About 264,000 results
Open links in new tab
  1. XSS attacks & exploitation: the ultimate guide – YesWeHack

    Feb 11, 2025 · Cross-site scripting (XSS) injects malicious JavaScript into a victim’s browser, leading to data theft or account takeover. This guide examines how to detect and exploit …

    Missing:

    • Flowchart

    Must include:

  2. theori-io/pwnjs: A Javascript library for browser exploitation - GitHub

    Using an exploit in a payload is easier if you use the deprecated with statement: with (new Exploit()) { var malloc = importFunction('msvcrt.dll', 'malloc', Uint8Ptr); // ... You can also define …

    Missing:

    • Flowchart

    Must include:

  3. Browser Exploit Design Author: Adel Keywords: DAGae6dsflY,BAEG0nkuyM4,0 Created Date: 5/13/2025 10:32:46 AM ...

    Missing:

    • Flowchart

    Must include:

  4. The Art of Exploitation: JavaScript Hacks for Ethical Web Hackers

    May 23, 2023 · In this article, we explore a collection of powerful JavaScript functions I’ve tailored to assist ethical web hackers in obtaining valuable insights and achieving improved results …

    Missing:

    • Flowchart

    Must include:

  5. Exploiting JavaScript's eval () method - Stack Overflow

    Aug 13, 2013 · Certainly, running eval() gives the hacker the ability to run any JavaScript code that you can run. But can't they do this anyway? In Chrome, at least, the Developer Tools …

    Missing:

    • Flowchart

    Must include:

  6. How JavaScript works: 5 types of XSS attacks - Medium

    Jan 20, 2021 · Cross-Site Scripting (XSS) is a browser-side code injection attack. An injection attack is performed when the attacker is able to inject malicious code into an application. This …

    Missing:

    • Flowchart

    Must include:

  7. JavaScript Engine Fuzzing and Exploitation Reading List

    Aug 23, 2020 · Want to learn how to break browsers, and in particular JavaScript engines? Traveling and got some reading time? Watch these conference talks or read these articles to …

    Missing:

    • Flowchart

    Must include:

  8. In this poster, we present JScalpel, a framework that combines JavaScript and binary level analyses to analyze exploits. It stems from the observation that seemingly complex and …

    Missing:

    • Flowchart

    Must include:

  9. Analyzing JavaScript Malware: Techniques and Tools for

    Aug 6, 2023 · Today, we will delve into a step-by-step analysis of JavaScript malware, utilizing cutting-edge techniques to deobfuscate and extract Indicators of Compromise (IOCs) for …

    Missing:

    • Flowchart

    Must include:

  10. 10 Best Flowchart JavaScript Libraries To Visualize Your Workflow

    Oct 28, 2020 · The easiest way to visualize your workflow on the webpage is to use a JavaScript flowchart library. This post rounds up some of the best jQuery plugins and Vanilla JavaScript …

Refresh