PortSwigger
portswigger.net › web-security › cross-site-scripting › cheat-sheet
Cross-Site Scripting (XSS) Cheat Sheet - 2026 Edition | Web Security Academy
You can download a PDF version of the XSS cheat sheet. This is a PortSwigger Research project.
GitHub
github.com › 0xROI › PortSwigger-XSS-payloads
GitHub - 0xROI/PortSwigger-XSS-payloads: Collection of PortSwigger XSS payloads. · GitHub
Collection of PortSwigger XSS payloads. Contribute to 0xROI/PortSwigger-XSS-payloads development by creating an account on GitHub.
Author 0xROI
Videos
PortSwigger
portswigger.net › research › portable-data-exfiltration
Portable Data exFiltration: XSS for PDFs | PortSwigger Research
May 28, 2024 - Just like how XSS vectors depend on the browser's parsing, PDF injection exploitability can depend on the PDF renderer. I decided to start by targeting Acrobat because I thought the vectors were less likely to work in Chrome. Two things I noticed: 1) You could inject additional annotation actions and 2) if you repair the existing closing parenthesis then the PDF would render. After some experimentation, I came up with a nice payload that injected an additional annotation action, executed JavaScript, and repaired the closing parenthesis: /blah)>>/A<</S/JavaScript/JS(app.alert(1);)/Type/Action>>/>>(
PortSwigger
portswigger.net › bappstore › eb75d39684b845adb457bcb050d1aa1d
XSS Cheatsheet - PortSwigger
October 17, 2023 - XSS Cheatsheet · Professional Community · Download BApp · An extension to incorporate PortSwigger's Cross-site scripting cheat sheet in to Burp. Usage · Load the extension · Browse or search for the desired payload · Right-click or Ctrl+C ...
GitHub
github.com › PortSwigger › xss-cheatsheet
GitHub - PortSwigger/xss-cheatsheet · GitHub
An extension to incorporate PortSwigger's Cross-site scripting cheat sheet in to Burp. Usage is straightforward. Load the extension, browse to or search for the desired payload, then right click or Ctrl+C to copy.
Starred by 18 users
Forked by 6 users
Languages Java 99.5% | HTML 0.5%
PortSwigger
portswigger.net › web-security › cross-site-scripting › stored
What is stored XSS (cross-site scripting)? Tutorial & Examples | Web Security Academy
When you have identified links between entry and exit points in the application's processing, each link needs to be specifically tested to detect if a stored XSS vulnerability is present. This involves determining the context within the response where the stored data appears and testing suitable candidate XSS payloads that are applicable to that context.
GitHub
github.com › crawl3r › PortswiggerXSS
GitHub - crawl3r/PortswiggerXSS: gathers the XSS cheatsheet payloads and creates a usable wordlist · GitHub
Disclaimer: Not the cleanest code but it works :) Cheatsheet: https://portswigger.net/web-security/cross-site-scripting/cheat-sheet · Thank you ArenasDev for adding the following parameters and functionality: -tag for tag filtering -event for event filtering -filename for setting the name of the filtered list -update to force update (it wont update if there is an existing payload file)
Starred by 74 users
Forked by 20 users
Languages Go
PortSwigger
portswigger.net › research › cross-site-scripting-research
Cross Site Scripting (XSS) Research | PortSwigger Research
View the latest cross-site scripting (XSS) research papers, tools, and techniques, from PortSwigger Research. Includes introductory and advanced content.
PortSwigger
portswigger.net › kb › papers › portable-data-exfiltration.pdf pdf
Portable Data exFiltration: XSS for PDFs
Just like how XSS vectors depend on the browser's parsing, PDF injection exploitability can depend on the PDF · renderer. I decided to start by targeting Acrobat because I thought the vectors were less likely to work in Chrome. Two · things I noticed: 1) You could inject additional annotation actions and 2) if you repair the existing closing parenthesis · then the PDF would render. After some experimentation, I came up with a nice payload that injected an additional
Deepeddyinfosec
deepeddyinfosec.github.io › content › tutorials › XSS Payload Examples.pdf pdf
Cross-Site Scripting (XSS) Payload Examples
XSS-Payload-List: https://github.com/payloadbox/xss-payload-list · • · Portswigger XSS Cheat Sheet: https://portswigger.net/web-security/cross-site-scripting/cheat-sheet · This tutorial was created by @deepeddyinfosec. www.deepeddyinfosec.com · Updated 10/25/2020 ·
GitHub
github.com › PortSwigger › xss-cheatsheet-data
GitHub - PortSwigger/xss-cheatsheet-data: This repository contains all the XSS cheatsheet data to allow contributions from the community. · GitHub
This repository contains all the XSS cheatsheet data to allow contributions from the community. - PortSwigger/xss-cheatsheet-data
Starred by 453 users
Forked by 89 users
PortSwigger
portswigger.net › research › one-xss-cheatsheet-to-rule-them-all
One XSS cheatsheet to rule them all | PortSwigger Research
September 4, 2020 - XSS cheatsheet vectors JavaScript HTML · Back to all articles · 03 September 2025 Cookie Chaos: How to bypass __Host and __Secure cookie prefixes · 22 January 2025 Stealing HttpOnly cookies with the cookie sandwich technique · 04 December 2024 Bypassing WAFs with the phantom $Version cookie · 29 October 2024 New crazy payloads in the URL Validation Bypass Cheat Sheet
PortSwigger
portswigger.net › web-security › cross-site-scripting › contexts
Cross-site scripting contexts | Web Security Academy
Instead, you simply need to use the ${...} syntax to embed a JavaScript expression that will be executed when the literal is processed. For example, if the XSS context is as follows: <script> ... var input = `controllable data here`; ... </script> ...
GitHub
github.com › ChrisM-X › PortSwigger-Academy-CheatSheets
GitHub - ChrisM-X/PortSwigger-Academy-CheatSheets: This repository contains cheatsheets and payloads compiled from completing the labs at PortSwigger Academy. · GitHub
This repository contains cheatsheets and payloads compiled from completing the labs at PortSwigger Academy. - ChrisM-X/PortSwigger-Academy-CheatSheets
Starred by 133 users
Forked by 50 users
Languages Python
PortSwigger
portswigger.net › burp › documentation › desktop › testing-workflow › vulnerabilities › input-validation › xss › testing-for-blind-xss
Testing for blind XSS - PortSwigger
1 month ago - To test for blind XSS vulnerabilities, you can use Burp Suite to inject an XSS payload that may trigger an out-of-band interaction with the Burp Collaborator server. Burp monitors the Collaborator server to identify whether an out-of-band ...
PortSwigger
portswigger.net › support › xss-filters-beating-length-limits-using-spanned-payloads
XSS Filters: Beating Length Limits Using Spanned Payloads - PortSwigger
A powerful technique for beating length limits is to span an attack payload across multiple different locations where user-controllable input is inserted into the same returned page.
PortSwigger
portswigger.net › support › xss-filters-beating-length-limits-using-shortened-payloads
XSS Filters: Beating Length Limits Using Shortened Payloads - PortSwigger
An attacker can exploit the behavior of window.name by using any website under his control to store a large JavaScript payload. The example uses a version of the "Magical Code Injection Rainbow" taken from OWASP's Broken Web Application Project.