Founded in 2005, Hak5's mission is to advance the InfoSec industry. We do this through our award winning podcasts, leading pentest gear, and inclusive community – where all hackers belong.
Founded in 2005, Hak5's mission is to advance the InfoSec industry. We do this through our award winning podcasts, leading pentest gear, and inclusive community – where all hackers belong.
Community developed payloads for Hak5 gear are featured and awarded at PayloadHub — a growing library of currated content.
Unleash your hacking creativity with the online payload editor: PayloadStudio
Link to your collections, sales and even external links
Add up to five columns
Founded in 2005, Hak5's mission is to advance the InfoSec industry. We do this through our award winning podcasts, leading pentest gear, and inclusive community – where all hackers belong.
Founded in 2005, Hak5's mission is to advance the InfoSec industry. We do this through our award winning podcasts, leading pentest gear, and inclusive community – where all hackers belong.
This payload executes a script that waits for new USB flash storage devices to be connected. When a new device connects, this script will copy a desired file...
This payload launches a new cmd.exe process with elevated privileges under TrustedInstaller, by setting the TrustedInstaller process as the parent, the cmd.e...
This payload extracts and saves Wi-Fi passwords and browser credentials from Google Chrome, Brave, Firefox, and Microsoft Edge on the target machine. Additio...
Get inspired, showcase your work and receive helpful feedback on your payloads in the Hak5 Community!
Caution
Third-party payloads executing as root may cause damage and come AS-IS without warranty or guarantees.
Disclaimer
Payloads are for education and auditing where permitted subject to local and international laws. Users are solely responsible for compliance. Hak5 claims no responsibility for unauthorized or unlawful use.
Stats
596 featured payloads in this library. Hundreds more at GitHub.com/Hak5.