diff --git a/XSS injection/Intruders/xss_alert.txt b/XSS injection/Intruders/xss_alert.txt index 5a78ca79..4fdbaff9 100644 --- a/XSS injection/Intruders/xss_alert.txt +++ b/XSS injection/Intruders/xss_alert.txt @@ -512,6 +512,7 @@ perl -e 'print "";' > out +xss">
diff --git a/XSS injection/README.md b/XSS injection/README.md index 96502030..796cdf0f 100644 --- a/XSS injection/README.md +++ b/XSS injection/README.md @@ -769,7 +769,7 @@ Works for CSP like `script-src self` Live example by @brutelogic - [https://brutelogic.com.br/xss.php](https://brutelogic.com.br/xss.php?c1=uxldz @@ -777,13 +777,13 @@ anythinglr00uxldz anythinglr00%3c%2fscript%3e%3cscript%3ealert(document.domain)%3c%2fscript%3euxldz ``` -### Incapsula WAF Bypass - 11th september +### Incapsula WAF Bypass by [@c0d3G33k](https://twitter.com/c0d3G33k) - 11th september ```javascript ``` -### Akamai WAF Bypass by @zseano - 18th june +### Akamai WAF Bypass by [@zseano](https://twitter.com/zseano) - 18th june ```javascript ?"> @@ -795,7 +795,7 @@ anythinglr00%3c%2fscript%3e%3cscript%3ealert(document.domain)%3c%2fscript%3euxld ``` -### WordFence WAF Bypass by @brutelogic - 12th september +### WordFence WAF Bypass by [@brutelogic](https://twitter.com/brutelogic) - 12th september ```javascript