is successfully executed.
The result for the mentioned fuzzing lists and payload will be the following:
When it is executed in a browser such as Mozilla Firefox, it will alert the executed payloads:
It is possible to use a page to XSS for different tests, such as bypasses for the browser XSS Auditor. The page can receive a GET or POST parameter called payload and will just display its unescaped value.
A live version can be found at
The application is in beta state so it might have bugs. If you would like to report a bug or provide a suggestion, you can use the GitHub repository or you can send me an email to contact [a] xssfuzzer.com.