kassem on Twitter: "Yay, I was awarded a $500 bounty on @Hacker0x01! Bug: Dom based XSS using the swagger ui by [?configUrl=] parameter Tips: ?configUrl=https://t.co/eBpP5NrCqC https://t.co/573zhTCbKG #TogetherWeHitHarder" / Twitter
Transforming Self-XSS Into Exploitable XSS | Invicti
Hacking Swagger-UI - from XSS to account takeovers
DOM XSS for Beginners | Cross Site Scripting Basics - YouTube
DOM Invader - Packt - SecPro
PostMessage Vulnerabilities. Part II · Jorge Lajara Website
The $1,000 worth cookie. A story of DOM XSS in Mail.ru | by Mase289 | InfoSec Write-ups
Hackerone-Report/TOPXSS.md at master · marz-hunter/Hackerone-Report · GitHub
$3,500 Shopify Hack - Analyzing XSS from HackerOne - YouTube
$20000 Facebook DOM XSS : Vinoth Kumar
Cross-Site Scripting ( XSS ) - Ask Buddie
DOM XSS (@DOMXss) / Twitter
What Bypassing Razer's DOM-based XSS Patch Can Teach Us - EdOverflow
XSS.Cx Blog: DOM XSS, location.hash, Stored XSS, Same Origin Policy, CoTS Scanners
PostMessage Vulnerabilities. Part II · Jorge Lajara Website
Persistent DOM-based XSS in help.twitter.com via localStorage | Persistent DOM-based XSS in help.twitter.com via localStorage Awarded: 1.120$ https:// hackerone.com/reports/297968 | By Nullwatch 0x2. | Facebook