rinku191 / MySQL-SQL-Injection-Cheatsheet
Tips for manually detect & exploit SQL injection Vulnerability : MySQL
☆16Updated 2 years ago
Alternatives and similar repositories for MySQL-SQL-Injection-Cheatsheet:
Users that are interested in MySQL-SQL-Injection-Cheatsheet are comparing it to the libraries listed below
- Collection of python3 exploits written by me to practice exploit development. Also is good preparation for OSED-301 course released by of…☆24Updated 3 years ago
- POC for a DLL spoofer to determine DLL Hijacking☆60Updated last year
- A lightweight HTTP/HTTPS reverse proxy for efficient, policy-based traffic filtering and redirection.☆42Updated last year
- ☆48Updated last year
- A repository with my code snippets for research/education purposes.☆50Updated last year
- Notes template for Offensive Security's EXP-301 course and OSED exam☆17Updated 2 years ago
- Windows internals and exploitation tricks☆92Updated 2 months ago
- vulnerable windows binaries for exploitation practice☆39Updated 2 years ago
- Check robustness of your (their) Active Directory accounts passwords☆34Updated 11 months ago
- MITRE TTPs derived from Conti's leaked playbooks from XSS.IS☆36Updated 3 years ago
- ☆47Updated 2 years ago
- Working repo used to experiment with various languages as it relates to offensive security & evasion.☆31Updated 8 months ago
- A collection of utilities for building extensions using Burp's Montoya API☆47Updated 8 months ago
- The program uses the Windows API functions to traverse through directories and locate DLL files with RWX section☆98Updated last year
- A port of classic netcat to C#☆31Updated 2 years ago
- offensive notes & resources☆40Updated 3 weeks ago
- Some of the presentations, workshops, and labs I gave at public conferences.☆29Updated 5 months ago
- ☆26Updated last year
- Another tool for exploiting CVE-2017-9248, a cryptographic weakness in Telerik UI for ASP.NET AJAX dialog handler.☆46Updated 6 months ago
- A tool to tunnel TCP traffic over WinRM☆17Updated 3 years ago
- All efforts for the AWE course and preparation for the Offensive Security Exploitation Expert (OSEE) exam.☆43Updated 4 years ago
- Bypass Constrained Language Mode in PowerShell☆27Updated 5 years ago
- ShadowForge Command & Control - Harnessing the power of Zoom's API, control a compromised Windows Machine from your Zoom Chats.☆47Updated last year
- Perform Windows domain enumeration via LDAP☆36Updated 2 years ago
- https://github.com/ManhNho/AWAE-OSWE☆11Updated 4 years ago
- vulnlab.com reaper writeup☆26Updated last year
- IAT Unhooking proof-of-concept☆29Updated 10 months ago
- ☆14Updated 2 months ago
- OSED Practice binary☆24Updated last year
- ☆27Updated last year