This repository is a comprehensive collection of SQL Injection Payloads designed for educational, research, and testing purposes. It includes a wide variety of payloads for different SQLi techniques.
☆85Mar 31, 2025Updated last year
Alternatives and similar repositories for SQL-Injection-Payloads
Users that are interested in SQL-Injection-Payloads are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- This repository is a comprehensive collection of Cross-Site Scripting (XSS) Payloads designed for educational, research, and testing purp…☆26Mar 31, 2025Updated last year
- DorkTerm is a terminal-themed web-based security tool designed to assist security researchers in performing Google Dork queries efficient…☆15Jan 25, 2026Updated 2 months ago
- HACKING BOT is an automated bug bounty tool that streamlines security testing by running multiple cybersecurity tools in parallel. It all…☆19Mar 6, 2025Updated last year
- Lab Website For Practicing Different Types of SQL Injection Vulnerabilities☆21Oct 27, 2023Updated 2 years ago
- 🌠 API for fetching the icon from any website☆17Nov 15, 2025Updated 5 months ago
- Serverless GPU API endpoints on Runpod - Bonus Credits • AdSkip the infrastructure headaches. Auto-scaling, pay-as-you-go, no-ops approach lets you focus on innovating your application.
- Social Engineering Tactics contains real-world social engineering tactics used for manipulation, persuasion, and deception. Stay aware an…☆46Jan 25, 2026Updated 2 months ago
- Lists various tools used in hardware hacking.☆34Jan 25, 2026Updated 2 months ago
- OneLinerBounty is a collection of quick, actionable bug bounty tips in one-liner format. Perfect for bug hunters looking to boost their s…☆58Jan 25, 2026Updated 2 months ago
- Sql-injection FuzzPayload collection:Sql-injection FuzzPayload 集合☆30Nov 7, 2017Updated 8 years ago
- A small webserver vulnerable to insecure deserialization☆21Nov 30, 2017Updated 8 years ago
- Physical penetration testing is a critical aspect of security assessment that involves simulating real-world attacks to evaluate the effe…☆90Jan 25, 2026Updated 2 months ago
- To run Burpsuite from launcher, You may run it in terminal by script, But by this tool you will able to run it from Launcher with a Burp …☆11Sep 24, 2023Updated 2 years ago
- Complete Malware Index - Use at your own Risk!☆19Sep 2, 2024Updated last year
- The OSINT Framework is a powerful collection of tools and methods designed for open-source intelligence gathering. This framework covers …☆53Jan 25, 2026Updated 2 months ago
- Wordpress hosting with auto-scaling - Free Trial • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- GreenLambert macOS IDA plugin to deobfuscate strings☆14Oct 4, 2021Updated 4 years ago
- Secure and performant OCI-image builder for Kubernetes☆12Updated this week
- Donut generator in rust.☆28Feb 17, 2022Updated 4 years ago
- Penstaller: A Python tool to automate the installation of essential bug bounty and pentesting tools. With one command, it sets up tools f…☆17Mar 14, 2025Updated last year
- Gampung tools for find nuclei template from github☆12Sep 6, 2023Updated 2 years ago
- One Liner OSINT is a collection of powerful one-liner commands for Open-Source Intelligence (OSINT) gathering.☆70Jan 25, 2026Updated 2 months ago
- Wiki to collect Red Team infrastructure hardening resources☆19Jun 18, 2018Updated 7 years ago
- A Python script running on Raspberry Pi 3 to receive commands (SSID & password) from / send executed results to an Android device over bl…☆25Apr 26, 2018Updated 7 years ago
- A React component which can parse JSX and output rendered React Components.☆16May 21, 2019Updated 6 years ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- Modular Buffer Overflow Fuzzer and Exploitation Tool☆10Aug 28, 2019Updated 6 years ago
- Dump WiFi passwords on Windows 10☆23Jan 25, 2018Updated 8 years ago
- Some important things for gate CSE☆32May 17, 2022Updated 3 years ago
- Vstream - Video Analytics pipeline with Hardware based accelerations (dev - stage)☆10Feb 2, 2024Updated 2 years ago
- OpenRedirector is a powerful automation tool for detecting Open Redirect vulnerabilities in web applications☆18Oct 30, 2025Updated 5 months ago
- Precision Knowledge Editing (PKE): A novel method to reduce toxicity in LLMs while preserving performance, with robust evaluations and ha…☆11Nov 26, 2024Updated last year
- A React Native boilerplate app to get you up and running very, very quickly☆11Jun 25, 2021Updated 4 years ago
- An implementation of MSSRM method☆11Mar 23, 2023Updated 3 years ago
- THIS REPOSITORY IS STALE. Collection of resources for penetration testing, ethical hacking, cybersecurity, organized by user context.☆10Jan 20, 2017Updated 9 years ago
- Bare Metal GPUs on DigitalOcean Gradient AI • AdPurpose-built for serious AI teams training foundational models, running large-scale inference, and pushing the boundaries of what's possible.
- Scan MSSQL databases for payment card data without relying on key words☆19Apr 10, 2017Updated 9 years ago
- AI agents running research on single-GPU nanochat training automatically☆41Mar 16, 2026Updated last month
- The SDK assets for the XRTK☆10Sep 16, 2022Updated 3 years ago
- Swagger UI powered by Vite with built-in support for multiple APIs.☆13Jul 30, 2024Updated last year
- Avatar system for Exokit☆10Apr 17, 2022Updated 3 years ago
- A simple macOS debugger detection trick☆19Apr 7, 2025Updated last year
- A proof-of-concept to demonstrate randomized execution paths and their impact on call stack signatures — ideal for EDR testing, behavior-…☆24Jan 17, 2026Updated 2 months ago