SleepTheGod / PayloadsAllTheThingsLinks
A list of useful payloads and bypass for Web Application Security and Pentest/CTF
☆14Updated 3 years ago
Alternatives and similar repositories for PayloadsAllTheThings
Users that are interested in PayloadsAllTheThings are comparing it to the libraries listed below
Sorting:
- Windows And Ways To Break It☆100Updated 2 years ago
- HTML smuggling is a malicious technique used by hackers to hide malware payloads in an encoded script in a specially crafted HTML attachm…☆143Updated 3 years ago
- Receive email alerts on successful ssh logins based on a predefined IP whitelist OR a predefined IP country origin whitelist (using gmail…☆23Updated last year
- This repository contains a few leaked files of HookBot.☆106Updated 2 years ago
- This is a shell script that creates an SSH backdoor on an iPhone.☆224Updated last week
- A privilege escalation vulnerability exists in Windows due to a flaw in the implementation of the Atom Table. An attacker could exploit t…☆30Updated last year
- Chat GPT Things by Taylor Newsome☆12Updated last year
- AES-256 Microsoft Cryptography API Example Use.☆34Updated 2 years ago
- payload Execution by Fake Windows SmartScreen with requires Administrator privileges & Turn off real SmartScreen Filter☆111Updated 2 years ago
- ☆141Updated last month
- Powershell implementation of a novel technique. Invoke-GPTObfuscation is a PowerShell Obfuscator that utilizes OpenAI (and other APIs) to…☆48Updated 2 years ago
- Cover your tracks during Linux Exploitation by leaving zero traces on system logs and filesystem timestamps.☆63Updated last year
- Dimorf is a ransomware using 256-bit AES with a self-destructing, randomly generated key for Linux OS´s☆59Updated 2 years ago
- Exfiltrate sensitive user data from apps on Android 12 and 13 using CVE-2024-0044 vulnerability remotely☆75Updated last year
- || Activate Burp Suite Pro with Loader and Key-Generator ||☆46Updated 4 years ago
- quick and dirty proof-of-concept to hide shells in images☆51Updated last year
- There were no proper POCs for CVE-2023-30533 so I made one. (Reported by Vsevolod Kokorin)☆12Updated 2 years ago
- Cryptanalysis of the DAO exploit & Multi-Stage Attack☆19Updated last year
- Fetching passwords from the chrome browser database☆91Updated 2 years ago
- This simple but powerful script will introduce a new type of malware that will turn off the firewall, start an HTTP server, forward its p…☆59Updated last year
- ARP Spoofing Defender is a project designed to protect local networks from ARP Spoofing attacks. ARP Spoofing Defender provides mechanism…☆23Updated last month
- Here are +200 different rats some with source code☆141Updated 2 years ago
- hiding in plain sight: part 2☆44Updated last year
- ☆32Updated 2 years ago
- Hacking Methodology, Cheatsheats, Conceptual-Breakdowns☆74Updated 3 months ago
- SSH Private Key Looting Wordlists. A collection of wordlists to aid in locating or brute-forcing SSH private key file names.☆46Updated last year
- TrafficWatch, a packet sniffer tool, allows you to monitor and analyze network traffic from PCAP files☆129Updated last year
- Stuxnet extracted binaries by reversing & Stuxnet Rootkit Analysis☆81Updated last year
- Crawls URL to get a better image of what is tied to a website.☆33Updated 2 years ago
- This vulnerability allows an attacker to bypass the credentials brute-force prevention mechanism of the Embedded Web Server (interface) o…☆90Updated last year