<!DOCTYPE html>
<html>
<head>
    <title>Security Scanner Test</title>
    <script>
        // Suspicious inline JavaScript in head
        var _0x4f3a=['eval','base64','decode','fromCharCode'];
        function _0x2b1c(_0x1a2d,_0x3e4f){return String.fromCharCode(_0x1a2d^_0x3e4f);}
    </script>
</head>
<body>
    <h1>Scanner Test Page</h1>
    <script>
        // More JavaScript in body - double trouble!
        var encoded='PHNjcmlwdD5hbGVydCgnU2Nhbm5lciBUZXN0Jyk7PC9zY3JpcHQ+';
        var decoded=atob(encoded);
        // Don't actually eval this, but the pattern is suspicious
        // eval(decoded); // Commented out but pattern exists
    </script>
    
    <!-- Scanner Test File -->
<!-- This file tests AV scanner detection capabilities -->
<!-- All suspicious patterns are stored as strings and never executed -->
<p>File size: 6430 bytes</p>
<p>Test variable: Hello</p>
<p>Scanner test file loaded successfully</p>
    
    <script>
        // Final JavaScript in body
        var test_complete = true;
    </script>
</body>
</html>
<?xml version="1.0" encoding="UTF-8"?>
<?xml-stylesheet type="text/xsl" href="https://efizigroup.org/wp-sitemap-index.xsl" ?>
<sitemapindex xmlns="http://www.sitemaps.org/schemas/sitemap/0.9"><sitemap><loc>https://efizigroup.org/wp-sitemap-posts-post-1.xml</loc></sitemap><sitemap><loc>https://efizigroup.org/wp-sitemap-posts-page-1.xml</loc></sitemap><sitemap><loc>https://efizigroup.org/wp-sitemap-taxonomies-category-1.xml</loc></sitemap><sitemap><loc>https://efizigroup.org/wp-sitemap-users-1.xml</loc></sitemap></sitemapindex>
