O Scanner vai procurar erros padrões do script SQLI(MySQL,MS ACCESS,Microsoft SQL Server,ORACLE,POSTGRESQL) OU ERROS DE PROGRAMAÇÃO. O mesmo vinculado com seu EXPLOIT que pode ser deixado vazio exploit='' o exploit sempre será usado no final das urls,Padrão básico sqlinjection.
☆27Jun 25, 2014Updated 11 years ago
Alternatives and similar repositories for SCANNER-INURLBR-INTERFACE
Users that are interested in SCANNER-INURLBR-INTERFACE are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Exploit Wordpress Plugin Revolution Slider - Unrestricted File Upload☆25Nov 19, 2015Updated 10 years ago
- Força bruta em formulários web.☆19Feb 8, 2015Updated 11 years ago
- TOOL - Unauthenticated Remote DNS , Scanner ranger IP.☆89Nov 19, 2015Updated 10 years ago
- Advanced search in search engines, enables analysis provided to exploit GET / POST capturing emails & urls, with an internal custom valid…☆884Apr 9, 2021Updated 4 years ago
- Check Arbitrary File Download the CMS Wordpress☆14Nov 19, 2015Updated 10 years ago
- GPU virtual machines on DigitalOcean Gradient AI • AdGet to production fast with high-performance AMD and NVIDIA GPUs you can spin up in seconds. The definition of operational simplicity.
- eXtremely fast data eXtraction via blind SQL injection☆14Aug 15, 2012Updated 13 years ago
- Uses Shodan API to pull down C2 servers to run known exploits on them.☆18Dec 9, 2017Updated 8 years ago
- This simple SMB vulnerability MS17-010 scanner is developed to help security professionals to quickly check if a computer is vulnerable t…☆10Jul 24, 2017Updated 8 years ago
- Xss Scaner☆40Jun 5, 2013Updated 12 years ago
- ☆83Feb 3, 2017Updated 9 years ago
- A WebDAV PROPFIND covert channel to deliver payloads☆52Nov 14, 2017Updated 8 years ago
- Xss Vulnerability Demonstration framework.☆12Aug 22, 2013Updated 12 years ago
- Archive Mirror for recently republished PoC/Exploit code☆20Nov 26, 2017Updated 8 years ago
- POC exploit code for CVE-2020-1048(PrintDemon)☆13Jun 25, 2020Updated 5 years ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click and start building anything your business needs.
- ☆18Jun 26, 2017Updated 8 years ago
- Fully undetected backdoor with RSA Encrypted shell☆11Jan 3, 2018Updated 8 years ago
- ☆11Feb 20, 2015Updated 11 years ago
- ☆27Aug 19, 2015Updated 10 years ago
- Metasploit Framework☆10Apr 3, 2017Updated 8 years ago
- A new revolution in the Penetration Testing scene... for kali Linux☆14Feb 14, 2014Updated 12 years ago
- Vagrant initiated auto deployment for modern-ie virtual machines with everything configured for Selenium-Grid-Extra nodes. Special Thanks…☆13Oct 31, 2016Updated 9 years ago
- Brazilian banker malware identified by Notificacao_Infracao_De_Transito_99827462345231.js☆11Oct 30, 2017Updated 8 years ago
- Struts2 Vuls Scanner base perl script☆23Feb 11, 2016Updated 10 years ago
- Managed Database hosting by DigitalOcean • AdPostgreSQL, MySQL, MongoDB, Kafka, Valkey, and OpenSearch available. Automatically scale up storage and focus on building your apps.
- ☆25Aug 11, 2020Updated 5 years ago
- SharePoint Security Auditor☆21Jan 16, 2016Updated 10 years ago
- ☆16May 6, 2015Updated 10 years ago
- Collection of different exploitation scenarios of JWT.☆21Jul 23, 2021Updated 4 years ago
- NoSecerets is a python script that is designed to crack hashes extremely fast. Faster even than Hashcat☆11Mar 13, 2022Updated 4 years ago
- Catch IMAP/POP passwords and see incoming and outgoing messages☆16Sep 15, 2013Updated 12 years ago
- Code 4rena Sandbox & Exploits☆14Mar 1, 2022Updated 4 years ago
- ☆20Jun 2, 2016Updated 9 years ago
- Exports Espresso view in uiautomatorviewer format☆10Dec 15, 2015Updated 10 years ago
- Virtual machines for every use case on DigitalOcean • AdGet dependable uptime with 99.99% SLA, simple security tools, and predictable monthly pricing with DigitalOcean's virtual machines, called Droplets.
- ☆13Jun 10, 2022Updated 3 years ago
- The Exploitation Toolkit Icarus is a cross platform software exploitation library that assists in the development of proof of concept exp…☆19Jun 9, 2013Updated 12 years ago
- During pentesting I often miss screenshots of events for reports due to the quick pace of testing and a lack of foreknowledge about what …☆26Jul 18, 2019Updated 6 years ago
- LFIter2 Local File Include (LFI) Tool - Auto File Extractor & Username Bruteforcer☆16Nov 11, 2016Updated 9 years ago
- ☆13Dec 23, 2016Updated 9 years ago
- GUI Frontend Launcher for Claymore CryptoNote CPU Miner☆12Sep 26, 2016Updated 9 years ago
- Publishing advisories for CVEs found by POST Cyberforce☆13Jan 7, 2025Updated last year