Bypass CSP in a single click using my new Custom Action, powered by @renniepak.nl's excellent CSP bypass project.
What windows or MacOs files reliably contain the username of the currently logged in user WITHOUT that username being part of the file path?
The best time to quit bug bounty was 20 months ago. The second best time is now.
To answer that question, I processed the latest Common Crawl dataset, totalling 14.54 TB, to compile a full list of the most commonly whitelisted domains found in CSP script-src directives (falling back to default-src where script-src was absent).
renniepak
When reviewing pull requests with new additions for CSPBypass.com, I often find myself questioning how useful a given entry actually is. If no websites whitelist a specific host, there is little point in adding it.
renniepak
The results are quite interesting and can be found here:
cspbypass.com/csp-domains....
To keep the list manageable, it only includes hostnames with 10 or more occurrences. I will push the full dataset to GitHub shortly.
we at cspbypass.com recommend cspbypass.com
renniepak
Gareth Heyes
Added a small feature to cspbypass.com to warn the user if unsafe-inline is detected, in which case you typically don’t need to waste time hunting for 3rd-party whitelisted CSP bypasses and go straight to inline scripts / event handlers.
For anyone curious, I just pushed the complete set to our repo:
github.com/renniepak/CS...