You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardexpand all lines: README.md
+4
Original file line number
Diff line number
Diff line change
@@ -37,5 +37,9 @@ Please see https://thehackerblog.com/xss-hunter-is-now-open-source-heres-how-to-
37
37
***Secondary Payload Loading**: Got a secondary payload that you want to load after XSS Hunter has done it's thing? XSS Hunter offers you the option to specify a secondary JavaScript payload to run after it's completed it's collection.
38
38
***iOS Web Application**: It is also possible to view your XSS payload fires via an iOS web app. Simple navigate to the `/app` path and save the page as a web application to your iPhone's desktop.
39
39
40
+
# Notable Exploits
41
+
* Blind XSS in Spotify's Salesforce integration: https://mhmdiaa.github.io/jekyll/update/2016/07/19/blind-xss-in-spotify.html
42
+
* Blind XSS in GoDaddy's support panel: https://thehackerblog.com/poisoning-the-well-compromising-godaddy-customer-support-with-blind-xss/
43
+
40
44
# Want to Contribute?
41
45
All code was created by me and (for that reason) is likely *not* best pracice and *definitely* in need of optimization/cleanup. Any pull requests are appreciated!
0 commit comments