h1pmnh / sqli-dojo-dockerView external linksLinks
A demo PHP application used to exercise SQL injection techniques in a safe, local Docker environment
☆45Jun 3, 2024Updated last year
Alternatives and similar repositories for sqli-dojo-docker
Users that are interested in sqli-dojo-docker are comparing it to the libraries listed below
Sorting:
- ☆20Jun 26, 2024Updated last year
- Automatic SQL injection and database takeover tool☆45Nov 27, 2025Updated 2 months ago
- Passively check for XSS character encodings☆18Feb 7, 2026Updated last week
- Collection of rules for Static Application Security Testing (SAST) with Semgrep☆12Apr 16, 2025Updated 10 months ago
- Find subdomains on GitLab.☆106Apr 28, 2024Updated last year
- A lightweight version of my bug bounty hunting framework designed to be run on Synack's LP+ machines.☆12Jul 11, 2023Updated 2 years ago
- A slick, modern, privacy-focused web interface for viewing and analyzing Nuclei scan results. Built for pentesters & bug hunters who want…☆26Mar 31, 2025Updated 10 months ago
- Laravel PHP framework black-box vulnerability scanner☆34Sep 3, 2024Updated last year
- Python/Bash automation customization script designed to automate the reconnaissance process☆21Jan 28, 2024Updated 2 years ago
- ☆17Oct 15, 2024Updated last year
- A collection of js analysis tools & scripts.☆18Updated this week
- Mine URLs from Browser's Heap Snapshot for fun and profit☆64Aug 9, 2023Updated 2 years ago
- Crawlex is a powerful Chrome extension designed to assist bug bounty hunters in their work by enabling easy crawling of all possible URLs…☆12May 28, 2023Updated 2 years ago
- A tool for adding new lines to files, skipping duplicates and written in Rust!☆18May 8, 2025Updated 9 months ago
- A Firefox Extension to track postMessage usage (url, domain and stack) both by logging using CORS and also visually as an extension-icon☆27Dec 9, 2024Updated last year
- Finds graphql queries in javascript files☆68May 18, 2024Updated last year
- Results from analyzing data gathered from 1.6 billion subdomains☆32Oct 15, 2024Updated last year
- ☆24May 21, 2025Updated 8 months ago
- Burp Suite extension to encode an IP address focused to bypass application IP / domain blacklist.☆46Mar 4, 2024Updated last year
- JSNotify is a Python script designed to monitor JavaScript files in a specified directory for changes. This tool can be used by developer…☆18Nov 15, 2023Updated 2 years ago
- apkizer is a mass downloader for android applications for all available versions.☆46Aug 11, 2021Updated 4 years ago
- For unpacking base64:ed "Save items"-content from Burp (From search + proxy history)☆54Feb 26, 2025Updated 11 months ago
- MapperPlus facilitates the extraction of source code from a collection of targets that have publicly exposed .js.map files.☆286Oct 5, 2024Updated last year
- De-clutter a list of URLs☆384Feb 3, 2026Updated last week
- An exhaustive list of all the possible ways you can chain your Blind SSRF vulnerability☆17Jan 31, 2021Updated 5 years ago
- A simple utility to quickly gather historic Port and CVE exposures from an IP range.☆41Nov 12, 2023Updated 2 years ago
- Generate a dynamic PAC script that will route traffic to your Burp proxy only if it matches the scope defined in your Burp target.☆34Nov 8, 2021Updated 4 years ago
- bounty collection☆41Sep 1, 2024Updated last year
- ☆148Dec 23, 2022Updated 3 years ago
- A tool to download program information from Bugcrowd, for use by researchers to compare programs they are eligible to participate in☆21Dec 22, 2022Updated 3 years ago
- Collection of scripts to test your website against vulnerabilities.☆18Mar 10, 2024Updated last year
- This extension adds a search bar to the Repeater tab that can be used to highlight all repeater tabs where the request and/or response ma…☆81Oct 20, 2023Updated 2 years ago
- Curated list of Meta (formerly Facebook) owned IT assets☆56Jul 20, 2025Updated 6 months ago
- Gather results of dorks across a number of search engines☆198Jan 22, 2026Updated 3 weeks ago
- A tech enumeration toolkit focused on 404 Not found pages.☆25Oct 6, 2024Updated last year
- All About Dependency Confusion Attack, (Detecting, Finding, Mitigating)☆301Mar 12, 2024Updated last year
- Versatile tool for managing wordlists☆11Jul 15, 2021Updated 4 years ago
- A Collection of Proof of Concepts for non-published Web Exploits and Common CVEs☆10Nov 29, 2020Updated 5 years ago
- The Mobile Security Testing Guide (MSTG) is a comprehensive manual for mobile app security development, testing and reverse engineering.☆11Apr 6, 2020Updated 5 years ago