Payload Catalogue

Browse our library of 800+ payloads and templates for testing email security.

21 templates
AiTM Payloads

AiTM Payloads

Premium & Enterprise only. AitM phishing uses tooling to act as a proxy between the target and a legitimate login portal for an application. This campaign contains a variety of payloads that can be used to test your defenses against AitM phishing.

5 payloads
All Payloads

All Payloads

This campaign contains all the payloads available to you. Malicious and benign; everything from Office macros, to 'Mark of the Web' bypassing containerised payloads, to threat intel samples. This campaign has it all.

815 payloads
BiTM Payloads

BiTM Payloads

Premium & Enterprise only. BitM phishing is a technique that uses a virtual browser to capture user credentials and session cookies. This campaign contains a variety of payloads that can be used to test your defenses against BitM phishing.

3 payloads
Body Payloads

Body Payloads

Phishing isn't just about attachments and links! Threat actors are leveraging the email body to impersonate brands, provide convincing social engineering pretexts, exploit email client vulnerabilities and deliver other malicious content.

benign
20 payloads
Brand Impersonation

Brand Impersonation

This campaign contains examples of brand impersonation used by real-world threat actors. Be that HTML smuggled content with fake file-sharing site backgrounds, or links to backdoored installers for popular messaging applications.

63 payloads
Browser Testing

Browser Testing

Premium & Enterprise only. Browser-based attack payloads including AiTM proxying, BiTM virtual browsers, ClickFix social engineering, pastejacking clipboard hijacking, and DragFix drag-and-drop abuse. Use this campaign to test your defenses against the full spectrum of browser-targeting techniques.

17 payloads
Callback Phishing

Callback Phishing

The telephone isn't dead! Test your defenses against callback phishing using a variety of file formats, including PDFs and images, that display fake invoices from several big-name brands.

callbackphishing
13 payloads
Container File Testing

Container File Testing

Containers are often used to deliver content that might otherwise be blocked, so use this collection of weaponised ISO, Zip, RAR and 7zip files to test your exposure.

container
benign
89 payloads
delivr.to's Top 10 Payloads

delivr.to's Top 10 Payloads

This campaign contains delivr.to's current top 10 payloads. Highlighting recent trends in threat actor activity and emerging threats, including ICS invites, auth coercion techniques, DragFix and emerging vulnerabilities.

authcoerce
fakecaptcha
exploit
10 payloads
EICAR Testing

EICAR Testing

This campaign puts mail filter Anti-Virus to the test! An EICAR string - a standardised way to test AV - embedded in a variety of formats, including ‘container’ formats such as ISOs, 7zip files, and password-protected zips.

eicar
77 payloads
File Type Testing

File Type Testing

A broad range of file types, all benign, designed to give you insight into what file types can reach your mailbox. This includes executable, document, and container file types, and combinations of all 3 (think LNK in a Zip in an ISO 👀)

benign
228 payloads
Health Check

Health Check

Your one stop shop for testing mail control effectiveness. Includes all the payloads that you wouldn't want to reach your inbox, ranging from EICAR-embedded text documents right through to the latest NOBELIUM sample.

eicar
htmlsmuggling
evasion
498 payloads
HTML Smuggling

HTML Smuggling

This campaign explores variations of payload delivery via HTML smuggling. Payload formats that would otherwise likely be blocked by mail filtering, e.g. .exe and .ps1, are embedded within HTML files and sent as attachments.

htmlsmuggling
85 payloads
Metasploit Payloads

Metasploit Payloads

This campaign includes the default payloads generated by the popular hacking tool, Metasploit. This also includes variations using the built-in 'Shikata Ga Nai' encoder.

malicious
metasploit
msfvenom
28 payloads
OffensiveVBA Office Files

OffensiveVBA Office Files

Contains VBA macros from @S3cur3Th1sSh1t's OffensiveVBA collection. 20+ VBA samples including ETW and AMSI Bypasses, PPID Spoofing and sandbox evasion have been adapted and embedded within popular Microsoft Office formats.

262 payloads
Office File Testing

Office File Testing

Microsoft Office documents are a common vehicle for malware delivery. This campaign delivers a variety of benign Office formats across Word, PowerPoint, Excel and Access. Know your .xlsbs from your .xlams? Or your .wlls from your .docs?

benign
office
91 payloads
Office Macro Evasion

Office Macro Evasion

Not all Microsoft Office VBA macros are created equal! Test your mail filter capabilities against samples that implement evasion techniques such as VBA Stomping, analysis resistance measures and alternative execution methods that steer clear of the classic AutoOpen.

evasion
office
4 payloads
PDF Links

PDF Links

Several malware families, including QakBot, Bumblebee and IcedId have been delivered via PDF attachments containing links to hosted content. These hosted files range from zipped ISO, LNK, DLL combinations, to script formats such as HTAs.

pdf
link
6 payloads
QR Code Phishing

QR Code Phishing

Emulate the threat actors deploying QR codes to bypass email filters. Contains various file formats with QR-coded links to hosted content such as login portals and executables.

qrcode
15 payloads
Threat Intel Samples

Threat Intel Samples

This campaign emulates the tradecraft seen in real-world, email-based attacks. This includes the threat actor, NOBELIUM's, use of DLL-launching LNKs packed into ISOs, and the commonly-abused use of right-to-left-override (RTLO) Unicode characters to obscure an attachment name.

117 payloads
Unwanted File Types

Unwanted File Types

Contains all the file types that delivr.to recommends most organisations block at the perimeter. It includes the common file types such as .exe, .js and .vbs, along with the weird & wonderful such as .pif and .msc.

198 payloads
delivr.to

© 2026 delivr.to. Test your email security with real-world malware replications.

We use cookies!

Hi, this website uses essential cookies to ensure its proper operation and tracking cookies to understand how you interact with it.