0% found this document useful (0 votes)
35 views1 page

SQL Injection and XSS Vulnerability Guide

Uploaded by

i.haquenabil
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as TXT, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
35 views1 page

SQL Injection and XSS Vulnerability Guide

Uploaded by

i.haquenabil
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as TXT, PDF, TXT or read online on Scribd

SQL Injection:

[Link]
Payload : [Link]
[Link] -- For PoC (Optional)

XSS :
Reflected : [Link]
Stored : [Link]
DOM-based :

Payload : [Link]
blind xss : [Link]
Payload : [Link]

IDOR :
[Link]

LFI : [Link]

OTP Auth Bypass :


[Link]
[Link]
{
"request-id" : " 332143det4"
"code" : 404

Open redirect:
[Link]
[Link]

Single command : waybackurls [Link] | grep -a -i \=http | qsreplace


'[Link] | while read host do;do curl -s -L $host -I|grep "[Link]" &&
echo -e "$host \033[0;31mVulnerable\n" ;done

GitHub : [Link]

You might also like