IBM DeveloperYour rich text could be a cross-site scripting vulnerabilityRecognize and mitigate SXSS vulnerabilities before they’re exploited14h ago
mrhavitBreaking TikTok: Our Journey to Finding an Account Takeover VulnerabilityHello, fellow security researchers and bug bounty hunters!Jun 4, 202313
Iason TzortzisStored Cross Site Scripting (XSS) ExplainedArticle which discusses Stored Cross Site Scripting(XSS) in depth with examples and available material for testingNov 30Nov 30
ZeroDay FreakExploiting Web Applications with Cross-Site Scripting (XSS): A Practical GuideCross-Site Scripting (XSS) is one of the most common vulnerabilities found in web applications, often leading to severe security breaches…Jun 2Jun 2
IBM DeveloperYour rich text could be a cross-site scripting vulnerabilityRecognize and mitigate SXSS vulnerabilities before they’re exploited14h ago
mrhavitBreaking TikTok: Our Journey to Finding an Account Takeover VulnerabilityHello, fellow security researchers and bug bounty hunters!Jun 4, 202313
Iason TzortzisStored Cross Site Scripting (XSS) ExplainedArticle which discusses Stored Cross Site Scripting(XSS) in depth with examples and available material for testingNov 30
ZeroDay FreakExploiting Web Applications with Cross-Site Scripting (XSS): A Practical GuideCross-Site Scripting (XSS) is one of the most common vulnerabilities found in web applications, often leading to severe security breaches…Jun 2
Viral VaghelaBuilding Specter: A Red Team Tool for Browser Exploitation (Part 1)Every red teamer has their favorite set of tools, but sometimes you hit a wall when none of them do exactly what you need. That’s the…Nov 16
LuddeknHTB Cross-Site Scripting (XSS) phishing attack task writeupIn this specific lesson task from the Cross-Site Scripting (XSS) module from HTB Academy we are asked to first identify a vulnerable input…Jan 16