sqlc - Universal DBMS/SQL client with exfiltration features :)
☆18Dec 19, 2023Updated 2 years ago
Alternatives and similar repositories for sqlc
Users that are interested in sqlc are comparing it to the libraries listed below
Sorting:
- ☆11Aug 19, 2017Updated 8 years ago
- DEFCON-RUSSIA WEB☆13Mar 30, 2021Updated 4 years ago
- This is a Shell Script to setup NTLM hash sniffing using the Raspberry Pi Zero. This tool can be used during Red Team assessments by atta…☆23Jun 7, 2017Updated 8 years ago
- Vulnerability Assessment and Penetration Testing Toolkit☆19Jan 5, 2022Updated 4 years ago
- ☆12Oct 16, 2017Updated 8 years ago
- PowerShell wrapper for nmap, allows easy scanning of many hosts and subnets☆15Apr 1, 2018Updated 7 years ago
- Attacking and defending web and VPN session hijacking in Pulse Secure Connect☆14Oct 24, 2019Updated 6 years ago
- Project to practice the basic at exploit bufferoverflow bugs.☆11Jan 28, 2017Updated 9 years ago
- EXIF-based command and control PoC☆15Mar 20, 2020Updated 5 years ago
- Python port of Pipal for password analytics☆22Oct 3, 2023Updated 2 years ago
- intrusion detection☆26Jun 14, 2017Updated 8 years ago
- Simple DNS logging server☆20Dec 22, 2021Updated 4 years ago
- Efficient clustering of MASSCAN results☆12Dec 26, 2016Updated 9 years ago
- An issue in AVG AVG Anti-Spyware v.7.5 allows an attacker to execute arbitrary code via a crafted script to the guard.exe component☆11Aug 5, 2023Updated 2 years ago
- retrace is a versatile security vulnerability / bug discovery tool through monitoring and modifying the behavior of compiled binaries on …☆61Feb 14, 2022Updated 4 years ago
- Execute Mimikatz with different technique☆51Nov 8, 2021Updated 4 years ago
- Automation Engine using the Covenant API and lua scripting☆24Dec 8, 2022Updated 3 years ago
- openVAS with ansible☆21Apr 22, 2015Updated 10 years ago
- This is a SOAP service written in C# that has intentional SQL injection vulnerabilties.☆21Nov 27, 2016Updated 9 years ago
- ☆17Jul 26, 2018Updated 7 years ago
- ☆17Oct 26, 2018Updated 7 years ago
- Identify common attack paths to get Domain Administrator☆21Aug 20, 2019Updated 6 years ago
- Packaging audit toolkit using vulners.com vulnerability database☆20Apr 9, 2018Updated 7 years ago
- A Python PoC for CVE-2018-9206☆13Oct 22, 2018Updated 7 years ago
- A minimal safe version of mimikatz to only allow the export of non-exportable Windows certificates☆26Sep 23, 2018Updated 7 years ago
- MalRecon - Basic Malware Reconnaissance and Analysis Tool☆26Jun 8, 2017Updated 8 years ago
- ☆50Sep 11, 2019Updated 6 years ago
- Scans SMB for Vuln Assessment☆17Mar 4, 2017Updated 9 years ago
- Reverse or bind shell catcher which uprgrades the caught shell to be more like a regular shell☆26Mar 17, 2019Updated 7 years ago
- Simple, lightweight and compact key logger written for fun ...☆17Sep 12, 2018Updated 7 years ago
- Simple Captive Portal for Evil Crow Keylogger: Access point (Free WiFi) with a registration form. Information is stored on the MicroSD ca…☆13Oct 6, 2020Updated 5 years ago
- Helper scripts to assist penetration testing and exploit development☆36Dec 11, 2024Updated last year
- ☆13Oct 22, 2023Updated 2 years ago
- A rootkit implemented as a linux kernel module☆18May 2, 2015Updated 10 years ago
- quick'n dirty hack to invoke ARM SMC instruction from userland through debugfs☆14Sep 4, 2016Updated 9 years ago
- Google Dorking Payloads☆12Jun 24, 2024Updated last year
- Print the strings of encoded printable characters in files☆12Jul 19, 2015Updated 10 years ago
- Some useful scripts for penetration testing☆46May 20, 2017Updated 8 years ago
- mOrc is a post-exploitation framework for macOS written in Bash☆19Apr 19, 2023Updated 2 years ago