 2024Updated last year
- CVE-2021-41773 | CVE-2021-42013 Exploit Tool (Apache/2.4.49-2.4.50)☆10Apr 8, 2022Updated 4 years ago
- Webarchive is a Go package for pentesters and developers to interacting with the Wayback Machine's CDX API and integrate web archive util…☆11Feb 25, 2024Updated 2 years ago
- This vulnerability could allow an attacker to take complete control of a vulnerable Confluence server. This could allow the attacker to s…☆11May 24, 2024Updated last year
- Managed Kubernetes at scale on DigitalOcean • AdDigitalOcean Kubernetes includes the control plane, bandwidth allowance, container registry, automatic updates, and more for free.
- CVE-2024-4040 CrushFTP SSTI LFI & Auth Bypass | Full Server Takeover | Wordlist Support☆64Jul 7, 2024Updated last year
- Automated GitHub secret scanning with smart alerting & monitoring.☆31Jan 15, 2026Updated 3 months ago
- Find open databases - Powered by Binaryedge.io☆14Jan 4, 2020Updated 6 years ago
- Python Library to use the implementation of the REST protocol of Tenable’s Nessus scanner. You can use Nessus from your scripts easily!☆14Nov 21, 2014Updated 11 years ago
- v2.48☆15Jun 21, 2025Updated 10 months ago
- Apache HTTP-Server 2.4.49-2.4.50 Path Traversal & Remote Code Execution PoC (CVE-2021-41773 & CVE-2021-42013)☆13Aug 22, 2025Updated 8 months ago
- A repository of LIVE malwares for your own joy and pleasure☆16Apr 21, 2016Updated 10 years ago