From ad3dfc2455996a0983f11ffaa2e37505bee36e6e Mon Sep 17 00:00:00 2001 From: ninjaki <45040001+dhmosfunk@users.noreply.github.com> Date: Thu, 10 Jul 2025 00:19:25 +0300 Subject: [PATCH] Update README.md --- XSS Injection/README.md | 9 +++++++++ 1 file changed, 9 insertions(+) diff --git a/XSS Injection/README.md b/XSS Injection/README.md index d42f59b5..9e4f630f 100644 --- a/XSS Injection/README.md +++ b/XSS Injection/README.md @@ -103,6 +103,15 @@ document.body.innerHTML = "




Please login to continue ``` +The following research presents a use case demonstrating how various attacks can be executed by weaponizing an XSS vulnerability abusing legitimate domains to deliver phishing: [lauraops07 XSS at its finest. "Weaponizing XSS vulnerabilities for Red Team engagements."](https://github.com/dhmosfunk/lauraops07-xss-at-its-finest) +- Phishing +- Clickfix +- HTML Smuggling + + + + + ### Javascript Keylogger Another way to collect sensitive data is to set a javascript keylogger.