PROFESSIONAL
Predefined payload lists
-
Last updated: May 15, 2023
-
Read time: 1 Minute
Burp Intruder includes a range of built-in payload lists. You can use these to quickly and easily generate payloads for various attacks.
Using predefined payload lists
You can use a predefined payload list with any payload type that uses a list of strings:
- Go to Intruder > Payloads, and select an appropriate payload type.
- Click Add from list... in the Payload settings field.
- Select a list from the drop-down menu. The list loads in the Payload settings field.
- If the list includes placeholders, set up a rule to process them.
Note
You can load your own directory of custom payload lists in the Settings dialog. Click on Settings to open the dialog. For more information, see Intruder settings.
Placeholders
Some of the predefined payload lists include placeholders, for example {KNOWNFILE}
or {domain}
.

To process a placeholder correctly in your attack, set up a processing rule:
- Go to Intruder > Payloads, and scroll down to the Payload processing field.
- Click Add. A window opens with a drop-down list of processing rules.
- Select Match / replace.
- In the Match regex box, type in the placeholder used in the list, for example
{KNOWNFILE}
or{domain}
. - In the Replace with box, type in the placeholder replacement. For example, application.exe instead of
{KNOWNFILE}
, or portswigger.net instead of{domain}
.