pentest

Fail

Audited by Socket on Feb 20, 2026

62 alerts found:

Obfuscated Filex12Securityx29Malwarex15Anomalyx6
Obfuscated FileHIGH
attacks/client-side/csrf/csrf-portswigger-labs-complete.md

This fragment is an instructional exploit walkthrough (PortsWigger-style lab) that demonstrates realistic, high-impact attack chains: reflected XSS on a sibling subdomain can be used to open authenticated WebSocket connections and exfiltrate sensitive data, and method-override handling combined with SameSite=Lax can enable CSRF of state-changing actions. The content is malicious in capability (credential theft and unauthorized state modification) but is presented as an educational lab; it is not obfuscated malware embedded inside a package. Recommended remediations (output-encoding, CSRF tokens, stricter SameSite and cookie scoping, origin checks, restrict method-override, WebSocket CSRF tokens) should be implemented to block these attack chains.

Confidence: 98%
SecurityMEDIUM
attacks/injection/ssti/ssti-portswigger-labs-complete.md

This document is an explicit offensive guide that contains working SSTI exploit payloads and step-by-step instructions to achieve remote code execution, file reads/deletion, and secret exfiltration across several template engines. It is high-risk: anyone with access to a vulnerable template rendering endpoint could weaponize these payloads to compromise servers, delete files, or leak secrets. Treat any code or package that enables user-controlled templates, or includes identical examples, as dangerous unless strict sandboxing, whitelisting and context separation are proven. Remediate by removing user-editable templates, using logic-less engines or robust whitelists, disabling dangerous builtins, and ensuring debug output is never enabled in production.

Confidence: 90%Severity: 90%
MalwareHIGH
attacks/web-applications/business-logic/business-logic-quickstart.md

This document is an explicit offensive playbook providing practical, actionable instructions to discover and exploit business-logic vulnerabilities in web applications. It includes concrete request/parameter examples, numeric calculations (overflow/negative quantity), automation guidance (Burp macros/Intruder), and even starter credentials/URL. While not obfuscated or a malware binary, it materially enables fraudulent activity and large-scale abuse if used against real targets without authorization. Treat it as high operational risk; it should only be used in authorized test environments, and defenders should prioritize server-side validation of prices/quantities, strong state-machine checks, coupon/gift-card issuance controls, CSRF/session protections, and strict email/domain verification workflows.

Confidence: 75%Severity: 90%
SecurityMEDIUM
attacks/network/wireless/wireless-attacks.md

This is an explicit offensive reference describing wireless attack techniques and providing concrete commands to capture handshakes, perform deauthentication, set up rogue APs/captive portals, crack keys, jam radios, and attack Bluetooth/RFID systems. The file itself contains no executable code or obfuscation, no hardcoded credentials, and no remote exfiltration endpoints, so it is not malware per se. However it is high‑actionability and can readily be misused to perform illegal or harmful actions. Treat as sensitive/dual‑use content: safe for controlled defensive testing with authorization, dangerous otherwise.

Confidence: 90%Severity: 70%
SecurityMEDIUM
attacks/system/privilege-escalation/system-exploitation.md

This document is a detailed offensive-security reference containing explicit, actionable commands and example exploits for privilege escalation, RCE, credential theft, container escape, DLL hijacking, and kernel exploits. It is dual-use: valuable for defenders and testers but also directly useful to attackers. The file itself does not execute or contain obfuscated/malicious runtime code, but it provides high-risk, actionable guidance that can lead to system compromise if followed. Treat contents as sensitive and potentially dangerous; do not execute examples on production systems without authorization.

Confidence: 90%Severity: 85%
AnomalyLOW
attacks/web-applications/cache-poisoning/web-cache-poisoning-portswigger-labs-complete.md

The material is high-risk, attack-oriented educational content that documents realistic cache poisoning techniques, including unkeyed inputs, reflection points, cache-busting, parameter cloaking, and multi-layer cache manipulation. It is dual-use: valuable for defense and training, but potentially harmful if misapplied in production environments. Recommend strict access control, comprehensive defense guidance, and deployment of robust cache-key hygiene, input validation, output encoding, CSP, and monitoring. Treat as dual-use content requiring authorized, limited testing environments.

Confidence: 68%Severity: 60%
SecurityMEDIUM
attacks/authentication/oauth/oauth-quickstart.md

This is an offensive, step-by-step lab/playbook describing multiple OAuth/OpenID Connect exploitation techniques (missing state/CSRF, redirect_uri validation bypass, implicit flow token theft, directory traversal and open-redirect chaining, postMessage/fragment exfiltration, and SSRF to cloud metadata). It contains explicit exploit snippets and operational guidance to steal authorization codes, access_tokens, and cloud credentials. The document itself is not an executable malware artifact, but it materially increases attack risk if applied against real systems without authorization. Treat it as high-risk dual-use instructional material and do not deploy these techniques against production systems without explicit permission.

Confidence: 75%Severity: 75%
Obfuscated FileHIGH
attacks/web-applications/business-logic/business-logic-cheat-sheet.md

This file is a high-risk, actionable exploitation toolkit for business-logic vulnerabilities. It contains practical payloads, exact Burp workflows, automation scripts, and a Burp extension that together enable discovery and automated exploitation of issues like price/quantity manipulation, coupon stacking, gift-card redemption loops, integer overflow and race conditions. While framed for authorized testing, the precision and automation present a strong potential for misuse (fraud, unauthorized funds crediting, workflow bypass). Do not include this material in public production dependencies without strict access controls, clear legal/ethical guardrails, and review. If found in a package, treat it as dangerous content requiring immediate review and potential removal or restricted distribution.

Confidence: 98%
MalwareHIGH
attacks/api-security/web-llm/web-llm-attacks-cheat-sheet.md

This document is an explicit offensive cheat-sheet for attacking LLMs and web applications. It contains actionable, high-risk payloads (reverse shells, file deletion, SQL drop/delete, DNS/HTTP exfiltration, XSS keyloggers) and detailed bypass techniques that make exploitation more likely against vulnerable systems. It is high risk to host or distribute in production contexts where copy/paste misuse is possible. Treat as dangerous offensive guidance: allowable for authorized security testing and training only; should not be included in production dependencies or executed without strict authorization and controls.

Confidence: 95%Severity: 95%
SecurityMEDIUM
attacks/injection/xxe/xxe-portswigger-labs-complete.md

This is a comprehensive instructional guide describing many XXE exploitation techniques (file retrieval, SSRF, blind OOB exfiltration, error-based and local-DTD attacks, XInclude, SVG attacks, and DoS). The document is not itself executable malware, but it contains many explicit, ready-to-use payloads and operational steps that materially increase risk if used against vulnerable XML parsers or if included in a project without appropriate mitigation. Treat the content as high-risk guidance to be handled responsibly: defenders should implement the recommended mitigations (disable DTD/external entities, harden parsers, restrict egress, sanitize uploads), and reviewers should consider removing such detailed offensive payloads from public package artifacts where they are unnecessary.

Confidence: 90%Severity: 80%
AnomalyLOW
attacks/client-side/dom-based/dom-xss-quickstart.md

This file is an explicit offensive-security cheat-sheet for discovering and exploiting DOM XSS, prototype pollution, DOM clobbering, and related client-side vulnerabilities. It contains numerous actionable payloads and step-by-step exploitation instructions. It is not obfuscated nor does it itself contain executable malware or network-exfiltration code, but it significantly lowers the effort required for an attacker to find and exploit vulnerable applications. Treat as dual-use offensive documentation: useful for security testing in authorized contexts, and potentially harmful if used to attack live targets. Do not bundle in production code; use in controlled test environments only.

Confidence: 90%Severity: 60%
SecurityMEDIUM
attacks/client-side/csrf/csrf-quickstart.md

This file is an instructional exploit guide for CSRF vulnerabilities containing multiple actionable exploit templates (auto-submitting forms, CRLF cookie injection, Referer/method bypasses, WebSocket exfiltration). It does not include obfuscated binaries or system-level backdoors, but it provides clear, ready-to-run payloads that can cause unauthorized actions when loaded by victim browsers. Use of this material poses a high risk for misuse: treat as potentially dangerous content for attacking live sites. For packaging: do not ship executable examples that could be run by end users without clear warnings and safe lab contexts.

Confidence: 85%Severity: 80%
Obfuscated FileHIGH
attacks/injection/xxe/xxe-cheat-sheet.md

This document is a high-quality, offensive-oriented XXE cheat sheet with strong dual-use characteristics: it provides explicit, actionable exploit payloads (file reads, SSRF to cloud metadata, OOB exfiltration, XSLT file writes, and DoS) alongside accurate defensive mitigations. While it contains useful hardening steps that defenders can apply, the presence of ready-to-run payloads, cloud metadata harvesting instructions, and web-shell-writing examples makes it dangerous if redistributed without controls. The file itself is not executable malware, but it materially lowers the effort required for attackers to exploit vulnerable XML parsers. Recommend treating this content as sensitive security testing material: restrict distribution, remove or sanitize concrete sensitive URIs/paths from public packages, and ensure projects using XML parsing enable recommended mitigations (disable DTDs, disallow external entities, set XmlResolver=null or equivalent, use defused/safe parsers).

Confidence: 98%
Obfuscated FileHIGH
attacks/client-side/cors/cors-portswigger-labs-complete.md

This file is a high-risk, high-actionability educational guide demonstrating multiple CORS exploitation techniques with ready-to-use PoCs for exfiltration, internal scanning, XSS coupling, and CSRF-driven destructive actions. While clearly authored for training and authorized testing, the included payloads and step-by-step methods can be directly abused against real systems. Treat the content as sensitive offensive guidance: restrict its use to authorized lab/pentest contexts, review and harden CORS policies (validate full origin including protocol, never whitelist 'null', avoid reflecting arbitrary origins, disallow credentials for wildcard origins), fix XSS/CSRF issues, and enforce internal service access controls and network segmentation.

Confidence: 98%
MalwareHIGH
attacks/injection/command-injection/os-command-injection-quickstart.md

This document is an explicit offensive guide for discovering and exploiting OS command injection vulnerabilities. It contains ready-to-use payloads for command execution, data exfiltration (local file writes and out-of-band DNS/HTTP), and reverse shells. The content is actionable and poses a high risk if used against real systems without authorization. It is not obfuscated and not a software package, but it facilitates serious misuse (data theft and remote compromise). Treat as high-risk malicious guidance; do not deploy or use against systems unless in an authorized testing environment.

Confidence: 95%Severity: 95%
MalwareHIGH
attacks/client-side/xss/xss-exploitation-techniques.md

This document is an offensive playbook containing explicit, ready-to-run XSS exploitation payloads and procedures for credential theft, session hijacking, internal scanning, BeEF hooking, keylogging, CSRF via XSS, phishing and data exfiltration. It reads as a practical guide for attackers and contains numerous high-risk, actionable code examples and attacker-controlled endpoints. If present in a codebase/package, this material constitutes a serious supply-chain risk and should be treated as malicious or at least extremely dangerous to host or distribute in production contexts. Use only in controlled, authorized security-testing environments.

Confidence: 95%Severity: 95%
SecurityMEDIUM
attacks/api-security/web-llm/web-llm-attacks-portswigger-labs-complete.md

This artifact is an explicit, step-by-step offensive guide for exploiting LLM integrations (prompt injection, excessive agency, command/SQL injection, and XSS via LLM output). It contains actionable payloads, HTTP examples, and bypass techniques that can be readily applied against vulnerable systems. Although educational in tone (lab/CTF material), the content is high-risk if published within an installable package or documentation that is shipped to non-security audiences. It should not be included in production dependencies without clear lab-scoping, warnings, and access restrictions. Recommend treating this as dangerous attack documentation: if found in a package, flag and remove or move to a controlled, private training environment; ensure projects exposing LLMs apply the listed mitigations (input/output sanitization, API whitelisting, least privilege, monitoring).

Confidence: 90%Severity: 70%
SecurityMEDIUM
attacks/server-side/deserialization/insecure-deserialization-cheat-sheet.md

This document is a detailed offensive/defensive cheat sheet for exploiting insecure deserialization across multiple languages. It contains explicit payload examples (reverse shells, file writes, gadget chain commands), step-by-step exploitation workflows, and references to tools (ysoserial, phpggc). As text it is not executable malware, but it is a high-risk reference: if its payloads or commands are executed in a vulnerable environment they will produce remote code execution, file tampering, and network exfiltration. Treat the content as dangerous guidance that should not be executed against systems you do not have explicit authorization to test. Use the defensive sections to harden applications and mitigate the described risks.

Confidence: 90%Severity: 80%
SecurityMEDIUM
attacks/api-security/graphql/graphql-quickstart.md

This file is an explicit offensive playbook for discovering and exploiting GraphQL vulnerabilities (introspection, IDOR, auth bypass, brute-force, CSRF). It provides ready-to-use payloads, automation snippets, and PoC templates for active exploitation. It is not obfuscated and does not itself run as malware, but it is high-risk content because it enables and accelerates real attacks against GraphQL APIs and victims. Treat this content as harmful if used without explicit authorization; do not include in production packages intended for general consumption.

Confidence: 90%Severity: 90%
MalwareHIGH
attacks/server-side/deserialization/insecure-deserialization-quickstart.md

This document is an offensive exploitation guide that provides concrete, ready-to-run techniques for finding and exploiting insecure deserialization in PHP, Java, and Ruby. It contains numerous sinks that lead to remote code execution, file deletion, and credential exfiltration, plus instructions to circumvent integrity checks and generate gadget chains. From a supply-chain/security perspective, inclusion of such content inside a package or widely-distributed repository poses a high risk because it materially lowers the barrier for attackers to perform destructive operations. If found in a public package, treat it as malicious or at minimum highly dangerous dual-use content and review context and intent carefully (e.g., lab vs. production).

Confidence: 90%Severity: 95%
MalwareHIGH
attacks/injection/ssti/ssti-cheat-sheet.md

This document is a comprehensive SSTI exploitation guide that contains explicit, actionable payloads for remote code execution, file access, sandbox bypass, WAF evasion, and data exfiltration across many template engines. The file itself is not executable, but it directly enables malicious activity against vulnerable template-rendering endpoints. Treat inclusion of this document in a codebase or package as a high-risk indicator: it should not be distributed as part of production dependencies, and any associated package should be carefully reviewed for additional malicious code or sample payloads that could be executed. If you see this in a repository or package, audit template handling, remove or segregate attack documentation from runtime code, and verify there are no examples that will be evaluated on install or at runtime.

Confidence: 41%Severity: 90%
SecurityMEDIUM
attacks/authentication/jwt/jwt-cheat-sheet.md

This document is an offensive security cheat sheet and contains explicit, actionable instructions and code to perform JWT exploitation (none-alg tokens, algorithm confusion, JWK/JKU injection, kid path traversal/SQL/command injection, secret cracking, forging tokens, and active testing against target URLs). It is not itself obfuscated malware, but its contents are high-risk: the provided scripts and commands can be used to discover secrets, bypass authentication, perform SSRF or local file disclosure, and otherwise compromise systems if executed against vulnerable targets or without authorization. For a benign user, treat this as a testing tool to be used only in authorized environments; for supply-chain assessment, inclusion of these materials in a package intended for general use increases risk of misuse. No direct evidence of embedded backdoors or stealthy exfiltration code in a package is present here, but the active testing script will perform network requests and file reads which, when executed, can have offensive effects.

Confidence: 90%Severity: 75%
SecurityMEDIUM
attacks/web-applications/cache-deception/web-cache-deception-portswigger-labs-complete.md

This document is a high-fidelity, actionable lab that demonstrates multiple web cache deception and request-smuggling techniques capable of causing authenticated, sensitive responses to be cached and exfiltrated. The content is not executable malware, nor is it obfuscated, but it contains explicit payloads and operational steps that can be misused against production systems. Treat examples as high-risk offensive guidance; use for defensive testing only in authorized contexts. Remediation priorities: ensure origin and cache normalization parity, apply conservative cache-control headers for sensitive endpoints, and remediate HTTP request-smuggling vulnerabilities (uniform parsing of Content-Length and Transfer-Encoding).

Confidence: 88%Severity: 85%
MalwareHIGH
attacks/client-side/prototype-pollution/prototype-pollution-quickstart.md

This document is an explicit offensive guide for exploiting prototype pollution vulnerabilities in web applications. It enumerates sources, gadget sinks, and provides fully formed payloads to achieve XSS, privilege escalation, remote code execution, and data exfiltration, including operational steps (Burp/Collaborator usage) and destructive commands. While it is not executable library code, it is highly actionable and can enable attackers or inexperienced testers to perform high-impact attacks if a target is vulnerable. Treat the content as high-risk attack documentation and avoid using it against systems without authorization; prioritize patching applications that accept unsanitized object keys, using input validation, safe merging practices (avoid merging into Object.prototype), and other mitigations described in the guide.

Confidence: 92%Severity: 90%
SecurityMEDIUM
attacks/client-side/xss/xss-bypass-techniques.md

This file is a dual-use, offensive-focused XSS/WAF/CSP bypass cheat-sheet containing concrete, practical payloads and exploitation chains. The document itself is not executable malware, but it meaningfully lowers the barrier for discovering and exploiting XSS and related weaknesses if the application contains vulnerable reflection points, unsafe AngularJS template usage, injectable CSP parameters, JSONP endpoints, or form-action exposures. Treat it as a high-risk informational artifact: remove from production packages, restrict distribution, and prioritize auditing and hardening of any code that reflects untrusted input into the described sinks.

Confidence: 75%Severity: 80%
Obfuscated FileHIGH
attacks/authentication/jwt/portswigger_jwt_labs.md

The artifact is an explicit, actionable JWT exploit and remediation guide covering multiple high-impact vulnerabilities. It poses significant operational risk if an application contains the demonstrated insecure patterns (unverified tokens, trusting alg/jwk/jku/kid, weak secrets). The content itself is educational/dual-use rather than malware, and it includes accurate remediation advice. Organizations should audit JWT handling for the listed anti-patterns, enforce algorithm/key whitelists, remove support for 'none', validate JWKS/JKU sources and kid values, use strong secrets and key management, and monitor for anomalous token usage.

Confidence: 98%
Obfuscated FileHIGH
attacks/injection/command-injection/os-command-injection-portswigger-labs-complete.md

This document is a detailed, dual-use OS command injection guide: high utility for defenders and authorized testers, but also a powerful, ready-to-use playbook for attackers. It is not obfuscated and contains explicit exploit payloads, tooling instructions, and vulnerable code patterns in multiple languages. As a standalone document it is not malware, but it raises meaningful security risk if distributed widely or bundled with executable install-time scripts. Recommend treating the file as sensitive instructional material: allow in security training contexts, but review any packaging for executable hooks (postinstall scripts, CI jobs) and remove/flag any automated execution of included payloads. Ensure repository/package maintainers document intent and that no install-time code runs untrusted content.

Confidence: 98%
SecurityMEDIUM
attacks/server-side/path-traversal/path-traversal-quickstart.md

This document is a detailed, actionable exploitation guide for path traversal vulnerabilities. It contains explicit payloads and evasion techniques to retrieve sensitive files from web servers, and provides automation and tooling instructions to scale attacks. The file content is dual-use: valuable for defensive testing and education when used in authorized contexts, but it is high-risk because it directly enables unauthorized data access and exfiltration when used maliciously. Use only in authorized, legal testing environments.

Confidence: 90%Severity: 85%
SecurityMEDIUM
attacks/authentication/auth-bypass/authentication-cheat-sheet.md

This document is a high-risk, offensive cheat sheet with concrete payloads and runnable scripts that enable credential discovery, authentication bypasses, token theft, and SSRF-based cloud credential exfiltration. It is not obfuscated and contains no obvious self-installing malware, but the included Flask token stealer and network-facing attack patterns provide clear exfiltration primitives. Use is dual-purpose: acceptable for authorized security testing, but publication or use against unauthorized targets poses significant legal and security risks.

Confidence: 75%Severity: 90%
MalwareHIGH
attacks/server-side/file-upload/file-upload-cheat-sheet.md

This file is an offensive exploitation cheat sheet describing multiple, high-impact techniques to bypass upload protections and achieve remote code execution, reverse shells, and data exfiltration. It contains explicit, ready-to-run payloads and automation that would enable attackers or inexperienced testers to compromise vulnerable servers. Treat this material as high-risk: do not deploy examples on production systems and consider blocking or removing it from code repositories that are part of a production supply chain. Use only in isolated, authorized testing environments and for defensive training.

Confidence: 90%Severity: 90%
AnomalyLOW
attacks/api-security/websockets/websockets-portswigger-labs-complete.md

This is an instructional security guide containing explicit, actionable exploit code and exfiltration techniques for WebSocket attacks (CSWSH, XSS via WebSocket, handshake manipulation). The content is dual-use: intended for training and testing (PortSwigger labs) and includes step-by-step exploitation and exfiltration code that can be abused if used against real vulnerable systems. There is no obfuscated or self-executing malicious code in the fragment, but the provided examples are weaponizable and represent a moderate security risk when copied into attacker-controlled pages or used against production targets. Use for authorized testing only; operators should ensure such examples are not embedded into automated deployable packages or sites where they could execute in victims’ browsers.

Confidence: 90%Severity: 55%
Obfuscated FileHIGH
attacks/web-applications/cache-poisoning/web-cache-poisoning-cheat-sheet.md

This file is an actionable offensive cheat sheet for web cache poisoning and reflected injection attacks. It contains explicit payloads, automation scripts (scanning and continuous poisoning), and operational strategies to detect and maintain poisoned cache entries. While it also includes defensive mitigation guidance, the document is highly actionable for attackers and therefore poses a moderate-to-high security risk if included in a repository or executed without strict authorization and oversight. The file itself is not obfuscated and does not contain a self-executing backdoor, but its runnable examples perform active network attacks and should be treated as malicious guidance if used against third-party systems without permission.

Confidence: 98%
MalwareHIGH
attacks/client-side/clickjacking/clickjacking-quickstart.md

This document is an explicit, actionable instruction set for performing clickjacking attacks (UI redressing), including practical bypasses and exploit templates (opacity/z-index tricks, sandbox allow-forms, querystring prepopulation, DOM XSS examples). It does not itself include network-exfiltration code or obfuscated binaries, but it fully enables attackers to craft web pages that cause victims to perform sensitive actions on framed sites. Treat this as malicious instructional material: avoid using it to launch attacks and ensure defensive measures (X-Frame-Options/CSP frame-ancestors, SameSite cookies, re-auth for sensitive actions) are applied. If included in a package, flag and remove it unless the package’s purpose is clearly authorized security research with proper safeguards.

Confidence: 95%Severity: 90%
SecurityMEDIUM
attacks/server-side/http-smuggling/http-request-smuggling-quickstart.md

This document is an explicit offensive guide that provides actionable, low-effort techniques and payloads to exploit HTTP request smuggling vulnerabilities, enabling high-impact attacks (admin access bypass, credential capture, XSS delivery, cache poisoning). It is dual-use (useful for security testing) but the level of detail makes it dangerous if used maliciously. Recommend treating it as sensitive offensive material: restrict distribution to authorized testers, ensure consent before testing targets, and prefer defensive guidance or sanitized examples in public packages.

Confidence: 90%Severity: 80%
AnomalyLOW
attacks/api-security/websockets/websockets-quickstart.md

This document is a practical offensive guide demonstrating how to exploit WebSocket weaknesses (XSS via message injection, handshake/header manipulation/IP spoofing, and Cross-Site WebSocket Hijacking with exfiltration to attacker-controlled endpoints). It does not contain obfuscated malware or system-level backdoors, but it provides clear, working exploit templates that enable data theft and account compromise when run against vulnerable systems or when a victim visits an attacker-controlled page. Use of this content is appropriate only in authorized testing contexts; it represents a moderate-to-high risk if used by malicious actors.

Confidence: 90%Severity: 60%
AnomalyLOW
attacks/web-applications/access-control/access-control-cheat-sheet.md

This is a plain-text penetration-testing cheat sheet that documents many proven techniques to discover and exploit broken access control. It is not obfuscated nor does it contain execution-stage malware, but it is highly actionable and includes scripts/commands and example credentials that enable unauthorized access if applied against misconfigured services. For a software supply chain: the file itself is not malware, but its presence in a package could be considered a security concern (dual-use) because it directly instructs how to exploit typical vulnerabilities. Recommend treating this as sensitive offensive content: restrict distribution to authorized red-team/learning contexts and do not include in production packages that run with elevated privileges or could be used by untrusted actors.

Confidence: 90%Severity: 65%
Obfuscated FileHIGH
attacks/server-side/http-smuggling/http-request-smuggling-cheat-sheet.md

This file is an explicit, highly actionable offensive cheat-sheet for HTTP request smuggling and related desync/CRLF/HTTP/2 attacks. It contains ready-to-run payloads, byte-counting, tooling workflows (Burp, Turbo Intruder) and automation snippets that can be reused directly to detect and exploit vulnerable front-end/back-end parsing inconsistencies. The content is dual-use: valuable for defenders and testers, but also provides attackers with low-effort, high-impact techniques (session theft, admin access, cache poisoning, XSS). The document itself is not executable malware, but it presents a meaningful security risk if distributed or used maliciously against production systems. Apply mitigations listed in the sheet, treat this artifact as high-risk offensive material, and restrict its distribution and use to authorized testing contexts only.

Confidence: 98%
SecurityMEDIUM
attacks/client-side/prototype-pollution/prototype-pollution-cheat-sheet.md

This is a well-documented prototype pollution cheat sheet containing detection and exploitation payloads, gadget chains, bypass techniques, testing commands (curl/Burp/Collaborator) and mitigations. It is not executable library code and does not itself perform malicious actions, but it contains numerous explicit, ready-to-use exploit examples (including RCE/reverse-shell payloads and exfiltration commands). As documentation it is dual-use: valuable for defenders and researchers, but it also lowers the barrier for attackers. Treat this content as sensitive operational guidance — safe to host in controlled, authorized testing contexts, but avoid publishing it carelessly where it could enable abuse.

Confidence: 90%Severity: 70%
AnomalyLOW
attacks/web-applications/race-conditions/race-conditions-portswigger-labs-complete.md

This is an educational, detailed exploitation guide for race conditions (PortSwigger-style labs). It contains explicit, actionable exploit instructions including Turbo Intruder scripts, HTTP request templates, and payloads (including PHP webshells) that could be used to perform account takeover, credential theft, data exfiltration, or remote code execution against vulnerable web applications. The document itself is not obfuscated and does not contain embedded malware, but it provides high-quality, copyable attack recipes — meaning inclusion of this content in a package or distribution increases the risk that attackers (or insufficiently careful users) will reuse the payloads against real targets. Treat as sensitive, dual-use security material; do not deploy payloads against systems you do not own or have explicit permission to test.

Confidence: 88%Severity: 65%
SecurityMEDIUM
attacks/authentication/oauth/oauth-portswigger-labs-complete.md

This is an educational/penetration-testing guide that explains several OAuth vulnerabilities and provides explicit, actionable exploitation recipes (HTML iframes, JavaScript exfiltration, SSRF via client registration, directory traversal and open-redirect chains, and authentication bypass techniques). The document itself is not a software module containing self-executing malware, but it contains high-fidelity, dual-use instructions that could be misused to compromise real systems that are vulnerable. Treat content as sensitive: do not deploy example exploit pages on public infrastructure, and ensure any demonstration code is used only in controlled lab environments. Remediations and defenses are included in the guide and should be applied to systems handling OAuth and dynamic client registration.

Confidence: 90%Severity: 70%
MalwareHIGH
attacks/web-applications/cache-deception/web-cache-deception-quickstart.md

This is an explicit offensive guide for discovering and exploiting Web Cache Deception vulnerabilities. It documents sources (victim-authenticated requests), concrete exploitation flows (cache miskeying via path/delimiter/normalization tricks), delivery mechanisms (JS redirect), and retrieval steps for attackers to obtain victim-specific cached sensitive data. The content is actionable and enables unauthorized data theft; treat it as malicious guidance. If included in a package intended for general distribution, it poses high risk and should be removed or restricted to authorized security testing contexts (with explicit permission).

Confidence: 95%Severity: 95%
SecurityMEDIUM
attacks/server-side/file-upload/file-upload-portswigger-labs-complete.md

This document is an explicit exploitation guide containing multiple ready-to-use payloads and automation techniques to achieve remote code execution, data exfiltration, and remote shells via file upload vulnerabilities. It is dual-use: appropriate for authorized security training and testing, but dangerous if used maliciously or included in production dependencies without restriction. If found inside an open-source dependency (npm/PyPI/etc.), treat it as high-risk: review purpose, provenance and restrict execution. Remove or sandbox any executable payloads, and ensure such material is not executed in production environments. The content should be used only in authorized testing contexts with explicit permission.

Confidence: 85%Severity: 80%
SecurityMEDIUM
attacks/authentication/jwt/jwt_attack_techniques.md

This document is an offensive security guide and collection of proof-of-concept code demonstrating multiple high-impact JWT attacks (missing/disabled verification, 'none' algorithm acceptance, JWK/JKU injection, kid-based path traversal/SQLi/command injection, algorithm confusion, SSRF to cloud metadata, secret brute-force). The content itself is not obfuscated malware, nor is it a packaged backdoor, but it provides ready-to-run techniques that can enable serious compromise if applied against vulnerable systems. Treat this as high-risk instructional material: safe for authorized security testing and education, dangerous if used without permission.

Confidence: 90%Severity: 80%
SecurityMEDIUM
attacks/client-side/clickjacking/clickjacking-portswigger-labs-complete.md

This document is a comprehensive offensive guide showing concrete, copy-pasteable clickjacking exploits, sandbox bypasses and DOM XSS exfiltration payloads. It contains explicit attacker-controlled payload examples (including fetch() exfiltration and forms that rely on victim session cookies) and precise CSS/HTML templates to make clickjacking effective. As content it is high-risk for misuse: it directly enables account takeover, data exfiltration, and other malicious actions when applied against real targets. If found inside a library/package intended for general use, it should be treated as dangerous documentation that could facilitate attacks; inclusion in a distributed dependency increases the likelihood of misuse. Defenders should ensure legitimate security training context and restrict distribution; otherwise remove or strongly gate this content.

Confidence: 90%Severity: 85%
MalwareHIGH
attacks/web-applications/race-conditions/race-conditions-cheat-sheet.md

This artifact is a high-risk offensive playbook that contains explicit exploit payloads (PHP webshells, reverse shells), automation scripts, and operational techniques to discover and exploit race conditions, bypass protections, and perform data exfiltration and RCE. Treat as malicious/abusive content in a supply-chain context: do not distribute in production packages; quarantine and review any repository containing it, check commit history for credentials or secrets, and remove or restrict access.

Confidence: 75%Severity: 90%
SecurityMEDIUM
attacks/authentication/jwt/jwt-quickstart.md

This document is an explicit, actionable exploitation guide for JWT vulnerabilities. It contains instructions and ready-to-run commands (jwt manipulation, alg=none tokens, JWK/JKU injection, kid path traversal, hashcat cracking) that enable authentication bypass and privilege escalation when applied to vulnerable systems. While useful for authorized pentesting and education, it is dual-use and poses a high security risk if present in code repositories or distributed to untrusted parties. There is no code obfuscation and the content itself is not malware code, but it facilitates high-impact attacks and should be handled as sensitive offensive guidance — only used in authorized testing contexts.

Confidence: 90%Severity: 80%
Obfuscated FileHIGH
attacks/injection/xxe/xxe-quickstart.md

This document is a comprehensive, dual-use XXE offensive playbook. It is not executable malware by itself, but it contains explicit, ready-to-use payloads and operational procedures to read local files, perform SSRF to cloud metadata, and exfiltrate data via OOB techniques. Treat it as sensitive offensive guidance: acceptable for authorized security testing and internal training, but risky if published alongside client-facing packages or included in distributed libraries without context and controls. Recommend limiting distribution to authorized testers, adding clear legal/usage disclaimers, and removing or separating high-risk payload examples from general-purpose packages. Developers should ensure XML libraries disable external entity resolution and follow OWASP/CWE guidance to mitigate the described attacks.

Confidence: 98%
Obfuscated FileHIGH
attacks/injection/command-injection/os-command-injection-cheat-sheet.md

The artifact is a highly actionable OS command-injection cheat sheet: it does not itself execute or contain malware code, but it contains explicit, ready-to-use payloads (including reverse shells and exfiltration techniques) and filter-bypass methods that materially lower the effort to exploit vulnerable systems. From a code inspection perspective the file poses no direct execution risk, but from a supply-chain and operational security perspective its presence in distributed packages or broadly accessible repositories increases attacker capabilities and should be treated cautiously. If this material is not intended for public distribution, restrict access or relocate to controlled security testing documentation; if intended for training or red-team use, ensure provenance and usage policies are clear.

Confidence: 98%
MalwareHIGH
attacks/server-side/ssrf/ssrf-quickstart.md

This document is a high-risk offensive SSRF exploitation guide containing actionable payloads for credential theft (cloud metadata), remote code execution (Shellshock), protocol smuggling, and admin-level destructive actions. While parts could inform defensive testing, the level of operational detail (payloads, bypasses, automation steps, and OOB exfiltration workflows) materially facilitates attacker activity. Treat inclusion of this file in a codebase or package as a serious security concern: restrict distribution, remove if not authorized for offensive testing, and audit surrounding commits and contributors for malicious intent or misuse.

Confidence: 75%Severity: 95%
SecurityMEDIUM
attacks/authentication/auth-bypass/authentication-quickstart.md

This file is a highly actionable, dual-use offensive guide for finding and exploiting authentication and session-management flaws. It contains concrete commands, payloads, and evasion techniques that substantially lower the effort to perform credential enumeration, brute-force, 2FA and OAuth bypasses, cookie forging and password-reset hijacking. The content itself is not executable malware, but it poses a notable security risk if included in publicly distributed packages or repositories without proper context, authorization, and safeguards. Treat presence of this document in a codebase as a high-risk indicator warranting review and potential removal or relocation to controlled, authorized testing documentation.

Confidence: 75%Severity: 70%
MalwareHIGH
attacks/api-security/web-llm/web-llm-attacks-quickstart.md

This file is an explicit offensive guide for exploiting web-facing LLMs and associated web application functionality (SQL/OS injection, prompt injection, XSS, exfiltration, reverse shells). It contains actionable payloads and evasion techniques that directly map untrusted inputs to high-impact sinks (DB modification, file deletion, credential/data exfiltration, remote shells). Because it actively instructs how to cause harm and includes attacker endpoints and reverse-shell examples, it should be treated as malicious documentation enabling attacks. Do not include or distribute this in production packages; if found in a public package, treat as high-risk and remove or quarantine.

Confidence: 90%Severity: 90%
SecurityMEDIUM
attacks/client-side/prototype-pollution/prototype-pollution-portswigger-labs-complete.md

This is an in-depth instructional guide and lab solution set describing prototype pollution attack vectors, gadgets, exploitation techniques and mitigations. It contains explicit, actionable exploit payloads (including DOM XSS, privilege escalation, RCE via execArgv and vim shell injection, file deletion, and data exfiltration examples). The content is dual-use: valuable for defenders and learners, but also provides precise steps and commands that an attacker could reuse against vulnerable systems. There is no hidden/obfuscated code in the fragment itself, nor a packaged malicious dependency, but the guide contains high-risk, concrete exploit recipes and should be treated as sensitive operational guidance. Use for authorized testing only; do not apply against systems without permission.

Confidence: 85%Severity: 78%
Obfuscated FileHIGH
attacks/client-side/clickjacking/clickjacking-cheat-sheet.md

The file is an explicit, operational guide for conducting clickjacking and related client-side attacks. It contains ready-to-use templates and payloads for tricking users, evading frame-busting protections, and exfiltrating sensitive client data. If included in a public package or repo, it materially lowers the barrier for abuse and should be either removed, restricted, or clearly labeled and access-controlled for defensive training purposes only. Projects distributing this content should ensure contextualization (legal/ethical training), gating, and consider removing verbatim exfiltration payloads and attacker domains.

Confidence: 98%
SecurityMEDIUM
attacks/server-side/ssrf/ssrf-portswigger-labs-complete.md

This document is an instructional offensive-security guide detailing SSRF attack techniques, with many explicit, ready-to-use payloads and tool workflows that enable enumeration, metadata exfiltration, RCE (via Shellshock and reverse shells), and destructive actions. It is not itself executable malware packaged in code, but it contains highly actionable exploit instructions that significantly raise the risk to vulnerable systems if used by an attacker. The guide also includes mitigation and detection guidance which is useful for defenders.

Confidence: 90%Severity: 75%
SecurityMEDIUM
attacks/web-applications/cache-deception/web-cache-deception-cheat-sheet.md

This document is a high-risk offensive cheat-sheet for Web Cache Deception. It does not contain executable malware or obfuscated code, but it provides concrete, ready-to-run payloads, request smuggling examples, discovery automation, and delivery techniques that materially lower the barrier to exfiltrating sensitive data from misconfigured caches and origin servers. Treat inclusion of this material in distributed packages or public-facing documentation as a notable security concern: restrict distribution, scan for similar content in supply-chain artifacts, and ensure services implement recommended mitigations (no-store/private for sensitive endpoints, strict URL validation, cache policies keyed to content-type).

Confidence: 75%Severity: 82%
SecurityMEDIUM
attacks/server-side/host-header/http-host-header-cheat-sheet.md

This is an offensive dual-use cheat sheet that documents how to discover and exploit HTTP Host header weaknesses (password reset poisoning, authentication bypass, cache poisoning, SSRF including cloud metadata access, connection-state exploits, and dangling markup). The material contains concrete payloads and automation techniques that make it straightforward to weaponize against vulnerable systems. The content is not obfuscated and does not contain executable malware, but it significantly lowers the barrier for attacks if misused. Use only for authorized testing; patching/whitelisting Host values, sanitizing outputs, including Host in cache keys, and rejecting ambiguous/malformed requests are recommended mitigations.

Confidence: 90%Severity: 70%
MalwareHIGH
attacks/web-applications/cache-poisoning/web-cache-poisoning-quickstart.md

This file is an explicit offensive guide for discovering and exploiting web cache poisoning leading to XSS, open redirects, and large-scale client impact. It contains actionable payloads, scripts, and operational guidance to poison caches and deliver malicious JavaScript to many victims. It is high-risk content: not obfuscated code, but clearly malicious/weaponizable instructions. Treat this material as an exploitation playbook and avoid including it in production packages or public modules; if found in a code repository or package, consider removal and alerting maintainers and platform security teams.

Confidence: 95%Severity: 90%
MalwareHIGH
attacks/server-side/file-upload/file-upload-quickstart.md

This file is an explicit offensive cheat-sheet that provides actionable payloads, automated scripts, and detailed bypass techniques to achieve remote code execution and data exfiltration via file upload endpoints. In an unattended or general-purpose repository/package it represents a high security risk and could facilitate malicious activity. If present in a repo, its use should be restricted to authorized testing environments and accompanied by clear authorization/context. From a supply-chain perspective, bundling this content into a dependency intended for general use is dangerous and warrants removal or strict labeling and access controls.

Confidence: 85%Severity: 95%
SecurityMEDIUM
attacks/web-applications/race-conditions/race-conditions-quickstart.md

This document is a tactical offensive guide for finding and exploiting race-condition vulnerabilities using Burp Suite and Turbo Intruder. It contains actionable instructions and an automation template to provoke TOCTOU issues (apply coupon multiple times, bypass rate limits, induce multiple withdrawals). While not code that directly exfiltrates data or installs backdoors, it is high-risk when used without authorization because it instructs automation of abusive, high-volume parallel requests and techniques to bypass server-side protections. Treat such content as dual-use: useful for security testing with permission, potentially malicious if used to attack live systems without consent.

Confidence: 90%Severity: 80%
Obfuscated FileHIGH
attacks/injection/nosql-injection/nosql-injection-cheat-sheet.md

The artifact is an explicit, highly actionable NoSQL injection playbook (offensive + defensive). It documents multiple high-risk vectors (notably $where/operator injection) and provides automation and payloads that make exploitation and data extraction easy against misconfigured systems. The content is dual-use: valuable for defenders to harden systems, but also lowers the barrier for attackers. No embedded malware or obfuscation is present, but treat this as sensitive offensive guidance: restrict use to authorized testing environments and implement recommended mitigations (disable DB-side JS, operator whitelisting, input validation, parameterized queries, schema enforcement, rate-limiting, and robust logging/alerting).

Confidence: 98%
SecurityMEDIUM
attacks/injection/ssti/ssti-quickstart.md

This document is a high-risk offensive SSTI playbook containing concrete, engine-specific exploit payloads (including RCE, file read/delete, sandbox bypasses, and DNS-based exfiltration). It is not inherently executable but provides low-effort, high-impact instructions that can lead to full server compromise on vulnerable systems. Treat inclusion of this content in production packages or templates as a security red flag; restrict to controlled pentest environments and sanitize any developer-facing template editors or examples to prevent accidental execution.

Confidence: 75%Severity: 75%
SecurityMEDIUM
attacks/client-side/cors/cors-quickstart.md

This file is a high-value offensive CORS exploitation guide containing explicit, ready-to-use proof-of-concept payloads that enable credentialed data exfiltration and destructive actions when combined with server misconfigurations or XSS. It is dual-use: appropriate for security testing and remediation, but highly actionable for attackers. There is no obfuscated/malicious binary code in the content itself, nor hard-coded credentials; the principal risk comes from the provided techniques and payloads being applied against vulnerable targets. Treat the document as sensitive operational attack guidance and ensure server-side mitigations (strict origin whitelist, protocol checks, anchored regexes, Vary: Origin header, deny null origin, CSP, input sanitization, remove XSS vectors) are implemented.

Confidence: 80%Severity: 72%
Audit Metadata
Analyzed At
Feb 20, 2026, 09:25 PM
Package URL
pkg:socket/skills-sh/transilienceai%2Fcommunitytools%2Fpentest%2F@0d5560c0d838663be30654d6b338fa63b462e034