webProeasy
Easy 5
web-kids20
XSS challenge where input is placed inside a JavaScript object literal within a `<script>` block. No filtering is applied.
$ ls tags/ techniques/
script_tag_breakouthtml_parser_priority
🔒
Permission denied (requires tier.pro)
Sign in to access full writeups
Sign in with GitHub to continue. No email required.
$sign in$ grep --similar