How to bypass sanitization of < while exploiting a xss vulnerability?


what ever is right to < is being deleted if i dont have a following >, else every thing in between < and > is being deleted. Is there a way to bypass this sanitization?