sqlmap cheat sheet
☆15Apr 6, 2023Updated 2 years ago
Alternatives and similar repositories for sqlmap-cheat-sheet
Users that are interested in sqlmap-cheat-sheet are comparing it to the libraries listed below
Sorting:
- List of bug bounty programs of companies/organisations in Switzerland☆13Oct 28, 2021Updated 4 years ago
- License Compatible Python2x Python3x Pure Blood v2 A Penetration Testing Framework created for Hackers / Pentester / Bug Hunter Menu We…☆26Oct 1, 2020Updated 5 years ago
- A list of universities with vulnerability disclosure policies☆13Jul 10, 2020Updated 5 years ago
- Hand-made Improved Nuclei Templates!🪴☆13Jun 12, 2023Updated 2 years ago
- A formula to calculate bounty amounts.☆15Dec 2, 2017Updated 8 years ago
- 🕵️ Check ERC20 token implementations on all chains.☆19Jan 6, 2024Updated 2 years ago
- ☆17Oct 15, 2024Updated last year
- 批量扫描url是否存在sql注入问题☆15Nov 29, 2022Updated 3 years ago
- 🔍LeakScanner - Inspired by Gitleaks☆14Aug 23, 2024Updated last year
- Random experiments and shenanigans☆13Dec 6, 2025Updated 3 months ago
- Find subdomains by searching public certificate records☆16Jun 11, 2024Updated last year
- ☆76Jun 5, 2021Updated 4 years ago
- A curated list of daily learnings, writeups, blogs, tips and everything related to hacking☆12Feb 5, 2023Updated 3 years ago
- A simple bash script for Web Cache Deception exploitation.☆16Oct 7, 2024Updated last year
- XSS payloads for bypassing WAF. This repository is updating continuously.☆10Aug 8, 2021Updated 4 years ago
- RedirectHunter is a powerful open redirect vulnerability scanner that helps you quickly identify and mitigate potential security risks in…☆12Apr 21, 2023Updated 2 years ago
- ☆19Oct 7, 2024Updated last year
- custom nuclei templates☆14Sep 27, 2022Updated 3 years ago
- Brute force otp on has no rate limit☆13Aug 1, 2021Updated 4 years ago
- A curated list of bugbounty writeups (Bug type wise) , inspired from https://github.com/ngalongc/bug-bounty-reference☆21Apr 14, 2021Updated 4 years ago
- Methods of C2☆22Jul 15, 2015Updated 10 years ago
- POC for CVE-2023-24488☆14Jul 4, 2023Updated 2 years ago
- Mac OSX application to control the DNSCrypt Proxy☆12Oct 7, 2017Updated 8 years ago
- collect robots.txt endpoint for allowed and disallowed endpoints from a list of subdomains☆14Jan 23, 2023Updated 3 years ago
- Este handbook abrange de maneira detalhada todas as informações essenciais para quem deseja iniciar na área de segurança da informação. A…☆21Nov 20, 2025Updated 4 months ago
- Stay on the beat with SubHound - receive notifications for new subdomains on Telegram and Discord! 🐶🎵☆17Jun 4, 2023Updated 2 years ago
- A collection of GitHub dorks for bug bounty hunters☆18Jun 24, 2022Updated 3 years ago
- A CLI tool to extract, analyze, and filter JavaScript links from web pages or URLs, with regex matching and structured JSON output.☆19Jan 6, 2025Updated last year
- public content☆20Oct 7, 2025Updated 5 months ago
- This repository is a comprehensive collection of resources, documentation, apps, and add-ons related to Splunk, a powerful data analytics…☆24Feb 16, 2026Updated last month
- a medium scraper that you need.☆18Nov 11, 2025Updated 4 months ago
- HHousen's writeups to various HackTheBox machines and challenges from https://hackthebox.com.☆21Mar 3, 2023Updated 3 years ago
- minimum memory leak checker☆11Feb 28, 2026Updated 3 weeks ago
- NSE Script for GraphQL Introspection Check☆24Jan 9, 2022Updated 4 years ago
- Private XSS BOMB 16k Payloads The Biggest Payloads List online☆20Dec 31, 2023Updated 2 years ago
- Tracking my progress for 100 days learning something new daily....☆21May 7, 2023Updated 2 years ago
- Automated Recon Framework☆24Oct 3, 2020Updated 5 years ago
- Collection of useful command line commands☆14Dec 10, 2021Updated 4 years ago
- ☆38Apr 7, 2023Updated 2 years ago