Automating SQL Injection in a list of URLs or Request Files
☆12Aug 8, 2016Updated 9 years ago
Alternatives and similar repositories for SQLInjector
Users that are interested in SQLInjector are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Source Code Management Attack Toolkit☆13Aug 1, 2022Updated 3 years ago
- A burp-suite plugin that extract all parameter names from in-scope requests☆29Nov 9, 2021Updated 4 years ago
- Basic XSS Scanner☆11Jan 21, 2021Updated 5 years ago
- ☆12Oct 2, 2022Updated 3 years ago
- ☆14Apr 29, 2020Updated 6 years ago
- Managed Database hosting by DigitalOcean • AdPostgreSQL, MySQL, MongoDB, Kafka, Valkey, and OpenSearch available. Automatically scale up storage and focus on building your apps.
- Somewhat Reliable PoC Exploit for CVE-2022-36804 (BitBucket Critical Command Injection)☆16Nov 23, 2023Updated 2 years ago
- A PoC of CVE-2025-24071 / CVE-2025-24054, A windows vulnerability that allow get NTMLv2 hashes☆25May 15, 2025Updated last year
- Small tool to scan On-Premises Exchange servers, useful for analytical purposes and patch management☆20Aug 28, 2022Updated 3 years ago
- ☆21Dec 7, 2021Updated 4 years ago
- A steganography based shellcode hider to bypass AV☆17Aug 7, 2022Updated 3 years ago
- ☆24Dec 16, 2020Updated 5 years ago
- ☆29Oct 18, 2022Updated 3 years ago
- Bugbounty utility to store list of enumerated subdomains into an sqlite3 db [one liner style / Pipe and save]☆29Jan 6, 2021Updated 5 years ago
- my own 2fa bypass methodolgy☆27Sep 22, 2023Updated 2 years ago
- Deploy to Railway using AI coding agents - Free Credits Offer • AdUse Claude Code, Codex, OpenCode, and more. Autonomous software development now has the infrastructure to match with Railway.
- ☆42Apr 22, 2021Updated 5 years ago
- a burp extension for dynamic payload generation to detect injection flaws (RCE, LFI, SQLi), creates access matrix based user sessions to …☆30Oct 21, 2025Updated 6 months ago
- ☆13Jun 26, 2021Updated 4 years ago
- ZAP/Burp plugin that generate script to reproduce a specific HTTP request (Intended for fuzzing or scripted attacks)☆30Dec 16, 2021Updated 4 years ago
- Exploit Pack - One step ahead☆11Sep 9, 2013Updated 12 years ago
- Parameter discovery and fuzzing tool☆12Oct 25, 2022Updated 3 years ago
- Contextual Deserialization vulnerability that causes RCE - Remote Code Execution☆14Apr 28, 2024Updated 2 years ago
- 🌲 golang port of Delgan's python loguru (just logging)☆11Jan 1, 2026Updated 4 months ago
- CVE-2018-11311 | mySCADA myPRO 7 Hardcoded FTP Username and Password Vulnerability☆12Jul 2, 2018Updated 7 years ago
- Deploy on Railway without the complexity - Free Credits Offer • AdConnect your repo and Railway handles the rest with instant previews. Quickly provision container image services, databases, and storage volumes.
- CVE-2021-40346 PoC (HAProxy HTTP Smuggling)☆41Sep 8, 2021Updated 4 years ago
- NSE script to detect ProxyOracle☆13Aug 30, 2021Updated 4 years ago
- Simple AV Evasion for PE Files☆41Nov 21, 2021Updated 4 years ago
- Script to install pentest tools on Alpine Linux☆10Jul 3, 2015Updated 10 years ago
- rShellZ s a linux reverse-shell & exploitation assistance framework. With lots of payload and post exploitation modules.☆13Dec 13, 2023Updated 2 years ago
- Pwndoc local file inclusion to remote code execution of Node.js code on the server☆47Jan 31, 2025Updated last year
- Extract uncompiled, uncompressed SPA code from Webpack source maps. A fork of @rarecoil's work.☆13Jul 11, 2024Updated last year
- Software Exploitation☆11Sep 22, 2025Updated 7 months ago
- Domain Connectivity Analysis Tools to analyze aggregate connectivity patterns across a set of domains during security investigations☆46Nov 1, 2021Updated 4 years ago
- Virtual machines for every use case on DigitalOcean • AdGet dependable uptime with 99.99% SLA, simple security tools, and predictable monthly pricing with DigitalOcean's virtual machines, called Droplets.
- Grab Firefox post requests by hooking PR_Write function from nss3.dll module using trampoline hook to get passwords and emails of users☆42Oct 5, 2022Updated 3 years ago
- ☆12Jan 21, 2019Updated 7 years ago
- Designed for automated enumeration for ethical hacking and penetration testing☆11Jan 17, 2018Updated 8 years ago
- Windows log and threat hunting with powershell☆16Dec 11, 2020Updated 5 years ago
- A tool to copy only the changed files to a new folder, useful to create incremental update packages.☆11Jan 27, 2022Updated 4 years ago
- ☆12Jun 8, 2018Updated 7 years ago
- Kevlar Benchmark: OWASP Top 10 for Agentic Apps (AI-Agents) 2026 a Red Team Benchmark☆32Jan 20, 2026Updated 3 months ago