Go to file
Quentin Ligier 6bbdc85aa2 XXE: Improve the documentation
- Add two references: "OWASP XXE prevention cheat sheet" and "XXE: How to become a Jedi"
- Describe the Parameters Laugh attack
- Expand the WAF bypass method with UTF-7
- Update the summary
2022-10-03 17:14:22 +02:00
2022-08-05 12:00:41 +02:00
2022-10-02 06:13:01 +00:00
2021-11-23 14:04:53 -03:00
2022-03-30 03:16:37 -04:00
2022-10-01 19:56:49 +00:00
2022-10-01 19:56:49 +00:00
2022-10-01 19:56:49 +00:00
2022-10-02 06:13:01 +00:00
2021-10-27 16:19:56 -04:00
2022-10-02 12:24:39 +02:00
2022-10-02 06:13:01 +00:00
2022-10-02 06:13:01 +00:00
2022-08-09 11:02:21 +02:00
2022-02-22 15:57:04 +01:00
2022-09-23 00:36:41 +02:00
2022-10-02 06:13:01 +00:00
2022-10-02 06:13:01 +00:00
2022-08-09 11:02:21 +02:00
2022-05-01 00:47:18 +09:00
2022-10-02 06:13:01 +00:00
2022-10-02 06:13:01 +00:00
2020-12-13 04:34:10 +11:00
2022-09-06 10:03:49 +02:00
2022-10-02 06:13:01 +00:00
2022-10-02 06:13:01 +00:00
2022-10-02 06:13:01 +00:00
2022-08-09 11:02:21 +02:00
2022-10-02 06:13:01 +00:00
2022-09-16 16:37:40 +02:00
2019-05-25 16:27:35 +02:00
2022-10-02 12:24:39 +02:00

Payloads All The Things

A list of useful payloads and bypasses for Web Application Security. Feel free to improve with your payloads and techniques !
I ❤️ pull requests :)

You can also contribute with a 🍻 IRL, or using the sponsor button

Sponsor Tweet

An alternative display version is available at PayloadsAllTheThingsWeb.

📖 Documentation

Every section contains the following files, you can use the _template_vuln folder to create a new chapter:

  • README.md - vulnerability description and how to exploit it, including several payloads
  • Intruder - a set of files to give to Burp Intruder
  • Images - pictures for the README.md
  • Files - some files referenced in the README.md

You might also like the Methodology and Resources folder :

You want more ? Check the Books and Youtube videos selections.

👨‍💻 Contributions

Be sure to read CONTRIBUTING.md

Thanks again for your contribution! ❤️

🧙‍♂️ Sponsors

This project is proudly sponsored by these companies.

Languages
Python 83.8%
Ruby 6.3%
ASP.NET 3.8%
XSLT 2.6%
Classic ASP 1.4%
Other 1.9%