The N45HT Blog

  • HOME
  • LEARNING
  • TOOLS
  • NEWS
  • RESEARCH
  • Reflected DOM-based XSS on DomaiNesia

    Reflected DOM-based XSS on DomaiNesia

    Choirur Rizal

    •

    April 30, 2021

    In this article, I’ll walk you through how I discovered a Reflected DOM-based Cross-site Scripting (XSS) vulnerability on…

  • Exploiting XSS via Markdown on Xiaomi

    Exploiting XSS via Markdown on Xiaomi

    Choirur Rizal

    •

    April 27, 2021

    Markdown is a popular text-to-HTML conversion tool, commonly used in forums and web platforms to create web content.…

  • N45HT Vulnerability Disclosure Program

    N45HT Vulnerability Disclosure Program

    XAdmin

    •

    April 25, 2021

    No technology is perfect, and N45HT believes that working with skilled security researchers across the globe is crucial…

  • Reflected XSS on Microsoft

    Reflected XSS on Microsoft

    Choirur Rizal

    •

    April 25, 2021

    During my recent bug bounty hunting, I started by gathering information on the Microsoft domain using a simple…

  • XSSR: An automatic XSS scanner

    XSSR: An automatic XSS scanner

    XAdmin

    •

    March 31, 2021

    Is an automatic Cross-site Scripting scanner application with Website, Chrome Extensions, and Windows Desktop platforms. Get in touch:

  • $300 Bounty for Exploiting DOM-based XSS

    $300 Bounty for Exploiting DOM-based XSS

    XAdmin

    •

    January 29, 2021

    While analyzing XING’s event management platform, I identified a reflected XSS vulnerability in the way event IDs are…

  • Reflected XSS on AT&T

    Reflected XSS on AT&T

    Choirur Rizal

    •

    July 17, 2020

    While performing a Google Dork search for potential vulnerabilities, I used the following query to target AT&T’s website:…

  • API: Subdomain Enumeration

    API: Subdomain Enumeration

    Rizky Xavier

    •

    March 25, 2020

    Subdomain Enumeration is the process of finding sub-domains of a domain, this is an important phase in a…


←Previous Next→

Recent Posts

  • Hacking AI with Markdown: How We Triggered XSS in DeepSeek’s Chat
    AI-generated chat messages are becoming a cornerstone of modern digital… Read more: Hacking AI with Markdown: How We Triggered XSS in DeepSeek’s Chat
  • Critical SQL Injection in a Major Indonesian Web Hosting Platform
    While exploring vulnerabilities in a major web hosting company in… Read more: Critical SQL Injection in a Major Indonesian Web Hosting Platform
  • Breaking Vercel’s Clone URL with a Simple XSS Exploit
    During my exploration of Vercel’s platform, I discovered a reflected… Read more: Breaking Vercel’s Clone URL with a Simple XSS Exploit
  • Bypassing Razer’s WAF for XSS
    While testing Razer’s web application, I identified an XSS vulnerability… Read more: Bypassing Razer’s WAF for XSS
  • Finding WordPress Vulnerabilities on CarGurus with WPScan
    While exploring CarGurus’ bug bounty program, I discovered a reflected… Read more: Finding WordPress Vulnerabilities on CarGurus with WPScan

Social Media

  • Twitter
  • Instagram
  • LinkedIn
  • Facebook

Advertisement

Tags

API Bug Bounty Capture The Flag Cross-site Scripting CTF ExifTool HTML JavaScript Markdown Open Redirection PHP SQL Injection VDP WAF Web Application Firewall XSS XSSR XSSRush

Connect With Us

  • Bali, Indonesia
  • [email protected]
  • Twitter
  • Instagram
  • Facebook

Categories

  • Learning
  • Tools
  • News
  • Research

N45HT

  • About
  • Contact
  • Products
  • Security

Search

Looking for something specific? Try a search below!

Copyright © 2023 | Made with love by SuperbThemes