https://www.google-analytics.com/plugins/ua/linkid.js
https://www.google-analytics.com/analytics.js
https://hackerone.com/assets/application-56394a13ade9e799b8d9b9acc44006d6.js
https://api.jollywallet.com/affiliate/client?p=16&dist=261&sub=chrome208
https://hackerone.com/assets/constants-8665faab345cfbe5430613cfd621af41.js
https://www.google-analytics.com/default.js
https://hackerone.com/assets/frontend-161dfc9b.js
https://hackerone.com/assets/vendor-118f4160.js
https://hackerone.com/assets/application-4a1a8595.css
https://hackerone.com/assets/vendor-3b47297caaa9fa37ef0fb85a01b3dac2.css
http://aplikasiadi2.blogspot.co.id/2016/03/hackeronecom.html
https://docs.google.com/document/d/1WxkN1lD_el7OGTYzRZBOrVvUxKFx_efJQK3laUo0tDM/pub
<iframe src="https://docs.google.com/document/d/1WxkN1lD_el7OGTYzRZBOrVvUxKFx_efJQK3laUo0tDM/pub?embedded=true"></iframe>
http://aplikasiadi2.blogspot.co.id/2016/02/https-to-be-developed.html
http://ubermovement.com/search?query=<script>alert(“Hi Uber!”)</script>
Title: Demo report: XSS in alph4delta home page
Types: Cross-Site Scripting (XSS)
Link: https://hackerone.com/reports/126351
Date: 2016-03-28 00:44:35 +0700
By: demo-researcher
Details:
In some ***fantasy world***, the home page of alph4delta is vulnerable to an *imaginary* Cross-Site Scripting attack.
1. Visit home page of alph4delta
2. Open the browser's javascript console
3. Type `alert(/xss!/)` and press enter
4. Profit!
https://hackerone.com/alph4delta
https://hackerone.com/muhammadadi
https://hackerone.com/muhammadadi/reports/new
https://api.hackerone.com/docs/v1