Circumventing CSP Restrictions to Exfil Data from an XSS Foothold
Exfiltrate sensitive data from XSS contexts via Cross-Document Messaging
Configuring a loopback VPN interface that uses AdGuard DNS blocking for cellular connections
A new bypass technique that can be used when spaces are not accepted in an SQL injection payload
Setting up a custom Burp template that can act as a daily driver template with proper scope control and traffic filtering