This is an example how you can use the XSS type to fuzz URLs. This one fuzzes characters before the JavaScript protocol. It uses a base tag to get round the sandboxed iframe problems.
<script>window.onerror=x=>true;</script>0x0D
<base href="https://example.com" /><a href="$[chr]javascript:" id=x></a>x.protocol === 'javascript:' && log($[i])<a href="0x01javascript:" id=x></a><a href="0x02javascript:" id=x></a><a href="0x03javascript:" id=x></a><a href="0x04javascript:" id=x></a><a href="0x05javascript:" id=x></a><a href="0x06javascript:" id=x></a><a href="0x07javascript:" id=x></a><a href="0x08javascript:" id=x></a><a href="0x09javascript:" id=x></a><a href="
javascript:" id=x></a><a href="0x0Bjavascript:" id=x></a><a href="0x0Cjavascript:" id=x></a><a href="0x0Djavascript:" id=x></a><a href="0x0Ejavascript:" id=x></a><a href="0x0Fjavascript:" id=x></a><a href="0x10javascript:" id=x></a><a href="0x11javascript:" id=x></a><a href="0x12javascript:" id=x></a><a href="0x13javascript:" id=x></a><a href="0x14javascript:" id=x></a>