A list of useful payloads and bypass for Web Application Security and Pentest/CTF
-
Updated
Oct 26, 2020 - Python
{{ message }}
A list of useful payloads and bypass for Web Application Security and Pentest/CTF
This repository is primarily maintained by Omar Santos and includes thousands of resources related to ethical hacking / penetration testing, digital forensics and incident response (DFIR), vulnerability research, exploit development, reverse engineering, and more.
一款完善的安全评估工具,支持常见 web 安全问题扫描和自定义 poc | 使用之前务必先阅读文档
Automated pentest framework for offensive security experts
A proof-of-concept tool for generating payloads that exploit unsafe Java object deserialization.
Collaborative Penetration Test and Vulnerability Management Platform
Exphub[漏洞利用脚本库] 包括Webloigc、Struts2、Tomcat、Nexus、Solr、Jboss、Drupal的漏洞利用脚本,最新添加CVE-2020-5902、CVE-2020-11444、CVE-2020-10204、CVE-2020-10199、CVE-2020-1938、CVE-2020-2551、CVE-2020-2555、CVE-2020-2883、CVE-2019-17558、CVE-2019-6340
Advanced vulnerability scanning with Nmap NSE
XVWA is a badly coded web application written in PHP/MySQL that helps security enthusiasts to learn application security.
Container Image Linter for Security, Helping build the Best-Practice Docker Image, Easy to start
Automatic SSRF fuzzer and exploitation tool
Reverse Shell as a Service
Tutorials and Things to Do while Hunting Vulnerability.
Penetration tests guide based on OWASP including test cases, resources and examples.
溯光 (TrackRay) 3 beta
Create actionable data from your Vulnerability Scans
Penetration Testing Platform
Vulnerability Labs for security analysis
vulnx
SQL Vulnerability Scanner
Open Vulnerability Assessment Scanner - Scanner for Greenbone Vulnerability Management (GVM)
The Correlated CVE Vulnerability And Threat Intelligence Database API
Popular Pentesting scanner in Python3.6 for SQLi/XSS/LFI/RFI and other Vulns
Steal Net-NTLM Hash using Bad-PDF
ES File Explorer Open Port Vulnerability - CVE-2019-6447
Add a description, image, and links to the vulnerability topic page so that developers can more easily learn about it.
To associate your repository with the vulnerability topic, visit your repo's landing page and select "manage topics."
Currently, Trivy traverses all paths and looks for all Gemfile.lock in a container image. However, the image sometimes has only Gemfile.lock and doesn't install gems listed in the Gemfile.lock. I think a gem should have *.gemspec file if it is installed. e.g.
rake.gemspechas the information aboutrake.To avoid false positives from Gemfile.lock, we are probably able to take advantage of `*