๐ฏ SQL Injection Payload List
-
Updated
Jul 18, 2024
๐ฏ SQL Injection Payload List
๐ฏ Command Injection Payload List
๐ฆ A curated list of the awesome resources about the Vulnerability Research
Subdomain takeover vulnerability checker
Open-source vulnerability disclosure and bug bounty program database
HTTP Request Smuggling over HTTP/2 Cleartext (h2c)
๐ฏ RFI/LFI Payload List
Hacker, ready for more of our story ! ๐
๐ shodansploit > v1.3.0
Metasploit Cheat Sheet ๐ฃ
Fuzz Introspector -- introspect, extend and optimise fuzzers
large hashcat rulesets generated from real-world compromised passwords
PHP Security Check List [ EN ] ๐ โฃ๏ธ
Jaws is an invisible programming language! Inject invisible code into other languages and files! Created for security research -- see blog post
tool designed for identifying vulnerabilities in open source codebases at scale. It can gather and filter on key repository metrics such as popularity and project size
๐ก๐ง Linux kernel syscall implementation tracker
MATE is a suite of tools for interactive program analysis with a focus on hunting for bugs in C and C++ code using Code Property Graphs.
๐๐ง Browsable Linux kernel syscall tables built with Systrack (https://github.com/mebeim/systrack)
A curated list of awesome baseband research resources
A customizable, easy-to-navigate tool for researching, pen testing, and defending with the power of Shodan.
Add a description, image, and links to the security-research topic page so that developers can more easily learn about it.
To associate your repository with the security-research topic, visit your repo's landing page and select "manage topics."