Skip to content

This repository provides several payloads for the web application fuzzing process, each of which has a different payload

License

Notifications You must be signed in to change notification settings

raytheon0x21/fuzzing

Repository files navigation

Fuzzing Payloads for Web Discovery

This repository provides a set of resources for performing fuzzing activities aimed at discovering web payloads. Fuzzing is a testing technique that involves providing invalid, unexpected, or random data as input to a computer program to identify vulnerabilities and weaknesses. In the context of web security, fuzzing can be used to find potential vulnerabilities in web applications by sending different payloads to different input fields, keep following this project, it will be continuously updated.

Payloads

The payloads directory contains a variety of payloads designed to test different input fields and scenarios on web application. Feel free to contribute additional payloads that can enhance the fuzzing process.

Content

command-Injection.txt
cross-site-scripting.txt
directory-traversal.txt
fuzz.txt
header-pwn.txt
header.txt
ldap-injection.txt
local-file-inclusion1.txt
local-file-inclusion2.txt
no-sql-injection.txt
open-redirect.txt
parameters.txt
password.txt
server-side-request-forgery.txt
server-side-template-injection.txt
sql-injection-authentication-bypass.txt
sql-injection.txt
technologies
username.txt
web-cache-deception.txt
xml-external-entity-injection.txt

Contributing

Contributions are welcome! If you have a new payload, please submit a withdrawal request. Make sure your contributions comply with existing standards and are well documented.

License

This project is licensed under the MIT License - see the LICENSE file for details.

Happy fuzzing! 🚀

About

This repository provides several payloads for the web application fuzzing process, each of which has a different payload

Topics

Resources

License

Stars

Watchers

Forks

Releases

No releases published

Packages

No packages published