Update XSS-bypass.txt
parent
3cf787985f
commit
a6660b20de
|
@ -1,12 +1,4 @@
|
|||
_____ _ _ _ __ _______ _____ _____ _ _ _ _
|
||||
| __ \ | | | | | \ \ / / ___/ ___| / __ \ | | | | | | |
|
||||
| | \/ |__ ___| |_| |_ ___ \ V /\ `--.\ `--. | / \/ |__ ___ __ _| |_ ___| |__ ___ ___| |_
|
||||
| | __| '_ \ / _ \ __| __|/ _ \ / \ `--. \`--. \ | | | '_ \ / _ \/ _` | __/ __| '_ \ / _ \/ _ \ __|
|
||||
| |_\ \ | | | __/ |_| |_| (_) | / /^\ |\__/ /\__/ / | \__/\ | | | __/ (_| | |_\__ \ | | | __/ __/ |_
|
||||
\____/_| |_|\___|\__|\__|\___/ \/ \|____/\____/ \____/_| |_|\___|\__,_|\__|___/_| |_|\___|\___|\__|
|
||||
|
||||
A ghetto collection of XSS payloads that I find to be useful during penetration tests, especially when faced with WAFs or application-based black-list filtering, but feel free to disagree or shoot your AK-74 in the air.
|
||||
|
||||
# A collection of XSS payloads that I find to be useful during penetration tests, especially when faced with WAFs or application-based black-list filtering
|
||||
Simple character manipulations.
|
||||
Note that I use hexadecimal to represent characters that you probably can't type. For example, \x00 equals a null byte, but you'll need to encode this properly depending on the context (URL encoding \x00 = %00).
|
||||
|
||||
|
|
Loading…
Reference in New Issue