Payloads All The Things Logo

Payloads All The Things

0
Free
Visit Website

A comprehensive list of useful payloads and bypasses for Web Application Security, including README.md files with vulnerability descriptions and exploitation techniques, Intruder files for Burp Intruder, images, and other referenced files. It also covers various attack techniques for Active Directory, Cloud services like AWS and Azure, Linux, Metasploit, network pivoting, reverse shells, subdomain enumeration, and Windows.

FEATURES

ALTERNATIVES

Very vulnerable ARM/ARM64[AARCH64] application with various levels of vulnerabilities for exploitation training.

An image with commonly used tools for creating a pentest environment easily and quickly, with detailed instructions for launching in a VPS.

Generates shellcode that loads Windows payloads from memory and runs them with parameters.

Python framework for building and utilizing interfaces to transfer data between frameworks with a focus on Command and Control frameworks.

CredMaster enhances password spraying tactics with IP rotation to maintain anonymity and efficiency.

Modern, asynchronous, multiplayer & multiserver C2/post-exploitation framework with Python 3 and .NETs DLR.

Mortar is an evasion technique to defeat and divert detection and prevention of security products, including AV, EDR, and XDR solutions.

A C2 profile generator for Cobalt Strike designed to enhance evasion.

CyberSecTools logoCyberSecTools

Explore the largest curated directory of cybersecurity tools and resources to enhance your security practices. Find the right solution for your domain.

Copyright © 2024 - All rights reserved