These tests are meant to be copy/paste friendly for Burp Repeater (then right-click -> run Auto Payload Positioner -> verify Intruder insertion points).
Notes:
- Montoya does not allow zero-length insertion points. This extension inserts the placeholder
__DELETE_ME__into empty values so you can fuzz them. - When placeholders are applied, the request sent to Intruder is intentionally modified (you will see
__DELETE_ME__). - Expected insertion points below are the minimum required. Additional insertion points may appear depending on headers/URL mode selected.
Body:
{"username":"alice","age":21,"active":true}Expected insertion points include:
alice21true
Body:
{"user":{"profile":{"displayName":"Alice","email":"a@example.com"}}}Expected insertion points include:
Alicea@example.com
Body:
{"items":[{"id":1,"name":"one"},{"id":2,"name":"two"}]}Expected insertion points include:
1one2two
Body:
{"a":"same","b":"same","c":["same","same"]}Expected insertion points include:
same(4 separate insertion points total)
Body:
{"embedded":"{\"json\":\"thisisembedded\",\"key\":1}"}Expected insertion points include:
thisisembedded1
Body:
{"rows":["{\"id\":1,\"name\":\"one\"}","{\"id\":2,\"name\":\"two\"}"]}Expected insertion points include:
1one2two
Body:
{"{\"type\":\"user\",\"id\":123}":"value","normal":"ok"}Expected insertion points include:
user123valueok
Body:
{"stats":[{"longTasks":[{"name":"unknown","embedded":"{\"json\":\"thisisembedded\",\"key\":1}","duration":246,"url":"https://github.com/"}],"timestamp":1771650231826,"loggedIn":false,"staff":false,"bundler":"rspack","ui":false,"app":"landing-pages","ssr":"true"}]}Expected insertion points include:
unknownthisisembedded1246https://github.com/1771650231826false(multiple positions may exist)rspacklanding-pagestrue
Request:
POST /test/empty HTTP/1.1
Host: example.com
Content-Type: text/plain
data=&x=1Expected behavior:
- Request sent to Intruder contains:
data=__DELETE_ME__&x=1Expected insertion points include: __DELETE_ME__1
Request:
GET /search?q=&page=2 HTTP/1.1
Host: example.comExpected behavior:
- Request sent to Intruder contains
q=__DELETE_ME__Expected insertion points include: __DELETE_ME__2
Request:
POST /test/json-empty HTTP/1.1
Host: example.com
Content-Type: application/json
{"data":"","ok":"yes"}Expected behavior:
- Request sent to Intruder contains
"data":"__DELETE_ME__"Expected insertion points include: __DELETE_ME__yes
Body:
<root><user id="42" role="admin">alice</user><meta token="abc123"/></root>Expected insertion points include:
42adminaliceabc123
Request:
POST /test/mixed-json HTTP/1.1
Host: example.com
Content-Type: text/plain
prefix=ok payload={"name":"alice","age":21,"active":true} suffix=endExpected insertion points include:
okalice21trueend
Request:
POST /test/mixed-xml HTTP/1.1
Host: example.com
Content-Type: text/plain
log=<event type="click">buttonA</event>&status=doneExpected insertion points include:
clickbuttonAdone
Request:
POST /test/kv HTTP/1.1
Host: example.com
Content-Type: text/plain
a=1&b=hello-world&c=true&token=xyz123Expected insertion points include:
1hello-worldtruexyz123
Request:
POST /test/form HTTP/1.1
Host: example.com
Content-Type: application/x-www-form-urlencoded
username=alice&password=secret123&remember=trueExpected insertion points include:
alicesecret123true
Request:
GET /search?q=payload&page=2&sort=desc HTTP/1.1
Host: example.comExpected insertion points include:
payload2desc
Request:
GET /api HTTP/1.1
Host: example.com
Authorization: Bearer token-part-123
Cookie: sid=abc123; theme=dark; locale=en-US
X-Custom: hello-header
Expected insertion points include:
token-part-123abc123darken-UShello-header