Exploitation: Difference between revisions
Jump to navigation
Jump to search
Line 18: | Line 18: | ||
=== Cross-site scripting (XSS) === | === Cross-site scripting (XSS) === | ||
* https://github.com/s0md3v/XSStrike | * https://github.com/s0md3v/XSStrike | ||
*https://github.com/mandatoryprogrammer/xsshunter | * https://github.com/mandatoryprogrammer/xsshunter | ||
* https://www.ired.team/offensive-security-experiments/offensive-security-cheetsheets/sql-injection-xss-playground#xss | |||
=== Command Injection === | === Command Injection === |
Revision as of 23:59, 29 July 2023
Payloads
Metasploit
- Install on server: https://docs.metasploit.com/docs/using-metasploit/getting-started/nightly-installers.html
Public exploits
SQL injection (SQLi)
- https://github.com/sqlmapproject/sqlmap
- Tamper agent scripts for sqlmap (WAF bypass): https://forum.bugcrowd.com/t/sqlmap-tamper-scripts-sql-injection-and-waf-bypass/423
- https://github.com/r0oth3x49/ghauri
- SQL Injection & XSS Playground: https://www.ired.team/offensive-security-experiments/offensive-security-cheetsheets/sql-injection-xss-playground#classic-sql-injection
Cross-site scripting (XSS)
- https://github.com/s0md3v/XSStrike
- https://github.com/mandatoryprogrammer/xsshunter
- https://www.ired.team/offensive-security-experiments/offensive-security-cheetsheets/sql-injection-xss-playground#xss