PayloadsAllTheThings/search/search_index.json

1 line
856 KiB
JSON
Raw Permalink Normal View History

{"config":{"lang":["en"],"separator":"[\\s\\-]+","pipeline":["stopWordFilter"]},"docs":[{"location":"","title":"Payloads All The Things","text":"<p>A list of useful payloads and bypasses for Web Application Security. Feel free to improve with your payloads and techniques ! I pull requests :)</p> <p>You can also contribute with a IRL, or using the sponsor button </p> <p> </p> <p>An alternative display version is available at PayloadsAllTheThingsWeb.</p> <p> </p>"},{"location":"#documentation","title":"Documentation","text":"<p>Every section contains the following files, you can use the <code>_template_vuln</code> folder to create a new chapter:</p> <ul> <li>README.md - vulnerability description and how to exploit it, including several payloads</li> <li>Intruder - a set of files to give to Burp Intruder</li> <li>Images - pictures for the README.md</li> <li>Files - some files referenced in the README.md</li> </ul> <p>You might also like the other projects from the AllTheThings family :</p> <ul> <li>InternalAllTheThings - Active Directory and Internal Pentest Cheatsheets</li> <li>HardwareAllTheThings - Hardware/IOT Pentesting Wiki</li> </ul> <p>You want more ? Check the Books and Youtube channel selections.</p>"},{"location":"#contributions","title":"Contributions","text":"<p>Be sure to read CONTRIBUTING.md</p> <p> </p> <p>Thanks again for your contribution! </p>"},{"location":"#sponsors","title":"Sponsors","text":"<p>This project is proudly sponsored by these companies: </p> <p> </p>"},{"location":"CONTRIBUTING/","title":"CONTRIBUTING","text":"<p>PayloadsAllTheThings' Team pull requests.</p> <p>Feel free to improve with your payloads and techniques !</p> <p>You can also contribute with a IRL, or using the sponsor button.</p>"},{"location":"CONTRIBUTING/#pull-requests-guidelines","title":"Pull Requests Guidelines","text":"<p>In order to provide the safest payloads for the community, the following rules must be followed for every Pull Request.</p> <ul> <li>Payloads must be sanitized<ul> <li>Use <code>id</code>, and <code>whoami</code>, for RCE Proof of Concepts</li> <li>Use <code>[REDACTED]</code> when the user has to replace a domain for a callback. E.g: XSSHunter, BurpCollaborator etc.</li> <li>Use <code>10.10.10.10</code> and <code>10.10.10.11</code> when the payload require IP addresses</li> <li>Use <code>Administrator</code> for privileged users and <code>User</code> for normal account</li> <li>Use <code>P@ssw0rd</code>, <code>Password123</code>, <code>password</code> as default passwords for your examples</li> <li>Prefer commonly used name for machines such as <code>DC01</code>, <code>EXCHANGE01</code>, <code>WORKSTATION01</code>, etc</li> </ul> </li> <li>References must have an <code>author</code>, a <code>title</code>, a <code>link</code> and a <code>date</code><ul> <li>Use Wayback Machine if the reference is not available anymore.</li> <li>The date must be following the format <code>Month Number, Year</code>, e.g: <code>December 25, 2024</code></li> <li>References to Github repositories must follow this format: <code>[author/tool](https://github.com/URL) - Description</code></li> </ul> </li> </ul> <p>Every pull request will be checked with <code>markdownlint</code> to ensure consistent writing and Markdown best practices. You can validate your files locally using the following Docker command:</p> <pre><code>docker run -v $PWD:/workdir davidanson/markdownlint-cli2:v0.15.0 \"**/*.md\" --config .github/.markdownlint.json --fix\n</code></pre>"},{"location":"CONTRIBUTING/#techniques-folder","title":"Techniques Folder","text":"<p>Every section should contains the following files, you can use the <code>_template_vuln</code> folder to create a new technique folder:</p> <ul> <li>README.md: vulnerability description and how to exploit it, including several payloads, more below</li> <li>Intruder: a set of files to give to Burp Intruder</li> <li>Images: pictures for the README.md</li> <li>Files: some files referenced in the README.md</li> </ul>"},{"location":"CONTRIBUTING/#readmemd-format","title":"README.md Format","text