lanmaster53 / sqli-exploiterLinks
Tool for exploiting SQL injection vulnerabilities that sqlmap can't find.
☆95Updated 7 years ago
Alternatives and similar repositories for sqli-exploiter
Users that are interested in sqli-exploiter are comparing it to the libraries listed below
Sorting:
- Takeover script extracts CNAME record of all subdomains at once. TakeOver saves researcher time and increase the chance of finding subdom…☆101Updated 2 years ago
- VPN pentest tools and scripts☆126Updated 8 years ago
- This tool is for automate the initial things that we usually do in daily pentesting. So you can focus more on the main target.☆76Updated 5 years ago
- subdomain bruteforce list☆101Updated 11 months ago
- A tool to hunt for publicly accessible DigitalOcean Spaces☆157Updated 5 years ago
- BugBounty Tool☆41Updated 6 years ago
- A simple XSS finding tool☆109Updated 6 years ago
- 🏰 A Python script for AWS S3 bucket enumeration.☆145Updated 2 years ago
- Script to automate PUT HTTP method exploitation to get shell☆125Updated 5 years ago
- ☆120Updated 8 years ago
- CollabOzark is a simple tool which helps the researchers track SSRF, RCE, Blind XSS, XXE, External Resource Access payloads triggers.☆135Updated 6 years ago
- Collection of scripts that aid in penetration testing of JSON Web Tokens☆59Updated 6 years ago
- Powerful Visual Subdomain Enumeration at the Click of a Mouse☆138Updated 6 years ago
- Albatar is a SQLi exploitation framework in Python☆137Updated 8 months ago
- All-in-one AWS S3 bucket tool for pentesters.☆74Updated 6 years ago
- XSS Hunter Burp Plugin☆150Updated 7 years ago
- Burp Suite extension to discover assets from HTTP response.☆230Updated 8 months ago
- Asynchronous wordlist based DKIM scanner☆58Updated 4 years ago
- A place to store my own wordlists, and link to others that are useful☆107Updated last year
- A script to extract subdomains/emails for a given domain using SSL/TLS certificate dataset on Censys☆152Updated 2 years ago
- Preventing malicious takeover of the retired slurp AWS tool☆41Updated 7 years ago
- A Burp extension to detect and exploit versions of Telerik Web UI vulnerable to CVE-2017-9248.☆99Updated 7 years ago
- CPH:SEC WAES: Web Auto Enum & Scanner - Auto enums website(s) and dumps files as result☆71Updated 2 years ago
- A tool used to check if a CNAME resolves to the scope address. If the CNAME resolves to a non-scope address it might be worth checking ou…☆134Updated 2 years ago
- Brute force AWS bucket finder☆61Updated 2 years ago
- Automating Jenkins Hacking using Shodan API☆94Updated 7 years ago
- Exploiting misconfigured firebase databases☆124Updated 6 years ago
- Enumerate a target Based off of Nmap Results☆78Updated last year
- Repo of useful scripts☆105Updated 5 years ago
- Advanced web server fingerprinting for Nmap☆131Updated 8 years ago