🌐
GitHub
github.com › 0xROI › PortSwigger-XSS-payloads
GitHub - 0xROI/PortSwigger-XSS-payloads: Collection of PortSwigger XSS payloads. · GitHub
Collection of PortSwigger XSS payloads. Contribute to 0xROI/PortSwigger-XSS-payloads development by creating an account on GitHub.
Author   0xROI
🌐
PortSwigger
portswigger.net › research › portable-data-exfiltration
Portable Data exFiltration: XSS for PDFs | PortSwigger Research
May 28, 2024 - Just like how XSS vectors depend on the browser's parsing, PDF injection exploitability can depend on the PDF renderer. I decided to start by targeting Acrobat because I thought the vectors were less likely to work in Chrome. Two things I noticed: 1) You could inject additional annotation actions and 2) if you repair the existing closing parenthesis then the PDF would render. After some experimentation, I came up with a nice payload that injected an additional annotation action, executed JavaScript, and repaired the closing parenthesis: /blah)>>/A<</S/JavaScript/JS(app.alert(1);)/Type/Action>>/>>(
🌐
Scribd
scribd.com › document › 795994637 › PortSwigger-XSS
PortSwigger XSS Labs Overview | PDF
[PortSwigger] XSS - Free download as PDF File (.pdf), Text File (.txt) or read online for free.
🌐
PortSwigger
portswigger.net › bappstore › eb75d39684b845adb457bcb050d1aa1d
XSS Cheatsheet - PortSwigger
October 17, 2023 - XSS Cheatsheet · Professional Community · Download BApp · An extension to incorporate PortSwigger's Cross-site scripting cheat sheet in to Burp. Usage · Load the extension · Browse or search for the desired payload · Right-click or Ctrl+C ...
🌐
GitHub
github.com › PortSwigger › xss-cheatsheet
GitHub - PortSwigger/xss-cheatsheet · GitHub
An extension to incorporate PortSwigger's Cross-site scripting cheat sheet in to Burp. Usage is straightforward. Load the extension, browse to or search for the desired payload, then right click or Ctrl+C to copy.
Starred by 18 users
Forked by 6 users
Languages   Java 99.5% | HTML 0.5%
🌐
PortSwigger
portswigger.net › web-security › cross-site-scripting › stored
What is stored XSS (cross-site scripting)? Tutorial & Examples | Web Security Academy
When you have identified links between entry and exit points in the application's processing, each link needs to be specifically tested to detect if a stored XSS vulnerability is present. This involves determining the context within the response where the stored data appears and testing suitable candidate XSS payloads that are applicable to that context.
🌐
GitHub
github.com › crawl3r › PortswiggerXSS
GitHub - crawl3r/PortswiggerXSS: gathers the XSS cheatsheet payloads and creates a usable wordlist · GitHub
Disclaimer: Not the cleanest code but it works :) Cheatsheet: https://portswigger.net/web-security/cross-site-scripting/cheat-sheet · Thank you ArenasDev for adding the following parameters and functionality: -tag for tag filtering -event for event filtering -filename for setting the name of the filtered list -update to force update (it wont update if there is an existing payload file)
Starred by 74 users
Forked by 20 users
Languages   Go
🌐
PortSwigger
portswigger.net › research › cross-site-scripting-research
Cross Site Scripting (XSS) Research | PortSwigger Research
View the latest cross-site scripting (XSS) research papers, tools, and techniques, from PortSwigger Research. Includes introductory and advanced content.
Find elsewhere
🌐
PortSwigger
portswigger.net › kb › papers › portable-data-exfiltration.pdf pdf
Portable Data exFiltration: XSS for PDFs
Just like how XSS vectors depend on the browser's parsing, PDF injection exploitability can depend on the PDF · renderer. I decided to start by targeting Acrobat because I thought the vectors were less likely to work in Chrome. Two · things I noticed: 1) You could inject additional annotation actions and 2) if you repair the existing closing parenthesis · then the PDF would render. After some experimentation, I came up with a nice payload that injected an additional
🌐
Deepeddyinfosec
deepeddyinfosec.github.io › content › tutorials › XSS Payload Examples.pdf pdf
Cross-Site Scripting (XSS) Payload Examples
XSS-Payload-List: https://github.com/payloadbox/xss-payload-list · • · Portswigger XSS Cheat Sheet: https://portswigger.net/web-security/cross-site-scripting/cheat-sheet · This tutorial was created by @deepeddyinfosec. www.deepeddyinfosec.com · Updated 10/25/2020 ·
🌐
GitHub
github.com › PortSwigger › xss-cheatsheet-data
GitHub - PortSwigger/xss-cheatsheet-data: This repository contains all the XSS cheatsheet data to allow contributions from the community. · GitHub
This repository contains all the XSS cheatsheet data to allow contributions from the community. - PortSwigger/xss-cheatsheet-data
Starred by 453 users
Forked by 89 users
🌐
PortSwigger
portswigger.net › research › one-xss-cheatsheet-to-rule-them-all
One XSS cheatsheet to rule them all | PortSwigger Research
September 4, 2020 - XSS cheatsheet vectors JavaScript HTML · Back to all articles · 03 September 2025 Cookie Chaos: How to bypass __Host and __Secure cookie prefixes · 22 January 2025 Stealing HttpOnly cookies with the cookie sandwich technique · 04 December 2024 Bypassing WAFs with the phantom $Version cookie · 29 October 2024 New crazy payloads in the URL Validation Bypass Cheat Sheet
🌐
PortSwigger
portswigger.net › research › our-favourite-community-contributions-to-the-xss-cheat-sheet
Our favourite community contributions to the XSS cheat sheet | PortSwigger Research
October 20, 2022 - View this entry on the XSS cheat sheet · Claiming the top spot, and for good reason, we consider this the best entry that we wanted to highlight. It's from @ladecruze, and uses the location object, base64 decoding, and tagged template strings to execute the payload.
🌐
PortSwigger
portswigger.net › web-security › cross-site-scripting › contexts
Cross-site scripting contexts | Web Security Academy
Instead, you simply need to use the ${...} syntax to embed a JavaScript expression that will be executed when the literal is processed. For example, if the XSS context is as follows: <script> ... var input = `controllable data here`; ... </script> ...
🌐
GitHub
github.com › ChrisM-X › PortSwigger-Academy-CheatSheets
GitHub - ChrisM-X/PortSwigger-Academy-CheatSheets: This repository contains cheatsheets and payloads compiled from completing the labs at PortSwigger Academy. · GitHub
This repository contains cheatsheets and payloads compiled from completing the labs at PortSwigger Academy. - ChrisM-X/PortSwigger-Academy-CheatSheets
Starred by 133 users
Forked by 50 users
Languages   Python
🌐
PortSwigger
portswigger.net › burp › documentation › desktop › testing-workflow › vulnerabilities › input-validation › xss › testing-for-blind-xss
Testing for blind XSS - PortSwigger
1 month ago - To test for blind XSS vulnerabilities, you can use Burp Suite to inject an XSS payload that may trigger an out-of-band interaction with the Burp Collaborator server. Burp monitors the Collaborator server to identify whether an out-of-band ...
🌐
PortSwigger
portswigger.net › support › xss-filters-beating-length-limits-using-spanned-payloads
XSS Filters: Beating Length Limits Using Spanned Payloads - PortSwigger
A powerful technique for beating length limits is to span an attack payload across multiple different locations where user-controllable input is inserted into the same returned page.
🌐
PortSwigger
portswigger.net › support › xss-filters-beating-length-limits-using-shortened-payloads
XSS Filters: Beating Length Limits Using Shortened Payloads - PortSwigger
An attacker can exploit the behavior of window.name by using any website under his control to store a large JavaScript payload. The example uses a version of the "Magical Code Injection Rainbow" taken from OWASP's Broken Web Application Project.