wavegxz-design/payload-kit

GitHub: wavegxz-design/payload-kit

结构化整理的 Web 漏洞攻击 Payload 速查手册,覆盖八大漏洞类型,每个条目包含场景说明、平台适配和 WAF 绕过变体。

Stars: 0 | Forks: 0


[![版本](https://img.shields.io/badge/version-1.0.0-ef4444?style=for-the-badge&labelColor=0d1117)](https://github.com/wavegxz-design/payload-kit) [![许可证](https://img.shields.io/badge/MIT-8b5cf6?style=for-the-badge&labelColor=0d1117)](LICENSE) [![Payloads](https://img.shields.io/badge/payloads-200+-f97316?style=for-the-badge&labelColor=0d1117)](https://github.com/wavegxz-design/payload-kit) [![分类](https://img.shields.io/badge/categories-8-06b6d4?style=for-the-badge&labelColor=0d1117)](https://github.com/wavegxz-design/payload-kit) [![CTF](https://img.shields.io/badge/CTF-Ready-4ade80?style=for-the-badge&labelColor=0d1117)](https://github.com/wavegxz-design/payload-kit) [![BugBounty](https://img.shields.io/badge/Bug%20Bounty-Ready-ef4444?style=for-the-badge&labelColor=0d1117)](https://github.com/wavegxz-design/payload-kit)
**适用于 CTF 和授权渗透测试的整理好的攻击 Payload。** **每个 Payload 都包含上下文、平台说明以及 WAF 绕过变体。**
[分类](#-categories) · [结构](#-structure) · [用法](#-how-to-use) · [贡献](#-contributing) · [作者](#-author)
## 📦 分类 | # | 类别 | Payloads | 平台 | |---|----------|----------|-----------| | 01 | [SQL 注入](sql-injection/) | 基础 · 报错 · 盲注 · WAF 绕过 | MySQL · PostgreSQL · MSSQL · SQLite | | 02 | [XSS](xss/) | 反射型 · 存储型 · DOM · 过滤器绕过 · Polyglots | 所有浏览器 | | 03 | [SSTI](ssti/) | 检测 · Jinja2 · Twig · Freemarker · Pebble | Python · PHP · Java | | 04 | [命令注入](command-injection/) | Linux · Windows · 盲注 · 绕过 | Bash · PowerShell | | 05 | [LFI / 路径遍历](lfi/) | Linux · Windows · PHP wrappers · 日志投毒 | Apache · Nginx · PHP | | 06 | [XXE](xxe/) | 经典 · 盲注 · OOB · 基于 XXE 的 SSRF | 任意 XML 解析器 | | 07 | [SSRF](ssrf/) | 基础 · 云元数据 · 绕过过滤器 | AWS · GCP · Azure | | 08 | [认证绕过](auth-bypass/) | SQL · JWT · Header 篡改 · 逻辑缺陷 | 任意 | ## 🗂️ 结构 ``` payload-kit/ │ ├── sql-injection/ │ ├── README.md ← category overview + detection │ ├── basic.md ← fundamental payloads │ ├── error-based.md ← extract data via error messages │ ├── blind.md ← boolean & time-based │ └── waf-bypass.md ← encoding, comments, case variants │ ├── xss/ │ ├── README.md │ ├── reflected.md │ ├── stored.md │ ├── dom.md │ └── filter-bypass.md ← tag/attr/event bypass + polyglots │ ├── ssti/ │ ├── README.md ← detection tree + engine fingerprint │ ├── jinja2.md ← Python/Flask │ ├── twig.md ← PHP/Symfony │ └── freemarker.md ← Java │ ├── command-injection/ │ ├── README.md │ ├── linux.md │ ├── windows.md │ └── blind.md ← OOB via DNS/HTTP │ ├── lfi/ │ ├── README.md │ ├── linux.md │ ├── windows.md │ └── php-wrappers.md ← filter, data, expect, zip │ ├── xxe/ │ ├── README.md │ ├── classic.md │ └── blind-oob.md │ ├── ssrf/ │ ├── README.md │ ├── basic.md │ └── cloud-metadata.md ← AWS · GCP · Azure IMDSv1/v2 │ └── auth-bypass/ ├── README.md ├── sql-login.md ├── jwt.md └── logic.md ``` ## 🎯 如何使用 每个 Payload 文件遵循以下格式: ``` ## Payload 名称 **When to use:** specific scenario where this applies **Platform:** MySQL / Apache / Python / etc. **Risk of detection:** Low / Medium / High [payload here] **Notes:** what it does, why it works, common variations ``` **克隆并搜索:** ``` git clone https://github.com/wavegxz-design/payload-kit.git cd payload-kit # 跨所有类别搜索 grep -r "union select" . grep -r "jinja2" . --include="*.md" # 查看特定类别 cat sql-injection/waf-bypass.md ``` ## 🛣️ 路线图 **v1.1** - [ ] 开放重定向 Payload - [ ] CORS 配置错误 - [ ] HTTP Request Smuggling - [ ] GraphQL 注入 **v2.0** - [ ] 搜索脚本 `./search.sh ` - [ ] 按平台过滤:`./search.sh --platform mysql` - [ ] 按类别过滤:`./search.sh --cat sqli` ## 🤝 贡献 添加新的 Payload?请遵循以下格式: ``` git checkout -b feat/new-payload-category # 按照 template 格式添加您的文件 git commit -m "feat: add GraphQL injection payloads" git push origin feat/new-payload-category ``` **规则:** - 每个 Payload 都需要上下文说明 —— 禁止直接堆砌 Payload - 注明平台及其适用场景 - 如适用,包含至少一个 WAF 绕过变体 ## 🔗 相关项目 | 项目 | 描述 | |---------|-------------| | [**webcheck**](https://github.com/wavegxz-design/webcheck) | HTTP 安全审计器 —— 查找这些 Payload 的适用场景 | | [**recon-kit**](https://github.com/wavegxz-design/recon-kit) | 侦察工具包 —— 测试前的情报收集 | | [**NEXORA-TOOLKIT**](https://github.com/wavegxz-design/NEXORA-TOOLKIT) | Android ADB 工具包 |

**[krypthane](https://github.com/wavegxz-design)** · 红队成员 & 开源开发者
[![站点](https://img.shields.io/badge/krypthane.workernova.workers.dev-ef4444?style=flat-square&logo=cloudflare&logoColor=white)](https://krypthane.workernova.workers.dev) [![Telegram](https://img.shields.io/badge/@Skrylakk-ef4444?style=flat-square&logo=telegram&logoColor=white)](https://t.me/Skrylakk) [![邮箱](https://img.shields.io/badge/Workernova@proton.me-ef4444?style=flat-square&logo=protonmail&logoColor=white)](mailto:Workernova@proton.me) [![GitHub](https://img.shields.io/badge/wavegxz--design-ef4444?style=flat-square&logo=github&logoColor=white)](https://github.com/wavegxz-design)
⭐ 如果 payload-kit 在 CTF 或 Bounty 中节省了您的时间,请点个 Star
标签:Bug Bounty, CISA项目, Cutter, LFI, Payload, RuleLab, SSRF, SSTI, WAF绕过, Web安全, XML外部实体注入, XSS, XXE, 可自定义解析器, 命令注入, 安全字典, 攻击向量, 攻击路径可视化, 数据展示, 服务端模板注入, 本地文件包含, 漏洞情报, 红队, 网络安全, 网络安全研究, 自动化分析, 蓝队分析, 认证绕过, 跨站脚本, 防御加固, 隐私保护, 黑客工具