针对SpringBoot的开源渗透框架,以及Spring相关高危漏洞利用工具
Intelligent Malware that takes screenshots for entire monitors and exfiltrate them through Trusted Channel Slack to the C2 server that's usi…
Get started with SQL database programming. This beginner's guide provides step-by-step tutorials, practical examples, exercises, and resourc…
This repository is a comprehensive collection of SQL Injection Payloads designed for educational, research, and testing purposes. It include…
The most comprehensive SQL guide from a real-world expert! Learn everything from basics to advanced queries, optimizations, and real-world S…
SQLi-Hunter is a simple HTTP / HTTPS proxy server and a SQLMAP API wrapper that makes digging SQLi easy.
SQL Injection Vulnerability Scanner made with Python
Automatic SQL injection and database takeover tool. Supports detection and exploitation of all major SQL injection types across MySQL, MSSQL…
Automatic SQL injection and database takeover tool
SQLMap with Autonomous AI, phased workflows, RAG memory, and MCP Agent Tools
GitBook 页面: [sqlmap.highlight.ink][host]
SQLMutant is a powerful SQL injection testing tool that includes both passive and active reconnaissance processes for any given domain. It f…
SSHD Based implant supporting tunneling mecanisms to reach the C2 (DNS, ICMP, HTTP Encapsulation, HTTP/Socks Proxies, UDP...)
an exploit of Server-side request forgery (SSRF)
Automatic SSRF fuzzer and exploitation tool
Checks for SSRF using built-in custom Payloads after fetching URLs from Multiple Passive Sources & applying complex patterns aimed at SSRF
A hub for Red Team activity to aid in record keeping, situational awareness and reporting. Stepping Stones provides a web based UI for the t…
👻Stowaway -- Multi-hop Proxy Tool for pentesters
Unsorted, raw, ugly & probably poorly usable tools for reversing, exploit and pentest
Stunner is a tool to test and exploit STUN, TURN and TURN over TCP servers.
one-stop resource for all things offensive security.
武器
A tool designed to exploit a privilege escalation vulnerability in the sudo program on Unix-like systems. It takes advantage of a specific m…
A standalone python script which utilizes python's built-in modules to enumerate SUID binaries, separate default binaries from custom binari…