Home
PayloadsAllTheThings
Cancel

Linux persistence

Linux - Persistence Summary Basic reverse shell Add a root user Suid Binary Crontab - Reverse shell Backdooring a user’s bash_rc Backdooring a startup service Backdooring a user st...

LDAP Injection

LDAP Injection is an attack used to exploit web based applications that construct LDAP statements based on user input. When an application fails to properly sanitize user input, it’s possible to mo...

XPath Injection

XPath Injection is an attack technique used to exploit applications that construct XPath (XML Path Language) queries from user-supplied input to query or navigate XML documents. Summary Ex...

NoSQL Injection

NoSQL databases provide looser consistency restrictions than traditional SQL databases. By requiring fewer relational constraints and consistency checks, NoSQL databases often offer performance ...

Azure

Summary Tools Azure Architecture Azure Storage Account - Access Azure AD vs Active Directory Azure AD - Enumeration Azure AD - Password Spray Azure AD - Convert GUID to SID Azure ...