Install
openclaw skills install payloadsProvides curated exploitation payloads for authorized security testing, including anti-virus test files, malicious files, and file name exploits.
openclaw skills install payloadsEssential exploitation payloads: anti-virus test files, file name exploits, malicious files. Curated for testing.
Source: SecLists/Payloads Repository: https://github.com/danielmiessler/SecLists License: MIT
Use this skill when you need:
⚠️ IMPORTANT: Only use for authorized security testing, bug bounty programs, CTF competitions, or educational purposes.
EICAR test fileNull byte file namesCommand execution file names# Access files from this skill
import os
# Example: Load patterns/payloads
skill_path = "references/Payloads"
# List all available files
for root, dirs, files in os.walk(skill_path):
for file in files:
if file.endswith('.txt'):
filepath = os.path.join(root, file)
print(f"Found: {filepath}")
# Read file content
with open(filepath, 'r', errors='ignore') as f:
content = f.read().splitlines()
print(f" Lines: {len(content)}")
This is a curated subset of SecLists. For the complete collection:
Generated by Skill Seeker | SecLists Payloads Collection License: MIT - Use responsibly with proper authorization