A list of useful payloads and bypass for Web Application Security and Pentest/CTF
☆48Mar 30, 2021Updated 4 years ago
Alternatives and similar repositories for PayloadsAllTheThings
Users that are interested in PayloadsAllTheThings are comparing it to the libraries listed below
Sorting:
- Scripts useful in cracking the Vulnhub Lab named View2aKill: 1☆26Feb 1, 2020Updated 6 years ago
- This repository contains the PowerShell script for adding and removing the Sticky Key backdoor on Windows☆34May 18, 2020Updated 5 years ago
- Notes only☆19May 2, 2022Updated 3 years ago
- This repository contains the files that provide the upload functionality in the IIS Server☆34Aug 4, 2021Updated 4 years ago
- This cheasheet is aimed at the Red Teamers to help them find diffent tools and methods to create a Commmand and Control Server and exploi…☆83Nov 7, 2020Updated 5 years ago
- ☆140Oct 23, 2022Updated 3 years ago
- ☆346Oct 23, 2022Updated 3 years ago
- ☆210Oct 23, 2022Updated 3 years ago
- ☆348Dec 25, 2022Updated 3 years ago
- ☆248Oct 23, 2022Updated 3 years ago
- ☆22Jun 19, 2025Updated 8 months ago
- ☆439Oct 23, 2022Updated 3 years ago
- This cheatsheet is aimed at the CTF Players and Beginners to help them understand Web Application Vulnerablity with examples.☆472Oct 23, 2022Updated 3 years ago
- This cheatsheet was created to assist Red Teamers and Penetration Testers in hunting down vulnerabilities using "Nmap."☆724Jun 24, 2025Updated 8 months ago
- This cheatsheet is aimed at the OSCP aspirants to help them understand the various methods of Escalating Privilege on Linux based Machine…☆860Oct 23, 2022Updated 3 years ago
- This cheatsheet is built for the Bug Bounty Hunters and penetration testers in order to help them hunt the vulnerabilities from P4 to P1 …☆2,462Nov 16, 2024Updated last year
- This cheasheet is aimed at the CTF Players and Beginners to help them sort the CTF Challenges on the basis of Difficulties.☆820Oct 23, 2022Updated 3 years ago
- Open Redirect Vulnerability Payload List☆10Feb 23, 2021Updated 5 years ago
- My dotfiles and bash configuration☆13Nov 6, 2024Updated last year
- This cheasheet is aimed at the CTF Players and Beginners to help them sort Vulnhub Labs. This list contains all the writeups available on…☆1,201Oct 23, 2022Updated 3 years ago
- This cheasheet is aimed at the CTF Players and Beginners to help them sort Hack The Box Labs on the basis of Operating System and Difficu…☆1,717Mar 24, 2023Updated 2 years ago
- Subdomain Scan (knockpy) in Python3☆13Oct 4, 2020Updated 5 years ago
- Fuzz for hidden proxies, vhosts, and URLs☆15Jun 21, 2021Updated 4 years ago
- ☆22Oct 30, 2022Updated 3 years ago
- 😎 Curated list of awesome programming podcasts, organized alphabetically & topically☆30Oct 28, 2017Updated 8 years ago
- Autorev.sh generates reverse shell codes for reverse shell . Supports linux and windows☆17Apr 8, 2022Updated 3 years ago
- Short script to decode output logs of *sslsplit* raw HTTP packets.☆18Aug 12, 2016Updated 9 years ago
- Instantly search the web for hacked data. Check if you appear in any database leaks.☆15Nov 22, 2018Updated 7 years ago
- The state of the art network attack and monitoring framework.☆17Mar 5, 2018Updated 8 years ago
- ☆72Oct 28, 2020Updated 5 years ago
- Packet sniffer using scapy☆25Mar 21, 2020Updated 5 years ago
- The script specializes in collecting information about sites, protocols and servers, facilitating work on the Metasploit project and repa…☆13Oct 31, 2018Updated 7 years ago
- Subdomain enumeration using Cloudflare's scanning tool.☆47Jul 11, 2025Updated 7 months ago
- This is very basic automated recon script tool.☆18Jul 14, 2024Updated last year
- The Last Web Recon Tool You'll Need☆17Nov 7, 2020Updated 5 years ago
- A python network scanner using scapy☆24Mar 21, 2020Updated 5 years ago
- A swiss army knife for pentesting networks☆24Mar 16, 2023Updated 2 years ago
- ☆20May 7, 2019Updated 6 years ago
- Use this Python Bot that Automates like4like.org to Gain Free Credit.☆16Apr 4, 2023Updated 2 years ago