Electro0ne Bytes 🦅 – Telegram
Electro0ne Bytes 🦅
364 subscribers
5 photos
60 links
I publish articles related to hacking and security for you, so let's learn together.💪

Contact: @Electro0ne Blogs: electro0nes.github.io
Download Telegram
Common OAuth Vulnerabilities · Doyensec's Blog

https://blog.doyensec.com/2025/01/30/oauth-common-vulnerabilities.html
🔥3
Forwarded from Brut Security
🔖Extracting endpoints from JavaScript bookmarklets

⬇️Usage
🔴Add a new bookmark in your browser’s toolbar
🔴Replace the bookmark’s URL with the following JavaScript code:
javanoscript:(function(){var noscripts=document.getElementsByTagName("noscript"),regex=/(?<=(\"|\'|\`))\/[a-zA-Z0–9_?&=\/\-\#\.]*(?=(\"|\'|\`))/g;const results=new Set;for(var i=0;i<noscripts.length;i++){var t=noscripts[i].src;""!=t&&fetch(t).then(function(t){return t.text()}).then(function(t){var e=t.matchAll(regex);for(let r of e)results.add(r[0])}).catch(function(t){console.log("An error occurred: ",t)})}var pageContent=document.documentElement.outerHTML,matches=pageContent.matchAll(regex);for(const match of matches)results.add(match[0]);function writeResults(){results.forEach(function(t){document.write(t+"<br>")})}setTimeout(writeResults,3e3);})();

🔴Visit the target page and click the bookmarklet. The noscript will run in your browser, revealing previously undiscovered endpoints right on the page.
Please open Telegram to view this post
VIEW IN TELEGRAM
3👍2
👍3
Forwarded from GitBook - Bug Bounty
Polyglot Payload
qwe'" <x</{{[7*7]}}

#XSS #SQLi #CSTI
@GitBook_s