iricartb / advanced-sql-injection-scannerLinks
Ivan Ricart Borges - Test for didactic purposes of web pages vulnerables to SQL injection using dbo database user with xp_cmdshell execution permissions. Using patterns from Internet search engines to extract potentially vulnerable web addresses and test them by changing the GET parameters using invalid Transact-SQL conversion function to cause …
☆21Updated 4 years ago
Alternatives and similar repositories for advanced-sql-injection-scanner
Users that are interested in advanced-sql-injection-scanner are comparing it to the libraries listed below
Sorting:
- TP-Link Archer C50 V3 devices before Build 200318 Rel. 62209 allows remote attackers to cause a denial of service via a crafted HTTP Head…☆20Updated 5 years ago
- Discovers and exploits hosts vulnerable to MS08-067/MS17-010☆42Updated 7 years ago
- A tool for recover router password☆33Updated 7 years ago
- It becomes the extension of Burp suite. The cookie set by the BipIP server may include a private IP, which is an extension to detect tha…☆16Updated last month
- Exploit for Mass Remote Code Execution on GPON home routers (CVE-2018-10562) obtained from Shodan.☆24Updated 7 years ago
- PowerShell script to help with privilege escalation on a compromised Windows box.☆23Updated 6 years ago
- Working exploit code for CVE-2019-17625☆19Updated 5 years ago
- Transferring Backdoor Payload by BSSID and Wireless traffic☆58Updated 2 years ago
- Fast and extensible network scanning library featuring multithreading, ping probing, and scan fetchers.☆39Updated 5 years ago
- Uses Shodan API to pull down C2 servers to run known exploits on them.☆17Updated 8 years ago
- ☆62Updated 3 years ago
- Perform various SMB-related attacks, particularly useful for testing large Active Directory environments.☆42Updated 3 years ago
- Exploits for some of the vulnerabilities I have discovered☆19Updated 5 years ago
- Interactive Post Exploitation Tool☆37Updated 6 years ago
- C# code for Transferring Backdoor Payloads by ARP Traffic and Bypassing Anti-viruses (Slow)☆44Updated 2 years ago
- Find unreferenced AWS S3 buckets which have CloudFront CNAME records pointing to them☆36Updated 7 years ago
- SWF Vulnerability & Information Scanner☆18Updated 7 years ago
- Python3 script to generate Office macros for the EvilOSX framework. Author: Cedric Owens☆28Updated 5 years ago
- Asynchronous MSF RPC API wrapper☆20Updated 3 years ago
- This tool aims at automating the identification of potential service running behind ports identified manually either through manual scan …☆51Updated 5 years ago
- ☆18Updated 7 years ago
- Burp extension for automated handling of CSRF tokens☆16Updated 7 years ago
- PowerSploit - A PowerShell Post-Exploitation Framework☆16Updated 8 years ago
- [DEPRECATED] Kadabra is my automatic LFI Exploiter and Scanner, written in C++ and a couple extern module in Python.☆36Updated 6 years ago
- Automate the creation of Backdoors and postexplotation activities☆23Updated 3 years ago
- ☆19Updated 8 years ago
- pentest toolbox☆27Updated 3 years ago
- jgraphx 4.0.4 build for cs project☆22Updated 5 years ago
- Windows privilege escalation through NTLM Relay and NBNS Spoofing☆52Updated 9 years ago
- The Hall of Ancient Exploitation Tools☆16Updated 6 years ago