swisskyrepo / PayloadsAllTheThingsLinks
A list of useful payloads and bypass for Web Application Security and Pentest/CTF
☆71,768Updated 2 weeks ago
Alternatives and similar repositories for PayloadsAllTheThings
Users that are interested in PayloadsAllTheThings are comparing it to the libraries listed below
Sorting:
- PEASS - Privilege Escalation Awesome Scripts SUITE (with colors)☆18,812Updated this week
- Welcome to the page where you will find each trick/technique/whatever I have learnt in CTFs, real life apps, and reading researches and n…☆10,546Updated last week
- GTFOBins is a curated list of Unix binaries that can be used to bypass local security restrictions in misconfigured systems☆12,326Updated 2 months ago
- 🎯 Cross Site Scripting ( XSS ) Vulnerability Payload List☆7,732Updated last year
- Impacket is a collection of Python classes for working with network protocols.☆15,130Updated last week
- Fast web fuzzer written in Go☆15,141Updated 7 months ago
- This repository contains cutting-edge open-source security tools (OST) for a red teamer and threat hunter.☆9,935Updated 2 months ago
- A swiss army knife for pentesting networks☆8,978Updated last year
- Nishang - Offensive PowerShell for red team, penetration testing and offensive security.☆9,594Updated last year
- AutoRecon is a multi-threaded network reconnaissance tool which performs automated enumeration of services.☆5,797Updated 2 weeks ago
- Web path scanner☆13,679Updated last month
- Complete Mandiant Offensive VM (Commando VM), a fully customizable Windows-based pentesting virtual machine distribution. commandovm@mand…☆7,417Updated last month
- Directory/File, DNS and VHost busting tool written in Go☆12,979Updated last week
- Dictionary of attack patterns and primitives for black-box application fault injection and resource discovery.☆8,730Updated 2 years ago
- Small and highly portable detection tests based on MITRE's ATT&CK.☆11,325Updated this week
- CTF framework and exploit development library☆13,064Updated this week
- List of Awesome Red Teaming Resources☆7,596Updated last year
- Scripted Local Linux Enumeration & Privilege Escalation Checks☆7,701Updated 2 years ago
- A list of interesting payloads, tips and tricks for bug bounty hunters.☆6,308Updated 2 years ago
- A cheat sheet that contains common enumeration and attack methods for Windows Active Directory.☆6,389Updated 8 months ago
- SecLists is the security tester's companion. It's a collection of multiple types of lists used during security assessments, collected in …☆67,200Updated this week
- Living Off The Land Binaries And Scripts - (LOLBins and LOLScripts)☆8,131Updated last month
- The Havoc Framework☆7,966Updated 4 months ago
- Adversary Emulation Framework☆10,270Updated this week
- A list of public penetration test reports published by several consulting firms and academic security groups.☆9,245Updated this week
- PowerSploit - A PowerShell Post-Exploitation Framework☆12,711Updated 5 years ago
- reNgine is an automated reconnaissance framework for web applications with a focus on highly configurable streamlined recon process via E…☆8,297Updated last week
- Attack Surface Management Platform☆9,230Updated 2 months ago
- A Workflow Engine for Offensive Security☆5,970Updated 3 months ago
- Monitor linux processes without root permissions☆5,771Updated 2 years ago