Skip to content

Latest commit

 

History

History
8 lines (7 loc) · 499 Bytes

README.md

File metadata and controls

8 lines (7 loc) · 499 Bytes

POST-XSS-Exploit

This can be used to exploit POST XSS without much interaction from the victim.

How to exploit?

Upload the 5 files(except of readme ofc 🙄) to your hosting by typing the URL of your website instead of attacker.com. Replace vulnerablesite.com with the vulnerable site on your target. Replace the form variables below with the variables of the form that contain the XSS vulnerability. In addition, you may need to change payload to bypass existing security filters.