O Scanner vai procurar erros padrões do script SQLI(MySQL,MS ACCESS,Microsoft SQL Server,ORACLE,POSTGRESQL) OU ERROS DE PROGRAMAÇÃO. O mesmo vinculado com seu EXPLOIT que pode ser deixado vazio exploit='' o exploit sempre será usado no final das urls,Padrão básico sqlinjection.
☆26Jun 25, 2014Updated 11 years ago
Alternatives and similar repositories for SCANNER-INURLBR-INTERFACE
Users that are interested in SCANNER-INURLBR-INTERFACE are comparing it to the libraries listed below
Sorting:
- Exploit Wordpress Plugin Revolution Slider - Unrestricted File Upload☆25Nov 19, 2015Updated 10 years ago
- Força bruta em formulários web.☆19Feb 8, 2015Updated 11 years ago
- This simple SMB vulnerability MS17-010 scanner is developed to help security professionals to quickly check if a computer is vulnerable t…☆10Jul 24, 2017Updated 8 years ago
- Fully undetected backdoor with RSA Encrypted shell☆11Jan 3, 2018Updated 8 years ago
- A new revolution in the Penetration Testing scene... for kali Linux☆14Feb 14, 2014Updated 12 years ago
- ☆18Aug 30, 2015Updated 10 years ago
- Xss Vulnerability Demonstration framework.☆12Aug 22, 2013Updated 12 years ago
- TOOL - Unauthenticated Remote DNS , Scanner ranger IP.☆89Nov 19, 2015Updated 10 years ago
- Bolster NEO API - Artificial intelligence based zero-hour phishing detection☆13Aug 10, 2021Updated 4 years ago
- eXtremely fast data eXtraction via blind SQL injection☆14Aug 15, 2012Updated 13 years ago
- ☆83Feb 3, 2017Updated 9 years ago
- ☆18Jun 26, 2017Updated 8 years ago
- These are just some script which you can use to detect and exploit the Apache Struts Vulnerability (CVE-2017-5638)☆16Mar 12, 2017Updated 8 years ago
- POC exploit code for CVE-2020-1048(PrintDemon)☆13Jun 25, 2020Updated 5 years ago
- Uses Shodan API to pull down C2 servers to run known exploits on them.☆17Dec 9, 2017Updated 8 years ago
- Check Arbitrary File Download the CMS Wordpress☆14Nov 19, 2015Updated 10 years ago
- ☆20Jun 2, 2016Updated 9 years ago
- Collection of different exploitation scenarios of JWT.☆21Jul 23, 2021Updated 4 years ago
- Advanced search in search engines, enables analysis provided to exploit GET / POST capturing emails & urls, with an internal custom valid…☆883Apr 9, 2021Updated 4 years ago
- SharePoint Security Auditor☆21Jan 16, 2016Updated 10 years ago
- A WebDAV PROPFIND covert channel to deliver payloads☆52Nov 14, 2017Updated 8 years ago
- WPSeku - Wordpress Security Scanner☆21Jun 1, 2017Updated 8 years ago
- Here you can get full exploit for SAP NetWeaver AS JAVA☆78Jan 18, 2018Updated 8 years ago
- Struts2 Vuls Scanner base perl script☆23Feb 11, 2016Updated 10 years ago
- During pentesting I often miss screenshots of events for reports due to the quick pace of testing and a lack of foreknowledge about what …☆26Jul 18, 2019Updated 6 years ago
- Proof of concept exploit for CVE-2017-3599☆23Apr 18, 2017Updated 8 years ago
- Incident Response Network Tools☆24Jul 23, 2021Updated 4 years ago
- Archive Mirror for recently republished PoC/Exploit code☆20Nov 26, 2017Updated 8 years ago
- Tool for check the cookie flag in multiple sites☆28Dec 30, 2015Updated 10 years ago
- Web service for scanning pcaps with snort☆110Jul 4, 2018Updated 7 years ago
- ~ BannerGrab☆25Oct 28, 2016Updated 9 years ago
- ☆27Aug 19, 2015Updated 10 years ago
- Xss Scaner☆40Jun 5, 2013Updated 12 years ago
- dhcpig : initiates an advanced DHCP exhaustion attack☆61Sep 20, 2015Updated 10 years ago
- ☆177Jul 5, 2023Updated 2 years ago
- Coalfire GCP RAMP/pak Reference Architecture☆13Feb 5, 2026Updated last month
- Security information and event management, masters's diploma☆10Aug 3, 2015Updated 10 years ago
- PHP tool to scan ADOdb code for SQL Injections☆31Aug 9, 2016Updated 9 years ago
- Android Connections Forensics☆33Dec 15, 2015Updated 10 years ago