his list can be used by penetration testers when testing for SQL injection authentication bypass.A penetration tester can use it manually or through burp in order to automate the process.
☆19Jun 7, 2018Updated 7 years ago
Alternatives and similar repositories for SQL-Injection-Authentication-Bypass-Cheat-Sheet
Users that are interested in SQL-Injection-Authentication-Bypass-Cheat-Sheet are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- A tool to find sensitive Keys and Passwords in your cookies, A reference guide on how to exploit them.☆19Oct 19, 2020Updated 5 years ago
- Install and Activate your Burp Suite Professional with ase.☆21Sep 16, 2023Updated 2 years ago
- Give a Mask to Phishing URL like a PRO☆13Oct 25, 2020Updated 5 years ago
- ☆11Oct 4, 2018Updated 7 years ago
- Burp Suite Certified Practitioner Exam Study☆19Feb 8, 2023Updated 3 years ago
- Managed Database hosting by DigitalOcean • AdPostgreSQL, MySQL, MongoDB, Kafka, Valkey, and OpenSearch available. Automatically scale up storage and focus on building your apps.
- WebSocket shell☆14Nov 29, 2020Updated 5 years ago
- Dump LSASS process in Task Manager without triggering Defender.☆18Apr 6, 2023Updated 2 years ago
- WebSecurityVision is a tool for checking XSS vulnerabilities and security headers in web applications, displaying browser information if …☆11Apr 6, 2023Updated 2 years ago
- Pimp my Kali but for lazy AFKers☆12Jun 18, 2023Updated 2 years ago
- [+]An Automation Tool Based on [ securitytrails.com ]☆17Jun 3, 2021Updated 4 years ago
- Repo containing all info, scripts, etc. related to CVE-2021-44228☆10Dec 29, 2021Updated 4 years ago
- Bug Bounty Recon Script☆18Aug 14, 2020Updated 5 years ago
- A Pretty simple utility built with Vue.js to check if a domain is live or down.☆19Apr 24, 2018Updated 7 years ago
- steal cookies from website using xss☆12Mar 25, 2020Updated 6 years ago
- Proton VPN Special Offer - Get 70% off • AdSpecial partner offer. Trusted by over 100 million users worldwide. Tested, Approved and Recommended by Experts.
- An inventory of tools and resources about CyberSecurity that aims to help people to find everything related to CyberSecurity.☆13Jan 5, 2021Updated 5 years ago
- Short add-on to termux to enable phone-calls using contact book and auto-completion☆12Sep 24, 2020Updated 5 years ago
- This contains a bundle with an executable to exploit ms17-010 remote or locally. It does not require Python.☆16Jan 10, 2019Updated 7 years ago
- Gathering All Nuclei Fuzzing Templates in a Single Repo.☆11Apr 23, 2024Updated last year
- Repository containing Jupyter Notebooks for working with OSQuery tables and data☆17May 8, 2020Updated 5 years ago
- Ruby script for cracking ECDSA private key☆10Mar 25, 2017Updated 9 years ago
- Command line interface for our public API☆20Jan 9, 2023Updated 3 years ago
- Cross-Site Scripting (XSS) is one of the most well known web application vulnerabilities. It even has a dedicated chapter in the OWASP To…☆12Jan 30, 2023Updated 3 years ago
- HW2022公开的POC整理☆11Jul 31, 2022Updated 3 years ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting with the flexibility to host WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Cloudways by DigitalOcean.
- ☆13Oct 15, 2018Updated 7 years ago
- spring-cloud-gateway-rce CVE-2022-22947☆13Jul 13, 2022Updated 3 years ago
- POC for GitLabs Authenticated RCE in version 11.4.7 community edition☆13Feb 8, 2021Updated 5 years ago
- The NodeJs cookie stealer is a tool that can be used in penetration testing and XSS attacks to steal browser cookies from victims.☆13Apr 5, 2023Updated 2 years ago
- Ragno is a Passive URL Crawler | Written in Python3 | Fetches URLs from the Wayback Machine, AlienVault's Open Threat Exchange & Common C…☆21Sep 1, 2025Updated 6 months ago
- 📝 A blog post about turning jupyter notebooks into interactive web apps☆17Mar 9, 2021Updated 5 years ago
- A collection of GitHub dorks for bug bounty hunters