From d0bb0f6f5b73368eec3a63fd1aa2ce9bb9ad2c36 Mon Sep 17 00:00:00 2001 From: Thomas Orlita Date: Sun, 10 May 2020 10:32:51 +0200 Subject: [PATCH] Update CSP Evaluator blog link --- XSS Injection/README.md | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/XSS Injection/README.md b/XSS Injection/README.md index 15495bdd..23db8032 100644 --- a/XSS Injection/README.md +++ b/XSS Injection/README.md @@ -929,7 +929,7 @@ XSS : %00%00%fe%ff%00%00%00%3C%00%00%00s%00%00%00v%00%00%00g%00%00%00/%00%00%00o ## CSP Bypass -Check the CSP on [https://csp-evaluator.withgoogle.com](https://csp-evaluator.withgoogle.com) and the post : [How to use Google’s CSP Evaluator to bypass CSP](https://appio.dev/vulns/google-csp-evaluator/) +Check the CSP on [https://csp-evaluator.withgoogle.com](https://csp-evaluator.withgoogle.com) and the post : [How to use Google’s CSP Evaluator to bypass CSP](https://websecblog.com/vulns/google-csp-evaluator/) ### Bypass CSP using JSONP from Google (Trick by [@apfeifer27](https://twitter.com/apfeifer27))