$loading...
Generate out-of-band (OOB) callback payloads for blind vulnerability testing. Supports Burp Collaborator, interactsh, webhook.site, RequestBin, and custom domains. Ready-to-use payloads for DNS, HTTP, XXE, SSRF, XSS, RCE, and blind SQLi. For authorized testing only.
h9wspogozja.interact.shhttp://h9wspogozja.interact.shh9wspogozjanslookup h9wspogozja.interact.sh
dig h9wspogozja.interact.sh
host h9wspogozja.interact.sh
ping -c 1 h9wspogozja.interact.sh
Resolve-DnsName h9wspogozja.interact.sh
python3 -c "import socket; socket.gethostbyname('h9wspogozja.interact.sh')"1. Open Burp Suite Pro 2. Go to Burp > Collaborator client 3. Click "Copy to clipboard" 4. Paste your Collaborator subdomain here
1. Install: go install -v github.com/projectdiscovery/interactsh/cmd/interactsh-client@latest 2. Run: interactsh-client 3. Copy the generated URL 4. Watch for incoming interactions
1. Visit https://webhook.site 2. Copy your unique URL 3. Use it as callback in payloads 4. Monitor incoming requests on the page
1. Set up a VPS with a DNS wildcard 2. Run: python3 -m http.server 80 3. Or use: socat TCP-LISTEN:80,fork - 4. Monitor for incoming connections