A list of useful payloads and bypass for Web Application Security and Pentest/CTF
☆14Jun 23, 2022Updated 3 years ago
Alternatives and similar repositories for PayloadsAllTheThings
Users that are interested in PayloadsAllTheThings are comparing it to the libraries listed below
Sorting:
- The results of my small term paper on the topic of the Internet of Vulnerable Things and the exploit for CVE-2022-48194.☆19Jan 20, 2023Updated 3 years ago
- The Ukr-Books-ChatGPT-Plugin is a Python-based plugin designed to enhance the capabilities of OpenAI's ChatGPT model by integrating it wi…☆19Jul 21, 2023Updated 2 years ago
- The HPE Alletra 9000 and Primera and 3PAR PowerShell Toolkit supports cmdlets, which are wrappers around the native HPE Alletra 9000 or H…☆12Dec 21, 2022Updated 3 years ago
- Modern open source login forms with clean HTM, CSS, JS and no dependencies☆36Aug 5, 2025Updated 7 months ago
- A privilege escalation vulnerability exists in Windows due to a flaw in the implementation of the Atom Table. An attacker could exploit t…☆29Sep 18, 2024Updated last year
- ☆10Feb 19, 2023Updated 3 years ago
- ☆14Dec 28, 2024Updated last year
- ☆12Feb 4, 2025Updated last year
- ☆13Oct 27, 2025Updated 4 months ago
- Create VCF file from exported Telegram data☆11May 21, 2019Updated 6 years ago
- OWASP Foundation web repository☆16Oct 11, 2025Updated 4 months ago
- A simple network stress test tool.☆14Feb 24, 2024Updated 2 years ago
- 🚀 RocketAPI PHP SDK for Instagram & Threads Private API 2025☆13Apr 22, 2025Updated 10 months ago
- ☆16Nov 6, 2025Updated 4 months ago
- Website for PlayCover☆12Feb 28, 2026Updated last week
- Acunetix - Vulnerability Scanner install + licensed (included docker version)☆12Jul 23, 2025Updated 7 months ago
- How to install macOS Big Sur on an Unsupported Mac : Example: MacBook Pro Late 2011☆10Feb 27, 2021Updated 5 years ago
- PoC List☆10Sep 4, 2022Updated 3 years ago
- Example code for the bpy Building Blocks Python package☆10Jul 31, 2022Updated 3 years ago
- Proof-of-concept implementation for the paper "Homomorphic Encryption for Large Integers from Nested Residue Number Systems", presented a…☆27Jun 4, 2025Updated 9 months ago
- Python 2.7 Library for the BitPay API☆10Oct 31, 2019Updated 6 years ago
- Wireguard Key Generator, web-based, client-side, trustless☆13Feb 3, 2025Updated last year
- ☆16Aug 17, 2013Updated 12 years ago
- Tracks cross references and allows fast viewing of pseudocode between references☆13Mar 10, 2025Updated 11 months ago
- VS Code extension for automatically starting workspace related docker containers☆17Mar 5, 2023Updated 3 years ago
- Run virtual machines in docker using qemu and practice exploitation techniques overcoming containers limitations.☆14Jan 14, 2021Updated 5 years ago
- Cobalt Strike Launcher on macOS☆12Nov 28, 2022Updated 3 years ago
- ☆11May 11, 2023Updated 2 years ago
- Spider or repeater to find all links.☆10Feb 7, 2021Updated 5 years ago
- ☆16Apr 3, 2024Updated last year
- Pandas tutorials and cheatsheet☆13Aug 22, 2016Updated 9 years ago
- A proxy for reverse engineering a communication protocol☆10Jan 17, 2021Updated 5 years ago
- A script for transferring morphs between Daz3D Genesis figures☆12May 23, 2019Updated 6 years ago
- An example multi-tenant logging system built with postgrest.☆11Jan 28, 2016Updated 10 years ago
- A curated list of awesome iOS application security resources.☆11Jan 5, 2024Updated 2 years ago
- PoC of 'LeakySAB' a vulnerability allowing extraction of usenet provider password from a SABnzbd instance☆12Apr 22, 2024Updated last year
- Automated mirror of https://gitlab.com/thelabnyc/django-oscar/django-oscar-bundles☆10Feb 27, 2026Updated last week
- ☆11Feb 27, 2026Updated last week
- Use NAT to reroute an applications UDP traffic for MITM purposes.☆11Sep 30, 2019Updated 6 years ago