https://evil-attacker.com
https://malicious-site.net
http://attacker.example.com
https://phishing-site.com
http://localhost:666
http://127.0.0.1:8080
http://0.0.0.0
https://untrusted-domain.com
http://external-site.org
https://cross-origin-attack.net
null
https://hacker-site.ru
http://malware-distribution.cn
https://credential-stealer.io
http://192.168.1.1
http://10.0.0.1
http://172.16.0.1
https://data-exfil.onion
http://botnet-c2.tk
https://exploit-kit.xyz
http://localhost:1337
http://127.0.0.1:3000
http://127.0.0.1:4444
http://127.0.0.1:8888
https://fake-bank.com
https://paypal-secure-login.net
https://amazon-verify.org
https://google-security.tk
http://evil.com
https://bad-actor.net
http://attacker.localhost
https://csrf-attack.com
http://xss-payload.net
https://session-hijack.io
http://token-stealer.com
https://api-abuse.net
http://websocket-exploit.org
https://mitm-attack.com
http://dns-rebinding.local
https://subdomain-takeover.io
http://open-redirect.net
https://clickjacking.com
http://prototype-pollution.js
https://deserialization-attack.io
http://xxe-exploit.xml
https://ssrf-target.internal
http://command-injection.sh
https://path-traversal.net
http://file-inclusion.php
https://sql-injection.db
http://nosql-injection.json
https://ldap-injection.ldap
http://xml-bomb.xml
https://billion-laughs.dtd
http://zip-bomb.zip
https://fork-bomb.sh
http://resource-exhaustion.io
https://dos-attack.net
http://ddos-botnet.cc
https://amplification-attack.io
http://reflection-attack.net
https://slowloris.attack
http://rudy-attack.io
https://syn-flood.net
http://ack-flood.io
https://udp-flood.net
http://icmp-flood.io
https://http-flood.attack
http://layer7-ddos.net
https://application-layer-attack.io
http://evil-twin.wifi
https://rogue-ap.net
http://arp-spoofing.local
https://dhcp-starvation.net
http://vlan-hopping.io
https://mac-flooding.net
http://cam-table-overflow.io
https://stp-attack.net
http://cdp-spoofing.io
https://lldp-attack.net
http://hsrp-hijack.io
https://vrrp-attack.net
http://bgp-hijack.io
https://route-injection.net
http://dns-poisoning.io
https://cache-poisoning.net
http://arp-cache-poison.local
https://neighbor-cache-poison.io
http://ntp-amplification.net
https://ssdp-amplification.io
http://memcached-amplification.net
https://chargen-amplification.io
http://qotd-amplification.net
https://dns-amplification.io
http://snmp-amplification.net
https://ldap-amplification.io
http://cldap-amplification.net
https://ws-discovery-amplification.io
http://portmapper-amplification.net
https://sentinel-amplification.io
http://ripv1-amplification.net
https://netbios-amplification.io
http://mdns-amplification.net
https://srvloc-amplification.io
http://tftp-amplification.net
https://rpc-amplification.io
http://steam-amplification.net
https://wsd-amplification.io
http://coap-amplification.net
https://mqtt-amplification.io
http://amqp-amplification.net
https://redis-amplification.io
http://elasticsearch-amplification.net
https://mongodb-amplification.io
http://cassandra-amplification.net
https://couchdb-amplification.io
http://influxdb-amplification.net
https://prometheus-amplification.io
http://grafana-amplification.net
https://kibana-amplification.io
http://jenkins-exploit.io
https://gitlab-exploit.net
http://github-phishing.com
https://bitbucket-fake.org
http://dockerhub-malware.io
https://npm-typosquat.net
http://pypi-malicious.org
https://rubygems-backdoor.io
http://maven-poisoned.net
https://nuget-trojan.io
http://cargo-malware.net
https://packagist-exploit.io
http://composer-backdoor.net
https://bower-malicious.io
http://yarn-poisoned.net
https://pnpm-exploit.io
http://webpack-backdoor.net
https://rollup-malicious.io
http://parcel-exploit.net
https://vite-backdoor.io
http://esbuild-malicious.net
https://turbopack-exploit.io
http://swc-backdoor.net
https://babel-malicious.io
http://typescript-exploit.net
https://eslint-backdoor.io
http://prettier-malicious.net
https://jest-exploit.io
http://mocha-backdoor.net
https://cypress-malicious.io
http://playwright-exploit.net
https://puppeteer-backdoor.io
http://selenium-malicious.net
https://webdriver-exploit.io
http://appium-backdoor.net
https://detox-malicious.io
http://espresso-exploit.net
https://xctest-backdoor.io
http://junit-malicious.net
https://testng-exploit.io
http://pytest-backdoor.net
https://unittest-malicious.io
http://rspec-exploit.net
https://minitest-backdoor.io
http://jasmine-malicious.net
https://karma-exploit.io
http://protractor-backdoor.net
https://nightwatch-malicious.io
http://testcafe-exploit.net
https://webdriverio-backdoor.io
http://codeceptjs-malicious.net
https://gauge-exploit.io
http://cucumber-backdoor.net
https://behave-malicious.io
http://lettuce-exploit.net
https://radish-backdoor.io
http://freshen-malicious.net
https://aloe-exploit.io
http://morelia-backdoor.net
https://sure-malicious.io
http://nose-exploit.net
https://nose2-backdoor.io
http://tox-malicious.net
https://nox-exploit.io
http://invoke-backdoor.net
https://fabric-malicious.io
http://ansible-exploit.net
https://saltstack-backdoor.io
http://chef-malicious.net
https://puppet-exploit.io
http://terraform-backdoor.net
https://cloudformation-malicious.io
http://arm-template-exploit.net
https://bicep-backdoor.io
http://pulumi-malicious.net
https://crossplane-exploit.io
http://argocd-backdoor.net
https://flux-malicious.io
http://spinnaker-exploit.net
https://tekton-backdoor.io
http://jenkins-x-malicious.net
https://circleci-exploit.io
http://travis-backdoor.net
https://gitlab-ci-malicious.io
http://github-actions-exploit.net
https://azure-devops-backdoor.io
http://aws-codepipeline-malicious.net
https://gcp-cloudbuild-exploit.io
http://bitbucket-pipelines-backdoor.net
https://drone-malicious.io
http://concourse-exploit.net
https://buildkite-backdoor.io
http://semaphore-malicious.net
https://codefresh-exploit.io
http://harness-backdoor.net
https://octopus-malicious.io
