he's doing tutorials like you, i love how you explain why the bug happens , now your video just shows that even if a site uses front end frameworks with saniters they're still hackable
Nice.. This is very complex and underrated vulnerability that every researchers avoid. Thanks for sharing, I'm very excited and interested to learn about this mXSS. Finally someone made it. Thank guru. ❤
amazing work! Keep going!
💪
he's doing tutorials like you, i love how you explain why the bug happens , now your video just shows that even if a site uses front end frameworks with saniters they're still hackable
Nice.. This is very complex and underrated vulnerability that every researchers avoid. Thanks for sharing, I'm very excited and interested to learn about this mXSS. Finally someone made it. Thank guru. ❤
Very hard to create videos like this, I can understand. Amazing video, Keep it up brother👌🙏
Really amazed by the concept and your explanation anna. Keep going
Excellent explanation of a rather complex issue, good stuff!
really good video explain well keep more videos like this
I made a challenge on this for IRON CTF 2024 its on oct 5
nice explanation
Good video, great animations
function foo(string $value): bool {
$paterns = ["]+(?:\s+on[a-z]+)"];
$invalid = 0;
foreach ($paterns as $patern) {
if (preg_match("/{$patern}/i", $value)) {
$invalid++;
}
}
return $invalid == 0;
}
$string = '';
foo($string); // return false;
alert(1) :)
@@mrgavyadha
$paterns = [
"]*>",
"]+(?:\s+on[a-z]+)",
// etc.
];
:)