- Joined
- Jan 8, 2019
- Messages
- 56,604
- Solutions
- 2
- Reputation
- 32
- Reaction score
- 100,446
- Points
- 2,313
- Credits
- 32,560
‎6 Years of Service‎
76%

A list of useful payloads and bypasses for Web Application Security. Feel free to improve with your payloads and techniques. I pull requests

Every section contains the following files, you can use the _template_vuln folder to create a new chapter:
   README.md - vulnerability description and how to exploit it
   Intruder - a set of files to give to Burp Intruder
   Images - pictures for the README.md
   Files - some files referenced in the README.md
You might also like the Methodology and Resources folder :
   Methodology and Resources
       Active Directory Attack.md
       Cloud - AWS Pentest.md
       Cloud - Azure Pentest.md
       Cobalt Strike - Cheatsheet.md
       Linux - Persistence.md
       Linux - Privilege Escalation.md
       Metasploit - Cheatsheet.md
       Methodology and enumeration.md
       Network Pivoting Techniques.md
       Network Discovery.md
       Reverse Shell Cheatsheet.md
       Subdomains Enumeration.md
       Windows - Download and Execute.md
       Windows - Mimikatz.md
       Windows - Persistence.md
       Windows - Post Exploitation Koadic.md
       Windows - Privilege Escalation.md
       Windows - Using credentials.md
   CVE Exploits
To see this hidden content, you must like this content.