XSS Payloads
Context-aware: HTML attribute, JavaScript string, URL parameter, JSON value, and SVG-based payloads with WAF bypass variants.
Free account required
Generate context-aware XSS, SQLi, SSRF, and SSTI payloads for security testing.
Generate bypass-aware payloads for every major vulnerability class. Context-sensitive encoding (URL, HTML, JavaScript, base64), WAF evasion variants, and format-specific payloads for JSON, XML, and HTTP headers. Every payload includes a curl command ready for testing.
What it detects
Detection capabilities
Context-aware: HTML attribute, JavaScript string, URL parameter, JSON value, and SVG-based payloads with WAF bypass variants.
Database-specific payloads (MySQL, PostgreSQL, MSSQL, SQLite, Oracle) including time-based blind, union, and error-based.
Cloud metadata endpoint variants, protocol wrappers (file://, dict://, gopher://), and IP obfuscation techniques.
Template engine polyglot probes for Jinja2, Twig, Freemarker, ERB, and Velocity with escalation payloads.
Step-by-step guide
Choose XSS, SQLi, SSRF, SSTI, Path Traversal, or Command Injection. Sub-types appear based on your selection.
Specify where the payload lands (HTML, attribute, JS, URL) for accurate context-aware generation.
Each payload comes with a one-click copy and an annotated curl command ready for PoC documentation.
Keep going
Decode JWT tokens and test for algorithm confusion, weak secrets, and common exploits.
Use tool →
Find open redirects, SSRF indicators, and injection points in any URL.
Use tool →
Inspect HTTP security headers and detect missing CSP, HSTS, and clickjacking protections.
Use tool →