DevanshRaghav75 / PayloadsOfAllTheThingsView external linksLinks
A collection of payloads for different vulnerabilities, best payload lists in one repository
☆17Jul 28, 2021Updated 4 years ago
Alternatives and similar repositories for PayloadsOfAllTheThings
Users that are interested in PayloadsOfAllTheThings are comparing it to the libraries listed below
Sorting:
- Google dorks for bug bounty hunting☆12Jul 28, 2021Updated 4 years ago
- Learn what is NoSQL injection and how to find them ?☆10Jul 22, 2021Updated 4 years ago
- Learn how to automate XSS, SSRF, LFI, SQLI, NoSQLi☆44Jul 9, 2021Updated 4 years ago
- PHP tool to test XSS☆22Nov 5, 2019Updated 6 years ago
- my own 2fa bypass methodolgy☆27Sep 22, 2023Updated 2 years ago
- BBT - Bug Bounty Tools☆63Jan 12, 2021Updated 5 years ago
- Final assignment for the course Data Visualization with Python, part of IBM Data Science Professional Certification on Coursera☆11Jun 22, 2020Updated 5 years ago
- Command Execution exploiter with an auto connection handling☆32Jun 15, 2022Updated 3 years ago
- This is power full BotNet☆41Aug 11, 2023Updated 2 years ago
- ☆10Jul 16, 2024Updated last year
- Oneliner Bug Bounty Collection collected from GitHub to all bug bounty hunters☆36Dec 12, 2023Updated 2 years ago
- ☆38Mar 8, 2022Updated 3 years ago
- A simple utility to perform reverse WHOIS lookups using whoisxml API☆44Aug 9, 2023Updated 2 years ago
- Hack The Box OSCP-like VMs writeups☆11Oct 11, 2020Updated 5 years ago
- This is a Packet flooder python program, This tool is created by 47hxl-53r, This tool is created only for educational purposes, Creator …☆10May 5, 2022Updated 3 years ago
- ☆10Apr 18, 2019Updated 6 years ago
- ☆14May 14, 2022Updated 3 years ago
- An Exploitation script developed to exploit the CVE-2023-4966 bleed citrix information disclosure vulnerability☆10Oct 29, 2023Updated 2 years ago
- It is a ML based project developed in python language. It detect and recognize the face and mark attendance of that person. It's good poi…☆10Aug 13, 2023Updated 2 years ago
- Exploiting Android devices☆10Sep 12, 2022Updated 3 years ago
- CRLF Bug scanner for WebPentesters and Bugbounty Hunters☆44Jun 9, 2023Updated 2 years ago
- 「💉」XSS Payload List☆44Feb 26, 2023Updated 2 years ago
- Generate Undetectable Metasploit Payload in a simple way☆38Dec 19, 2023Updated 2 years ago
- Uma lista de recursos para quem deseja aprender sobre Physical Pentesting☆12Jul 28, 2025Updated 6 months ago
- I DOC VIEW RCE 的poc☆13Nov 23, 2023Updated 2 years ago
- DDos attack☆10Feb 13, 2023Updated 3 years ago
- Network scanning tool designed to detect and report changes in open ports and services over time☆12Oct 16, 2025Updated 3 months ago
- ☆16Aug 25, 2025Updated 5 months ago
- an awesome list of honeypot resources☆10Jul 14, 2017Updated 8 years ago
- Smart and efficient tool to automate open redirect detection at scale.☆10Mar 21, 2022Updated 3 years ago
- Attack Active Directory Trusts with a single tool☆14Jan 15, 2025Updated last year
- LibreHealth v2.0.0 suffers from an authenticated file upload vulnerability allowing remote attackers to gain remote code execution (RCE) …☆13Jul 19, 2020Updated 5 years ago
- Simple Antivirus☆10Dec 24, 2016Updated 9 years ago
- A small go harness that uses Ollama to orchestrate LLMs in a restricted process flow☆15Sep 10, 2024Updated last year
- A collection of hacks and one-off scripts☆10Jan 18, 2021Updated 5 years ago
- Publishing advisories for CVEs found by POST Cyberforce☆13Jan 7, 2025Updated last year
- A collection of useful, small python3 scripts for penetration testing/ethical hacking which I created over the years.☆10Aug 13, 2022Updated 3 years ago
- Hardhat made easy with a flexible CLI to help run test, deploy and more.☆10Apr 10, 2024Updated last year
- Local File Inclusion (LFI) in FHEM 6.0 allows an attacker to include a file, it can lead to sensitive information disclosure.☆12Jan 20, 2021Updated 5 years ago