swisskyrepo / PayloadsAllTheThingsLinks
A list of useful payloads and bypass for Web Application Security and Pentest/CTF
☆70,396Updated this week
Alternatives and similar repositories for PayloadsAllTheThings
Users that are interested in PayloadsAllTheThings are comparing it to the libraries listed below
Sorting:
- PEASS - Privilege Escalation Awesome Scripts SUITE (with colors)☆18,432Updated this week
- Welcome to the page where you will find each trick/technique/whatever I have learnt in CTFs, real life apps, and reading researches and n…☆10,391Updated this week
- GTFOBins is a curated list of Unix binaries that can be used to bypass local security restrictions in misconfigured systems☆12,153Updated 2 weeks ago
- Impacket is a collection of Python classes for working with network protocols.☆14,918Updated this week
- This repository contains cutting-edge open-source security tools (OST) for a red teamer and threat hunter.☆9,827Updated last week
- In-depth attack surface mapping and asset discovery☆13,613Updated last month
- A swiss army knife for pentesting networks☆8,932Updated last year
- 🎯 Cross Site Scripting ( XSS ) Vulnerability Payload List☆7,559Updated last year
- AutoRecon is a multi-threaded network reconnaissance tool which performs automated enumeration of services.☆5,712Updated 4 months ago
- Small and highly portable detection tests based on MITRE's ATT&CK.☆11,054Updated this week
- A cheat sheet that contains common enumeration and attack methods for Windows Active Directory.☆6,307Updated 6 months ago
- Scripted Local Linux Enumeration & Privilege Escalation Checks☆7,616Updated 2 years ago
- Living Off The Land Binaries And Scripts - (LOLBins and LOLScripts)☆7,983Updated this week
- A list of interesting payloads, tips and tricks for bug bounty hunters.☆6,278Updated 2 years ago
- List of Awesome Red Teaming Resources☆7,509Updated last year
- Adversary Emulation Framework☆10,045Updated 2 weeks ago
- reNgine is an automated reconnaissance framework for web applications with a focus on highly configurable streamlined recon process via E…☆8,158Updated 7 months ago
- A list of public penetration test reports published by several consulting firms and academic security groups.☆9,148Updated 2 months ago
- Fast web fuzzer written in Go☆14,844Updated 5 months ago
- Collection of methodology and test case for various web vulnerabilities.☆6,616Updated 3 months ago
- Six Degrees of Domain Admin☆10,343Updated 2 months ago
- A fast, simple, recursive content discovery tool written in Rust.☆7,001Updated this week
- Nishang - Offensive PowerShell for red team, penetration testing and offensive security.☆9,503Updated last year
- Attack Surface Management Platform☆9,112Updated last week
- Dictionary of attack patterns and primitives for black-box application fault injection and resource discovery.☆8,697Updated last year
- PowerSploit - A PowerShell Post-Exploitation Framework☆12,629Updated 5 years ago
- The Havoc Framework☆7,863Updated 2 months ago
- A list of resources for those interested in getting started in bug bounties☆11,534Updated last year
- One place for all the default credentials to assist the Blue/Red teamers identifying devices with default password 🛡️☆6,250Updated 2 months ago
- Keyhacks is a repository which shows quick ways in which API keys leaked by a bug bounty program can be checked to see if they're valid.☆5,769Updated last year