command-injection-payload-list
Command injection examples
A collection of examples and tools to test and exploit command injection vulnerabilities in web applications.
🎯 Command Injection Payload List
3k stars
73 watching
648 forks
last commit: 7 months ago
Linked from 1 awesome list
applicationapplication-securitybugbountycommandcommand-injectioninjectionlinuxmacososos-injectionpayloadpayload-listsecuritysecurity-researchsecurity-testingsecurity-vulnerabilityunixvulnerabilityvulnerability-researchwindows
Related projects:
Repository | Description | Stars |
---|---|---|
| Provides a comprehensive list of SQL injection payloads and techniques | 5,067 |
| A collection of scripts and payloads designed to exploit Cross-Site Scripting (XSS) vulnerabilities in web applications. | 6,484 |
| Lists examples and types of XML external entity injection payloads and attacks | 1,110 |
| An OS command injection detection and exploitation tool that provides methodologies and software for identifying and exploiting vulnerabilities in applications. | 106 |
| A comprehensive toolset for identifying and exploiting application vulnerabilities through dynamic testing | 8,288 |
| Automates the detection and exploitation of command injection vulnerabilities in web applications. | 4,647 |
| A collection of C# techniques for injecting malicious shellcode into processes | 450 |
| A tool to embed malicious payloads in various document formats | 553 |
| Loads and executes a malicious payload in a Windows system using PowerShell. | 245 |
| A tool for automatically exploiting vulnerabilities to gain elevated privileges on Linux systems | 6,735 |
| Provides examples and explanations of vulnerabilities in web applications | 545 |
| Generates payloads to exploit unsafe .NET object deserialization. | 3,260 |
| A collection of payloads designed to exploit vulnerabilities in large language models. | 70 |
| A tool that exploits weaknesses in LTE broadcast signals to inject manipulated signals without an FBS. | 90 |
| A PowerShell payload designed to evade detection and execute malicious commands on a target system | 108 |