SQL Injection Payloads for Burp Suite, OWASP Zed Attack Proxy,...
☆243Dec 23, 2019Updated 6 years ago
Alternatives and similar repositories for SQL-Injection-Payloads
Users that are interested in SQL-Injection-Payloads are comparing it to the libraries listed below
Sorting:
- My metasploit modules☆11Jul 7, 2015Updated 10 years ago
- Collect some PoC that I writted .记录自己写过的PoC ..☆22Dec 20, 2017Updated 8 years ago
- DNS TCP to UDP proxy☆10Jul 19, 2015Updated 10 years ago
- ☆122Mar 27, 2017Updated 8 years ago
- PowerShell script to bypass UAC using DCCW☆19Jul 29, 2017Updated 8 years ago
- Microsoft Office / COM Object DLL Planting☆15May 14, 2016Updated 9 years ago
- A collection of PowerShell Modules for BloodHound/Empire Orchestration☆109Sep 26, 2017Updated 8 years ago
- A lightweight CSRF Toolkit for easy Proof of concept☆172Jun 11, 2014Updated 11 years ago
- Enumerate subdomains through Virustotal☆32Nov 2, 2019Updated 6 years ago
- A collection of useful scripts for penetration testers☆83Oct 23, 2012Updated 13 years ago
- simple rootkit for computer security class☆15Dec 18, 2012Updated 13 years ago
- This is a fuzzer for Windows SEH buffer overflow.☆15Oct 17, 2017Updated 8 years ago
- Windows login backdoor diagnostic tool☆11Apr 2, 2017Updated 8 years ago
- Vulnerable Windows Driver with exploits which were used for demonstration purposes on Hunting and exploiting bugs in kernel drivers prese…☆13Jan 29, 2013Updated 13 years ago
- Burp plugin to do random fuzzing of HTTP requests☆33Jan 31, 2017Updated 9 years ago
- Exploit for Jenkins serialization vulnerability - CVE-2016-0792☆49Aug 2, 2017Updated 8 years ago
- Modules created by Nettitude for Metasploit☆12Jun 20, 2018Updated 7 years ago
- Framework for vulnerability fuzzing and reverse-engineering tool development.☆23Jul 25, 2023Updated 2 years ago
- A small python script to check for Cross-Site Tracing (XST)☆133Jan 23, 2016Updated 10 years ago
- XPath injection tool☆403Jan 11, 2023Updated 3 years ago
- A new technique to bypass microsoft's applocker.☆12May 27, 2015Updated 10 years ago
- Local UNIX PrivEsc Aggregation☆243Apr 9, 2016Updated 9 years ago
- Decrypt AES256GCM-encrypted data in Apple Pay Payment Tokens.☆10Nov 30, 2018Updated 7 years ago
- A tool for detecting XML External Entity (XXE) vulnerabilities in Java applications☆72Sep 4, 2014Updated 11 years ago
- CVE-2017-9791☆27Jul 8, 2017Updated 8 years ago
- JShell - Get a JavaScript shell with XSS.☆532May 5, 2019Updated 6 years ago
- Burp Bounty (Scan Check Builder in BApp Store) is a extension of Burp Suite that allows you, in a quick and simple way, to improve the ac…☆1,774Apr 26, 2024Updated last year
- Inject codes to another process to watch and operate other process. This is usually used as anti-virus software.☆15Sep 19, 2015Updated 10 years ago
- ActionScript Proof of Concept to perform cross-domain reads☆16Aug 26, 2013Updated 12 years ago
- A unique automated LFi Exploiter with Bind/Reverse Shells☆299Jun 25, 2015Updated 10 years ago
- Vulnerability scanner based on vulners.com search API☆883Oct 1, 2025Updated 5 months ago
- An exploit for Apache Struts CVE-2017-9805☆247Nov 7, 2017Updated 8 years ago
- Sentinel is a command line tool able to protect Windows 32 bit programs against exploits targeted by attackers or viruses. It can protect…☆71Mar 12, 2014Updated 11 years ago
- A system call tracer☆10Sep 22, 2014Updated 11 years ago
- Prototype for an in memory fuzzer☆13Aug 1, 2017Updated 8 years ago
- Extract Juniper firewall usernames and hashes and put into a John the Ripper format for cracking☆13Jul 4, 2014Updated 11 years ago
- Apache Tomcat < 9.0.1 (Beta) / < 8.5.23 / < 8.0.47 / < 7.0.8 - JSP Upload Bypass / Remote Code Execution☆395Oct 11, 2017Updated 8 years ago
- ☆12Oct 16, 2017Updated 8 years ago
- Next-gen BurpSuite penetration testing tool☆460Jan 27, 2016Updated 10 years ago