You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
MagicRecon is a powerful shell script to maximize the recon and data collection process of an objective and finding common vulnerabilities, all this saving the results obtained in an organized way in directories and with various formats.
CoupDeWeb is an automated web vulnerability scanner designed for security researchers and developers. It scans for potential vulnerable endpoints, targeting various types of vulnerabilities such as XSS, SQL Injection, and more.
StealthNewSQL : The Ultimate NewSQL Injection Tool - Your All-in-One Solution for NewSQL Database Security! 🛡️ Uncover, exploit, and secure NewSQL database vulnerabilities with this feature-packed command-line tool. Whether you're a penetration tester, security researcher, or developer, StealthNewSQL equips you with the ultimate power! 💥
StealthSQL: The Ultimate SQL Injection Tool - Dive into the shadows of web security with StealthSQL. Harness the power of StealthSQL to silently unveil vulnerabilities in SQL databases. Conduct stealthy SQL injections, expose misconfigurations, and empower your security journey. 🕵️♂️🔐
Ethical hacking 🧑💻 is the legal way of breaking into systems 💻 to check and improve their security 🔐. White-hat hackers 🤍 work with permission ✅ to find and fix problems 🛠️ before bad hackers 🕵️♂️ exploit them. It helps in pen testing 🧪, risk checks ⚠️, and securing networks 🔒.
SQLAliasInjector is a tool designed to add alias keywords to SQL from the MySQL source code level and compile a complete running image of MySQL in Docker. Its primary purpose is to bypass firewall or bastion host SQL injection checks, making the SQL injection "invisible" to firewalls and bastion hosts.
A complete hands-on lab for learning SQL injection exploitation and detection using modern security tools. This repository accompanies a three-part article series that takes you from basic PHP exploitation to enterprise-grade detection with Sigma rules on Kubernetes.