SleepTheGod / PayloadsAllTheThingsLinks
A list of useful payloads and bypass for Web Application Security and Pentest/CTF
☆14Updated 3 years ago
Alternatives and similar repositories for PayloadsAllTheThings
Users that are interested in PayloadsAllTheThings are comparing it to the libraries listed below
Sorting:
- Windows And Ways To Break It☆100Updated last year
- Capture screenshots of onion services on an onion service.☆49Updated last year
- HTML smuggling is a malicious technique used by hackers to hide malware payloads in an encoded script in a specially crafted HTML attachm…☆135Updated 3 years ago
- Dimorf is a ransomware using 256-bit AES with a self-destructing, randomly generated key for Linux OS´s☆58Updated 2 years ago
- Cover your tracks during Linux Exploitation by leaving zero traces on system logs and filesystem timestamps.☆65Updated last year
- A turbo traffic generator pentesting tool to generate random traffic with random MAC and IP addresses in addition to random sequence numb…☆153Updated 4 months ago
- Chat GPT Things by Taylor Newsome☆12Updated last year
- Hacking the Singularity. Deep learning hacking. Weaponizing AI in Offensive security☆99Updated last year
- Powershell implementation of a novel technique. Invoke-GPTObfuscation is a PowerShell Obfuscator that utilizes OpenAI (and other APIs) to…☆49Updated last year
- This is a shell script that creates an SSH backdoor on an iPhone.☆222Updated 9 months ago
- Here are +200 different rats some with source code☆105Updated last year
- A privilege escalation vulnerability exists in Windows due to a flaw in the implementation of the Atom Table. An attacker could exploit t…☆28Updated 10 months ago
- quick and dirty proof-of-concept to hide shells in images☆50Updated last year
- Fetching passwords from the chrome browser database☆91Updated last year
- TrafficWatch, a packet sniffer tool, allows you to monitor and analyze network traffic from PCAP files☆117Updated last year
- Web Path Finder☆61Updated last year
- ☆128Updated 3 months ago
- Cryptanalysis of the DAO exploit & Multi-Stage Attack☆19Updated last year
- Hacking Methodology, Cheatsheats, Conceptual-Breakdowns☆72Updated last month
- ☆33Updated last year
- ☆110Updated last year
- Social Engineering Browser Update Attack.☆56Updated last year
- Maltego Transforms for generating screenshots from Websites and URLs☆17Updated 2 years ago
- Find Email Spoofing Vulnerablity of domains☆96Updated 11 months ago
- Pandora is an simple undetectable open-source virus composed of agents, servers and masters. Can be used under Windows & Linux.☆62Updated 3 years ago
- This repository contains a few leaked files of HookBot.☆104Updated last year
- 🕵️ OSINT Tool (github tracker)☆140Updated last year
- Virus.xcheck is a Python tool designed to bulk verify the existence of file hashes in the Virus Exchange database and fetch download URLs…☆55Updated 3 months ago
- Remote Access Trojan I wrote, but didn't finish. Although, you could use this as is without many issues.☆38Updated 8 months ago
- Ethical Remote Acces Tool Client and Server for W10 and Linux Persist functionality☆50Updated 2 years ago