Gorgamite ff3b45e0b7
Added LinPEAS to Linux Privesc.
I very strongly recommend adding LinPEAS to the enumeration tools. LinPEAS is arguably the best linux privesc enumeration tool out there. If you haven't used it, I'd try it out. It highlights all relevant information with color coded text, and you can pass it parameters to control the thoroughness of the scan. You should add WinPEAS for windows privesc as well.
2020-10-29 03:50:05 -07:00
2020-08-10 11:36:18 +02:00
2020-02-23 20:58:53 +01:00
2020-10-06 23:17:34 +02:00
2019-12-17 22:12:35 +05:30
2020-10-18 16:17:03 -04:00
2020-10-09 18:17:06 +05:30
2020-08-25 23:14:33 +00:00
2020-09-25 09:43:35 +07:00
2020-04-17 16:34:51 +02:00
2019-03-07 00:07:55 +01:00
2020-08-25 14:38:28 +02:00
2020-05-12 14:27:25 +02:00
2020-10-20 11:34:02 +02:00
2020-10-23 23:15:59 +07:00
2020-09-27 11:16:50 +02:00
2019-12-26 12:09:23 +01:00
2019-01-07 18:15:45 +01:00
2019-05-12 22:43:42 +02:00
2020-09-27 11:16:50 +02:00
2019-05-25 16:27:35 +02:00
2020-08-22 23:45:49 +02:00
2020-10-08 10:01:45 +02:00

Payloads All The Things Tweet

A list of useful payloads and bypasses for Web Application Security. Feel free to improve with your payloads and techniques ! I ❤️ pull requests :)

You can also contribute with a 🍻 IRL, or using the sponsor button.

Every section contains the following files, you can use the _template_vuln folder to create a new chapter:

  • README.md - vulnerability description and how to exploit it, including several payloads
  • Intruder - a set of files to give to Burp Intruder
  • Images - pictures for the README.md
  • Files - some files referenced in the README.md

You might also like the Methodology and Resources folder :

You want more ? Check the Books and Youtube videos selections.

Description
No description provided
Readme MIT 17 MiB
Languages
Python 86.2%
Ruby 6.4%
ASP.NET 3.8%
Classic ASP 1.4%
PHP 1.3%
Other 0.8%