A list of useful payloads and bypass for Web Application Security and Pentest/CTF
-
Updated
Nov 6, 2020 - Python
{{ message }}
A list of useful payloads and bypass for Web Application Security and Pentest/CTF
This repository is primarily maintained by Omar Santos and includes thousands of resources related to ethical hacking / penetration testing, digital forensics and incident response (DFIR), vulnerability research, exploit development, reverse engineering, and more.
一款完善的安全评估工具,支持常见 web 安全问题扫描和自定义 poc | 使用之前务必先阅读文档
Automated pentest framework for offensive security experts
A proof-of-concept tool for generating payloads that exploit unsafe Java object deserialization.
Collaborative Penetration Test and Vulnerability Management Platform
Exphub[漏洞利用脚本库] 包括Webloigc、Struts2、Tomcat、Nexus、Solr、Jboss、Drupal的漏洞利用脚本,最新添加CVE-2020-14882、CVE-2020-11444、CVE-2020-10204、CVE-2020-10199、CVE-2020-1938、CVE-2020-2551、CVE-2020-2555、CVE-2020-2883、CVE-2019-17558、CVE-2019-6340
Advanced vulnerability scanning with Nmap NSE
XVWA is a badly coded web application written in PHP/MySQL that helps security enthusiasts to learn application security.
Tutorials and Things to Do while Hunting Vulnerability.
Container Image Linter for Security, Helping build the Best-Practice Docker Image, Easy to start
Automatic SSRF fuzzer and exploitation tool
Reverse Shell as a Service
溯光 (TrackRay) 3 beta
Penetration tests guide based on OWASP including test cases, resources and examples.
Create actionable data from your Vulnerability Scans
Penetration Testing Platform
Vulnerability Labs for security analysis
vulnx
SQL Vulnerability Scanner
Open Vulnerability Assessment Scanner - Scanner for Greenbone Vulnerability Management (GVM)
The Correlated CVE Vulnerability And Threat Intelligence Database API
Popular Pentesting scanner in Python3.6 for SQLi/XSS/LFI/RFI and other Vulns
Steal Net-NTLM Hash using Bad-PDF
ES File Explorer Open Port Vulnerability - CVE-2019-6447
Add a description, image, and links to the vulnerability topic page so that developers can more easily learn about it.
To associate your repository with the vulnerability topic, visit your repo's landing page and select "manage topics."
Description
Unescaped characters in messages including < or > or " breaks XML format output required to convert to JUNIT format for Jenkins report collector.
What did you expect to happen?
Characters in messages and values properly escaped.
What happened instead?
Error encountered in importing XML file by Jenkins XML parser.