diff --git a/payloads/XSS/XSS-bypass.txt b/payloads/XSS/XSS-bypass.txt index 352b0a0..36c3324 100644 --- a/payloads/XSS/XSS-bypass.txt +++ b/payloads/XSS/XSS-bypass.txt @@ -1,12 +1,4 @@ - _____ _ _ _ __ _______ _____ _____ _ _ _ _ -| __ \ | | | | | \ \ / / ___/ ___| / __ \ | | | | | | | -| | \/ |__ ___| |_| |_ ___ \ V /\ `--.\ `--. | / \/ |__ ___ __ _| |_ ___| |__ ___ ___| |_ -| | __| '_ \ / _ \ __| __|/ _ \ / \ `--. \`--. \ | | | '_ \ / _ \/ _` | __/ __| '_ \ / _ \/ _ \ __| -| |_\ \ | | | __/ |_| |_| (_) | / /^\ |\__/ /\__/ / | \__/\ | | | __/ (_| | |_\__ \ | | | __/ __/ |_ - \____/_| |_|\___|\__|\__|\___/ \/ \|____/\____/ \____/_| |_|\___|\__,_|\__|___/_| |_|\___|\___|\__| - -A ghetto collection of XSS payloads that I find to be useful during penetration tests, especially when faced with WAFs or application-based black-list filtering, but feel free to disagree or shoot your AK-74 in the air. - +# A collection of XSS payloads that I find to be useful during penetration tests, especially when faced with WAFs or application-based black-list filtering Simple character manipulations. Note that I use hexadecimal to represent characters that you probably can't type. For example, \x00 equals a null byte, but you'll need to encode this properly depending on the context (URL encoding \x00 = %00).