0% found this document useful (0 votes)
2K views2 pages

Kumpulan Payload 2024 (SFILE

The document provides various payload examples for bypassing security, including payloads for enhanced, direct bypass, websocket non-SSL, direct, and SSL payloads. It also mentions changing default payloads and adjusting existing SSH payloads.

Uploaded by

imammunir0707
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as TXT, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
2K views2 pages

Kumpulan Payload 2024 (SFILE

The document provides various payload examples for bypassing security, including payloads for enhanced, direct bypass, websocket non-SSL, direct, and SSL payloads. It also mentions changing default payloads and adjusting existing SSH payloads.

Uploaded by

imammunir0707
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as TXT, PDF, TXT or read online on Scribd
You are on page 1/ 2

KUMPULAN PAYLOD

#PAYLOAD ENHANCED
1
PATCH / HTTP/1.1[crlf]Host: [host_port][crlf]Upgrade: Websocket[crlf]Connection:
Keep-Alive[crlf]X-Forward-Host: isi bug[crlf]Connection: Keep-Alive[crlf]Upgrade:
websocket[crlf][crlf]

2
PROPATCH / HTTP/1.1[crlf]Host: [host_port][crlf]Upgrade: Websocket[crlf]Connection:
Keep-Alive[crlf]X-Forward-Host: isi bug[crlf]Connection: Keep-Alive[crlf]Upgrade:
websocket[crlf][crlf]

3
PUT / HTTP/1.1[crlf]Host: [host_port][crlf]Upgrade: Websocket[crlf]Connection:
Keep-Alive[crlf]Referer: isi bug[crlf]Upgrade: websocket[crlf][crlf]

#PAYLOAD DIRECT BYPAS

GET http://m.twitter.com/ HTTP/1.1[crlf]Host: m.twitter.com[crlf][crlf]CONNECT


[host_port] [protocol][crlf][crlf]

GANTI BUG ANDALAN ANDA

#PAYLOAD DIRECT

GET /worryfree/ssh HTTP/1.1[crlf]Host: BUG[crlf]User-Agent: [ua][crlf]Upgrade:


websocket[crlf][crlf]
(direct terbaru)

GET HTTP/1.1[crlf]Host: BUG[crlf]User-Agent: [ua][crlf]Upgrade: websocket[crlf]


[crlf] (direct versi lama

#PAYLOAD WEBSOCKET NON SSL

GET /cdn-cgi/trace HTTP/1.1[crlf]Host: BUG[crlf][crlf]CF-RAY / HTTP/1.1[crlf]Host:


[host][crlf]Upgrade: Websocket[crlf]Connection: Keep-Alive[crlf]User-Agent: [ua]
[crlf]Upgrade: websocket[crlf][crlf]

(ALL OPOK)

GET / HTTP/1.1[crlf]Host: [host_port][crlf]Upgrade: Websocket[crlf]Connection:


Keep-Alive[crlf]X-Forward-Host: isi bug[crlf]Connection: Keep-Alive[crlf]User-
Agent: [ua][crlf]Upgrade: websocket[crlf][crlf]
(WEBSOKET v1) CONNECT / HTTP/1.1[crlf]Host: [host_port][crlf]Upgrade:
Websocket[crlf]Connection: Keep-Alive[crlf]X-Online-Host: isi bug[crlf]Connection:
Keep-Alive[crlf]User-Agent: [ua][crlf]Upgrade: websocket[crlf][crlf]

(webskoket v2)

GET / HTTP/1.1[crlf]Host: [host_port]@isi bug[crlf]Upgrade:


Websocket[crlf]Connection: Keep-Alive[crlf]X-Online-Host: isi bug[crlf]Connection:
Keep-Alive[crlf]Upgrade: websocket[crlf][crlf]

(webskoket v3)

#PAYLOAD SSL
GET-CDN
wss://bug.com [protocol][crlf]Host: [host][crlf]Upgrade: websocket[crlf][crlf] (v1)
GET wss://bug.com [protocol][crlf]Host: [host][crlf]Upgrade: websocket[crlf][crlf]
(v1)

yang lain bisa menyesuaikan payload yang ada di ssh

Powered By:@kiplymacho

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy