有效载荷
Git 所有有效载荷!Web 攻击负载的集合。欢迎请求请求!
用法
运行./get.sh以下载外部有效负载并解压缩任何压缩的有效负载文件。
有效载荷学分
fuzzdb -
https://github.com/fuzzdb-project/fuzzdbSecLists -
https://github.com/danielmiessler/SecListsxsuperbug -
https://github.com/xsuperbug/payloadsNickSanzotta -
https://github.com/NickSanzotta/BurpIntruder7ioSecurity -
https://github.com/7ioSecurity/XSS-Payloadsshadsidd -
https://github.com/shadsiddshikari1337 -
https://www.shikari1337.com/list-of-xss-payloads-for-cross-site-scripting/xmendez -
https://github.com/xmendez/wfuzzminimaxir -
https://github.com/minimaxir/big-list-of-naughty-stringsxsscx -
https://github.com/xsscx/Commodity-Injection-SignaturesTheRook -
https://github.com/TheRook/subbrutedanielmiessler -
https://github.com/danielmiessler/RobotsDisallowedFireFart -
https://github.com/FireFart/HashCollision-DOS-POCHybrisDisaster -
https://github.com/HybrisDisaster/aspHashDoSswisskyrepo -
https://github.com/swisskyrepo/PayloadsAllTheThings1N3 -
https://github.com/1N3/IntruderPayloadscujanovic -
https://github.com/cujanovic/Open-Redirect-Payloadscujanovic -
https://github.com/cujanovic/Content-Bruteforcing-Wordlistcujanovic -
https://github.com/cujanovic/subdomain-bruteforce-listcujanovic -
https://github.com/cujanovic/CRLF-Injection-Payloadscujanovic -
https://github.com/cujanovic/Virtual-host-wordlistcujanovic -
https://github.com/cujanovic/dirsearch-wordlistlavalamp- -
https://github.com/lavalamp-/password-listsarnaudsoullie -
https://github.com/arnaudsoullie/ics-default-passwordsscadastrangelove -
https://github.com/scadastrangelove/SCADAPASS让琴 -
https://github.com/jeanphorn/wordlistj3ers3 -
https://github.com/j3ers3/PassListnyxxxie -
https://github.com/nyxxxie/awesome-default-passwordsfoospidy -
https://github.com/foospidy/web-cve-teststerjanq -
https://github.com/terjanq/Tiny-XSS-PayloadsOWASP
dirbuster -
https://www.owasp.org/index.php/DirBusterfuzzing_code_database -
https://www.owasp.org/index.php/Category:OWASP_Fuzzing_Code_DatabaseJBroFuzz -
https://www.owasp.org/index.php/JBroFuzz其他
xss/ismailtasdelen.txt -
https://github.com/ismailtasdelen/xss-payload-listxss/jsf__k.txt -
http://www.jsfuck.com/xss/kirankarnad.txt -
https://www.linkedin.com/pulse/20140812222156-79939846-xss-vectors-you-may-need-as-a-pen-testerxss/packetstorm.txt -
https://packetstormsecurity.com/files/112152/Cross-Site-Scripting-Payloads.htmlxss/smeegesec.com.txt -
http://www.smeegesec.com/2012/06/collection-of-cross-site-scripting-xss.htmlxss/d3adend.org.txt -
http://d3adend.org/xss/ghettoBypassxss/soaj1664ashar.txt -
http://pastebin.com/u6FY1xDAxss/billsempf.txt -
https://www.sempf.net/post/Six-hundred-and-sixty-six-XSS-vectors-suitable-for-attacking-an-API.aspx(
http://pastebin. com/48WdZR6L)
xss/787373.txt -
https://84692bb0df6f30fc0687-25dde2f20b8e8c1bda75aeb96f737eae.ssl.cf1.rackcdn.com/--xss.htmlxss/bhandarkar.txt -
http://hackingforsecurity.blogspot.com/2013/11/xss-cheat-sheet-huge-list.htmlxss/xssdb.txt -
http://xssdb.net/xssdb.txtxss/0xsobky.txt -
https://github.com/0xsobky/HackVault/wiki/Unleashing-an-Ultimate-XSS-Polyglotxss/secgeek.txt -
https://www.secgeek.net/solutions-for-xss-waf-challenge/xss/reddit_xss_get.txt - 来自
https://www.reddit.com/r/xss的所有 XSS GET 请求(截至 2016 年 3 月 30 日)
xss/rafaybaloch.txt -
http://www.rafayhackingarticles.net/2016/09/breaking-great-wall-of-web-xss-waf.htmlxss/alternume0.txt -
https://www.openbugbounty.org/reports/722726/xss/XssPayloads -
https://twitter.com/XssPayloadssqli/camoufl4g3.txt -
https://github.com/camoufl4g3/SQLi-payload-Fuzz3R/blob/master/payloads.txtsqli/c0rni3sm.txt -
http://c0rni3sm.blogspot.in/2016/02/a-quite-rare-mssql-injection.htmlsqli/sqlifuzzer.txt -
https://github.com/ContactLeft/sqlifuzzer/tree/master/payloadssqli/harisec.txt -
https://hackerone.com/reports/297478sqli/jstnkndy.txt -
https://foxglovesecurity.com/2017/02/07/type-juggling-and-php-object-injection-and-sqli-oh-my/sqli/d0znpp.txt -
https://medium.com/@d0znpp/how-to-bypass-libinjection-in-many-waf-ngwaf-1e2513453c0fsqli/libinjection-bypasses.txt -
https://gist.github.com/migolovanov/432fe28c8c7e9fa675ab3903c5eda77f遍历/dotdotpwn.txt -
https://github.com/wireghoul/dotdotpwn代码注入/fede.txt -
https://techblog.mediaservice.net/2016/10/exploiting-ognl-injection/命令注入/ismailtasdelen-unix.txt -
https://github.com/ismailtasdelen/command-injection-payload-list命令注入/ismailtasdelen-windows.txt -
https://github.com/ismailtasdelen/command-injection-payload-listCTF
从数据包捕获或捕获标志 (ctf) 事件的日志文件中提取的请求。主要是原始数据,因此并非所有请求都是实际有效负载,但是应该对请求进行重复数据删除。
maccdc2010.txt - 中大西洋 CCDC (
http://maccdc.org/),来源:
http ://www.netresec.com/?page=MACCDCmaccdc2011.txt - 中大西洋 CCDC (
http://maccdc.org/),来源:
http ://www.netresec.com/?page=MACCDCmaccdc2012.txt - 中大西洋 CCDC (
http://maccdc.org/),来源:
http ://www.netresec.com/?page=MACCDCists12_2015.txt - 信息安全人才搜索(
http://ists.sparsa.org/),来源:
http ://www.netresec.com/?page=ISTSdefcon20.txt - DEFCON 夺旗 (
https://www.defcon.org/html/links/dc-ctf.html),来源:
http ://www.netresec.com/?page=PcapFiles各种各样的
可能与上面已包含的来源重叠的 XSS 引用:
https://www.owasp.org/index.php/XSS_Filter_Evasion_Cheat_Sheet
http://htmlpurifier.org/live/smoketests/xssAttacks.php
原文地址;https://github.com/foospidy/payloads