+ This test will try to confuse the browser to show the wrong domain in the URL bar by opening an about:blank page,
+ rewriting the content, starting a navigation elsewhere and quickly stopping the
+ navigation using window.stop().
+
+
+
+
\ No newline at end of file
diff --git a/security/address-bar-spoofing/spoof-application-scheme.html b/security/address-bar-spoofing/spoof-application-scheme.html
new file mode 100644
index 0000000..cafbdf0
--- /dev/null
+++ b/security/address-bar-spoofing/spoof-application-scheme.html
@@ -0,0 +1,26 @@
+
+
+
+
+
+
+ URL Spoofing - Unsupported Application Scheme
+
+
+
+
+
+ This test uses an unsupported application scheme and a href target to trick the browser into displaying the href
+ target as the current address bar value, while actually navigating to an attacker controlled page.
+
+
+ This test uses a unicode whitespace character (\u2028) inside the username field of the basicauth portion
+ of the URL to perform an address bar spoofing attack.
+
+
+
+
\ No newline at end of file
diff --git a/security/address-bar-spoofing/spoof-basicauth-2029.html b/security/address-bar-spoofing/spoof-basicauth-2029.html
new file mode 100644
index 0000000..8723c7b
--- /dev/null
+++ b/security/address-bar-spoofing/spoof-basicauth-2029.html
@@ -0,0 +1,23 @@
+
+
+
+
+
+
+ URL Spoofing - Basic Auth Whitespace (2029)
+
+
+
+
+
+ This test uses a unicode whitespace character (\u2029) inside the username field of the basicauth portion
+ of the URL to perform an address bar spoofing attack.
+
+
+
+
\ No newline at end of file
diff --git a/security/address-bar-spoofing/spoof-basicauth-whitespace.html b/security/address-bar-spoofing/spoof-basicauth-whitespace.html
new file mode 100644
index 0000000..fdb5300
--- /dev/null
+++ b/security/address-bar-spoofing/spoof-basicauth-whitespace.html
@@ -0,0 +1,24 @@
+
+
+
+
+
+
+ URL Spoofing - Basic Auth Whitespace Repeated
+
+
+
+
+
+ This test uses 300 repeated unicode whitespace characters inside the username field of the basicauth portion
+ of the URL to perform an address bar spoofing attack.
+
+
+
+
\ No newline at end of file
diff --git a/security/address-bar-spoofing/spoof-form-action.html b/security/address-bar-spoofing/spoof-form-action.html
new file mode 100644
index 0000000..864fd9b
--- /dev/null
+++ b/security/address-bar-spoofing/spoof-form-action.html
@@ -0,0 +1,26 @@
+
+
+
+
+
+
+
+ URL Spoofing - Redirect Form Action
+
+
+
+
+
+ This test uses a form action on a redirect URL to trick the browser into displaying the
+ redirect URL as the current address bar value, while trying to remain on the current page.
+
+
+
+
+
\ No newline at end of file
diff --git a/security/address-bar-spoofing/spoof-js-download-url.html b/security/address-bar-spoofing/spoof-js-download-url.html
new file mode 100644
index 0000000..5f648a1
--- /dev/null
+++ b/security/address-bar-spoofing/spoof-js-download-url.html
@@ -0,0 +1,26 @@
+
+
+
+
+
+
+ URL Spoofing - Download URL
+
+
+
+
+
+ This test uses a download URL for downloading a file to spoof the browser into displaying the download
+ URL as the current origin while rewriting the document content to spoof the address bar.
+
+
+
+
\ No newline at end of file
diff --git a/security/address-bar-spoofing/spoof-js-page-rewrite-simple.html b/security/address-bar-spoofing/spoof-js-page-rewrite-simple.html
new file mode 100644
index 0000000..8833802
--- /dev/null
+++ b/security/address-bar-spoofing/spoof-js-page-rewrite-simple.html
@@ -0,0 +1,26 @@
+
+
+
+
+
+
+ URL Spoofing - Simple JS page rewrite
+
+
+
+
+
+
+ This test will try to confuse the browser to show the wrong domain in the URL bar by rewriting the current page
+ content and loading a URL that will timeout.
+
+
+
+
+
\ No newline at end of file
diff --git a/security/address-bar-spoofing/spoof-open-b64-html.html b/security/address-bar-spoofing/spoof-open-b64-html.html
new file mode 100644
index 0000000..7dc35c5
--- /dev/null
+++ b/security/address-bar-spoofing/spoof-open-b64-html.html
@@ -0,0 +1,31 @@
+
+
+
+
+
+
+ URL Spoofing - Base64 Document Load
+
+
+
+
+
+
+ This test will try to confuse the browser to show the wrong domain in the URL bar by loading a static Base64
+ encoded document, rewriting the current page, and then navigating to a tel: URL.
+
+
+
+
+
\ No newline at end of file
diff --git a/security/address-bar-spoofing/spoof-unsupported-scheme.html b/security/address-bar-spoofing/spoof-unsupported-scheme.html
new file mode 100644
index 0000000..197612a
--- /dev/null
+++ b/security/address-bar-spoofing/spoof-unsupported-scheme.html
@@ -0,0 +1,24 @@
+
+
+
+
+
+
+ URL Spoofing - Simple Location
+
+
+
+
+
+
+ This is the most simple test for URL spoofing. Simply rewrite the current location using an unsupported scheme.
+
+
+
+
+
\ No newline at end of file
diff --git a/security/spoof-js-page-rewrite.html b/security/spoof-js-page-rewrite.html
deleted file mode 100644
index bad250d..0000000
--- a/security/spoof-js-page-rewrite.html
+++ /dev/null
@@ -1,35 +0,0 @@
-
-
-
-
-
- URL Spoofing - JS page rewrite
-
-
-
-
-