A list of useful payloads and bypass for Web Application Security and Pentest/CTF
Go to file
2024-11-06 23:32:18 +01:00
_LEARNING_AND_SOCIALS Fix typos 2024-09-16 18:05:54 +02:00
_template_vuln Fix uppercase links and anchor 2024-09-13 22:43:18 +02:00
.github Fix nested lists 2024-11-03 17:10:52 +01:00
Account Takeover Account Takeover References 2024-11-03 21:22:14 +01:00
API Key Leaks References updated for API, Business, Clickjacking, CSPT, Command 2024-11-04 16:35:24 +01:00
Business Logic Errors References updated for API, Business, Clickjacking, CSPT, Command 2024-11-04 16:35:24 +01:00
Clickjacking References updated for CORS CRLF CSV 2024-11-04 18:00:07 +01:00
Client Side Path Traversal References updated for API, Business, Clickjacking, CSPT, Command 2024-11-04 16:35:24 +01:00
Command Injection References updated for API, Business, Clickjacking, CSPT, Command 2024-11-04 16:35:24 +01:00
CORS Misconfiguration References updated for Dom Clobbering, File Inclusion 2024-11-05 17:29:15 +01:00
CRLF Injection References updated for CORS CRLF CSV 2024-11-04 18:00:07 +01:00
Cross-Site Request Forgery References updated for CORS CRLF CSV 2024-11-04 18:00:07 +01:00
CSV Injection References updated for CORS CRLF CSV 2024-11-04 18:00:07 +01:00
CVE Exploits Fix typos 2024-09-16 18:05:54 +02:00
Denial of Service References updated for CORS CRLF CSV 2024-11-04 18:00:07 +01:00
Dependency Confusion References updated for Dom Clobbering, File Inclusion 2024-11-05 17:29:15 +01:00
Directory Traversal References updated for Dom Clobbering, File Inclusion 2024-11-05 17:29:15 +01:00
DNS Rebinding References updated for Dom Clobbering, File Inclusion 2024-11-05 17:29:15 +01:00
Dom Clobbering References updated for Dom Clobbering, File Inclusion 2024-11-05 17:29:15 +01:00
File Inclusion References updated for Dom Clobbering, File Inclusion 2024-11-05 17:29:15 +01:00
Google Web Toolkit References added for GWT, GraphQL, HTTP, Headless 2024-11-06 23:32:18 +01:00
GraphQL Injection References added for GWT, GraphQL, HTTP, Headless 2024-11-06 23:32:18 +01:00
Headless Browser References added for GWT, GraphQL, HTTP, Headless 2024-11-06 23:32:18 +01:00
Hidden Parameters References added for GWT, GraphQL, HTTP, Headless 2024-11-06 23:32:18 +01:00
HTTP Parameter Pollution References added for GWT, GraphQL, HTTP, Headless 2024-11-06 23:32:18 +01:00
Insecure Deserialization References added for GWT, GraphQL, HTTP, Headless 2024-11-06 23:32:18 +01:00
Insecure Direct Object References Fix typos 2024-09-16 18:05:54 +02:00
Insecure Management Interface Normalize Titles 2022-10-12 12:13:55 +02:00
Insecure Randomness Fix typos 2024-09-16 18:05:54 +02:00
Insecure Source Code Management Fix typos 2024-09-16 18:05:54 +02:00
Java RMI Java beanshooter 2023-10-15 19:31:16 +02:00
JSON Web Token Recover Public Key From Signed JWTs 2023-09-04 11:37:15 +02:00
LaTeX Injection CSP updates + Indirect Prompt Injection 2024-05-29 15:32:58 +02:00
LDAP Injection Fix typos 2024-09-16 18:05:54 +02:00
Mass Assignment Business Logic Errors + Mass Assignment 2023-07-09 13:01:03 +02:00
Methodology and Resources switch to nxc as cme is archived 2024-03-29 21:22:18 +00:00
NoSQL Injection IIS MachineKeys + CI/CD + CSPT + ORM leak 2024-08-26 11:27:47 +02:00
OAuth Misconfiguration Business Logic Errors + Mass Assignment 2023-07-09 13:01:03 +02:00
Open Redirect Fix typos 2024-09-16 18:05:54 +02:00
ORM Leak IIS MachineKeys + CI/CD + CSPT + ORM leak 2024-08-26 11:27:47 +02:00
Prompt Injection Moving CICD to IATT repository 2024-11-01 21:00:03 +01:00
Prototype Pollution adding the payload for Polluting the prototype via the constructor property in JSON input 2024-01-03 17:24:28 +05:30
Race Condition fix:Typo_Race-Condition 2024-10-03 15:23:23 +05:30
Regular Expression IIS MachineKeys + CI/CD + CSPT + ORM leak 2024-08-26 11:27:47 +02:00
Request Smuggling update old url's 2022-10-26 20:36:15 -05:00
SAML Injection Add ZAP Addon in Tools 2022-05-01 00:47:18 +09:00
Server Side Include Injection Open Redirect + SSI Injection 2023-07-08 10:09:59 +02:00
Server Side Request Forgery Merge pull request #730 from Horlad/master 2024-11-02 15:20:09 +01:00
Server Side Template Injection Account Takeover References 2024-11-03 21:22:14 +01:00
SQL Injection SQL injections references updates 2024-11-03 14:06:53 +01:00
Tabnabbing Fix uppercase links and anchor 2024-09-13 22:43:18 +02:00
Type Juggling Update README.md 2024-07-28 21:16:30 +02:00
Upload Insecure Files Fix typos 2024-09-16 18:05:54 +02:00
Web Cache Deception Fix typos 2024-09-16 18:05:54 +02:00
Web Sockets Fix typos 2024-09-16 18:05:54 +02:00
XPATH Injection Normalize Titles 2022-10-12 12:13:55 +02:00
XSLT Injection XSLT payloads + Headless Browser 2024-05-31 00:07:21 +02:00
XSS Injection Merge pull request #728 from isacaya/add_xss_bypass 2024-11-02 15:16:46 +01:00
XXE Injection Bypass CSP, technique from #715 2024-11-02 12:26:45 +01:00
.gitignore YAML Deserialization 2022-09-16 16:37:40 +02:00
CONTRIBUTING.md PR Guidelines + User Hunting + HopLa Configuration 2022-06-30 16:33:35 +02:00
custom.css CSS - Update style color + Blind SQL Oracle 2023-12-10 13:27:21 +01:00
LICENSE Create License 2019-05-25 16:27:35 +02:00
mkdocs.yml SSTI references updates 2024-11-03 20:54:01 +01:00
README.md Fix typos 2024-09-16 18:05:54 +02:00

Payloads All The Things

A list of useful payloads and bypasses for Web Application Security. Feel free to improve with your payloads and techniques !
I ❤️ pull requests :)

You can also contribute with a 🍻 IRL, or using the sponsor button

Sponsor Tweet

An alternative display version is available at PayloadsAllTheThingsWeb.

📖 Documentation

Every section contains the following files, you can use the _template_vuln folder to create a new chapter:

  • README.md - vulnerability description and how to exploit it, including several payloads
  • Intruder - a set of files to give to Burp Intruder
  • Images - pictures for the README.md
  • Files - some files referenced in the README.md

You might also like the other projects from the AllTheThings family :

You want more ? Check the Books and Youtube channel selections.

🧑‍💻 Contributions

Be sure to read CONTRIBUTING.md

Thanks again for your contribution! ❤️

🍻 Sponsors

This project is proudly sponsored by these companies: