ISR-sqlget It's a blind SQL injection tool developed in Perl.
☆14Apr 26, 2013Updated 12 years ago
Alternatives and similar repositories for isr-sqlget
Users that are interested in isr-sqlget are comparing it to the libraries listed below
Sorting:
- Cross Distribution Exploit Testing☆28Sep 23, 2015Updated 10 years ago
- Faraday Workspaces for Bug Bounties☆21Jan 19, 2016Updated 10 years ago
- Updated version of SWFIntruder☆27Aug 16, 2016Updated 9 years ago
- Shellcode tracer☆15Jun 12, 2016Updated 9 years ago
- ☆15Mar 2, 2014Updated 11 years ago
- advanced Perl Backdoor☆13Jun 6, 2015Updated 10 years ago
- ☆11Jul 21, 2016Updated 9 years ago
- Fimap post-exploitation plugin that injects dave Rel1k's AES HTTP Reverse Shell☆16Apr 16, 2014Updated 11 years ago
- The great RSA Attacking Toolkit compiled for Windows☆18Jan 20, 2016Updated 10 years ago
- ☆14Sep 20, 2014Updated 11 years ago
- Empirical Analysis and Modeling of Black-Box Mutational Fuzzing☆10Mar 30, 2016Updated 9 years ago
- A Java JAXB library for generating events conforming to the Event Logging XML Schema☆16Aug 5, 2024Updated last year
- ☆12Sep 11, 2019Updated 6 years ago
- Exploit kit analyzer☆22Mar 3, 2015Updated 10 years ago
- Faraday Continuous Scanning☆34Sep 29, 2016Updated 9 years ago
- _Working_ examples from Grayhat Python☆14Apr 28, 2015Updated 10 years ago
- Wordpress Sploit Framework was developed for the purpose to provide a framework which creates proof of concept when discovering vulnerabi…☆33Sep 19, 2016Updated 9 years ago
- A PowerShell binding for the Unicorn Engine☆17Dec 27, 2015Updated 10 years ago
- NMAP NSE scripts - (not all)) my contributions before merging to nmap svn☆36Jun 30, 2015Updated 10 years ago
- Bypass XSS Reflected Cross-site scripting☆33Oct 15, 2015Updated 10 years ago
- Infecting PE☆25Mar 10, 2014Updated 11 years ago
- Burp Intruder File Payload Generator☆18Oct 27, 2019Updated 6 years ago
- ☆16Nov 16, 2015Updated 10 years ago
- ☆27Sep 4, 2017Updated 8 years ago
- Catfish is a tool used ease the process of finding ROP gadgets and creating payloads with them.☆30Jul 1, 2014Updated 11 years ago
- ☆21Mar 24, 2015Updated 10 years ago
- This project uses the .NET framework to bypass Antivirus solutions.☆29Mar 24, 2013Updated 12 years ago
- Collection of information security policies.☆29Apr 20, 2017Updated 8 years ago
- Open Source trojan for android.☆21Mar 21, 2024Updated last year
- melter library for Win32 PE files☆18Jul 6, 2015Updated 10 years ago
- PyCommands for Immunity Debugger☆29Mar 30, 2013Updated 12 years ago
- Sample files for fuzzing ImageMagick☆19May 10, 2017Updated 8 years ago
- plugin of ida with pin☆48Jan 25, 2021Updated 5 years ago
- Demonstrates how Android Marshmallow permissions dialog can be hijacked by the app drawind on top of it.☆27Jan 20, 2016Updated 10 years ago
- HackSys Extreme Vulnerable Driver - ArbitraryOverwrite Exploit☆26Jan 15, 2017Updated 9 years ago
- Suru is one of the original Man In The Middle (MITM) proxies that sits between the user's browser and the web application.☆28Apr 20, 2017Updated 8 years ago
- A project to learn about malware and c++ coding☆23Sep 5, 2015Updated 10 years ago
- Expweb project is a php+python based on the development of bulk getshell scanning platform. ----------------------QQ Group:485281743☆20Aug 18, 2015Updated 10 years ago
- Converts a command to a base64 powershell compatible string☆27Jul 31, 2014Updated 11 years ago