payload-obfuscation

5 articles
sort: new top best
clear filter
0 4/10

A researcher bypassed an XSS filter on a HackerOne private program that was blocking payloads containing event handlers by using nested script tag obfuscation (e.g., <<scrip<scriptT>alert(1);) to execute arbitrary JavaScript.

HackerOne Jay Jani Armaan Ak1t4
blog.securitybreached.org · devanshbatham/Awesome-Bugbounty-Writeups · 22 hours ago · details
0 5/10

Tutorial demonstrating XSS exploitation by converting HTML defacement payloads into charcode-encoded form using String.fromCharCode() to bypass XSS filters, with a real bug bounty example showing successful exploitation.

Uncle Jim's Javascript Utilities Arif-ITSEC111 String.fromCharCode
medium.com · devanshbatham/Awesome-Bugbounty-Writeups · 22 hours ago · details
0 5/10

A writeup describing XSS exploitation via cookie injection where character filtering (equals signs, parentheses) was bypassed using script tag injection and backtick encoding techniques. The attacker eventually used a `-prompt\`1\`-` payload to trigger the vulnerability despite WAF restrictions.

GA_countryCode brutelogic akita rahul-maini
medium.com · devanshbatham/Awesome-Bugbounty-Writeups · 22 hours ago · details
0 6/10

Researcher bypassed a WAF filtering angle brackets by inserting dummy tags (e.g., <x>) to obfuscate XSS payloads, then exploited reflected XSS to steal user credit card data via jQuery GET/POST requests to exfiltrate payment details pages.

Osama Avvan Bugcrowd Redact.com
medium.com · devanshbatham/Awesome-Bugbounty-Writeups · 22 hours ago · details
0 4/10

A security researcher documents bypassing an XSS filter on a private program by discovering that a search parameter was reflected unencoded in a `<dfn>` tag, then using double URL encoding and backticks to replace parentheses in a `<script>alert(0)</script>` payload to execute XSS.

Mohamed Sayed
medium.com · devanshbatham/Awesome-Bugbounty-Writeups · 22 hours ago · details