mindspoof / WarSQLiLinks
WarSQLi; "SQL" sunucularında (MS-SQL, MySQL,) bulunan zayıf şifre denemelerini gerçekleştirmek ve tespit edilen SQL hesaplarını kullanarak post exploitation yapmak üzere geliştirilmiştir.
☆21Updated 2 years ago
Alternatives and similar repositories for WarSQLi
Users that are interested in WarSQLi are comparing it to the libraries listed below
Sorting:
- Subdomain Finder Application has 2 tools and 4 web services. With these we are finding the subdomains of the domain.☆11Updated 9 years ago
- iSMET (A)symmetric Meterpreter Encryption Tool☆26Updated 5 years ago
- ☆14Updated 5 years ago
- Brute forcer and shell deployer for WildFly☆101Updated 7 years ago
- ☆27Updated 9 years ago
- A toolkit for CTFs☆14Updated 7 years ago
- Remote Code Execution vulnerability on ArcSight Logger☆20Updated 4 years ago
- For educational purposes only, use at your own responsibility. metasploit_rc_scripts - contains either sample rc files for explatation o…☆21Updated 8 years ago
- ☆20Updated 6 years ago
- Powershell to CodeExecution and ProcessInjection☆65Updated 8 years ago
- Hacktrick web application☆20Updated 7 years ago
- ☆11Updated 9 years ago
- wifiDOS with scapy☆16Updated 9 years ago
- This is a tool for exploiting Ticketbleed (CVE-2016-9244) vulnerability.☆30Updated 8 years ago
- CVE-2018-11311 | mySCADA myPRO 7 Hardcoded FTP Username and Password Vulnerability☆12Updated 7 years ago
- Windows log and threat hunting with powershell☆16Updated 5 years ago
- An Advanced Web Crawler and DirBuster☆114Updated 3 years ago
- APT || Execution || Launch || APTs || ( Authors harr0ey, bohops )☆110Updated 7 years ago
- Simple C# reverse shell with shellcode and process injection☆39Updated 9 years ago
- Meterpreter_Payload_Detection.exe tool for detecting Meterpreter in memory like IPS-IDS and Forensics tool☆164Updated 2 years ago
- Encoded Reverse Shell Generator With Techniques To Bypass AV's☆146Updated 5 years ago
- Aggressor script to integrate Phant0m with Cobalt Strike☆27Updated 8 years ago
- Tool aided persistence via Windows URI schemes abuse☆84Updated 5 years ago
- Joomla Vulnerability Component Scanner☆62Updated 7 years ago
- ☆56Updated 8 years ago
- MS17-010 multithreading scanner written in python.☆75Updated 8 years ago
- Use powershell to test Office-based persistence methods☆76Updated 4 years ago
- C# code for Transferring Backdoor Payloads by IPv6 Address (AAAA) records and DNS Traffic also Bypassing Anti-viruses☆31Updated 2 years ago
- Cyber Security Researcher Mert SARICA's Python codes (https://www.hack4career.com)☆85Updated 3 months ago
- A cobaltstrike script that integrates DDEAuto Attacks☆63Updated 8 years ago