A list of useful payloads and bypass for Web Application Security and Pentest/CTF
☆11May 25, 2019Updated 6 years ago
Alternatives and similar repositories for PayloadsAllTheThings
Users that are interested in PayloadsAllTheThings are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Hackquest solutions.☆10Sep 29, 2015Updated 10 years ago
- Repo for all the Recon and enum techniques, Exploitation, Priv-escalation (Linux and Windows), post exploitation☆16Sep 8, 2025Updated 6 months ago
- An Android based, social media App for your friendly neighborhood☆23Oct 3, 2020Updated 5 years ago
- ☆13Oct 14, 2017Updated 8 years ago
- World's first Bitcoin client ddos software // Experimental program to exhaust inbound TCP connections of a Bitcoin node☆24Jul 24, 2019Updated 6 years ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting with the flexibility to host WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Cloudways by DigitalOcean.
- Threat Hunt Investigation Methodology and Procedure☆15Jul 11, 2022Updated 3 years ago
- Slides of the talk on Injection attacks in apps with NoSQL Backends, given at null OWASP Bangalore monthly meet on 27th April 2019☆23Apr 28, 2019Updated 6 years ago
- C# Admin Control Panel Finder For Windows☆46Sep 23, 2019Updated 6 years ago
- Rollercoin bot☆11Oct 12, 2021Updated 4 years ago
- A repository used as a Go module to help out with Shuffle development, and to ensure we reuse code structures everywhere.☆14Updated this week
- Install and run kali, blackarch, parrot and more... inside the termux udocker container | no root☆14Jul 25, 2025Updated 8 months ago
- Brute force Bitcoin Public keys for puzzles.☆12Dec 24, 2021Updated 4 years ago
- Live-Armor: Building Custom Linux Live Images for Security Sandboxing☆11Mar 25, 2015Updated 11 years ago
- My Submission for the OpenAI/NeurIPS ProcGen Competition☆11Nov 12, 2020Updated 5 years ago
- NordVPN Threat Protection Pro™ • AdTake your cybersecurity to the next level. Block phishing, malware, trackers, and ads. Lightweight app that works with all browsers.
- Some edits☆15Nov 12, 2015Updated 10 years ago
- A powerful GUI application for searching Bitcoin private keys and verifying addresses.☆13May 27, 2025Updated 10 months ago
- Automates some API functions, automates minigames.☆16Jan 2, 2020Updated 6 years ago
- Metasploit-like pentest framework derived from TIDoS (https://github.com/0xInfection/TIDoS-Framework)☆65Dec 16, 2020Updated 5 years ago
- A php based obfuscation tool for obfuscating scripts using various methods ¯\_(ツ)_/¯☆15Jun 19, 2021Updated 4 years ago
- Mac OS X TFTP client/server application☆17Dec 25, 2016Updated 9 years ago
- Automatic Enumeration is a command line utility that automatically tries to collect and retrieve various pieces of information from a tar…☆15Apr 21, 2025Updated 11 months ago
- ☆26Jan 23, 2025Updated last year
- A collection of PHP backdoors. For educational or testing purposes only.☆15Apr 8, 2018Updated 7 years ago
- Managed Database hosting by DigitalOcean • AdPostgreSQL, MySQL, MongoDB, Kafka, Valkey, and OpenSearch available. Automatically scale up storage and focus on building your apps.
- Create Evil Twin network that deauthernticates victims to force them to connect to your evil AP.☆27May 21, 2021Updated 4 years ago
- BigEye6 is a Web Penetration Testing toolkit along with having some extra features and tools. It has more than 22 tools. Which has been d…☆12May 20, 2021Updated 4 years ago
- OS Patch Level changer for Android Boot && Recovery partitions☆12Nov 11, 2020Updated 5 years ago
- Common php webshells. Do not host the file(s) on your server!☆18May 20, 2016Updated 9 years ago
- OWASP Foundation web repository☆60Mar 19, 2026Updated last week
- A mini Multi-Threaded ProxyServer + HTTPserver in python using socket programming☆12Jun 9, 2016Updated 9 years ago
- 🔐💻 ecloop: A high-performance, CPU-optimized tool for computing public keys on the secp256k1 elliptic curve, with features for searchin…☆14Jul 20, 2024Updated last year
- A Helm chart that deploys a web app defined in docker-compose.yml to Kubernetes☆14Mar 28, 2018Updated 8 years ago
- Incident Response Collections☆11Jul 24, 2018Updated 7 years ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click and start building anything your business needs.
- security course list☆14Sep 18, 2015Updated 10 years ago
- Android App - RemoteCodeExecution☆14Aug 20, 2013Updated 12 years ago
- Wireless pentesting tool with functionalities such as password cracking (in WEP and WPA/WPA2 networks), DoS attacks, client de-authentica…☆31Sep 30, 2019Updated 6 years ago
- Quick Folder Menu is a tiny application that opens a menu of the folder you specify as a command line parameter.☆15Apr 4, 2014Updated 11 years ago
- Module PMKIDAttack for WiFi Pineapple☆12Oct 6, 2022Updated 3 years ago
- Mort's dotfiles☆20Updated this week
- check cmd execute☆14Feb 4, 2017Updated 9 years ago