SleepTheGod / PayloadsAllTheThings
A list of useful payloads and bypass for Web Application Security and Pentest/CTF
☆14Updated 2 years ago
Alternatives and similar repositories for PayloadsAllTheThings:
Users that are interested in PayloadsAllTheThings are comparing it to the libraries listed below
- HTML smuggling is a malicious technique used by hackers to hide malware payloads in an encoded script in a specially crafted HTML attachm…☆128Updated 2 years ago
- Highly configurable script for dictionary/spray attacks against online web applications.☆53Updated 2 years ago
- quick and dirty proof-of-concept to hide shells in images☆49Updated 9 months ago
- Social Engineering Browser Update Attack.☆57Updated last year
- Windows And Ways To Break It☆100Updated last year
- Ethical Remote Acces Tool Client and Server for W10 and Linux Persist functionality☆50Updated 2 years ago
- AES-256 Microsoft Cryptography API Example Use.☆30Updated last year
- Interactive shell to execute commands anonymously using Proxychains and Tor☆39Updated 2 years ago
- A PHP script demonstrating cookie stealing by capturing and logging request information, including the victim's cookie, IP address, HTTP …☆35Updated last year
- 「🧱」Test a list of payloads and see if you can bypass it☆59Updated 2 years ago
- Python script that generates Visual Basic Script (VBS) stagers for executing PowerShell scripts directly from specified URLs. It provides…☆13Updated 11 months ago
- 「💥」CVE-2022-33891 - Apache Spark Command Injection☆26Updated 2 years ago
- A custom Google search (to bypass some limitations on google and VPNs)☆114Updated last year
- it is malicious technique used by hackers to hide malware payloads in an encoded script in a specially crafted HTML attachment or web pag…☆122Updated last year
- Tool for scanning domains for .git directories.☆16Updated last year
- Tips, Tricks, and Scripts for Linux Post Exploitation☆38Updated 2 years ago
- A folder to serve tools from during PT/Red Team engagements. Contains common executables and scripts for privesc, recon, pivoting and CVE…☆14Updated last year
- This is a working variant of the Mirai IOT botnet☆13Updated 2 years ago
- Dimorf is a ransomware using 256-bit AES with a self-destructing, randomly generated key for Linux OS´s☆56Updated last year
- Crawls URL to get a better image of what is tied to a website.☆33Updated last year
- APK Infrastructure Investigator☆63Updated last year
- Reverse backdoor written in PowerShell and obfuscated with Python. It generates payloads for popular hacking devices like Flipper Zero an…☆29Updated last year
- A C2 framework built for my bachelors thesis☆55Updated 5 months ago
- PowerSploit - A PowerShell Post-Exploitation Framework☆23Updated 2 years ago
- CVE-2023-43261 - Credential Leakage Through Unprotected System Logs and Weak Password Encryption☆57Updated last year
- Web Path Finder☆60Updated last year
- A privilege escalation vulnerability exists in Windows due to a flaw in the implementation of the Atom Table. An attacker could exploit t…☆26Updated 7 months ago
- Hades Basic Command & Control Server☆88Updated last year
- Powershell implementation of a novel technique. Invoke-GPTObfuscation is a PowerShell Obfuscator that utilizes OpenAI (and other APIs) to…☆49Updated last year
- 「🚪」Linux Backdoor based on ICMP protocol☆60Updated 4 months ago