lanmaster53 / sqli-exploiterLinks
Tool for exploiting SQL injection vulnerabilities that sqlmap can't find.
☆96Updated 7 years ago
Alternatives and similar repositories for sqli-exploiter
Users that are interested in sqli-exploiter are comparing it to the libraries listed below
Sorting:
- Takeover script extracts CNAME record of all subdomains at once. TakeOver saves researcher time and increase the chance of finding subdom…☆101Updated 2 years ago
- subdomain bruteforce list☆102Updated last year
- VPN pentest tools and scripts☆126Updated 8 years ago
- Albatar is a SQLi exploitation framework in Python☆138Updated 11 months ago
- ☆121Updated 8 years ago
- XSS Hunter Burp Plugin☆150Updated 7 years ago
- A simple XSS finding tool☆110Updated 7 years ago
- This tool is for automate the initial things that we usually do in daily pentesting. So you can focus more on the main target.☆76Updated 6 years ago
- BugBounty Tool☆40Updated 6 years ago
- A tool to hunt for publicly accessible DigitalOcean Spaces☆156Updated 5 years ago
- A place to store my own wordlists, and link to others that are useful☆108Updated 2 years ago
- CollabOzark is a simple tool which helps the researchers track SSRF, RCE, Blind XSS, XXE, External Resource Access payloads triggers.☆135Updated 6 years ago
- Paramalyzer - Burp extension for parameter analysis of large-scale web application penetration tests.☆159Updated 5 months ago
- All-in-one AWS S3 bucket tool for pentesters.☆73Updated 6 years ago
- A web application for generating custom XSS payloads☆77Updated 6 years ago
- Collection of scripts that aid in penetration testing of JSON Web Tokens☆59Updated 6 years ago
- 🏰 A Python script for AWS S3 bucket enumeration.☆145Updated 3 years ago
- Script to automate PUT HTTP method exploitation to get shell☆125Updated 5 years ago
- This tool can be used to enumerate the subdomains associated with a company by aggregating the results of multiple OSINT (Open Source Int…☆142Updated 3 years ago
- Hacked together script for feeding urls into Burp's Sitemap☆93Updated 3 weeks ago
- Asynchronous wordlist based DKIM scanner☆58Updated 4 years ago
- Based on URL and Organization Name, collect the IP Ranges, subdomains using various tools like Amass, subfinder, etc.. And check for upho…☆159Updated last year
- A Burp extension to detect and exploit versions of Telerik Web UI vulnerable to CVE-2017-9248.☆98Updated 7 years ago
- Scans a list of websites for Cloudfront or S3 Buckets☆106Updated 2 months ago
- A python script that filters, checks the validity, generates clickable link(s) of subdomain(s), and reports their status☆89Updated 5 years ago
- Powerful Visual Subdomain Enumeration at the Click of a Mouse☆137Updated 6 years ago
- The Attack Surface Detector uses static code analyses to identify web app endpoints by parsing routes and identifying parameters☆110Updated 2 years ago
- Burp Suite extension to discover assets from HTTP response.☆228Updated 11 months ago
- Common Wordlists☆54Updated 9 years ago
- A blind SQL injection module that uses bitshfting to calculate characters.☆131Updated 3 years ago