lanmaster53 / sqli-exploiter
Tool for exploiting SQL injection vulnerabilities that sqlmap can't find.
☆96Updated 6 years ago
Alternatives and similar repositories for sqli-exploiter:
Users that are interested in sqli-exploiter are comparing it to the libraries listed below
- subdomain bruteforce list☆101Updated 4 months ago
- XSS Hunter Burp Plugin☆149Updated 6 years ago
- Brute force AWS bucket finder☆60Updated 2 years ago
- A tool used to check if a CNAME resolves to the scope address. If the CNAME resolves to a non-scope address it might be worth checking ou…☆135Updated last year
- A collection of scripts to extend Burp Suite☆139Updated 5 years ago
- Takeover script extracts CNAME record of all subdomains at once. TakeOver saves researcher time and increase the chance of finding subdom…☆101Updated last year
- Burp Suite extension to discover assets from HTTP response.☆221Updated last month
- Simple Server Side Request Forgery services enumeration tool.☆54Updated 6 years ago
- Paramalyzer - Burp extension for parameter analysis of large-scale web application penetration tests.☆154Updated 2 years ago
- A tool to hunt for publicly accessible DigitalOcean Spaces☆155Updated 5 years ago
- VPN pentest tools and scripts☆121Updated 7 years ago
- Wordlist for content(directory) bruteforce discovering with Burp or dirsearch☆212Updated 4 months ago
- CollabOzark is a simple tool which helps the researchers track SSRF, RCE, Blind XSS, XXE, External Resource Access payloads triggers.☆138Updated 5 years ago
- This is a web application fuzzer scanner - the goal was CLI flexibility and rapid prototyping☆48Updated 5 years ago
- BugBounty Tool☆39Updated 5 years ago
- A simple XSS finding tool☆109Updated 6 years ago
- All-in-one AWS S3 bucket tool for pentesters.☆72Updated 6 years ago
- Enumerate a target Based off of Nmap Results☆77Updated last year
- The Attack Surface Detector uses static code analyses to identify web app endpoints by parsing routes and identifying parameters☆100Updated last year
- A blind SQL injection module that uses bitshfting to calculate characters.☆117Updated 2 years ago
- Powerful Visual Subdomain Enumeration at the Click of a Mouse☆138Updated 5 years ago
- Collection of scripts that aid in penetration testing of JSON Web Tokens☆58Updated 6 years ago
- A simple Cherry Tree template that can be used to organize bug bounties☆36Updated 5 years ago
- This tool is for automate the initial things that we usually do in daily pentesting. So you can focus more on the main target.☆78Updated 5 years ago
- Push notifications for passive DNS data☆108Updated 8 years ago
- A small Php application to fetch archive url snapshots from archive.org. using it you can fetch complete list of snapshot urls of any yea…☆80Updated 6 years ago
- Preventing malicious takeover of the retired slurp AWS tool☆40Updated 6 years ago
- DEPRECATED - A wrapper around gobuster that automatically scans newly discovered directories.☆116Updated 4 years ago
- Hacked together script for feeding urls into Burp's Sitemap☆93Updated 2 years ago
- A little collection of fun and creative proof of concepts to demonstrate the potential impact of a security vulnerability.☆164Updated 5 years ago