zidansec / QuadCore-Web-SQLi-Injecter-DB-Dumper
WEB SQLi Injection DB Dumper DATA Hacking Tool
☆13Updated 5 years ago
Alternatives and similar repositories for QuadCore-Web-SQLi-Injecter-DB-Dumper:
Users that are interested in QuadCore-Web-SQLi-Injecter-DB-Dumper are comparing it to the libraries listed below
- Dogma V1.5.3☆30Updated 5 years ago
- Websites Vulnerability Scanner☆69Updated 4 months ago
- GMS-Sploit GhostManSec - Hacking Tool - 8 method hacking - GhostManS3c-Sploit v1.2-dev☆20Updated last year
- Hackerinfo infromations Web Application Security☆71Updated last year
- Information Gathering Simplified.☆64Updated 2 years ago
- An OSINT focused tool made with Nodejs!☆93Updated 2 years ago
- Herramienta de ingeniería social (Creador de puerta trasera con Reverse Shell para Windows/Android) con Ngrok.☆65Updated last year
- Information Gathering tool for a Website or IP address☆45Updated last year
- AirHunt is a versatile and user-friendly wireless network hacking toolkit designed for security professionals and enthusiasts. With a wid…☆37Updated last year
- Generate Malicious QR or similar☆15Updated last year
- Python-based Google dork generator that creates search patterns for web reconnaissance. Combines custom patterns, site lists, and search …☆29Updated 2 months ago
- An efficient tool To Find click jacking vulnerabilities in easiest way with poc☆20Updated 3 years ago
- Malwarekid python BadUSB payload encoder for generating powershell script in bas64☆23Updated 3 months ago
- License Compatible Python2x Python3x Pure Blood v2 A Penetration Testing Framework created for Hackers / Pentester / Bug Hunter Menu We…☆23Updated 4 years ago
- Wi-Fi tools keep getting more and more accessible to beginners, and the Ehtools Framework is a framework of serious penetration tools th…☆51Updated 4 years ago
- BUG HUNTING/WEB APPLICATION PENTESTING CHECKLIST☆16Updated last year
- Do bug hunting with One-Line script and get bounty☆19Updated last year
- ☆10Updated last year
- This is a simple web application vulnerability scanner that checks if a given URL or IP address is vulnerable to 37 common web applicatio…☆22Updated last year
- Scripts, POCs & bullshit☆25Updated last week
- URLs very strong obfuscation tool (can be used in requests too)☆12Updated 4 months ago
- ☆22Updated 2 years ago
- NekRos is an Open-Source Ransomeware, with advanced Features, Which Looks Like Wannacry and Has C&C Server which can be Used to Retrive K…☆14Updated 4 years ago
- Valhalla finds vulnerable devices on shodan, it can also scan a list of domains to find vulnerabilities.☆43Updated last year
- ☆15Updated 6 years ago
- A 1 Liner SQL Injection Attack using SQLMAP and various parameters that helps quickly check for a vulnerabilities during Bug Bounty☆38Updated 5 months ago
- ☆13Updated last year
- 👽 Metasploit is the most widely used open-source exploitation framework. Learn how to use it and unlock its full potential.☆21Updated last year
- ☆14Updated 2 years ago
- Automated Wireless Attack Framework☆70Updated 5 years ago