https://www.trustedsec.com/blog/tricks-for-weaponizing-xss/arrow-up-right
https://portswigger.net/web-security/cross-site-scripting/dangling-markuparrow-up-right
https://int0x33.medium.com/day-35-xss-payloads-217ab6c6ead7arrow-up-right
https://labs.f-secure.com/blog/getting-real-with-xss/arrow-up-right
https://cube01.io/blog/Moodle-DOM-Stored-XSS-to-RCE.htmlarrow-up-right
https://medium.com/@nnez/always-escalate-from-self-xss-to-persistent-xss-on-login-portal-54265b0adfd0arrow-up-right
https://cirius.medium.com/escalating-xss-to-account-takeover-ffde08624937arrow-up-right
https://www.trustedsec.com/events/webinar-popping-shells-instead-of-alert-boxes-weaponizing-xss-for-fun-and-profit/?utm_content=109784370&utm_medium=social&utm_source=twitter&hss_channel=tw-403811306arrow-up-right
https://medium.com/@Ch3ckM4te/self-xss-to-account-takeover-72c89775cf8farrow-up-right
https://hackerone.com/reports/314518arrow-up-right
https://infosecwriteups.com/chain-of-low-level-bugs-and-misconfigurations-leads-to-account-takeover-de248fc4e481arrow-up-right
https://medium.com/@ephreet/creatively-chaining-xss-techniques-eb5503e15d2earrow-up-right
https://hackerone.com/reports/534450arrow-up-right
https://hackerone.com/reports/340431arrow-up-right
Last updated 4 years ago