Lists (1)
Sort Name ascending (A-Z)
Stars
Exploitation paths allowing you to (mis)use the Windows Privileges to elevate your rights within the OS.
A list of useful payloads and bypass for Web Application Security and Pentest/CTF
Badges and Gadgets of Defcon - Source to Some of The Coolest badges and gadgets as seen at DEF CON
🎯 SQL Injection Payload List
🎯 Command Injection Payload List
🎯 Cross Site Scripting ( XSS ) Vulnerability Payload List
A tool for generating multiple types of NTLMv2 hash theft files by Jacob Wilkin (Greenwolf)
Responder is a LLMNR, NBT-NS and MDNS poisoner, with built-in HTTP/SMB/MSSQL/FTP/LDAP rogue authentication server supporting NTLMv1/NTLMv2/LMv2, Extended Security NTLMSSP and Basic HTTP authenticat…
RDP monster-in-the-middle (mitm) and library for Python with the ability to watch connections live or after the fact