unicornsasfuel / sqlite_sqli_cheat_sheetLinks
A cheat sheet for attacking SQLite via SQLi
☆99Updated 9 years ago
Alternatives and similar repositories for sqlite_sqli_cheat_sheet
Users that are interested in sqlite_sqli_cheat_sheet are comparing it to the libraries listed below
Sorting:
- notes and code on past CTFs☆102Updated 4 years ago
- My writeups of various CTFs & security challenges☆73Updated last year
- SHELLING - a comprehensive OS command injection payload generator☆111Updated 6 years ago
- ☆265Updated 6 years ago
- A natural evolution of Burp Suite's Repeater tool☆199Updated last year
- 🏴☠️ Bypass Same Origin Policy with DNS-rebinding to retrieve local server files 🏴☠️☆201Updated 6 years ago
- Proof of concept for CVE-2020-5902☆72Updated 5 years ago
- Solutions and write-ups from security-based competitions also known as Capture The Flag competition☆101Updated 4 years ago
- Sources for challenges of Nullcon's HackIM 2020☆57Updated 2 years ago
- Albatar is a SQLi exploitation framework in Python☆137Updated 6 months ago
- Damn Vulnerable Thick Client App☆150Updated 5 years ago
- All CTF events☆75Updated 4 years ago
- Windows Enumeration and Privilege Escalation Script☆18Updated 5 years ago
- research☆151Updated last year
- ☆148Updated 3 years ago
- The Attack Surface Detector uses static code analyses to identify web app endpoints by parsing routes and identifying parameters☆103Updated last year
- Various Payload wordlists☆237Updated 3 months ago
- Predict Mongo ObjectIds☆144Updated 7 years ago
- ☆67Updated 11 years ago
- A lab for playing with NoSQL Injection☆133Updated 5 years ago
- This will give you shell access on the target system if redis server is not configured properly and faced on the internet without any aut…☆100Updated 5 years ago
- Handbook and survival guide for hacking over the wire, OSCP-style☆43Updated 4 years ago
- A natural evolution of Burp Suite's Repeater tool☆93Updated last year
- Fuzzing Payloads to Assist in Web Application Testing.☆166Updated 6 years ago
- Scripts to execute enumeration via LFI☆89Updated 6 years ago
- Hearbleed exploit to retrieve sensitive information CVE-2014-0160☆83Updated 4 years ago
- Writeups of Capture The Flag Competitions☆122Updated 3 years ago
- Fuzzing for LFI using Burpsuite☆63Updated 8 years ago
- ☆121Updated 8 years ago
- Curated list of public penetration testing reports released by several consulting firms☆48Updated 7 years ago