Shazzer logo

Characters allowed between slashes using XSS type

Chrome logo 5
Firefox logo 5
Edge logo 5
Safari logo 5

This is an example how you can use the XSS type to fuzz URLs. It uses a base tag to get round the sandboxed iframe problems.

hackvertor
Created byhackvertor
Created Jan 16, 2025
Updated May 27, 2025

Tweet
Detecting browser...
CategoryURL Handling
VisibilityPublic
TypeXSS
CharsetUTF-8
Code used before fuzz:
<script>window.onerror=x=>true;</script>0x0D
<base href="https://example.com" />
Template used:
<a href="/$[chr]/example2.com" id=x></a>
Code used after fuzz:
x.host === "example2.com" && log($[i])

Sample payloads

<a href="/0x09/example2.com" id=x></a>
<a href="/
/example2.com" id=x></a>
<a href="/0x0D/example2.com" id=x></a>
<a href="///example2.com" id=x></a>
<a href="/\/example2.com" id=x></a>

Fuzz results

Chrome logo
Chrome 144.0.0.0 desktop Windows NT 10.0

Updated

Sun Jan 25 2026
Found 5 results
Loading...
Chrome logo
Chrome 132.0.0.0 desktop macOS 10.15.7older version

Updated

Thu Jan 16 2025
Found 5 results
Loading...
Firefox logo
Firefox 147.0 desktop Linux

Updated

Sun Feb 01 2026
Found 5 results
Loading...
Firefox logo
Firefox 140.0 desktop Linux Unknownolder version

Updated

Tue Oct 28 2025
Found 5 results
Loading...
Firefox logo
Firefox 134.0 desktop macOS 10.15older version

Updated

Thu Jan 16 2025
Found 5 results
Loading...
Edge logo
Microsoft Edge 144.0.0.0 desktop Windows NT 10.0

Updated

Sat Jan 31 2026
Found 5 results
Loading...
Safari logo
Safari 18.2 desktop macOS 10.15.7

Updated

Fri Jan 17 2025
Found 5 results
Loading...
Safari logo
Safari 18.2 mobile iOS 18.2.1

Updated

Thu Jan 16 2025
Found 5 results
Loading...