diff --git a/XSS Injection/README.md b/XSS Injection/README.md index 92ccfa74..a1ae92c9 100644 --- a/XSS Injection/README.md +++ b/XSS Injection/README.md @@ -191,6 +191,7 @@ Most tools are also suitable for blind XSS attacks: //parseInt("confirm",30) == 8680439 && 8680439..toString(30) == "confirm" + // Img payload