No description
  • Python 76.2%
  • ASP.NET 8.7%
  • XSLT 5.9%
  • Classic ASP 3.2%
  • PHP 3.1%
  • Other 2.8%
Find a file
2026-04-22 16:04:22 +02:00
.github
_LEARNING_AND_SOCIALS
_template_vuln Update reference date, fix format 2026-04-22 16:04:22 +02:00
Account Takeover Normalize commands, callbacks and references 2026-04-22 15:03:31 +02:00
API Key Leaks Normalize commands, callbacks and references 2026-04-22 15:03:31 +02:00
Brute Force Rate Limit
Business Logic Errors Update reference date, fix format 2026-04-22 16:04:22 +02:00
Clickjacking
Client Side Path Traversal Update reference date, fix format 2026-04-22 16:04:22 +02:00
Command Injection Update reference date, fix format 2026-04-22 16:04:22 +02:00
CORS Misconfiguration Update reference date, fix format 2026-04-22 16:04:22 +02:00
CRLF Injection
Cross-Site Request Forgery Update reference date, fix format 2026-04-22 16:04:22 +02:00
CSS Injection Update reference date, fix format 2026-04-22 16:04:22 +02:00
CSV Injection Normalize commands, callbacks and references 2026-04-22 15:03:31 +02:00
CVE Exploits Update reference date, fix format 2026-04-22 16:04:22 +02:00
Denial of Service
Dependency Confusion
Directory Traversal Update reference date, fix format 2026-04-22 16:04:22 +02:00
DNS Rebinding Update reference date, fix format 2026-04-22 16:04:22 +02:00
DOM Clobbering Update reference date, fix format 2026-04-22 16:04:22 +02:00
Encoding Transformations
External Variable Modification
File Inclusion Update reference date, fix format 2026-04-22 16:04:22 +02:00
Google Web Toolkit
GraphQL Injection Update reference date, fix format 2026-04-22 16:04:22 +02:00
Headless Browser Normalize commands, callbacks and references 2026-04-22 15:03:31 +02:00
Hidden Parameters
HTTP Parameter Pollution
Insecure Deserialization Update reference date, fix format 2026-04-22 16:04:22 +02:00
Insecure Direct Object References
Insecure Management Interface Update reference date, fix format 2026-04-22 16:04:22 +02:00
Insecure Randomness
Insecure Source Code Management Update reference date, fix format 2026-04-22 16:04:22 +02:00
Java RMI
JSON Web Token Update reference date, fix format 2026-04-22 16:04:22 +02:00
LaTeX Injection
LDAP Injection Update reference date, fix format 2026-04-22 16:04:22 +02:00
Mass Assignment
Methodology and Resources
NoSQL Injection
OAuth Misconfiguration
Open Redirect
ORM Leak
Prompt Injection Update reference date, fix format 2026-04-22 16:04:22 +02:00
Prototype Pollution
Race Condition
Regular Expression
Request Smuggling
Reverse Proxy Misconfigurations
SAML Injection Normalize commands, callbacks and references 2026-04-22 15:03:31 +02:00
Server Side Include Injection Normalize commands, callbacks and references 2026-04-22 15:03:31 +02:00
Server Side Request Forgery Normalize commands, callbacks and references 2026-04-22 15:03:31 +02:00
Server Side Template Injection Update reference date, fix format 2026-04-22 16:04:22 +02:00
SQL Injection Update reference date, fix format 2026-04-22 16:04:22 +02:00
Tabnabbing
Type Juggling
Upload Insecure Files Update reference date, fix format 2026-04-22 16:04:22 +02:00
Virtual Hosts
Web Cache Deception
Web Sockets
XPATH Injection
XS-Leak
XSLT Injection
XSS Injection Update reference date, fix format 2026-04-22 16:04:22 +02:00
XXE Injection Update reference date, fix format 2026-04-22 16:04:22 +02:00
Zip Slip Update reference date, fix format 2026-04-22 16:04:22 +02:00
.gitignore
CONTRIBUTING.md Normalize commands, callbacks and references 2026-04-22 15:03:31 +02:00
custom.css
DISCLAIMER.md
LICENSE
mkdocs.yml
README.md

Payloads All The Things

A list of useful payloads and bypasses for Web Application Security. Feel free to improve with your payloads and techniques!

You can also contribute with a 🍻 IRL, or using the sponsor button.

Sponsor Tweet

An alternative display version is available at PayloadsAllTheThingsWeb.

banner

📖 Documentation

Every section contains the following files, you can use the _template_vuln folder to create a new chapter:

  • README.md - vulnerability description and how to exploit it, including several payloads
  • Intruder - a set of files to give to Burp Intruder
  • Images - pictures for the README.md
  • Files - some files referenced in the README.md

You might also like the other projects from the AllTheThings family :

You want more? Check the Books and YouTube channel selections.

🧑‍💻 Contributions

Be sure to read CONTRIBUTING.md

sponsors-list

Thanks again for your contribution! ❤️

🍻 Sponsors

This project is proudly sponsored by these companies.

Logo Description
sponsor-serpapi SerpApi is a real time API to access Google search results. It solves the issues of having to rent proxies, solving captchas, and JSON parsing.
sponsor-projectdiscovery ProjectDiscovery - Detect real, exploitable vulnerabilities. Harness the power of Nuclei for fast and accurate findings without false positives.
sponsor-vaadata VAADATA - Ethical Hacking Services