Try seeing what words are filtered out of an xss filter, can you trick it? Probably.
Ex: script is removed, but perhaps scscriptript would be stripped to become script
Polyglots
Basically a giant sometimes makes a one size fits all xss payload to break common filters.
Netcat is your friend for potential blind xss, have a way to send a request in the browser via fetch to your machine. If you get a response, nice, it worked!