A list of useful payloads and bypass for Web Application Security and Pentest/CTF
-
Updated
Jun 12, 2024 - Python
A list of useful payloads and bypass for Web Application Security and Pentest/CTF
A collection of hacking / penetration testing resources to make you better!
K8工具合集(内网渗透/提权工具/远程溢出/漏洞利用/扫描工具/密码破解/免杀工具/Exploit/APT/0day/Shellcode/Payload/priviledge/BypassUAC/OverFlow/WebShell/PenTest) Web GetShell Exploit(Struts2/Zimbra/Weblogic/Tomcat/Apache/Jboss/DotNetNuke/zabbix)
An Information Security Reference That Doesn't Suck; https://rmusser.net/git/admin-2/Infosec_Reference for non-MS Git hosted version.
A cheat sheet that contains common enumeration and attack methods for Windows Active Directory.
A collection of links related to Linux kernel security and exploitation
This cheasheet is aimed at the CTF Players and Beginners to help them understand the fundamentals of Privilege Escalation with examples.
一个攻防知识仓库 Red Teaming and Offensive Security
⬆️ ☠️ 🔥 Automatic Linux privesc via exploitation of low-hanging fruit e.g. gtfobins, pwnkit, dirty pipe, +w docker.sock
Linux enumeration tool for pentesting and CTFs with verbosity levels
📦 Make security testing of K8s, Docker, and Containerd easier.
Automation for internal Windows Penetrationtest / AD-Security
Collection of things made during my OSCP journey
A cheat sheet that contains common enumeration and attack methods for Windows Active Directory.
A sugared version of RottenPotatoNG, with a bit of juice, i.e. another Local Privilege Escalation tool, from a Windows Service Accounts to NT AUTHORITY\SYSTEM.
Full-featured C2 framework which silently persists on webserver with a single-line PHP backdoor
Privilege Escalation Enumeration Script for Windows
My proof-of-concept exploits for the Linux kernel
ODAT: Oracle Database Attacking Tool
RedTeam/Pentest notes and experiments tested on several infrastructures related to professional engagements.
Add a description, image, and links to the privilege-escalation topic page so that developers can more easily learn about it.
To associate your repository with the privilege-escalation topic, visit your repo's landing page and select "manage topics."