iricartb / advanced-sql-injection-scanner
Ivan Ricart Borges - Test for didactic purposes of web pages vulnerables to SQL injection using dbo database user with xp_cmdshell execution permissions. Using patterns from Internet search engines to extract potentially vulnerable web addresses and test them by changing the GET parameters using invalid Transact-SQL conversion function to cause …
☆22Updated 3 years ago
Alternatives and similar repositories for advanced-sql-injection-scanner:
Users that are interested in advanced-sql-injection-scanner are comparing it to the libraries listed below
- Burp extension for automated handling of CSRF tokens☆16Updated 7 years ago
- Exploit Research & Development - Ported Exploits☆11Updated 7 years ago
- A Burp extension for generic extraction and reuse of data within HTTP requests and responses.☆8Updated 3 years ago
- module for certexfil☆15Updated 2 years ago
- Proof-of-Concept exploit of CVE-2018-19131: Squid Proxy XSS via X.509 Certificate☆20Updated 6 years ago
- Vulnerable XSLT Console Application☆10Updated 7 years ago
- YARA rule-based automation system to detect network attacks at byte-level☆15Updated 3 years ago
- Interactive Post Exploitation Tool☆36Updated 5 years ago
- Fast DNS history enumeration tool for network and OSINT investigations☆17Updated 4 years ago
- A recon-ng module for crawling Indeed.com for contacts and resumes.☆12Updated 9 years ago
- It becomes the extension of Burp suite. The cookie set by the BipIP server may include a private IP, which is an extension to detect tha…☆15Updated 9 months ago
- Do the unexpected with AD GPO processing☆9Updated 5 years ago
- Useful Windows and AD tools☆15Updated 3 years ago
- An AV evasion technique using multibyte xor encoding of shellcode☆8Updated 8 years ago
- ☆13Updated 2 years ago
- Simple PowerShell enumeration script to look for interesting files☆10Updated 5 years ago
- Open-source Exploiting Framework☆30Updated 8 years ago
- A wrap up script to auto perform nmap scan from the result of dnsrecon, then output result with filename as hostname and ip☆11Updated 6 years ago
- Automated Payload Test Controller☆9Updated 7 years ago
- Public exploits☆14Updated 6 years ago
- Identify common attack paths to get Domain Administrator☆22Updated 5 years ago
- Techniques that i have used to evade anti-virus during pen tests.☆13Updated 6 years ago
- Reddit domain search module for Recon-ng☆10Updated 7 years ago
- An tool for search IOT MQTT vulnerable with shodan☆19Updated 7 years ago
- Launch a Windows EXE file with this EXE file (application filter evasion)☆13Updated 8 years ago
- A PoC to show how to add code to C# and dotNet and make it reusable for Red Team operations. Maybe one day it will be the largest collect…☆17Updated 4 years ago
- jgraphx 4.0.4 build for cs project☆22Updated 4 years ago
- PowerShell script to help with privilege escalation on a compromised Windows box.☆22Updated 6 years ago
- Reverse shell and rootkit☆19Updated 7 years ago
- Working exploit code for CVE-2019-17625☆18Updated 5 years ago