Facebook security bug -Deleting event cover page without admin permission (fixed)
March 30th, 2016 📆 | 2836 Views ⚑
2016-03-30 17:41:32 source
March 30th, 2016 📆 | 2836 Views ⚑
2016-03-30 17:41:32 source
February 4th, 2016 📆 | 7081 Views ⚑
2016-02-04 15:33:44 source
February 2nd, 2015 📆 | 4933 Views ⚑
payload use : +ADw-SCRIPT+AD4-alert(‘XSS’);+ADw–SCRIPT+AD4- but utf-7 support has been depriciated so will only work in older browser’s or IE you
February 2nd, 2015 📆 | 6847 Views ⚑
Payload used : a onmouseover=prompt(document.domain); challenge link : s-quiz.int21h.jp-stage07.php 2015-02-02 06:02:12 source
February 2nd, 2015 📆 | 7709 Views ⚑
payload used : javascript:alert(document.domain); challenge link : http:–xss-quiz.int21h.jp-stage008.php 2015-02-02 06:19:14 source
February 1st, 2015 📆 | 4185 Views ⚑
xss vector used is onmouseover=”prompt(document.domain);”” Link for the challenge 6 http:– xss-quiz.int21h.jp-stage-no6.php 2015-02-01 10:52:56 source
February 1st, 2015 📆 | 7936 Views ⚑
This tutorial is based upon how to bypass the attribute based context to execute our javascript leading to xss Link
November 4th, 2014 📆 | 6210 Views ⚑
Link to the challenge 2 https:–www.youtube.com-watch?v=Twwb3ZtU9Wk please like share and subscribe this will motivate me to have more videos !!
November 4th, 2014 📆 | 2418 Views ⚑
This tutorial is based upon a case when all the inputs are being getted fed inside the. Value= we can
October 18th, 2014 📆 | 3713 Views ⚑
This tutorial series is all about web application security testing and finding xss .One can go through these series and
Comments