Look for SQL injection attacks in python source code
☆126Mar 5, 2019Updated 7 years ago
Alternatives and similar repositories for py-find-injection
Users that are interested in py-find-injection are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Python SQL injection framework☆132Nov 8, 2021Updated 4 years ago
- Scan for missing timeout calls in python source files☆18Mar 18, 2020Updated 6 years ago
- Automatically exported from code.google.com/p/pweb-suite☆14Jun 8, 2016Updated 9 years ago
- A repo to make our changes more transparent to bug bounty researchers in our program (so they can see commits, etc).☆29Mar 18, 2020Updated 6 years ago
- A tool to generate statistics and help manage bug bounty reports in HackerOne.☆22Mar 18, 2020Updated 6 years ago
- AI Agents on DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- JanusGraph: an open-source, distributed graph database☆14Aug 10, 2017Updated 8 years ago
- Python API wrapper around MegaCli64☆15Mar 9, 2019Updated 7 years ago
- A Static Analysis Tool for Detecting Security Vulnerabilities in Python Web Applications☆2,204Dec 25, 2020Updated 5 years ago
- Signatures for wraith used to detect secrets across various sources☆15Jul 8, 2022Updated 3 years ago
- Vulnerability Scanner☆11Dec 23, 2014Updated 11 years ago
- ☆17Jul 10, 2024Updated last year
- Python library to urlencode a multidimensional dict☆67Apr 13, 2026Updated 3 weeks ago
- Clay is a framework for building RESTful backend services using best practices. It’s a wrapper around Flask.☆451Aug 22, 2023Updated 2 years ago
- Rust bot that works on IRC and Slack for tracking karma (upvotes/downvotes...)☆18Updated this week
- End-to-end encrypted email - Proton Mail • AdSpecial offer: 40% Off Yearly / 80% Off First Month. All Proton services are open source and independently audited for security.
- UberScriptQuery, a SQL-like DSL to make writing Spark jobs super easy☆64Dec 17, 2023Updated 2 years ago
- This is sample code to demonstrate how one can use SQL Injection vulnerability to download local file from server in specific condition. …☆42Mar 14, 2017Updated 9 years ago
- A tool to surface security issues in python code☆227Apr 20, 2017Updated 9 years ago
- Metasploit Framework☆26Feb 10, 2026Updated 2 months ago
- \ PowerAvails Powershell /☆10Jun 30, 2018Updated 7 years ago
- Frida Python Tool☆14Sep 29, 2020Updated 5 years ago
- Pentoo installer rewritten by Wuodan to be more modular☆11Jan 9, 2026Updated 3 months ago
- dragonscan is a information gathering tool coded in python cloning in /root/ folder is recommended☆13Aug 31, 2019Updated 6 years ago
- An ES6 map-like cache with file-based backing☆17Mar 27, 2014Updated 12 years ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- Python 3 module for working with credit card numbers☆17Jun 25, 2015Updated 10 years ago
- Thrift APIs for Cherami - A distributed, scalable, durable, and highly available message queue system. This project is deprecated and no…☆20Dec 3, 2019Updated 6 years ago
- uber-ngen is a tool that will generate a new nodejs project for you.☆43May 20, 2016Updated 9 years ago
- Check your email(s) using popular online services to see if it appears in any data-breach☆30Jan 11, 2026Updated 3 months ago
- DEPRECATED — Containerized Cloud Fuzzing☆26Sep 19, 2018Updated 7 years ago
- Inject shellcode into extra file alignment padding of a PE and change the entry point to point to the shellcode. On execution, the shellc…☆22Oct 29, 2012Updated 13 years ago
- Trie implementation of a CIDR lookup table☆18May 20, 2015Updated 10 years ago
- ☆13Jan 28, 2026Updated 3 months ago
- RuCTF 2016 repository☆16Nov 16, 2019Updated 6 years ago
- End-to-end encrypted cloud storage - Proton Drive • AdSpecial offer: 40% Off Yearly / 80% Off First Month. Protect your most important files, photos, and documents from prying eyes.
- LD_PRELOAD rootkit☆24Oct 12, 2014Updated 11 years ago
- 通过调用zoomeye来获取安装JBoss机器的地址,然后通过HEAD请求植入webshell。 wxPython写了一个界面的控制程序。☆12Mar 28, 2018Updated 8 years ago
- ☆11Oct 23, 2019Updated 6 years ago
- 陈列一堆用python写的黑客脚本工具☆11Apr 19, 2019Updated 7 years ago
- ☆32Aug 6, 2017Updated 8 years ago
- Bypass XSS Reflected Cross-site scripting☆33Oct 15, 2015Updated 10 years ago
- Custom Fortify SCA rules to detect common JSSE certification validation flaws☆11Nov 18, 2015Updated 10 years ago