Advanced SQLMap command builder with an intuitive cheatsheet UI. Works locally in your browser as a single HTML file (no data sent anywhere).
☆32Jul 6, 2025Updated 8 months ago
Alternatives and similar repositories for sqlmap-command-builder
Users that are interested in sqlmap-command-builder are comparing it to the libraries listed below
Sorting:
- ☆10May 25, 2023Updated 2 years ago
- ReconPro is a specialized Google dorking tool designed for cybersecurity professionals and bug bounty hunters.☆45Feb 23, 2026Updated 3 weeks ago
- Remote code execution in Power Platform connectors via JSON deserialization☆23Mar 30, 2023Updated 2 years ago
- Make inso available in your GitHub Actions workflows☆11Jul 16, 2025Updated 8 months ago
- CompChomper is a framework for measuring how LLMs perform at code completion.☆21Apr 29, 2025Updated 10 months ago
- Performs review of Entra ID users and their assigned roles based on least privilege principle and actual Entra ID operations performed wi…☆30Feb 23, 2026Updated 3 weeks ago
- A cookiecutter template for creating a new LLM plugin that adds tools to LLM☆29May 27, 2025Updated 9 months ago
- micro-gpt in ASM on the Super Nintendo☆49Feb 12, 2026Updated last month
- Demo of using WASM to sandbox Plotly execution☆19Mar 30, 2025Updated 11 months ago
- A Burp Suite extension for identifying missing Subresource Integrity attributes.☆13Jun 12, 2019Updated 6 years ago
- ☆17Apr 9, 2024Updated last year
- OWASP Foundation Web Respository☆12Jan 28, 2026Updated last month
- A monitoring hub that watches popular open-source repositories and uses AI to detect when commits are patching security vulnerabilities -…☆82Updated this week
- Make DSPy Agentic using protocol-first approach that support the Agent Protocols like MCP, A2A☆73May 27, 2025Updated 9 months ago
- HTTP testing platform for security researchers☆21Updated this week
- AWS Lambda shell commands in $PATH available to runtime subprocesses☆12Sep 1, 2021Updated 4 years ago
- A BurpSuite plugin to detect Same Origin Method Execution vulnerabilities☆16Feb 13, 2017Updated 9 years ago
- Configure and manage mikrotik devices remotelly via api.☆13Mar 30, 2016Updated 9 years ago
- The disclosure website for httpoxy☆10Jan 20, 2023Updated 3 years ago
- Micro-agent framework for Caido☆29Sep 4, 2025Updated 6 months ago
- ☆12Apr 20, 2017Updated 8 years ago
- A Burp extension to help pentesters copy requests / responses for reports.☆51Jul 8, 2025Updated 8 months ago
- ☆22Dec 16, 2024Updated last year
- ☆21Oct 9, 2017Updated 8 years ago
- Feed it a number. Your cloned voice does the social engineering, while you sip your coffee. A ghost that talks on the phone for you.☆111May 30, 2025Updated 9 months ago
- ☆12Aug 29, 2021Updated 4 years ago
- Writeup for the challenges in H@cktivityCon CTF 2020☆17Aug 6, 2020Updated 5 years ago
- A utility to inspect, validate, sign and verify machine learning model files.☆67Feb 5, 2025Updated last year
- GarudRecon automates domain recon with top open-source tools to discover assets, enumerate subdomains, and detect XSS, SQLi, LFI, RCE & m…☆198Jan 24, 2026Updated last month
- Privacyscanner is the new scanning backend component of a future PrivacyScore version☆18Dec 20, 2021Updated 4 years ago
- ☆11Mar 27, 2024Updated last year
- General research for Dreadnode☆27Jun 17, 2024Updated last year
- Seamless AI Integration into Caido☆44Mar 12, 2026Updated last week
- Analysis scripts for Binary Ninja to work with Android NDK libraries.☆37Mar 27, 2022Updated 3 years ago
- A Completely Modular LLM Reverse Engineering, Red Teaming, and Vulnerability Research Framework.☆54Nov 9, 2024Updated last year
- Deptective automatically determines the native dependencies required to run any arbitrary program or command.☆129Feb 27, 2026Updated 3 weeks ago
- 🔗 A curated list of awesome Caido related projects☆46Mar 25, 2025Updated 11 months ago
- Instagram-like Ionic app☆10Apr 11, 2017Updated 8 years ago
- A black-box scanner for HTTP request smuggling vulnerabilities caused by chunk parsing discrepancies.☆32Oct 29, 2025Updated 4 months ago