Awesome Open Source
Search
Programming Languages
Languages
All Categories
Categories
About
Search results for cybersecurity sql injection
cybersecurity
x
sql-injection
x
11 search results found
Payloads
⭐
3,289
Git All the Payloads! A collection of web attack payloads.
Black Widow
⭐
168
GUI based offensive penetration testing tool (Open Source)
Egyscan
⭐
157
Egyscan The Best web vulnerability scanner; it's a multifaceted security powerhouse designed to fortify your web applications against malicious threats. Let's delve into the tasks and functions that make Egyscan an indispensable tool in your security arsenal:
Nlp4cybersecurity
⭐
40
NLP model and tech for cyber security tasks
Sql Injection
⭐
38
SQL Injection / SQL инъекциа - Hacking and bypass
Blindpie
⭐
37
Automatically exploit time-based blind SQL injection vulnerabilities.
Hackliner
⭐
37
Hackliner: Cybersec/Bughunting Oneliners
Oste Meta Scan
⭐
35
The OSTE meta scanner is a comprehensive web vulnerability scanner that combines multiple DAST scanners, including Nikto Scanner, OWASP ZAP, Nuclei, SkipFish, and Wapiti.
Wallnet
⭐
19
Open-source code to support BSides 2019's talk: Bye-Bye False Positives: Using AI to Improve Detection
Tamperthemall
⭐
12
A tampered payload generator to Fuzz Web Application Firewalls
Metamaska
⭐
12
μετάμάσκα - malevolent payload classifier
Sqli Detector In Python
⭐
10
python based sqli detector tool
Blanket
⭐
10
A Web application firewall to monitor, analyze and block traffic, built with Python
Hackguard
⭐
10
FAST WEB APPLICATION VULNERABILITY SCANNER written in python3
Vulnerability Testing Solutions
⭐
8
Website for testing and preventing different attacks like XSS, SQL Injection & Spoofing for Nasscom (ISAA) Project.
Oste Vulnerable Web Application
⭐
6
Vulnerable Web application made with PHP/SQL designed to help new web testers gain some experience and test DAST tools for identifying web vulnerabilities. Containing some of the most well-known vulnerabilities such as SQL, cross-site scripting (XSS), OS command injections, our intention to expand more vulnerabilities for learning purposes.
Apache Http Logs
⭐
5
to detect vulnerability scans, XSS and SQLI attacks, examine access log files for detections.
Related Searches
Python Cybersecurity (752)
Security Cybersecurity (402)
1-11 of 11 search results
Privacy
|
About
|
Terms
|
Follow Us On Twitter
Copyright 2018-2024 Awesome Open Source. All rights reserved.