SleepTheGod / PayloadsAllTheThingsLinks
A list of useful payloads and bypass for Web Application Security and Pentest/CTF
☆14Updated 3 years ago
Alternatives and similar repositories for PayloadsAllTheThings
Users that are interested in PayloadsAllTheThings are comparing it to the libraries listed below
Sorting:
- Windows And Ways To Break It☆101Updated 2 years ago
- This is a shell script that creates an SSH backdoor on an iPhone.☆225Updated last year
- Fetching passwords from the chrome browser database☆93Updated 2 years ago
- A turbo traffic generator pentesting tool to generate random traffic with random MAC and IP addresses in addition to random sequence numb…☆160Updated 2 weeks ago
- Cover your tracks during Linux Exploitation by leaving zero traces on system logs and filesystem timestamps.☆65Updated last year
- A custom Google search (to bypass some limitations on google and VPNs)☆112Updated 2 years ago
- ARP Spoofing Defender is a project designed to protect local networks from ARP Spoofing attacks. ARP Spoofing Defender provides mechanism…☆22Updated 3 weeks ago
- ☆138Updated last week
- HTML smuggling is a malicious technique used by hackers to hide malware payloads in an encoded script in a specially crafted HTML attachm…☆143Updated 3 years ago
- Crawls URL to get a better image of what is tied to a website.☆33Updated 2 years ago
- TrafficWatch, a packet sniffer tool, allows you to monitor and analyze network traffic from PCAP files☆127Updated last year
- Social Engineering Browser Update Attack.☆59Updated 2 years ago
- it is malicious technique used by hackers to hide malware payloads in an encoded script in a specially crafted HTML attachment or web pag…☆119Updated 2 years ago
- A PHP script demonstrating cookie stealing by capturing and logging request information, including the victim's cookie, IP address, HTTP …☆37Updated 2 years ago
- DNSleuth sniffs DNS packets, i.e, allowing you to spy on the DNS queries your machine is making☆101Updated 2 years ago
- Dimorf is a ransomware using 256-bit AES with a self-destructing, randomly generated key for Linux OS´s☆59Updated 2 years ago
- There were no proper POCs for CVE-2023-30533 so I made one. (Reported by Vsevolod Kokorin)☆12Updated 2 years ago
- Receive email alerts on successful ssh logins based on a predefined IP whitelist OR a predefined IP country origin whitelist (using gmail…☆23Updated last year
- This repository contains a few leaked files of HookBot.☆106Updated 2 years ago
- Hacking Methodology, Cheatsheats, Conceptual-Breakdowns☆76Updated 2 months ago
- Here are +200 different rats some with source code☆128Updated 2 years ago
- payload Execution by Fake Windows SmartScreen with requires Administrator privileges & Turn off real SmartScreen Filter☆109Updated last year
- Chat GPT Things by Taylor Newsome☆12Updated last year
- Steal/Inject Chrome cookies over the DevTools (--remote-debugging-port) protocol.☆112Updated 2 years ago
- IoT Camera Reconnaissance and Live Viewer☆168Updated last year
- A privilege escalation vulnerability exists in Windows due to a flaw in the implementation of the Atom Table. An attacker could exploit t…☆29Updated last year
- Find Email Spoofing Vulnerablity of domains☆97Updated last year
- Seekolver is a tool focused on attack-surface mapping. It performs searches for subdomains associated with root domains and root domains …☆40Updated 2 years ago
- || Activate Burp Suite Pro with Loader and Key-Generator ||☆42Updated 4 years ago
- A repository preserving darknet market data, including vendor lists, PGP keys, listings, and more for research & intelligence purposes.☆46Updated 5 months ago