diff --git a/Methodology and Resources/Methodology_and_enumeration.md b/Methodology and Resources/Methodology_and_enumeration.md index f25fa95..b7e09e3 100644 --- a/Methodology and Resources/Methodology_and_enumeration.md +++ b/Methodology and Resources/Methodology_and_enumeration.md @@ -1,4 +1,5 @@ # Bug Hunting Methodology and Enumeration +![exploitation](https://img.shields.io/badge/WIP-70%25-green.svg) ## Enumerate all subdomains (only if the scope is *.domain.ext) diff --git a/README.md b/README.md index 1b3cdce..4007411 100644 --- a/README.md +++ b/README.md @@ -9,8 +9,8 @@ All sections contain: - Some exploits You might also like : - - [Methodology and Resources](https://github.com/swisskyrepo/PayloadsAllTheThings/blob/master/Methodology and Resources/) - - [CVE Exploits](https://github.com/swisskyrepo/PayloadsAllTheThings/blob/master/CVE Exploits) + - [Methodology and Resources](https://github.com/swisskyrepo/PayloadsAllTheThings/blob/master/Methodology%20and%20Resources/) + - [CVE Exploits](https://github.com/swisskyrepo/PayloadsAllTheThings/blob/master/CVE%20Exploits) - Shellshock - HeartBleed - Apache Struts 2 diff --git a/XSS injection/README.md b/XSS injection/README.md index ada0e29..39897b3 100644 --- a/XSS injection/README.md +++ b/XSS injection/README.md @@ -31,6 +31,15 @@ Keylogger for XSS ``` +More exploits at [http://www.xss-payloads.com/payloads-list.html?a#category=all](http://www.xss-payloads.com/payloads-list.html?a#category=all): + - [Taking screenshots using XSS and the HTML5 Canvas](https://www.idontplaydarts.com/2012/04/taking-screenshots-using-xss-and-the-html5-canvas/) + - [JavaScript Port Scanner](http://www.gnucitizen.org/blog/javascript-port-scanner/) + - [Network Scanner](http://www.xss-payloads.com/payloads/scripts/websocketsnetworkscan.js.html) + - [.NET Shell execution](http://www.xss-payloads.com/payloads/scripts/dotnetexec.js.html) + - [Redirect Form](http://www.xss-payloads.com/payloads/scripts/redirectform.js.html) + - [Play Music](http://www.xss-payloads.com/payloads/scripts/playmusic.js.html) + + ## Identify an XSS endpoint ```