A cheat sheet for attacking SQLite via SQLi
☆102Apr 19, 2016Updated 9 years ago
Alternatives and similar repositories for sqlite_sqli_cheat_sheet
Users that are interested in sqlite_sqli_cheat_sheet are comparing it to the libraries listed below
Sorting:
- An experimental shell that handles file exfiltration, exploit injection and various other obnoxious tasks.☆13Aug 9, 2020Updated 5 years ago
- Proof of concept for an anti-phishing browser plugin, working by comparing pages screenshots with perceptual hashing algorithms.☆10Apr 3, 2022Updated 3 years ago
- Apophis is a Bash script that leverages tools such as DotNetToJScript, ConfuserEx, Net-Obfuscator etc. to generate 'Shellcode runners'.☆20Mar 12, 2023Updated 2 years ago
- ☆21Dec 8, 2022Updated 3 years ago
- Binary exploitation exercises and scripts☆12Mar 15, 2022Updated 3 years ago
- A collection of writeups for active HTB boxes.☆11Nov 15, 2018Updated 7 years ago
- security related events, tools, tutorials, cheatsheets, and more.☆11Oct 20, 2015Updated 10 years ago
- ☆11Sep 3, 2023Updated 2 years ago
- Collection of Nmap scripts☆10Nov 27, 2015Updated 10 years ago
- A bunch of tricks and configs to configure a work environment for web pentesting☆13Oct 1, 2018Updated 7 years ago
- A tool to find the memory address of an environment variable in a binary☆11Jun 23, 2015Updated 10 years ago
- Slides from my AD Privesc talk at WAHCKon 2017☆16May 6, 2017Updated 8 years ago
- A packer utility to create and capture DFIR Image for use AWS & Azure☆15Oct 18, 2019Updated 6 years ago
- A new revolution in the Penetration Testing scene... for kali Linux☆14Feb 14, 2014Updated 12 years ago
- Modifed PowerSploit/PowerView to search files and match RegEx for Sensitive info (PII, PCI, Passwords, Usernames, SNMP Strings, etc.)☆14Aug 1, 2018Updated 7 years ago
- Kibana app for RedELK☆18Mar 19, 2023Updated 2 years ago
- steal Windows Telegram Desktop session☆15Sep 8, 2020Updated 5 years ago
- This repository contains a graphical representation (Mind maps) of specific topics, so one can utilize it as a handbook for that specific…☆17Feb 10, 2022Updated 4 years ago
- It becomes the extension of Burp suite. The cookie set by the BipIP server may include a private IP, which is an extension to detect tha…☆16Dec 8, 2025Updated 3 months ago
- Writeups and solutions for RC3CTF 2016☆14Nov 23, 2016Updated 9 years ago
- Basics of Windows privilege escalation☆134Sep 30, 2017Updated 8 years ago
- Tool for password spraying RDP☆98Oct 12, 2018Updated 7 years ago
- HTML5 WebSocket message fuzzer☆148Nov 23, 2018Updated 7 years ago
- eXtremely fast data eXtraction via blind SQL injection☆14Aug 15, 2012Updated 13 years ago
- Collection of Aggressor scripts for Cobalt Strike 3.0+ pulled from multiple sources☆13Jun 24, 2018Updated 7 years ago
- Easy way to create a MISP event related to a Phishing page☆17May 31, 2023Updated 2 years ago
- notorious BIG IP☆15Aug 8, 2019Updated 6 years ago
- Dumping LSA secrets: a story about task decorrelation☆14Jul 9, 2024Updated last year
- A Linux x86/x86-64 tool to trace registers and memory regions.☆40Jun 9, 2022Updated 3 years ago
- Whisker is a C# tool for taking over Active Directory user and computer accounts by manipulating their msDS-KeyCredentialLink attribute, …☆932Nov 11, 2024Updated last year
- DEPRECATED - A wrapper around gobuster that automatically scans newly discovered directories.☆113Dec 23, 2020Updated 5 years ago
- An Ansible role to install cobalt-strike☆16Aug 24, 2020Updated 5 years ago
- C# project to Reflectively load .Net assemblies in memory☆19Jun 19, 2024Updated last year
- AD-control-paths LDAP submodule☆19Jun 20, 2018Updated 7 years ago
- An SNMPv3 User Enumerator and Attack tool☆261Aug 23, 2020Updated 5 years ago
- A technique for Active Directory domain persistence☆39May 31, 2023Updated 2 years ago
- locate and attack Lync/Skype for Business☆345Oct 1, 2024Updated last year
- The Ultimate Guide to Pwning☆59Apr 4, 2018Updated 7 years ago
- Facebook Bug Bounties☆106Feb 24, 2021Updated 5 years ago