You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
While using the XSS Hunter hosted by Trufflesecurity, if a person injects 20 payloads to a website in different locations and one of them is fired, it is not possible to know which payload worked. My idea is to having the option to add query parameters to js.rip url. The user can add comments to each payload using the query params.
While using the XSS Hunter hosted by Trufflesecurity, if a person injects 20 payloads to a website in different locations and one of them is fired, it is not possible to know which payload worked. My idea is to having the option to add query parameters to js.rip url. The user can add comments to each payload using the query params.
Example: https://js.rip/yourrandomstring?location=contactformuserinput . Then, the location parameter would be reflected in the report, giving the user description of vulnerable endpoint.
The text was updated successfully, but these errors were encountered: