Showing 16 open source projects for "sql injector hack"

View related business solutions
  • Our Free Plans just got better! | Auth0 by Okta Icon
    Our Free Plans just got better! | Auth0 by Okta

    With up to 25k MAUs and unlimited Okta connections, our Free Plan lets you focus on what you do best—building great apps.

    You asked, we delivered! Auth0 is excited to expand our Free and Paid plans to include more options so you can focus on building, deploying, and scaling applications without having to worry about your secuirty. Auth0 now, thank yourself later.
    Try free now
  • Bright Data - All in One Platform for Proxies and Web Scraping Icon
    Bright Data - All in One Platform for Proxies and Web Scraping

    Say goodbye to blocks, restrictions, and CAPTCHAs

    Bright Data offers the highest quality proxies with automated session management, IP rotation, and advanced web unlocking technology. Enjoy reliable, fast performance with easy integration, a user-friendly dashboard, and enterprise-grade scaling. Powered by ethically-sourced residential IPs for seamless web scraping.
    Get Started
  • 1
    Phinx

    Phinx

    PHP database migrations for everyone

    Most database migration tools are framework-dependent, complicated, confusing to install/configure and a pain in the ass to write migrations for. In less than 5 minutes you can install Phinx, create and execute your first migration. Phinx supports migrations written in both PHP and SQL. Use the PHP syntax to make your migrations portable between different database vendors or hand-code advanced queries. It's your choice. As Phinx executes from the command-line, it is painless to integrate...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 2
    TensorBase

    TensorBase

    TensorBase is a new big data warehousing with modern efforts

    TensorBase hopes the open source not become a copy game. TensorBase has a clear-cut opposition to fork communities, repeat wheels, or hack traffic for so-called reputations (like Github stars). After thoughts, we decided to temporarily leave the general data warehousing field. For people who want to learn how a database system can be built up, or how to apply modern Rust to the high-performance field, or embed a lightweight data analysis system into your own big one. You can still try, ask...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 3

    Intrusion Detection and Defense System

    Intrusion Detection and Defense System for windows

    Its a light weight Intrusion detection and defense system works with windows firewall to protect any windows operating system from attacks that are intended to hack the server or provide any operational damage. By keeping eye on network activities and event viewer logs, ServerCloak capture and log any failed/denied inbound calls from IPv4 as well as IPv6. Once the calls reaches its limit, the service immediately tells windows firewall to block the attacking IP by adding a denial inbound...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 4
    GHZ Tools v0.6 Build 9645 Release Data (02/09/2014) 7zPass: MHg2NzY4N0E3NDZGNkY2QzczMzAzNj== (base64/hex) Properties: 1)- Brute Forcer: WordPress Joomla 4images osCommerce Drupal, Razor Ftp cPanel Whmcs DirectAdmin Authentication Bypass SSH Authentication vBulletin Kleeja OpenCart WordPress Xmlrpc 2)- Remote Exploits: JCE Webdav 3)- SQL Injector: Auto SQL Injection 4)- Hash Cracker: MD2 MD4 MD5 SHA1 MD5(MD5(PASS)) SHA1(SHA1(PASS)) 5)- URL Fuzzer: URL...
    Downloads: 0 This Week
    Last Update:
    See Project
  • Build Securely on Azure with Proven Frameworks Icon
    Build Securely on Azure with Proven Frameworks

    Lay a foundation for success with Tested Reference Architectures developed by Fortinet’s experts. Learn more in this white paper.

    Moving to the cloud brings new challenges. How can you manage a larger attack surface while ensuring great network performance? Turn to Fortinet’s Tested Reference Architectures, blueprints for designing and securing cloud environments built by cybersecurity experts. Learn more and explore use cases in this white paper.
    Download Now
  • 5
    HiveMind Java Web Application Cloud IDE

    HiveMind Java Web Application Cloud IDE

    Web development IDE in browser, supports Java, ruby, javascript...etc

    HiveMind is a browser based web development that combines an application container (jetty), a middleware and a developer environment that runs in the browser. It runs on the jvm so you are not limited by environment. You can run it on your laptop, company server or even on a cloud service like AWS. It supports Java, Ruby, Python, JavaScript, Groovy, Clojure. Source include so it is easy to hack so you can modify it for your own need.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 6

    AHT (Ashiyane Hack Tools Ver) 1.1

    Perl Hacking Tools (BackTrack)

    This is a perl script for hacking .. It Will make hacking easy for You .. It is For BackTrack This Script Contains This tools : Local File Disclource (LFD) Checker Scanning the whole netmask and returning IP and MAC BackConnect Tools Proxy Checker Reverse IP Add a User With Admin Access (Windows) Add a User With r00t Access (Unix) Grab Cpanel Users Remote Port Scanning With NetCat SQL Injection Scanner MD5 Hash Cracker (Online) Admin Page Finder Make Uploader With Echo...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 7
    safe3 sql injector
    Safe3SI is one of the most powerful and easy usage penetration tool that automates the process of detecting and exploiting SQL injection flaws and taking over of database servers. It comes with a AI detection engine. http://www.safe3.com.cn/en
    Leader badge
    Downloads: 17 This Week
    Last Update:
    See Project
  • 8
    Downloads: 0 This Week
    Last Update:
    See Project
  • 9
    Darkjumper.py Developed by : mywisdom & gunslinger_ This tool will try to find every website that host at the same server at your target Then check for every vulnerability of each website that host at the same server
    Downloads: 2 This Week
    Last Update:
    See Project
  • IBM Blueworks Live is a cloud-based business process modeling tool that helps you discover, map and document your processes. Icon
    IBM Blueworks Live is a cloud-based business process modeling tool that helps you discover, map and document your processes.

    It is easy to use, allowing you to learn and perform business process modeling in minutes.

    With an intuitive, web-based interface, IBM Blueworks Live empowers teams to document, analyze and streamline processes with unprecedented ease and efficiency, with no downloads necessary. It's designed for dynamic collaboration, enabling stakeholders to connect, share insights and drive improvements in real-time, from anywhere.
    Learn More
  • 10
    SQL DB INJECTOR, Oracle, SQL SERVER BY WINDOWS .NET(2.0)
    Downloads: 5 This Week
    Last Update:
    See Project
  • 11
    A graphical application created in C# .Net 1.1 that helps the penetration tester to inject SQL commands on a web page. Its main strength is its capacity to automate tedious blind SQL injection with several threads. Under Clarified Artistic License
    Downloads: 25 This Week
    Last Update:
    See Project
  • 12
    Security tool designed to detect, research and leverage SQL injection exploitation.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 13
    Tools for moving from Blog:CMS to NucleusCMS. All tools are Hacks & may require some PHP skills. Check our documentation for the best answers found todate. If you move to NucleusCMS let us know how it went - we'd love to hear some "war stories".
    Downloads: 0 This Week
    Last Update:
    See Project
  • 14
    E-Hacks is project dedicated to the PHP CMS (E) Xoops. It's purpose is to write modules for (E) Xoops and also hack existing modules for improvment.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 15
    Set of utilities unified in one application to check the security of a machine over networks, and specially TCP/IP. i.e.: DoS, Packet Injector, Adv. Proxy use, ...
    Downloads: 3 This Week
    Last Update:
    See Project
  • 16
    AVirCAP is a system for manual and / or automated detection of CodeRed and Nimda type of hack attempts and virtually all other kinds of "logable" intrusion attempts. It can work stand alone or together with other additional AVirCAP machines in the LAN/W
    Downloads: 0 This Week
    Last Update:
    See Project
  • Previous
  • You're on page 1
  • Next