Vunnm 273da9e1b5
Add JSON simple with form
Add JSON simple paylaod with autosubmit form. Using autosubmit form instead of AJax, allow to bypass some protection like the Standard Enhanced Tracking Protection in Firfefox, which will refuse to send cookie with  cross-site  Ajax request (tested with Firefox 115.0.2esr),.
2023-08-05 14:39:33 +02:00
2023-07-18 11:16:36 +03:00
2023-01-04 21:06:36 +05:30
2023-06-22 19:03:06 +02:00
2022-10-11 18:49:17 +02:00
2023-07-07 23:10:33 +02:00
2022-11-06 12:28:26 +01:00
2023-08-05 14:39:33 +02:00
2022-10-12 12:13:55 +02:00
2022-10-12 12:13:55 +02:00
2022-10-12 12:13:55 +02:00
2023-06-10 20:08:23 +02:00
2023-06-10 20:08:23 +02:00
2023-01-11 23:19:26 +01:00
2022-10-17 11:07:33 +02:00
2022-10-12 20:35:32 +02:00
2022-10-24 12:28:31 -05:00
2023-06-29 10:19:14 +00:00
2022-10-12 12:13:55 +02:00
2022-10-12 12:13:55 +02:00
2023-07-07 23:10:33 +02:00
2022-08-09 11:02:21 +02:00
2022-10-26 20:36:15 -05:00
2022-05-01 00:47:18 +09:00
2023-07-16 23:44:00 +08:00
2020-12-13 04:34:10 +11:00
2023-06-22 19:03:06 +02:00
2023-04-09 12:35:43 -04:00
2023-07-18 22:19:29 +02:00
2022-10-12 12:13:55 +02:00
2022-08-09 11:02:21 +02:00
2023-07-18 18:23:34 +02:00
2022-09-16 16:37:40 +02:00
2019-05-25 16:27:35 +02:00
2023-03-10 22:14:22 +01:00
2023-03-10 23:20:39 +01:00

Payloads All The Things

A list of useful payloads and bypasses for Web Application Security. Feel free to improve with your payloads and techniques !
I ❤️ pull requests :)

You can also contribute with a 🍻 IRL, or using the sponsor button

Sponsor Tweet

An alternative display version is available at PayloadsAllTheThingsWeb.

📖 Documentation

Every section contains the following files, you can use the _template_vuln folder to create a new chapter:

  • README.md - vulnerability description and how to exploit it, including several payloads
  • Intruder - a set of files to give to Burp Intruder
  • Images - pictures for the README.md
  • Files - some files referenced in the README.md

You might also like the Methodology and Resources folder :

You want more ? Check the Books and Youtube videos selections.

👨‍💻 Contributions

Be sure to read CONTRIBUTING.md

Thanks again for your contribution! ❤️

🧙‍♂️ Sponsors

This project is proudly sponsored by these companies.

Description
No description provided
Readme MIT 17 MiB
Languages
Python 86.2%
Ruby 6.4%
ASP.NET 3.8%
Classic ASP 1.4%
PHP 1.3%
Other 0.8%