A comprehensive list of useful payloads and bypasses for Web Application Security, including README.md files with vulnerability descriptions and exploitation techniques, Intruder files for Burp Intruder, images, and other referenced files. It also covers various attack techniques for Active Directory, Cloud services like AWS and Azure, Linux, Metasploit, network pivoting, reverse shells, subdomain enumeration, and Windows.
FEATURES
EXPLORE BY TAGS
SIMILAR TOOLS
APT Simulator is a tool for simulating a compromised system on Windows.
GNU/Linux Wireless distribution for security testing with XFCE desktop environment.
A cross-platform post-exploitation HTTP/2 Command & Control server and agent dedicated for containerized environments
Check if a domain is in the Alexa or Cisco top one million domain list.
A collection of precompiled Windows exploits for privilege escalation.
A modern post-exploitation command and control framework with a client-server architecture and extensibility features.
An image with commonly used tools for creating a pentest environment easily and quickly, with detailed instructions for launching in a VPS.
A penetration testing tool for intercepting SSH connections and logging plaintext passwords.
PINNED

Mandos
Fractional CISO service that helps B2B companies implement security leadership to win enterprise deals, achieve compliance, and develop strategic security programs.

Checkmarx SCA
A software composition analysis tool that identifies vulnerabilities, malicious code, and license risks in open source dependencies throughout the software development lifecycle.

Orca Security
A cloud-native application protection platform that provides agentless security monitoring, vulnerability management, and compliance capabilities across multi-cloud environments.

DryRun
A GitHub application that performs automated security code reviews by analyzing contextual security aspects of code changes during pull requests.