sAjibuu / SQL-login-bypassLinks
Brute forcing login pages with SQL Injection queries with cURL
☆20Updated 2 years ago
Alternatives and similar repositories for SQL-login-bypass
Users that are interested in SQL-login-bypass are comparing it to the libraries listed below
Sorting:
- POC exploit for CVE-2015-10141☆30Updated 5 months ago
- This Python script provides functionality to encode PowerShell commands while preserving the environment variables. It's especially usefu…☆16Updated last year
- Dorkey is Dork generator For Sql Injection It includes Php Aspx And other extension Its Simple Fast And Lightweight Sqli Dork Generator☆15Updated 3 years ago
- LFITester is a Python3 program that automates the detection and exploitation of Local File Inclusion (LFI) vulnerabilities on a server.☆109Updated last year
- This demonstration video shows how we can control the victim's device by sending the innocent-looking PDF file to the target which actual…☆69Updated 4 years ago
- A 1 Liner SQL Injection Attack using SQLMAP and various parameters that helps quickly check for a vulnerabilities during Bug Bounty☆41Updated last year
- Simple Bash Script For Collecting Wordpress Username☆20Updated 4 years ago
- A PHP script demonstrating cookie stealing by capturing and logging request information, including the victim's cookie, IP address, HTTP …☆37Updated 2 years ago
- A Powerfull Windows Ransomware with a Fully Undetectable Persistent Backdoor | System Halt Attack etc☆25Updated 4 years ago
- Automated enumeration for red teamers☆10Updated 3 years ago
- 「🧱」Test a list of payloads and see if you can bypass it☆62Updated 3 years ago
- Generate Undetectable Metasploit Payload in a simple way☆38Updated 2 years ago
- Simple-XSS is a multiplatform cross-site scripting (XSS) vulnerability exploitation tool.☆48Updated 7 months ago
- PassBreaker☆65Updated last year
- Malwarekid python BadUSB payload encoder for generating powershell script in bas64☆22Updated last year
- simple recon tool to help you for searching vulnerability on web server☆75Updated last month
- A tool for generating reverse shell payloads on the fly.☆10Updated 3 years ago
- Drupal Exploiter Tool (Drupal Hunter)☆37Updated 7 years ago
- An efficient tool To Find click jacking vulnerabilities in easiest way with poc☆27Updated 4 years ago
- Mass bruteforce authentication of common services with common credentials.☆53Updated 2 years ago
- WpDisect is a wordpress hacking tool that finds vulnerabilities in wordpress.☆14Updated 3 years ago
- ParamFirstCheck identifies in a list of urls those containing a parameter of the top 25 of the most vulnerable parameters for SQLi, LFI, …☆35Updated 2 years ago
- A bash script that automates the process of service discovery on specified target hosts. The aim of the scripts is reducing scan time, in…☆11Updated 8 months ago
- Seamlessly Detect and Construct Exploit POCs for ClickJacking Vulnerability using this Automated tool☆48Updated last year
- The provided Python program, Nim-Backdoor.py, generates a Nim program that operates as a backdoor, allowing remote command execution via …☆64Updated last year
- it is malicious technique used by hackers to hide malware payloads in an encoded script in a specially crafted HTML attachment or web pag…☆117Updated 2 years ago
- Hackfruit is an easy search tool that finds hacking tools, commands and cheat sheets. It helps cybersecurity learing and trainings, CTFs,…☆23Updated 3 years ago
- regex Hunter- Fast website endpoint sensitive data and Leaks JS files endpoint API Key Scraper☆12Updated last year
- Web Vulnerability Detector (XSS,SQL,LFI,XST,WAF)☆27Updated 5 years ago
- A powerful and sophisticated tool for detecting and exploiting open redirect vulnerabilities using the sed utility and a selected list of…☆47Updated last year