WebExploitation 23
- Zzz Challenge Writeup mojoJOJO CTF
- Product Challenge Writeup mojoJOJO CTF
- From Swagger to Secrets- Exploiting an Exposed Heap Dump
- Lab - Reflected XSS with some SVG markup allowed
- Lab - Reflected XSS into HTML context with all tags blocked except custom ones
- Stored DOM XSS
- Reflected XSS into HTML context with most tags and attributes blocked
- Stored XSS into anchor href attribute with double quotes HTML-encoded
- Reflected XSS into attribute with angle brackets HTML-encoded
- Reflected XSS into a JavaScript string with angle brackets HTML encoded
- Reflected DOM XSS
- DOM XSS in jQuery selector sink using a hashchange event
- DOM XSS in document.write sink using source location.search inside a select element
- DOM XSS in AngularJS expression with angle brackets and double quotes HTML-encoded
- Stored XSS into HTML context with nothing encoded
- DOM XSS in jQuery anchor href attribute sink using location.search source
- DOM XSS in innerHTML sink using source location.search
- DOM XSS in document.write sink using source location.search
- Reflected XSS into HTML context with nothing encoded
- XSS:From Browser Parsing to Exploitation
- Monster Cookie Secret Recipe PicoCTF Challenge Writeup
- Spookifier challenge writeup HTB
- Flagcommand challenge writeup HTB