Go to file
PixeL 1b190939c4 Remove example from win priv esc
This example was used on hackthebox where it leaked the root flag of a machine on free servers.
This resulted in every user being able to get the root flag before they have even completed the box which isn't fair to others.

This example should either be changed or removed completely to combat copy-pasting without knowing what you're doing.
2020-03-23 17:17:42 -05:00
2020-02-23 20:58:53 +01:00
2020-03-15 01:11:47 +08:00
2019-12-17 22:12:35 +05:30
2020-01-28 17:41:01 +00:00
2019-12-26 12:09:23 +01:00
2020-02-29 12:56:00 +01:00
2019-10-30 11:36:09 +08:00
2019-03-07 00:07:55 +01:00
2020-02-21 23:49:50 +01:00
2019-11-14 18:26:35 +08:00
2019-10-02 20:09:41 -04:00
2020-02-13 22:53:45 +01:00
2019-10-26 16:43:36 +02:00
2019-12-26 12:09:23 +01:00
2019-01-07 18:15:45 +01:00
2019-05-12 22:43:42 +02:00
2019-05-25 16:27:35 +02:00
2020-03-19 12:03:32 +01:00
2019-05-12 22:59:22 +02:00

Payloads All The Things

A list of useful payloads and bypasses for Web Application Security. Feel free to improve with your payloads and techniques ! I ❤️ pull requests :)

You can also contribute with a 🍻 IRL

Every section contains the following files, you can use the _template_vuln folder to create a new chapter:

  • README.md - vulnerability description and how to exploit it
  • Intruder - a set of files to give to Burp Intruder
  • Images - pictures for the README.md
  • Files - some files referenced in the README.md

You might also like the Methodology and Resources folder :

You want more ? Check the Books and Youtube videos selections.

Languages
Python 83.8%
Ruby 6.3%
ASP.NET 3.8%
XSLT 2.6%
Classic ASP 1.4%
Other 1.9%