XSS via HTTP Headers
https://brutelogic.com.br/blog/xss-via-http-headers/
https://brutelogic.com.br/blog/xss-via-http-headers/
Google Dorking for Bug Bounty Programs
https://twitter.com/sushiwushi2/status/1165282481567760385
https://github.com/sushiwushi/bug-bounty-dorks/blob/master/dorks.txt
https://twitter.com/sushiwushi2/status/1165282481567760385
https://github.com/sushiwushi/bug-bounty-dorks/blob/master/dorks.txt
Twitter
sushiwushi2
Feeling cute, so I gathered some Google Dorks to hunt external bug bounty programs, enjoy ❤️ https://t.co/Qd2psyNV4Z Suggestions are welcome! #bugbounty #bugbountytips
BYPASSING A CRAPPY WAF TO EXPLOIT A BLIND SQL INJECTION
https://robinverton.de/blog/2019/08/25/bug-bounty-bypassing-a-crappy-waf-to-exploit-a-blind-sql-injection/
https://robinverton.de/blog/2019/08/25/bug-bounty-bypassing-a-crappy-waf-to-exploit-a-blind-sql-injection/
Access portal of Facebook mobile retailers and see earnings and referrals reports
https://ysamm.com/?p=314
https://ysamm.com/?p=314
How a classical XSS can lead to persistent ATO Vulnerability?
https://hackademic.co.in/how-a-classical-xss-can-lead-to-persistent-ato-vulnerability/
https://hackademic.co.in/how-a-classical-xss-can-lead-to-persistent-ato-vulnerability/
Hackademic
How a classical XSS can lead to persistent ATO Vulnerability? | Hackademic
Hello Hunters, XSS (Cross Site Scripting) is really one of the most common bugs that we have found atleast once somewhere The thing that is not common is how we report it? Most of the Bug Bounty…
Android-Reports-and-Resources
https://github.com/B3nac/Android-Reports-and-Resources
https://github.com/B3nac/Android-Reports-and-Resources
GitHub
GitHub - B3nac/Android-Reports-and-Resources: A big list of Android Hackerone disclosed reports and other resources.
A big list of Android Hackerone disclosed reports and other resources. - GitHub - B3nac/Android-Reports-and-Resources: A big list of Android Hackerone disclosed reports and other resources.
HTTP Request Smuggling introduction, detection, exploitation and IRL example
https://twitter.com/s0md3v/status/1167451862351499265
https://twitter.com/s0md3v/status/1167451862351499265
Twitter
Somdev Sangwan
HTTP Request Smuggling Introduction: https://t.co/c1e0m8u4Kk Detection: https://t.co/FvmIeppVH1 Exploitation: https://t.co/4VuPNNk1YO IRL Example: https://t.co/2qyS4YSCvC
Solving intigriti 3rd XSS Challenge
https://blog.fadyothman.com/go-local-solving-intigriti-challenge-3/
https://blog.fadyothman.com/go-local-solving-intigriti-challenge-3/
Fady's Technical Blog
Go Local : Solving Intigriti 3rd XSS Challenge
A writeup for the third XSS challenge made by intigriti describing both failed and successful attempts at solving this challenge,
Forwarded from burpsuite (not official)
burpsuite_pro_v2.1.zip
279.3 MB
pass: 311138
java -jar burpsuite_pro_v2.1_BurpHelper.jar
java -jar burpsuite_pro_v2.1_BurpHelper.jar
Security analysis of <portal> element
https://research.securitum.com/security-analysis-of-portal-element/
https://research.securitum.com/security-analysis-of-portal-element/
research.securitum.com
Security analysis of <portal> element - research.securitum.com
Portal is a fairly new HTML element that is currently supported only in Chrome Canary behind the #enable-portals flag. Their main objective is to enable seamless transitions to the web by pre-rendering content in an iframe-like element that can be then “promoted”…
Graphql Abuse to Steal Anyone’s Address
https://blog.usejournal.com/graphql-bug-to-steal-anyones-address-fc34f0374417
https://blog.usejournal.com/graphql-bug-to-steal-anyones-address-fc34f0374417
Medium
Graphql Abuse to Steal Anyone’s Address
Introduction
How i found a 1500$ worth Deserialization vulnerability
https://medium.com/@D0rkerDevil/how-i-found-a-1500-worth-deserialization-vulnerability-9ce753416e0a
https://medium.com/@D0rkerDevil/how-i-found-a-1500-worth-deserialization-vulnerability-9ce753416e0a
Medium
How i found a 1500$ worth Deserialization vulnerability
Note before you start.
Time-Based Blind SQL Injection In GraphQL
https://blog.usejournal.com/time-based-blind-sql-injection-in-graphql-39a25a1dfb3c
https://hackerone.com/reports/435066
https://blog.usejournal.com/time-based-blind-sql-injection-in-graphql-39a25a1dfb3c
https://hackerone.com/reports/435066
Medium
Time-Based Blind SQL Injection In GraphQL
I have heard a lot about GraphQL but never got time to understand due to time constraints. Recently, I got an application to pentest with…
Exploiting JSONP and Bypassing Referer
https://medium.com/bugbountywriteup/exploiting-jsonp-and-bypassing-referer-check-2d6e40dfa24
https://medium.com/bugbountywriteup/exploiting-jsonp-and-bypassing-referer-check-2d6e40dfa24
Medium
Exploiting JSONP and Bypassing Referer Check
Hi Folks, hope you are all fine, so this writeup is about exploiting JSONP to extract private data from API endpoints and bypassing the…
How I could have hacked your Uber account
https://appsecure.security/blog/how-i-could-have-hacked-your-uber-account
https://appsecure.security/blog/how-i-could-have-hacked-your-uber-account
www.appsecure.security
How I could have hacked your Uber account! - AppSecure Security
AppSecure is an offensive cybersecurity company, works with businesses across the world to protect their data, reputation, and brand.