This tweet contains an XSS bypass payload that is encoded. The payload is '%3E%3CD3V%0DonMOUseovEr%09=%09["BadrHere"].find(confirm)%0Dx%3Ev3dm0s'. This payload aims to execute malicious JavaScript code in a web application. XSS bypass payloads like this can evade Web Application Firewalls (WAFs) by obfuscating the code. Security testers and developers should be aware of such payloads to strengthen web application security.
Original tweet: https://twitter.com/viehgroup/status/1852987142815015225