About 264,000 results
Open links in new tab
  1. XSS attacks & exploitation: the ultimate guide – YesWeHack

    Feb 11, 2025 · Cross-site scripting (XSS) injects malicious JavaScript into a victim’s browser, leading to data theft or account takeover. This guide examines how to detect and exploit common XSS variants, from reflected to blind – essential knowledge for bug hunters, as XSS is the most pervasive vulnerability.

    Missing:

    • Flowchart

    Must include:

  2. theori-io/pwnjs: A Javascript library for browser exploitation - GitHub

    Using an exploit in a payload is easier if you use the deprecated with statement: with (new Exploit()) { var malloc = importFunction('msvcrt.dll', 'malloc', Uint8Ptr); // ... You can also define an Exploit object (non-deprecated, but more verbose): var e = new Exploit(); var malloc = e.importFunction('msvcrt.dll', 'malloc', Uint8Ptr); // ...

    Missing:

    • Flowchart

    Must include:

  3. Browser Exploit Design Author: Adel Keywords: DAGae6dsflY,BAEG0nkuyM4,0 Created Date: 5/13/2025 10:32:46 AM ...

    Missing:

    • Flowchart

    Must include:

  4. The Art of Exploitation: JavaScript Hacks for Ethical Web Hackers

    May 23, 2023 · In this article, we explore a collection of powerful JavaScript functions I’ve tailored to assist ethical web hackers in obtaining valuable insights and achieving improved results during...

    Missing:

    • Flowchart

    Must include:

  5. Exploiting JavaScript's eval () method - Stack Overflow

    Aug 13, 2013 · Certainly, running eval() gives the hacker the ability to run any JavaScript code that you can run. But can't they do this anyway? In Chrome, at least, the Developer Tools allow the end-user to run their own JavaScript.

    Missing:

    • Flowchart

    Must include:

  6. How JavaScript works: 5 types of XSS attacks - Medium

    Jan 20, 2021 · Cross-Site Scripting (XSS) is a browser-side code injection attack. An injection attack is performed when the attacker is able to inject malicious code into an application. This code is then...

    Missing:

    • Flowchart

    Must include:

  7. JavaScript Engine Fuzzing and Exploitation Reading List

    Aug 23, 2020 · Want to learn how to break browsers, and in particular JavaScript engines? Traveling and got some reading time? Watch these conference talks or read these articles to get up to speed with browser vulnerability research and exploitation.

    Missing:

    • Flowchart

    Must include:

  8. In this poster, we present JScalpel, a framework that combines JavaScript and binary level analyses to analyze exploits. It stems from the observation that seemingly complex and irregular JavaScript statements in an exploit often exhibit strong data dependencies in the binary.

    Missing:

    • Flowchart

    Must include:

  9. Analyzing JavaScript Malware: Techniques and Tools for

    Aug 6, 2023 · Today, we will delve into a step-by-step analysis of JavaScript malware, utilizing cutting-edge techniques to deobfuscate and extract Indicators of Compromise (IOCs) for enhanced cyber-security.

    Missing:

    • Flowchart

    Must include:

  10. 10 Best Flowchart JavaScript Libraries To Visualize Your Workflow

    Oct 28, 2020 · The easiest way to visualize your workflow on the webpage is to use a JavaScript flowchart library. This post rounds up some of the best jQuery plugins and Vanilla JavaScript libraries that make it easier to draw and render customizable flowcharts on your existing web project. Have fun with it.

Refresh