A list of useful payloads and bypass for Web Application Security and Pentest/CTF
☆50Jul 15, 2019Updated 6 years ago
Alternatives and similar repositories for PayloadsAll
Users that are interested in PayloadsAll are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- "Repeater" style XSS post-exploitation tool for mass browser control. Primarily a PoC to show why HttpOnly flag isn't a complete protecti…☆14Mar 4, 2017Updated 9 years ago
- A passive online scanner from OWTF☆16Feb 16, 2026Updated last month
- My Payload Collection (XSS,SQL ...)☆14Jul 17, 2018Updated 7 years ago
- PwnGIT is a semi-automated, feedback-driven tool to empower users to rapidly search through troves of public data on GitHub for sensitive…☆14Dec 17, 2020Updated 5 years ago
- ☆16Mar 26, 2023Updated 3 years ago
- NordVPN Special Discount Offer • AdSave on top-rated NordVPN 1 or 2-year plans with secure browsing, privacy protection, and support for for all major platforms.
- notes 2016-present☆48Jun 28, 2020Updated 5 years ago
- K8博客 k8gege.org☆42Dec 2, 2025Updated 3 months ago
- Tool to automate corporate network segmentation test☆21Aug 6, 2020Updated 5 years ago
- Magento Security Scanner☆13Jan 10, 2022Updated 4 years ago
- Bug Bounty Clipboard☆17Nov 6, 2019Updated 6 years ago
- Burp Suite Extension useful to inspect UPnP security☆16Nov 9, 2021Updated 4 years ago
- stdin writes to slack☆14Feb 8, 2020Updated 6 years ago
- LFI/RFI scanner by Iman Karim (fimap.dev@gmail.com)☆10Jul 3, 2015Updated 10 years ago
- Program to perform vulnerability analysis and automatically generate a report☆58Mar 2, 2026Updated 3 weeks ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting with the flexibility to host WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Cloudways by DigitalOcean.
- ☆16Oct 24, 2018Updated 7 years ago
- Facebook Write-ups, PoC, and exploitation codes:☆30Jan 20, 2020Updated 6 years ago
- Blind RCE fuzzer☆15Jul 25, 2023Updated 2 years ago
- Firewall bypass script based on shodan search results☆14Jun 5, 2019Updated 6 years ago
- 利用xray高级版批量收集子域名☆18Feb 19, 2020Updated 6 years ago
- Script to quickly install Golang and the most popular PD repos☆53Aug 20, 2024Updated last year
- ☆20Sep 6, 2023Updated 2 years ago
- Boxer: A fast directory bruteforce tool written in Python with concurrency.☆14Feb 26, 2021Updated 5 years ago
- Misc bounty and vulndisc things☆85Jan 4, 2021Updated 5 years ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting with the flexibility to host WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Cloudways by DigitalOcean.
- It's an watcher for new scopes added to bounty-targets-data and send you alert to Slack.☆60Mar 2, 2022Updated 4 years ago
- ☆45Jun 5, 2021Updated 4 years ago
- psychoPATH - hunting file uploads & LFI in the dark. This tool is a customisable payload generator designed for blindly detecting LFI & w…☆19Jun 28, 2018Updated 7 years ago
- MalQR is a collection of malicious QR Codes and Barcodes you can use to test the security of your scanners.☆127Apr 28, 2024Updated last year
- The official BBF university.☆10Oct 12, 2017Updated 8 years ago
- Burp Intruder File Payload Generator☆18Oct 27, 2019Updated 6 years ago
- List of special metadata IPs used in cloud services☆11Aug 9, 2019Updated 6 years ago
- ☆11Jun 19, 2024Updated last year
- ☆20Aug 15, 2020Updated 5 years ago
- DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- This extension provide a Python panel for writing custom proxy script.☆16Aug 26, 2019Updated 6 years ago
- Exploiting misconfigured firebase databases☆124Jun 5, 2019Updated 6 years ago
- This repository services the UNO Cybersecurity capstone (CYBR 4580/8950)☆11Feb 23, 2026Updated last month
- OAuth plugin for Burp Suite Extender☆43Jun 27, 2018Updated 7 years ago
- rlyCTF (relay CTF) challenge to emulate real-world SSRF attacks.☆10Apr 13, 2019Updated 6 years ago
- Hacking tools☆148Feb 11, 2025Updated last year
- Image Tragick Exploit Tool Using Burp Collaborator☆35May 24, 2024Updated last year