his list can be used by penetration testers when testing for SQL injection authentication bypass.A penetration tester can use it manually or through burp in order to automate the process.
☆19Jun 7, 2018Updated 7 years ago
Alternatives and similar repositories for SQL-Injection-Authentication-Bypass-Cheat-Sheet
Users that are interested in SQL-Injection-Authentication-Bypass-Cheat-Sheet are comparing it to the libraries listed below
Sorting:
- A malware payload generator that can bypass almost all antivirus. It can bypass signature detection and heuristics.☆16Mar 28, 2023Updated 2 years ago
- A tool to find sensitive Keys and Passwords in your cookies, A reference guide on how to exploit them.☆19Oct 19, 2020Updated 5 years ago
- Install and Activate your Burp Suite Professional with ase.☆21Sep 16, 2023Updated 2 years ago
- WebSecurityVision is a tool for checking XSS vulnerabilities and security headers in web applications, displaying browser information if …☆11Apr 6, 2023Updated 2 years ago
- ☆24Mar 2, 2026Updated last week
- Python script to give you subsets of the nmap "top-ports". For example, I want the 10th to 100th most common TCP ports. Spits out a comma…☆18Mar 8, 2020Updated 6 years ago
- Cross-Site Scripting (XSS) is one of the most well known web application vulnerabilities. It even has a dedicated chapter in the OWASP To…☆12Jan 30, 2023Updated 3 years ago
- Gathering All Nuclei Fuzzing Templates in a Single Repo.☆11Apr 23, 2024Updated last year
- Short add-on to termux to enable phone-calls using contact book and auto-completion☆12Sep 24, 2020Updated 5 years ago
- Pimp my Kali but for lazy AFKers☆12Jun 18, 2023Updated 2 years ago
- ☆11Oct 4, 2018Updated 7 years ago
- Example Spring 5 Web Application☆10Aug 15, 2024Updated last year
- A simple offline *.srt translator using transformers models that helps you to translate subtitles.简单的离线字幕翻译器,使用transformers模型,助你翻译字幕。☆10Jun 13, 2023Updated 2 years ago
- Filter bypass for php shell upload using exiftool and injecting code into an existing image☆13Jan 28, 2021Updated 5 years ago
- ☆11Dec 17, 2023Updated 2 years ago
- The NodeJs cookie stealer is a tool that can be used in penetration testing and XSS attacks to steal browser cookies from victims.☆13Apr 5, 2023Updated 2 years ago
- Generate Random Reset Instagram URLs and check if they still valid for a complete account takeover☆12Apr 26, 2022Updated 3 years ago
- This tool named "CallSpoof" is mainly used to prank with friends , All working apis are present in the script , If you do any illegal act…☆60Jun 2, 2024Updated last year
- ☆11Dec 26, 2022Updated 3 years ago
- Give a Mask to Phishing URL like a PRO☆13Oct 25, 2020Updated 5 years ago
- An inventory of tools and resources about CyberSecurity that aims to help people to find everything related to CyberSecurity.☆13Jan 5, 2021Updated 5 years ago
- POC for GitLabs Authenticated RCE in version 11.4.7 community edition☆13Feb 8, 2021Updated 5 years ago
- HW2022公开的POC整理☆11Jul 31, 2022Updated 3 years ago
- steal cookies from website using xss☆12Mar 25, 2020Updated 5 years ago
- spring-cloud-gateway-rce CVE-2022-22947☆13Jul 13, 2022Updated 3 years ago
- This contains a bundle with an executable to exploit ms17-010 remote or locally. It does not require Python.☆16Jan 10, 2019Updated 7 years ago
- Proof of Concept for CVE-2022-42889 (Text4Shell Vulnerability)☆15Nov 21, 2022Updated 3 years ago
- Call API from Zspoof is a tool which is used for spoofing calls. This tool lets you to call anyone by changing callerid.☆17Sep 10, 2023Updated 2 years ago
- cve-2018-2894 不同别人的利用方法。☆15Dec 1, 2025Updated 3 months ago
- Introducing the Ransomware Builder – an educational tool with a sleek, modern GUI that makes it easy for anyone to create their own ranso…☆18Aug 4, 2024Updated last year
- In the spirit of #opendata, we publish our list (dangerous.domains) and a full change history here on GitHub, delayed by 6 hours. For liv…☆14Apr 19, 2025Updated 10 months ago
- A command-line interface wrapper for Faster Whisper☆17Dec 14, 2023Updated 2 years ago
- The PoC implementations for the Android code packing technique.☆14Jul 24, 2016Updated 9 years ago
- 反弹shell生成器☆17Jul 23, 2018Updated 7 years ago
- rename☆19Jul 19, 2017Updated 8 years ago
- ☆13Oct 15, 2018Updated 7 years ago
- https://bc-security.gitbook.io/empire-wiki/☆13Aug 2, 2023Updated 2 years ago
- The online version of Ciphey☆18Oct 11, 2023Updated 2 years ago
- Python tool to generate password permutations from keywords☆16Oct 6, 2023Updated 2 years ago