I'm making a web penetration test, so I trying to exploit a XSS, I've looked that if I use a payload like the following:
<script>alert(document.domain)</script>
The output in the page will be
<script>alert(document.domain)</script>
So I'm looking for alternatives payloads or valid encoding, already I tryied these encoding:
http://evuln.com/tools/xss-encoder/
Anyone have an idea about exploiting this XSS or is it possible exploiting an xss without using </> ?