ISR-sqlget It's a blind SQL injection tool developed in Perl.
☆14Apr 26, 2013Updated 12 years ago
Alternatives and similar repositories for isr-sqlget
Users that are interested in isr-sqlget are comparing it to the libraries listed below
Sorting:
- Cross Distribution Exploit Testing☆28Sep 23, 2015Updated 10 years ago
- Faraday Workspaces for Bug Bounties☆21Jan 19, 2016Updated 10 years ago
- Shellcode tracer☆15Jun 12, 2016Updated 9 years ago
- A Java JAXB library for generating events conforming to the Event Logging XML Schema☆16Aug 5, 2024Updated last year
- Collection of information security policies.☆29Apr 20, 2017Updated 8 years ago
- advanced Perl Backdoor☆13Jun 6, 2015Updated 10 years ago
- ☆15Mar 2, 2014Updated 12 years ago
- Updated version of SWFIntruder☆27Aug 16, 2016Updated 9 years ago
- Faraday Continuous Scanning☆34Sep 29, 2016Updated 9 years ago
- Empirical Analysis and Modeling of Black-Box Mutational Fuzzing☆10Mar 30, 2016Updated 9 years ago
- ☆11Jul 21, 2016Updated 9 years ago
- Fimap post-exploitation plugin that injects dave Rel1k's AES HTTP Reverse Shell☆16Apr 16, 2014Updated 11 years ago
- ☆12Sep 11, 2019Updated 6 years ago
- The great RSA Attacking Toolkit compiled for Windows☆18Jan 20, 2016Updated 10 years ago
- ☆14Sep 20, 2014Updated 11 years ago
- Converts a command to a base64 powershell compatible string☆27Jul 31, 2014Updated 11 years ago
- Exploit kit analyzer☆22Mar 3, 2015Updated 11 years ago
- Sample files for fuzzing ImageMagick☆19May 10, 2017Updated 8 years ago
- Infecting PE☆25Mar 10, 2014Updated 12 years ago
- ☆27Sep 4, 2017Updated 8 years ago
- Open Source trojan for android.☆21Mar 21, 2024Updated 2 years ago
- A tool to visually snapshot a website by supplying multiple user-agent. Designed to aid in discovery of different entry points into an ap…☆30May 6, 2016Updated 9 years ago
- Embed vim on any web site☆20Oct 1, 2020Updated 5 years ago
- Suru is one of the original Man In The Middle (MITM) proxies that sits between the user's browser and the web application.☆28Apr 20, 2017Updated 8 years ago
- Wordpress Sploit Framework was developed for the purpose to provide a framework which creates proof of concept when discovering vulnerabi…☆33Sep 19, 2016Updated 9 years ago
- A PowerShell binding for the Unicorn Engine☆17Dec 27, 2015Updated 10 years ago
- plugin of ida with pin☆48Jan 25, 2021Updated 5 years ago
- HackSys Extreme Vulnerable Driver - ArbitraryOverwrite Exploit☆26Jan 15, 2017Updated 9 years ago
- ☆21Mar 24, 2015Updated 10 years ago
- This contains common OSCP local exploits and enumeration scripts☆12Sep 18, 2015Updated 10 years ago
- Bypass XSS Reflected Cross-site scripting☆33Oct 15, 2015Updated 10 years ago
- Python emoji + emoticon Library (<ゝω・)☆ 👨🚀👩🚀☆13Jun 17, 2018Updated 7 years ago
- _Working_ examples from Grayhat Python☆14Apr 28, 2015Updated 10 years ago
- A Burp Extender plugin, that will make binary soap objects readable and modifiable.☆29Feb 21, 2022Updated 4 years ago
- DNS log http://zone.wooyun.org/content/27119☆21May 10, 2016Updated 9 years ago
- NMAP NSE scripts - (not all)) my contributions before merging to nmap svn☆36Jun 30, 2015Updated 10 years ago
- Catfish is a tool used ease the process of finding ROP gadgets and creating payloads with them.☆30Jul 1, 2014Updated 11 years ago
- ☆139Jul 13, 2017Updated 8 years ago
- This project uses the .NET framework to bypass Antivirus solutions.☆29Mar 24, 2013Updated 12 years ago