sqlmap-database-penetration-testing
π―Skillfrom zebbern/claude-code-guide
Automates SQL injection vulnerability scanning and database penetration testing using the powerful sqlmap tool for comprehensive security assessments.
Part of
zebbern/claude-code-guide(29 items)
Installation
claude mcp add <name> <cmd> # Add new serverclaude mcp add filesystem -s user -- npx -y @modelcontextprotocol/server-filesystem ~/Documents ~/Desktopclaude mcp add <name> <command> [parameters...]claude mcp add <name> --client-id <id> --client-secret <secret> -- <cmd>claude mcp add shared-tools -s project -- npx -y @your-team/mcp-tools+ 18 more commands
{
"mcpServers": {
"shared-tools": {
"command": "npx",
"args": ...More from this repository10
Automatically scans web applications and databases for potential SQL injection vulnerabilities by generating and testing malicious input payloads against database query interfaces.
Provides a comprehensive reference guide and detailed information about the top 100 most critical web vulnerabilities, enabling developers and security professionals to understand, identify, and mi...
Identifies and tests web application vulnerabilities by systematically scanning input fields for potential cross-site scripting (XSS) and HTML injection attack vectors.
Provides cybersecurity professionals with specialized tools and techniques for simulating adversarial attacks, identifying system vulnerabilities, and assessing network security defenses.
Performs automated testing and detection of potential HTML injection vulnerabilities in web applications by simulating malicious input scenarios.
Generates and manages robust, production-ready shell scripts for Linux server environments, optimizing system administration and deployment workflows.
Tests and identifies potential file path traversal vulnerabilities by systematically probing file system access points with malicious input patterns designed to escape intended directory restrictions.
Performs automated vulnerability scanning, exploits potential security weaknesses, and identifies potential entry points in WordPress websites and installations.
Assists cybersecurity professionals in automating and guiding web application penetration testing workflows using Burp Suite, providing step-by-step vulnerability scanning and exploitation techniques.
Automates AWS infrastructure security testing by scanning cloud environments for misconfigurations, vulnerabilities, and potential entry points for unauthorized access.