payloadbox / command-injection-payload-list
π― Command Injection Payload List
β3,008Updated 4 months ago
Related projects β
Alternatives and complementary repositories for command-injection-payload-list
- Linux enumeration tool for pentesting and CTFs with verbosity levelsβ3,443Updated 10 months ago
- Writeups for HacktheBox 'boot2root' machinesβ1,898Updated last year
- An easy-to-setup version of XSS Hunter. Sets up in five minutes and requires no maintenance!β1,621Updated 8 months ago
- AutoRecon is a multi-threaded network reconnaissance tool which performs automated enumeration of services.β5,167Updated 5 months ago
- A collection of Burpsuite Intruder payloads, BurpBounty payloads, fuzz lists, malicious file uploads and web pentesting methodologies andβ¦β3,684Updated 3 years ago
- Red Teaming & Pentesting checklists for various engagementsβ2,508Updated 2 months ago
- β2,253Updated 3 months ago
- Windows / Linux Local Privilege Escalation Workshopβ1,881Updated 2 years ago
- Monitor linux processes without root permissionsβ4,961Updated last year
- A script that you can run in the background!β2,732Updated 3 months ago
- Scripted Local Linux Enumeration & Privilege Escalation Checksβ7,040Updated last year
- A curated list of amazingly awesome Burp Extensionsβ3,000Updated this week
- A list of interesting payloads, tips and tricks for bug bounty hunters.β5,945Updated last year
- enum4Linux is a Linux alternative to enum.exe for enumerating data from Windows and Samba hostsβ1,183Updated last month
- The ultimate WinRM shell for hacking/pentestingβ4,542Updated 3 weeks ago
- A curated list of awesome OSCP resourcesβ2,694Updated 6 months ago
- This cheasheet is aimed at the CTF Players and Beginners to help them understand the fundamentals of Privilege Escalation with examples.β3,300Updated last year
- π― Cross Site Scripting ( XSS ) Vulnerability Payload Listβ6,379Updated 4 months ago
- Rockyou for web fuzzingβ2,619Updated 2 months ago
- CeWL is a Custom Word List Generatorβ1,999Updated 3 weeks ago
- Take a list of domains and probe for working HTTP and HTTPS serversβ2,883Updated 4 months ago
- "Can I take over XYZ?" β a list of services and how to claim (sub)domains with dangling DNS records.β4,869Updated this week
- Linux privilege escalation auditing toolβ5,660Updated 9 months ago
- Markdown Templates for Offensive Security OSCP, OSWE, OSCE, OSEE, OSWP exam reportβ3,559Updated 2 weeks ago
- A cheat sheet that contains common enumeration and attack methods for Windows Active Directory.β5,678Updated last month
- Hosted Reverse Shell generator with a ton of functionality. -- (Great for CTFs)β3,055Updated 2 weeks ago
- Red Teaming Tactics and Techniquesβ4,065Updated 2 months ago
- Automatic SSRF fuzzer and exploitation toolβ3,000Updated 5 months ago
- Empire is a post-exploitation and adversary emulation framework that is used to aid Red Teams and Penetration Testers.β4,261Updated last week
- π― XML External Entity (XXE) Injection Payload Listβ1,097Updated 4 months ago