Brute forcing login pages with SQL Injection queries with cURL
☆17Feb 23, 2023Updated 3 years ago
Alternatives and similar repositories for SQL-login-bypass
Users that are interested in SQL-login-bypass are comparing it to the libraries listed below
Sorting:
- ☆12Aug 10, 2022Updated 3 years ago
- Google Dorking Payloads☆12Jun 24, 2024Updated last year
- Hacking: The Art of Exploitation 2nd Edition, by Jon Erickson☆21Mar 24, 2020Updated 5 years ago
- TCP Data Transfer Tool By ClumsyLulz☆12Feb 25, 2023Updated 3 years ago
- A repo containing some tooling build to assist with reverse engineering malware samples☆15Jul 22, 2023Updated 2 years ago
- This repository contains combined exploits for two vulnerabilities in Moodle, a widely used open-source learning management system (LMS)☆18Mar 13, 2024Updated 2 years ago
- Original PoC for CVE-2023-30367☆16Jan 4, 2024Updated 2 years ago
- Exploit POC code for CVE-2022-31898, a command injection for GL-iNet routers with firmware below 3.215☆17Nov 17, 2022Updated 3 years ago
- Check IP addresses against known cloud provider IP address ranges☆47Feb 7, 2026Updated last month
- Find subdomains by searching public certificate records☆16Jun 11, 2024Updated last year
- WooCommerce Payments: Unauthorized Admin Access Exploit☆41May 31, 2023Updated 2 years ago
- Wpushell is a tool used to upload a backdoor shell to a site that uses a WordPress Content Management System with a simple and fast proce…☆27May 22, 2023Updated 2 years ago
- MacroExploit use in excel sheet☆20Jun 12, 2023Updated 2 years ago
- create a "simulated internet" cyber range environment☆19Jan 28, 2026Updated last month
- XML-RPC Vulnerability Checker and Directory Fuzzer☆22Sep 28, 2023Updated 2 years ago
- Hacker calendar 2024 in high resolution + template + some editing tips☆23Jan 2, 2024Updated 2 years ago
- Python Prototype Scripts to Exploit or Discover Network vulnerabilities and misconfiguration.☆19Apr 6, 2024Updated last year
- An automated script to extract hidden images from Tecno Camon X☆12Sep 23, 2023Updated 2 years ago
- CLI tool that extracts a regex pattern from a list of urls ( Rust )☆61Sep 14, 2022Updated 3 years ago
- ☆41Sep 9, 2023Updated 2 years ago
- powerfull pentesting tool to checking email by smtp command☆10Feb 29, 2024Updated 2 years ago
- DLink DIR-846 Authenticated Remote Code Execution☆18Oct 4, 2023Updated 2 years ago
- سناب شات سكرابر تتيح لك تحميل القصص العامة من سناب شات مع الصور والفيديوهات، وتعرض التو اريخ الزمنية لكل قصة. تركز على الخصوصية ولا تصل لل…☆14Apr 1, 2025Updated 11 months ago
- 420 Certificates☆11Aug 9, 2020Updated 5 years ago
- 🕵️♂️ Investigate Google emails and documents.☆19Dec 6, 2021Updated 4 years ago
- Corrupted files generator. Random bits flipper.☆27Oct 30, 2023Updated 2 years ago
- Tool for checking reflecting Parameters in a URL.☆10Aug 31, 2020Updated 5 years ago
- Here are some tools I developed to help analyze malware☆11Nov 8, 2023Updated 2 years ago
- This is a working variant of the Mirai IOT botnet☆15Nov 22, 2022Updated 3 years ago
- A CLI utility to scan S3 buckets permissions☆14May 14, 2023Updated 2 years ago
- Search bing with python☆12Sep 25, 2014Updated 11 years ago
- Reverse backdoor written in PowerShell and obfuscated with Python. It generates payloads for popular hacking devices like Flipper Zero an…☆31Jun 19, 2023Updated 2 years ago
- A command-line utility for auditing DNS configuration using Zonemaster API☆32Aug 21, 2023Updated 2 years ago
- Fitness OSINT Resources☆15Jul 21, 2023Updated 2 years ago
- Reflected Cross-Site Scripting (XSS) vulnerability in 'index.php' login-portal webpage of SourceCodesters Stock Management System v1.0 al…☆21Mar 30, 2021Updated 4 years ago
- ScanExp automates the scanning of any machine's open ports via the ip address and performs a brute force attack on ports 20, 21 for the F…☆26Oct 14, 2023Updated 2 years ago
- MS17-010☆12Oct 25, 2017Updated 8 years ago
- PassDetective is a command-line tool that scans shell command history to detect mistakenly written passwords, API keys, and secrets. Usin…☆145Jan 16, 2026Updated 2 months ago
- Speeding up identifying which binaries with a SUID flag may lead to root access☆15Aug 26, 2024Updated last year