-
Notifications
You must be signed in to change notification settings - Fork 0
/
Copy pathindex.html
70 lines (67 loc) · 3.25 KB
/
index.html
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
<!DOCTYPE html>
<html>
<head>
<meta charset="utf-8">
<meta name="viewport" content="width=device-width, initial-scale=1">
<link rel="stylesheet" media="screen" href="/static/style.css" />
<!-- Primary Meta Tags -->
<title>teler WAF tester!</title>
<meta name="title" content="teler WAF tester!">
<meta name="description" content="Testing your common web attack payloads here!">
<!-- Open Graph / Facebook -->
<meta property="og:type" content="website">
<meta property="og:url" content="https://test.teler.sh/">
<meta property="og:title" content="teler WAF tester!">
<meta property="og:description" content="Testing your common web attack payloads here!">
<meta property="og:image" content="https://user-images.githubusercontent.com/25837540/213121513-79986c70-d21c-4a1a-94c9-4eb5df2982bd.png">
<!-- Twitter -->
<meta property="twitter:card" content="summary_large_image">
<meta property="twitter:url" content="https://test.teler.sh/">
<meta property="twitter:title" content="teler WAF tester!">
<meta property="twitter:description" content="Testing your common web attack payloads here!">
<meta property="twitter:image" content="https://user-images.githubusercontent.com/25837540/213121513-79986c70-d21c-4a1a-94c9-4eb5df2982bd.png">
</head>
<body>
<header role="banner">
<h1>teler-waf tester</h1>
<p>Testing your common web attack payloads here!</p>
</header>
<main id="app" role="main">
<div class="popup" id="init">
<div class="popup-inner" id="popup-inner">
<div class="popup__text">
<h1>What is this?</h1>
<p>This page serves as a demonstration of the <a href="https://github.com/teler-sh/teler-waf" target="_blank">teler-waf</a> package implementation, which is configured with default settings to test the resilience of web applications against common web attack threats.</p>
<p>If you are able to successfully execute such as cross-site scripting (XSS) and pop-up an alert, kindly report it to us via the <a href="https://github.com/teler-sh/teler-waf/security/advisories/new" target="_blank">vulnerability report form</a> under its GitHub repository.</p>
</div>
<a class="popup__close" href="#">X</a>
</div>
</div>
<form method="GET">
<fieldset class="form-item">
<legend>GET</legend>
<div>
<input type="text" name="query" placeholder="query=" class="test">
<button class="btn" type="submit"><span aria-hidden="true" class="material-icons">Submit</span></button>
</div>
</fieldset>
</form>
<form method="POST">
<fieldset class="form-item">
<legend>POST</legend>
<div>
<input type="text" name="body" placeholder="body=" class="test">
<button class="btn" type="submit"><span aria-hidden="true" class="material-icons">Submit</span></button>
</div>
</fieldset>
</form>
<p>Your payload is written here:</p>
<div class="form-item">
<input type="text" value="{{.Query}}" placeholder="querystring" style="width: 49%;">
<input type="text" value="{{.Body}}" placeholder="body" style="width: 49%;">
</div>
</main>
<a href="#init"><img src="https://user-images.githubusercontent.com/25837540/212849713-c9c73940-cc0e-4da0-a34e-c97ba479cfcd.png" class="teler"></a>
<script src="/static/script.js" defer=""></script>
</body>
</html>