🔐Blog of Osanda

Security Researching and Reverse Engineering

Skip to content
  • 🏠 Home
  • 🔒 My Advisories
  • 💊 Cool Posts
    • 💉 SQLi
    • 🕷 Web App Security
    • 🛠 Tools
    • ☢ Exploits
    • 🔬 Reverse Engineering
    • 🧬 Malware Analysis
  • ☠ Shellcodes
  • ☣ About

XSS

  • Osanda Malith Jayathissa
  • November 13, 2014
  • 8 Comments

JS via Images

Recently I saw an awesome research by Ange Albertini in abusing a GIF file and injecting JS inside. You can download his code from here The following code is a custom made gif , yet abused by our JS payload.
(more…)

Share this:

  • Tweet
  • Click to share on WhatsApp (Opens in new window) WhatsApp
  • Click to share on Telegram (Opens in new window) Telegram
  • Click to print (Opens in new window) Print
  • More
  • Click to share on Reddit (Opens in new window) Reddit
  • Share on Tumblr
  • Pocket
tools, Uncategorized, Web Application Security, XSS

Search

Archives

Categories

Join 4,752 other subscribers
Buy Me A Coffee

TRANSLATE

Tweets by OsandaMalith

Tags

0day ARM assembly blogging C c/c++ Certs crackme CSRF ctf DLL Hijacking DoS egg hunting eLearnSecurity exploit exploit development HEVD kernel LFI Microsoft mimikatz MS-DOS MSN MySQL PE Pentesting PHP POST XSS Programming Reverse Engineering reversing SecurityNet.org security researchers shellcode special thanks SQLi SQL injection technology tools vulnerable version Web Application Security windows WMI XSS ZTE
  • Home
  • ☠ Shellcodes
  • ☣ About
  • 💊 Cool Posts
  • 🔒 My Advisories

Copyright © 2025 Osanda Malith Jayathissa