unlock-security / sqlmapsh
SQLMap wrapper that lets you use Interact.sh as a DNS server for exfiltrating data with zero configuration
☆36Updated 2 years ago
Alternatives and similar repositories for sqlmapsh:
Users that are interested in sqlmapsh are comparing it to the libraries listed below
- Simple bash Script to automate initial recon using (httpx, puredns, regulator, wayback, katana, aquatone)☆35Updated 2 years ago
- Web cache poisoning vulnerability scanner.☆64Updated 2 years ago
- Help recon of hostnames from specific ASN or CIDR, thanks to Robtex and BGP.HE☆52Updated 3 months ago
- A BurpSuite extension to deploy an OpenVPN config file to DigitalOcean and set up a SOCKS proxy to route traffic through it☆48Updated 11 months ago
- Nmapurls parses Nmap xml reports from either piped input or command line arg and outputs a list of http(s) URL's to be used in an automat…☆39Updated last year
- Burp extension to check and exploit the IIS Tilde Enumeration/IIS 8.3 Short Filename Disclosure vulnerability☆56Updated last year
- Simple Python script to sort nuclei scans by severity and URL☆29Updated last year
- ElasticSearch exploit and Pentesting guide for penetration tester☆24Updated 2 years ago
- ☆52Updated 2 years ago
- This tool automates the process of running FFUF (Fuzz Faster U Fool) and post-processing its results to extract valid URLs. It supports b…☆33Updated 3 months ago
- Striping CDN IPs from a list of IP Addresses☆75Updated 2 years ago
- Perform TE.CL HTTP Request Smuggling attacks by crafting HTTP Request automatically.☆67Updated 2 years ago
- 🚀 Sling Shot R3con: Automate Your Bug Bounty and Pentest Reconnaissance with Project Discovery tools 🎯☆24Updated last year
- A "Spring4Shell" vulnerability scanner.☆50Updated 3 weeks ago
- Repo for hosting rayder workflows☆56Updated last year
- This tool is designed to test for file upload and XXE vulnerabilities by poisoning XLSX files.☆74Updated last year
- Given a list of domains, you resolve them and get the IP addresses.☆48Updated 2 years ago
- DNS resolution tracing tool☆34Updated 3 years ago
- Exploits targeting vBulletin.☆77Updated last year
- Script for Bug Bounty☆28Updated 3 years ago
- WEB-Wordlist-Generator creates related wordlists after scanning your web applications.☆48Updated 8 months ago
- Mine URLs from Browser's Heap Snapshot for fun and profit☆63Updated last year
- Check for CVE-2024-22024 vulnerability in Ivanti Connect Secure☆29Updated last year
- Extract endpoints marked as disallow in robots files to generate wordlists.☆56Updated 2 years ago
- Hunt SSL Certificates for interesting keywords on major cloud service providers / internet☆37Updated 2 months ago
- Enumerate AWS cloud resources based on provided credential☆50Updated 2 years ago
- Proof of Concept for Path Traversal in Apache Struts ("CVE-2023-50164")☆58Updated last year
- My personal collection of nuclei templates made for fuzzing.☆27Updated 5 months ago
- Ffuf output browser☆39Updated last year
- Make better use of the embedded browser that comes by default with Burp☆42Updated last year