GromHacks Labs -- The payload lists they don't want you to have. 1,324 injection probes beamed down from the mothership to detect what's injectable across 20 vuln classes. We don't exploit, we just knock on the door and see who answers. Every payload tested against real parsers because the aliens demand proof. Trust no input. Question everything…
☆30Apr 12, 2026Updated this week
Alternatives and similar repositories for Payload-and-Polyglot-Lists
Users that are interested in Payload-and-Polyglot-Lists are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Automate Conversion of web app/ website made with any javascript framework into an native android app.☆27Mar 29, 2024Updated 2 years ago
- powerfull pentesting tool to checking email by smtp command☆10Feb 29, 2024Updated 2 years ago
- Some courses, mostly Computer Science, at McMaster. For more information, that is not in the README, please contact me.☆23Apr 29, 2023Updated 2 years ago
- ExecEvasion is a lightweight execution-evasion toolkit that generates command variants designed to bypass naive filters and WAF rules by …☆50Jan 31, 2026Updated 2 months ago
- Gampung tools for find nuclei template from github☆12Sep 6, 2023Updated 2 years ago
- Proton VPN Special Offer - Get 70% off • AdSpecial partner offer. Trusted by over 100 million users worldwide. Tested, Approved and Recommended by Experts.
- Repository for tools used for the OSCP☆24Sep 18, 2025Updated 6 months ago
- Writeups for Vulnhub, Tryhackme and Others☆13Jun 25, 2023Updated 2 years ago
- The voting application for moderation elections.☆11May 18, 2017Updated 8 years ago
- A lightweight Python HTTP server with fuzzy filename matching and automatic fallback to directory listing.☆13Aug 28, 2025Updated 7 months ago
- I was searching for such resource to work as cheat sheet series and guide me through different attack scenarios for API attacks, didn’t f…☆15May 5, 2025Updated 11 months ago
- A Security Operations playbook to assist blue teamers from day-to-day tasks to Digital Forensics and Incident Response (DFIR) activities.☆22Mar 30, 2026Updated last week
- Checks for search order privilege escalation vectors in system environment, system shared objects and executable files in $PATH.☆18Aug 6, 2021Updated 4 years ago
- static tor + sshd for reverse shell debugging of CI containers and other natted environments☆17Nov 30, 2022Updated 3 years ago
- Elastic Common Schema (ECS) support for zerolog☆11Updated this week
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting with the flexibility to host WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Cloudways by DigitalOcean.
- rotating proxy server☆11Sep 17, 2024Updated last year
- Every GitHub repo mentioning OSCP — hunted, cloned, read by AI, judged by a human. 399 clean repos.☆78Mar 5, 2026Updated last month
- ☆14Oct 14, 2022Updated 3 years ago
- ☆14Jun 19, 2024Updated last year
- Templates for various types of engineering documents that I find useful☆10Feb 26, 2019Updated 7 years ago
- Wrapper for concurrent batch processing of testssl.sh commands☆13Mar 15, 2019Updated 7 years ago
- WaybackRust is a tool written in Rust to query the WaybackMachine.☆14Jul 18, 2025Updated 8 months ago
- AIGoat - Open-source AI security playground for LLM red teaming. AI Goat provides hands-on labs covering the full OWASP LLM Top 10 with p…☆39Updated this week
- ☆38Aug 6, 2025Updated 8 months ago
- DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- SASS compiler binaries☆12Mar 18, 2018Updated 8 years ago
- ☆16Jun 15, 2025Updated 9 months ago
- Analyzes AdminSDHolder permissions & compares with default baseline or a previous run, to detect potential backdoor/excessive persistent …☆16Apr 8, 2025Updated last year
- This is a phishing ready platform. Unlike other phishing methods, EvilnoVNC allows you to bypass 2FA using a real browser via noVNC conn…☆10Apr 7, 2023Updated 3 years ago
- ☆15Aug 25, 2021Updated 4 years ago
- Disposable/throwaway/temporary email list and API☆11Feb 1, 2026Updated 2 months ago
- Open Source Cheat Sheets for some of McMaster CS's courses☆37Mar 18, 2026Updated 3 weeks ago
- Kerberos CNAME abuse PoC☆104Jan 27, 2026Updated 2 months ago
- A repository with various tutorials on how to do things in Pentesting, setup environments and other things☆21Apr 26, 2025Updated 11 months ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting with the flexibility to host WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Cloudways by DigitalOcean.
- A Beacon Object File (BOF) that talks directly to Windows authentication packages through the LSA untrusted/trusted client interface, wit…☆291Feb 21, 2026Updated last month
- A penetration testing Swiss Army Knife that's suitable for CTF challenges, bug bounty hunting and red team assessments.☆33Mar 26, 2026Updated 2 weeks ago
- Offensive security toolkit for Claude Code☆125Apr 1, 2026Updated last week
- Bloatfree opensource Frigate NVR network-aware android viewer☆29Jan 25, 2026Updated 2 months ago
- KeexyBox - The box to keep the Internet under your control☆16May 4, 2021Updated 4 years ago
- Generate, encode, and decode UUIDs v1 with fast or cryptographic-quality random node identifier.☆18Mar 12, 2020Updated 6 years ago
- An ongoing & curated collection of awesome web vulnerability - Server-side request forgery software practices and remediation, libraries…☆24Feb 22, 2022Updated 4 years ago