incredibleindishell / Local-file-disclosure-SQL-Injection-LabLinks
This is sample code to demonstrate how one can use SQL Injection vulnerability to download local file from server in specific condition. If you have any doubt, ping me at https://twitter.com/IndiShell1046 :)
☆42Updated 8 years ago
Alternatives and similar repositories for Local-file-disclosure-SQL-Injection-Lab
Users that are interested in Local-file-disclosure-SQL-Injection-Lab are comparing it to the libraries listed below
Sorting:
- Materials related to the 2017 BSides Las Vegas presentation☆52Updated 4 years ago
- WhiteBox CMS analysis☆68Updated 2 years ago
- HTTPoxy Exploit Scanner by 1N3 @CrowdShield☆102Updated 8 years ago
- CSV injection Vulnerable Script.☆29Updated 8 years ago
- Burplay is a Burp Extension allowing for replaying any number of requests using same modifications definition. Its main purpose is to aid…☆83Updated 8 years ago
- Strutsy - Mass exploitation of Apache Struts (CVE-2017-5638) vulnerability☆10Updated 7 years ago
- a collection of payloads for common webapps☆72Updated 12 years ago
- Penetration Testing Tools Developed by AppSec Consulting.☆48Updated 6 years ago
- Various tools for managing bug bounty recon and exploration.☆49Updated 2 years ago
- An adaptive, intelligent XSS fuzzer that learns how the response is reflected and carefully crafts an XSS payload to match☆42Updated 13 years ago
- Advanced XPath Injection Tool☆35Updated 10 years ago
- Collection of tools for privesc on Linux☆34Updated 12 years ago
- Provide a shell-like interface for exploiting Remote File Inclusion vulnerabilities.☆46Updated 9 years ago
- Burp Notes Extension is a plugin for Burp Suite that adds a Notes tab. The tool aims to better organize external files that are created d…☆66Updated last year
- Stay on top of new domains! Bug bounty hunters can use this tool to receive Pushbullet notifications each time there is a new target subd…☆26Updated 7 years ago
- A C# web handler that is vulnerable to XXE with PoC. This is to serve as an example of what vulnerable C# code looks like.☆26Updated 12 years ago
- ☆47Updated 9 years ago
- Allows you to trace where inputs are reflected back to the user.☆37Updated 8 years ago
- PAVELOW Exploit Toolbox is a BASH script that corresponds with your KALI distro to better help your vulnerability hunting and exploiting …☆87Updated 7 years ago
- automato should help with automating some of the user-focused enumeration tasks during an internal penetration test.☆72Updated 5 years ago
- PHDAYS |||☆17Updated 12 years ago
- Tool for checking Whether a domain or its multiple sub-domains are up and running.☆72Updated 6 years ago
- Modified version of ActiveScan++ Burp Suite extension☆31Updated 8 years ago
- Post-exploitation scripts for OS X persistence and privesc☆73Updated 8 years ago
- Babel Scripting Framework☆43Updated 5 years ago
- Highlight Burp proxy requests made by different browsers☆29Updated 8 years ago
- Image size issues plugin for Burp Suite☆95Updated 7 years ago
- [L]ocal [A]uto [R]oot [E]xploiter is a simple bash script that helps you deploy local root exploits from your attacking machine when your…☆67Updated 8 years ago
- Everything you need to exploit overly permissive crossdomain.xml files☆86Updated 10 years ago
- Python Implementation of a .NET Padding Oracle Assessment Tool☆30Updated 9 years ago