🔐Blog of Osanda

Security Researching and Reverse Engineering

Skip to content
  • 🏠 Home
  • 🔒 My Advisories
  • 💊 Cool Posts
    • 💉 SQLi
    • 🕷 Web App Security
    • 🛠 Tools
    • ☢ Exploits
    • 🔬 Reverse Engineering
    • 🧬 Malware Analysis
  • ☠ Shellcodes
  • ☣ About

XSS

  • Osanda Malith Jayathissa
  • November 13, 2014
  • 8 Comments

JS via Images

Recently I saw an awesome research by Ange Albertini in abusing a GIF file and injecting JS inside. You can download his code from here The following code is a custom made gif , yet abused by our JS payload.
(more…)

Share this:

  • Tweet
  • Click to share on WhatsApp (Opens in new window) WhatsApp
  • Click to share on Telegram (Opens in new window) Telegram
  • Click to print (Opens in new window) Print
  • More
  • Click to share on Reddit (Opens in new window) Reddit
  • Share on Tumblr
  • Pocket
tools, Uncategorized, Web Application Security, XSS

Search

Archives

Categories

Join 4,752 other subscribers
Buy Me A Coffee

TRANSLATE

Tweets by OsandaMalith

Tags

0day AHK ARM arrays assembly AutoHotKey borland C C c/c++ Certs crackme CSRF ctf DLL Hijacking DoS EE EE 4GEE EE 4GEE Mini eLearnSecurity exploit exploit development format string game hacking HEVD kernel LFI mimikatz MS-DOS MySQL PE Pentesting PHP POST XSS Programming Reverse Engineering reversing shellcode SQLi SQL injection tools Web Application Security windows WMI XSS ZTE
  • Home
  • ☠ Shellcodes
  • ☣ About
  • 💊 Cool Posts
  • 🔒 My Advisories

Copyright © 2025 Osanda Malith Jayathissa