A python library to automate time-based blind SQL injection
☆50Sep 15, 2019Updated 6 years ago
Alternatives and similar repositories for Blinder
Users that are interested in Blinder are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- ☆16May 3, 2021Updated 4 years ago
- Takes raw hex shellcode (e.g. msfvenom hex format) from a cmd line arg, text file, or URL download and runs it.☆20Dec 17, 2018Updated 7 years ago
- Docker image that provides features similar to Burp Collaborator☆15Mar 6, 2021Updated 5 years ago
- ☆14Nov 29, 2021Updated 4 years ago
- XLSX parser for nessus and nmap scan results.☆12Nov 22, 2019Updated 6 years ago
- GPU virtual machines on DigitalOcean Gradient AI • AdGet to production fast with high-performance AMD and NVIDIA GPUs you can spin up in seconds. The definition of operational simplicity.
- Yet another dirbuster tool☆13Oct 16, 2023Updated 2 years ago
- Use regular expressions to get sensitive information from a given repository (GitHub, pip or npm).☆37Sep 30, 2019Updated 6 years ago
- GQL Burp Extension☆21Sep 16, 2022Updated 3 years ago
- Bugbounty utility to store list of enumerated subdomains into an sqlite3 db [one liner style / Pipe and save]☆29Jan 6, 2021Updated 5 years ago
- Burp extension that performs a passive scan to identify cloud buckets and then test them for publicly accessible vulnerabilities☆48Jan 11, 2023Updated 3 years ago
- Crawlex is a powerful Chrome extension designed to assist bug bounty hunters in their work by enabling easy crawling of all possible URLs…☆12May 28, 2023Updated 2 years ago
- Modular command-line tool to parse, create and manipulate JWT tokens for hackers☆104Mar 17, 2023Updated 3 years ago
- Ingests logs/dbs from cobalt and empire and outputs an excel report with activity, sessions, and credentials☆21Dec 3, 2020Updated 5 years ago
- Random Tips and Writeups.☆15Feb 21, 2019Updated 7 years ago
- Wordpress hosting with auto-scaling on Cloudways • AdFully Managed hosting built for WordPress-powered businesses that need reliable, auto-scalable hosting. Cloudways SafeUpdates now available.
- Scripts and payloads for internet-wide network scanning☆17Aug 2, 2015Updated 10 years ago
- Miscellaneous C-Sharp projects for red team activities☆24Aug 12, 2022Updated 3 years ago
- Debpic lets you easily build Debian packages in an isolated Docker environment.☆11Updated this week
- The offical exploit for Pandora v7.0NG Post-auth Remote Code Execution CVE-2019-20224☆14Jan 10, 2020Updated 6 years ago
- GUI Tool to Generate Android Payloads.☆10May 20, 2020Updated 5 years ago
- Docker container escape enumeration tool.☆12Jan 23, 2021Updated 5 years ago
- ☆34Jul 17, 2019Updated 6 years ago
- DOM XSS scanner for Single Page Applications☆414Nov 15, 2025Updated 4 months ago
- HRShell is an HTTPS/HTTP reverse shell built with flask. It is an advanced C2 server with many features & capabilities.☆249Sep 9, 2021Updated 4 years ago
- Wordpress hosting with auto-scaling on Cloudways • AdFully Managed hosting built for WordPress-powered businesses that need reliable, auto-scalable hosting. Cloudways SafeUpdates now available.
- an RCE (remote command execution) approach of CVE-2018-7750☆21Nov 6, 2018Updated 7 years ago
- ☆25May 9, 2021Updated 4 years ago
- Light System Examination Toolkit (LISET) - logs & activity & configuration gathering utility that comes handy in fast Windows incident re…☆32Aug 29, 2016Updated 9 years ago
- A Cross Site Scripting scanner using selenium webdriver☆55Nov 1, 2019Updated 6 years ago
- ☆15Aug 21, 2021Updated 4 years ago
- A spiritual .NET equivalent to the Gargoyle memory scanning evasion technique☆52Dec 6, 2018Updated 7 years ago
- Simple Linux RootKit written in python☆10Dec 10, 2017Updated 8 years ago
- The official exploit for OCS Inventory NG v2.7 Remote Command Execution CVE-2020-14947☆19Jul 2, 2020Updated 5 years ago
- Recursive DNS Subdomain Enumerator with dead-end avoidance system (BETA)☆146Apr 9, 2021Updated 5 years ago
- DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- Auto Web Vulnerability Scanning Framework☆10Feb 3, 2016Updated 10 years ago
- Various implementations for C# in memory execution. Assembly.Load() Assembly.LoadFile() AppDomain.ExecuteAssembly()☆34Feb 10, 2021Updated 5 years ago
- A PowerShell script that simplifies life and therefore... phishing.☆18Aug 16, 2022Updated 3 years ago
- Small Python library that makes it easy to exploit race conditions in web apps with Requests.☆162May 22, 2023Updated 2 years ago
- #BugBounty #BugBounty Tools #WebDeveloper Tool☆38May 17, 2025Updated 10 months ago
- Discord bot created to automate bug bounty recon, automated scans and information gathering via a discord server☆82Jan 8, 2024Updated 2 years ago
- Oracle Database Penetration Testing Reference (10g/11g)☆40Jul 28, 2018Updated 7 years ago