Payloads All The Things Logo

Payloads All The Things

0
Free
Visit Website

A comprehensive list of useful payloads and bypasses for Web Application Security, including README.md files with vulnerability descriptions and exploitation techniques, Intruder files for Burp Intruder, images, and other referenced files. It also covers various attack techniques for Active Directory, Cloud services like AWS and Azure, Linux, Metasploit, network pivoting, reverse shells, subdomain enumeration, and Windows.

FEATURES

ALTERNATIVES

A credit card/magstripe spoofer that can emulate any magnetic stripe or credit card wirelessly.

A C2 profile generator for Cobalt Strike designed to enhance evasion.

A tool for security researchers and penetration testers to automate the process of finding sensitive information on a target domain.

Tool for attacking Active Directory environments through SQL Server access.

A customized Kali Linux distribution for ICS/SCADA pentesting professionals

A tool for performing hash length extension attacks against multiple hashing algorithms.

A set of commands for exploit developers and reverse-engineers to enhance GDB functionality.

Open-source project for building instrumented environments to simulate attacks and test detections.

PINNED