Go to file
Viren Pawar 0266a7dd67 [Update] Added 1 payload
Added one payload which executes without any usage of single or double quotes. Helpful when you have AngularJS injection but quotes are blocked by application.
Working proof of payload here: 

https://portswigger-labs.net/xss/angularjs.php?type=reflected&csp=0&version=1.6.0&x={{x=valueOf.name.constructor.fromCharCode;constructor.constructor(x(97,108,101,114,116,40,49,41))()}}
2020-08-15 16:29:13 +05:30
2020-08-10 11:36:18 +02:00
2020-06-01 21:37:32 +02:00
2020-02-23 20:58:53 +01:00
2020-07-29 17:53:07 +02:00
2019-12-17 22:12:35 +05:30
2020-01-28 17:41:01 +00:00
2020-07-06 23:43:47 +02:00
2020-05-16 22:58:11 +02:00
2020-04-17 16:34:51 +02:00
2020-03-29 16:48:09 +02:00
2019-03-07 00:07:55 +01:00
2020-02-21 23:49:50 +01:00
2019-11-14 18:26:35 +08:00
2020-05-12 14:27:25 +02:00
2020-04-26 21:43:42 +02:00
2020-05-14 00:10:12 +02:00
2019-10-02 20:09:41 -04:00
2019-12-26 12:09:23 +01:00
2020-08-15 16:29:13 +05:30
2019-01-07 18:15:45 +01:00
2019-05-12 22:43:42 +02:00
2019-05-25 16:27:35 +02:00
2020-08-10 11:36:18 +02:00
2020-04-23 13:11:51 +02:00

Payloads All The Things Tweet

A list of useful payloads and bypasses for Web Application Security. Feel free to improve with your payloads and techniques ! I ❤️ pull requests :)

You can also contribute with a 🍻 IRL, or using the sponsor button.

Every section contains the following files, you can use the _template_vuln folder to create a new chapter:

  • README.md - vulnerability description and how to exploit it, including several payloads
  • Intruder - a set of files to give to Burp Intruder
  • Images - pictures for the README.md
  • Files - some files referenced in the README.md

You might also like the Methodology and Resources folder :

You want more ? Check the Books and Youtube videos selections.

Languages
Python 83.8%
Ruby 6.3%
ASP.NET 3.8%
XSLT 2.6%
Classic ASP 1.4%
Other 1.9%