carlospolop / PayloadsAllTheThingsLinks
A list of useful payloads and bypass for Web Application Security and Pentest/CTF
☆22Updated 3 years ago
Alternatives and similar repositories for PayloadsAllTheThings
Users that are interested in PayloadsAllTheThings are comparing it to the libraries listed below
Sorting:
- Mobile Pentesting Guide (WIP)☆24Updated 5 years ago
- Hackfruit is an easy search tool that finds hacking tools, commands and cheat sheets. It helps cybersecurity learing and trainings, CTFs,…☆23Updated 2 years ago
- A collection of hacks and one-off scripts☆18Updated 4 years ago
- Rockyou for web fuzzing☆15Updated 3 years ago
- Portable and flexible web application security assessment tool.It parses Burp Suite log and performs various tests depending on the modul…☆36Updated 9 years ago
- Lab Website For Practicing Different Types of SQL Injection Vulnerabilities☆21Updated last year
- A 1 Liner SQL Injection Attack using SQLMAP and various parameters that helps quickly check for a vulnerabilities during Bug Bounty☆40Updated last year
- Seamlessly Detect and Construct Exploit POCs for ClickJacking Vulnerability using this Automated tool☆46Updated last year
- Tool to generate csrf payloads based on vulnerable requests☆64Updated 4 years ago
- Bash Recon Scan - Recon and Scan a network using Bash☆30Updated 3 years ago
- Notes from OSCP, CTF, security adventures, etc...☆62Updated last year
- Super Simple Python Word List Generator for Fuzzing and Brute Forcing in Python☆56Updated 4 years ago
- Headless web crawler for bugbounty and penetration-testing/redteaming☆40Updated last year
- Web Application Vulnerability Exploiter (WAVE) is basically a vulnerability scanner which scans for Secuirity Vulnerabilities in web appl…☆26Updated 3 years ago
- Selenium based bot that automatize the creation of accounts in a web page☆14Updated 2 years ago
- Information-Gathering Shell Script☆30Updated 4 years ago
- ☆20Updated 4 years ago
- Dorks for Google, Shodan and BinaryEdge☆144Updated 5 years ago
- Discover the attack surface and prioritize risks with our continuous Attack Surface Management (ASM) platform - Sn1per Professional #pent…☆97Updated 3 years ago
- Hello my friends, it is my repo about sql injections. Call me in Telegram: @anakein☆44Updated 4 years ago
- steal cookies from website using xss☆13Updated 5 years ago
- Funter (Forms Hunter) is a tool that hunts all forms and inputs found in a list of urls.☆18Updated 2 years ago
- 💀 Generate a bunch of malicious pdf files with phone-home functionality. Can be used with Burp Collaborator or Interact.sh☆34Updated 3 years ago
- Command Execution exploiter with an auto connection handling☆32Updated 3 years ago
- A bash script that automates the process of service discovery on specified target hosts. The aim of the scripts is reducing scan time, in…☆12Updated 4 months ago
- Bash script to generate reverse shell payloads☆20Updated 2 years ago
- Sniffcon has a wide list of powerful online bug bounty tools which can be used to find security vulnerabilities.☆40Updated 2 years ago
- Customized Password/Passphrase List inputting Target Info☆91Updated 10 months ago
- Web application pentesting recon☆23Updated 5 years ago
- XSSRecon - Reflected XSS Scanner☆28Updated 4 years ago