A list of useful payloads and bypasses for Web Application Security. Feel free to improve with your payloads and techniques !
Every section contains the following files, you can use the
_template_vuln folder to create a new chapter:- README.md - vulnerability description and how to exploit it
 - Intruder - a set of files to give to Burp Intruder
 - Images - pictures for the README.md
 - Files - some files referenced in the README.md
 
Methodology and Resources folder :- Methodology and Resources
- Active Directory Attack.md
 - Cloud - AWS Pentest.md
 - Cloud - Azure Pentest.md
 - Cobalt Strike - Cheatsheet.md
 - Linux - Persistence.md
 - Linux - Privilege Escalation.md
 - Metasploit - Cheatsheet.md
 - Methodology and enumeration.md
 - Network Pivoting Techniques.md
 - Network Discovery.md
 - Reverse Shell Cheatsheet.md
 - Subdomains Enumeration.md
 - Windows - Download and Execute.md
 - Windows - Mimikatz.md
 - Windows - Persistence.md
 - Windows - Post Exploitation Koadic.md
 - Windows - Privilege Escalation.md
 - Windows - Using credentials.md
 
 - CVE Exploits
 
via KitPloit

Nenhum comentário:
Postar um comentário