Mole is an automatic SQL Injection exploitation tool. clone from sourceforge
☆52Feb 26, 2017Updated 9 years ago
Alternatives and similar repositories for themole
Users that are interested in themole are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- ☆14Jan 28, 2021Updated 5 years ago
- LLMNR/NBNS/mDNS Spoofing Detection Toolkit☆60Apr 3, 2022Updated 4 years ago
- Burp extension to find and decode BigIP and Netscaler cookies☆15Jul 20, 2018Updated 7 years ago
- SensePost's network footprinting and enumeration tool. You can't pwn what you don't know about.☆42Nov 24, 2014Updated 11 years ago
- Snort rules to detect local malware, phishing, and adult content by inspecting DNS responses from OpenDNS☆52Sep 16, 2016Updated 9 years ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click and start building anything your business needs.
- CVE-2019-0230 Exploit POC☆15Aug 21, 2020Updated 5 years ago
- PoC for CVE-2016-1000027☆12Mar 5, 2021Updated 5 years ago
- ☆12Apr 14, 2017Updated 8 years ago
- SAPProx is a proof of concept tool for intercepting and modifying SAP GUI (DIAG protocol) traffic.☆13Apr 20, 2017Updated 8 years ago
- Ruby command-line interface to Burp Suite's REST API☆58Apr 1, 2020Updated 6 years ago
- This is my own custom fork of Bhassani's original repo, which contains the (unfinished) reverse-engineered WannaCry Ransomware-related fi…☆10Mar 7, 2023Updated 3 years ago
- Scripted Local Linux Enumeration & Privilege Escalation Checks☆19Mar 26, 2019Updated 7 years ago
- Ruby Oracle Security Scanner☆16Jul 9, 2012Updated 13 years ago
- ISR-sqlget It's a blind SQL injection tool developed in Perl.☆14Apr 26, 2013Updated 12 years ago
- End-to-end encrypted cloud storage - Proton Drive • AdSpecial offer: 40% Off Yearly / 80% Off First Month. Protect your most important files, photos, and documents from prying eyes.
- Open Source trojan for android.☆21Mar 21, 2024Updated 2 years ago
- sniff inputs type☆10Aug 3, 2017Updated 8 years ago
- data-at-rest updatable threshold encryption KMS server and client☆22Mar 15, 2026Updated 3 weeks ago
- android-sms2csv.py extract SMS messages from Android backup files☆13Jun 19, 2020Updated 5 years ago
- This clone of the Evernote WebApp was built in Ruby on Rails. Styling is custom (not bootstrap).☆15Mar 21, 2015Updated 11 years ago
- ☆17Oct 26, 2021Updated 4 years ago
- ☆13Jan 19, 2024Updated 2 years ago
- This module helps you get started with basic Zigbee analysis, and later on performing additional attacks on the Zigbee protocol.☆13Nov 23, 2016Updated 9 years ago
- OPAQUE asymmetric PAKE, and its threshold implementation. Experimental, not audited.☆17Jun 16, 2021Updated 4 years ago
- NordVPN Special Discount Offer • AdSave on top-rated NordVPN 1 or 2-year plans with secure browsing, privacy protection, and support for for all major platforms.
- ☆21Apr 16, 2023Updated 2 years ago
- Advanced Vulnerable Web Application (AVWA)☆14Jun 10, 2017Updated 8 years ago
- simple C# portscanner - written for playing around with Metasploit's Execute-Assembly☆10Jul 1, 2023Updated 2 years ago
- Script for tracking file system changes☆19Jan 23, 2018Updated 8 years ago
- A quick-and-easy bash script installing and launching EvilGinx2, a phishing reverse-proxy☆29Apr 1, 2026Updated last week
- A packer utility to create and capture DFIR Image for use AWS & Azure☆15Oct 18, 2019Updated 6 years ago
- ☆16Jun 15, 2025Updated 9 months ago
- Exploits developped by Outflank B.V. team members☆21Jan 26, 2017Updated 9 years ago
- i made this simple lite version of dsplit.exe to detect antivirus signature matching☆15Nov 6, 2013Updated 12 years ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click and start building anything your business needs.
- Python3 script which decrypts files encrypted by flawed Cl0p ELF variant.☆17Feb 6, 2023Updated 3 years ago
- A proxy server for cookie sidejacking. Works with 'ferret'.☆56May 18, 2016Updated 9 years ago
- Local Transform Wrapper for Maltego☆11May 24, 2016Updated 9 years ago
- Service desk password tools.☆16Apr 21, 2017Updated 8 years ago
- Memcache hacking tool.☆47Apr 20, 2017Updated 8 years ago
- A FRONTEND Interfaces compliant device for the USRP that requires the UHD host code and supporting libraries to be installed☆16Sep 7, 2018Updated 7 years ago
- some AV / EDR / analysis studies☆10May 21, 2023Updated 2 years ago