lanmaster53 / sqli-exploiterLinks
Tool for exploiting SQL injection vulnerabilities that sqlmap can't find.
☆96Updated 7 years ago
Alternatives and similar repositories for sqli-exploiter
Users that are interested in sqli-exploiter are comparing it to the libraries listed below
Sorting:
- Takeover script extracts CNAME record of all subdomains at once. TakeOver saves researcher time and increase the chance of finding subdom…☆101Updated 2 years ago
- subdomain bruteforce list☆102Updated last year
- VPN pentest tools and scripts☆126Updated 8 years ago
- A tool to hunt for publicly accessible DigitalOcean Spaces☆156Updated 6 years ago
- Collection of scripts that aid in penetration testing of JSON Web Tokens☆59Updated 6 years ago
- Script to automate PUT HTTP method exploitation to get shell☆125Updated 5 years ago
- All-in-one AWS S3 bucket tool for pentesters.☆73Updated 6 years ago
- Albatar is a SQLi exploitation framework in Python☆137Updated 11 months ago
- XSS Hunter Burp Plugin☆152Updated 7 years ago
- Paramalyzer - Burp extension for parameter analysis of large-scale web application penetration tests.☆158Updated 6 months ago
- BugBounty Tool☆40Updated 6 years ago
- Powerful Visual Subdomain Enumeration at the Click of a Mouse☆137Updated 6 years ago
- A simple XSS finding tool☆110Updated 7 years ago
- 🏰 A Python script for AWS S3 bucket enumeration.☆145Updated 3 years ago
- The Attack Surface Detector uses static code analyses to identify web app endpoints by parsing routes and identifying parameters☆110Updated 2 years ago
- CollabOzark is a simple tool which helps the researchers track SSRF, RCE, Blind XSS, XXE, External Resource Access payloads triggers.☆135Updated 6 years ago
- ☆121Updated 8 years ago
- A place to store my own wordlists, and link to others that are useful☆108Updated 2 years ago
- Preventing malicious takeover of the retired slurp AWS tool☆41Updated 7 years ago
- random notes☆47Updated 6 months ago
- Asynchronous wordlist based DKIM scanner☆58Updated 4 years ago
- This tool is for automate the initial things that we usually do in daily pentesting. So you can focus more on the main target.☆77Updated 6 years ago
- This repository contains all the material from the talk "Practical recon techniques for bug hunters & pentesters" given at Bugcrowd Level…☆62Updated 6 years ago
- dork scanner with Sqli and Lfi testing☆28Updated 7 years ago
- Burp Suite Importer - Connect to multiple web servers while populating the sitemap.☆47Updated 5 years ago
- CPH:SEC WAES: Web Auto Enum & Scanner - Auto enums website(s) and dumps files as result☆69Updated this week
- Automating Jenkins Hacking using Shodan API☆94Updated 7 years ago
- This script is intended to automate your reconnaissance process in an organized fashion☆39Updated 6 years ago
- Scans a list of websites for Cloudfront or S3 Buckets☆108Updated 2 months ago
- A tool to generate media files with malicious metadata☆127Updated 6 years ago