Automating SQL Injection in a list of URLs or Request Files
☆13Aug 8, 2016Updated 9 years ago
Alternatives and similar repositories for SQLInjector
Users that are interested in SQLInjector are comparing it to the libraries listed below
Sorting:
- Source Code Management Attack Toolkit☆13Aug 1, 2022Updated 3 years ago
- A burp-suite plugin that extract all parameter names from in-scope requests☆29Nov 9, 2021Updated 4 years ago
- ☆12Oct 2, 2022Updated 3 years ago
- Malware Analysis (Zararlı Yazılım Analizi)☆33Aug 1, 2019Updated 6 years ago
- Somewhat Reliable PoC Exploit for CVE-2022-36804 (BitBucket Critical Command Injection)☆16Nov 23, 2023Updated 2 years ago
- A PoC of CVE-2025-24071 / CVE-2025-24054, A windows vulnerability that allow get NTMLv2 hashes☆25May 15, 2025Updated 10 months ago
- Small tool to scan On-Premises Exchange servers, useful for analytical purposes and patch management☆20Aug 28, 2022Updated 3 years ago
- ☆20Dec 7, 2021Updated 4 years ago
- Low budget VirusTotal Intelligence Cosplay☆20Jan 6, 2022Updated 4 years ago
- A steganography based shellcode hider to bypass AV☆17Aug 7, 2022Updated 3 years ago
- ☆24Dec 16, 2020Updated 5 years ago
- Bugbounty utility to store list of enumerated subdomains into an sqlite3 db [one liner style / Pipe and save]☆29Jan 6, 2021Updated 5 years ago
- ☆42Apr 22, 2021Updated 4 years ago
- a burp extension for dynamic payload generation to detect injection flaws (RCE, LFI, SQLi), creates access matrix based user sessions to …☆30Oct 21, 2025Updated 4 months ago
- PoC exploit for VMware Cloud Director RCE (CVE-2020-3956)☆89Jun 2, 2020Updated 5 years ago
- ZAP/Burp plugin that generate script to reproduce a specific HTTP request (Intended for fuzzing or scripted attacks)☆30Dec 16, 2021Updated 4 years ago
- Parameter discovery and fuzzing tool☆12Oct 25, 2022Updated 3 years ago
- 🌲 golang port of Delgan's python loguru (just logging)☆11Jan 1, 2026Updated 2 months ago
- CVE-2018-11311 | mySCADA myPRO 7 Hardcoded FTP Username and Password Vulnerability☆12Jul 2, 2018Updated 7 years ago
- CVE-2021-40346 PoC (HAProxy HTTP Smuggling)☆41Sep 8, 2021Updated 4 years ago
- A collection of awesome tools, books, resources, software, documents and cool stuff about IoT and HW security.☆34Mar 8, 2026Updated last week
- Script to install pentest tools on Alpine Linux☆12Jul 3, 2015Updated 10 years ago
- ☆16Dec 28, 2016Updated 9 years ago
- rShellZ s a linux reverse-shell & exploitation assistance framework. With lots of payload and post exploitation modules.☆14Dec 13, 2023Updated 2 years ago
- Software Exploitation☆11Sep 22, 2025Updated 5 months ago
- Domain Connectivity Analysis Tools to analyze aggregate connectivity patterns across a set of domains during security investigations☆46Nov 1, 2021Updated 4 years ago
- Grab Firefox post requests by hooking PR_Write function from nss3.dll module using trampoline hook to get passwords and emails of users☆42Oct 5, 2022Updated 3 years ago
- ☆12Jan 21, 2019Updated 7 years ago
- Designed for automated enumeration for ethical hacking and penetration testing☆11Jan 17, 2018Updated 8 years ago
- Windows log and threat hunting with powershell☆16Dec 11, 2020Updated 5 years ago
- A tool to copy only the changed files to a new folder, useful to create incremental update packages.☆11Jan 27, 2022Updated 4 years ago
- Web CTF CheatSheet 🐈☆11Jun 12, 2019Updated 6 years ago
- ☆12Jun 8, 2018Updated 7 years ago
- Plugin for Recaf, which allows you to no-op methods with a single click.☆17May 22, 2021Updated 4 years ago
- Hidden parameters discovery suite☆224Nov 14, 2022Updated 3 years ago
- Adding PowerShell scripts that I use on my Proxmox server to automate certain tasks.☆13Jan 9, 2026Updated 2 months ago
- ☆54Feb 25, 2021Updated 5 years ago
- Nessie Viewer enables IT Security auditors and penetration testers to quickly navigate through Nessus reports and Nmap XMLs☆17May 23, 2018Updated 7 years ago
- Burp Extension to identify PII data☆21Jan 29, 2021Updated 5 years ago