🤬
Revision indexing in progress... (symbol navigation in revisions will be accurate after indexed)
  • ■ ■ ■ ■ ■ ■
    assets/basics.md
    skipped 67 lines
    68 68   - https://www.learnrubyonline.org/
    69 69  - Python
    70 70   - https://docs.python.org/3/tutorial/
     71 +- Go(lang)
     72 + - https://golang.org
    71 73  - Additional Resources:
    72 74   - https://www.codecademy.com/learn/paths/web-development
    73 75   - https://docs.python.org/3/tutorial/
    skipped 6 lines
  • ■ ■ ■ ■ ■
    assets/blogposts.md
    skipped 15 lines
    16 16  - [HTTP Desync](#HTTP-Desync)
    17 17  - [File Upload](#File-Upload)
    18 18  - [Automation](#Automation)
     19 +- [Buffer Overflow](#Buffer-Overflow)
     20 +- [IDOR](#IDOR)
    19 21  - [Misc](#Misc)
    20 22  ## XSS
    21 23  You can find a ton of awesome XSS reports by searching through the HackerOne Hacktivity Page (https://hackerone.com/hacktivity?querystring=XSS). Here are some more complex and some of my favorite XSS related blog posts:
    22 24   
    23 25  - [XSS on Google Search - Sanitizing HTML in The Client?](https://www.youtube.com/watch?v=lG7U3fuNw3A) - by LiveOverflow
    24 26   - [The Fix](https://github.com/google/closure-library/commit/c79ab48e8e962fee57e68739c00e16b9934c0ffa)
    25  - 
     27 +- [Cracking my windshield and earning $10,000 on the Tesla Bug Bounty Program](https://samcurry.net/cracking-my-windshield-and-earning-10000-on-the-tesla-bug-bounty-program/) - by [Sam Curry](https://twitter.com/samwcyo)
     28 +- [Effortlessly finding Cross Site Script Inclusion (XSSI) & JSONP for bug bounty](https://medium.com/bugbountywriteup/effortlessly-finding-cross-site-script-inclusion-xssi-jsonp-for-bug-bounty-38ae0b9e5c8a) - by [@th3_hidd3n_mist](https://twitter.com/th3_hidd3n_mist)
     29 +- [Microsoft Edge (Chromium) - EoP via XSS to Potential RCE](https://leucosite.com/Edge-Chromium-EoP-RCE/) - by [@Qab](https://twitter.com/qab)
    26 30  ### DOM XSS
    27 31  - https://hackerone.com/reports/297968
    28 32  - https://hackerone.com/reports/168165
    skipped 21 lines
    50 54  ## Token / Authentication
    51 55  - [Abusing feature to steal your tokens](https://medium.com/@rootxharsh_90844/abusing-feature-to-steal-your-tokens-f15f78cebf74) - by Harsh Jaiswal
    52 56  - [How I was able to bypass OTP code requirement in Razer [The story of a critical bug]](https://medium.com/bugbountywriteup/how-i-was-able-to-bypass-otp-token-requirement-in-razer-the-story-of-a-critical-bug-fc63a94ad572?) - by Ananda Dhakal
     57 +- [Bypassing GitHub's OAuth flow](https://blog.teddykatz.com/2019/11/05/github-oauth-bypass.html) - by [@not_aardvark](https://twitter.com/not_aardvark)
    53 58   
    54 59   
    55 60  ## SQL Injection
    skipped 7 lines
    63 68  - [A deep dive into reversing Android pre-Installed apps](https://github.com/maddiestone/ConPresentations/blob/master/Blackhat2019.SecuringTheSystem.pdf) and the [BlackHat Talk](https://www.youtube.com/watch?v=U6qTcpCfuFc) - by Maddie Stone
    64 69   
    65 70  ## HTTP Desync
    66  -- [HTTP Desync Attacks: Request Smuggling Reborn](https://portswigger.net/research/http-desync-attacks-request-smuggling-reborn) in combination with this [report](https://hackerone.com/reports/510152) - by James Kettle
     71 +- [HTTP Desync Attacks: Request Smuggling Reborn](https://portswigger.net/research/http-desync-attacks-request-smuggling-reborn) in combination with this [report](https://hackerone.com/reports/510152) - by [James Kettle](https://twitter.com/albinowax)
    67 72  - [HTTP Request Smuggling on vpn.lob.com](https://hackerone.com/reports/694604) - by 0X0 (painreigns)
    68 73   
    69 74  ## File Upload
    70 75  - [Webshell via File Upload on ecjobs.starbucks.com.cn](https://hackerone.com/reports/506646) - by johnstone
     76 +- [Facebook Messenger server random memory exposure through corrupted GIF image ](https://www.vulnano.com/2019/03/facebook-messenger-server-random-memory.html) - by [@xdzmitry](https://twitter.com/xdzmitry)
     77 +- [A Tale of Exploitation in Spreadsheet File Conversions](https://buer.haus/2019/10/18/a-tale-of-exploitation-in-spreadsheet-file-conversions/) - by [@bbuerhaus](https://twitter.com/bbuerhaus)[@daeken](https://twitter.com/daeken)[@erbbysam](https://twitter.com/erbbysam)[@smiegles](https://twitter.com/smiegles)
    71 78   
    72 79  ## Automation
    73 80  - [Fasten your Recon process using Shell Scripting](https://medium.com/bugbountywriteup/fasten-your-recon-process-using-shell-scripting-359800905d2a) - by Mohd Shibli
    74 81  - [Beginner’s Guide to recon automation](https://medium.com/bugbountywriteup/beginners-guide-to-recon-automation-f95b317c6dbb) - by Ashish Jha
    75 82  - [Burp Suite tutorial: IDOR vulnerability automation using Autorize and AutoRepeater (bug bounty)](https://www.youtube.com/watch?v=3K1-a7dnA60) - by STÖK & Fisher
    76 83   
     84 +## Buffer Overflow
     85 +- [Filling in the Blanks: Exploiting Null Byte Buffer Overflow for a $40,000 Bounty](https://samcurry.net/filling-in-the-blanks-exploiting-null-byte-buffer-overflow-for-a-40000-bounty/) - by [Sam Curry](https://twitter.com/samwcyo)
     86 + 
     87 +## IDOR
     88 +- [Steal Earning of Airbnb hosts by Adding Bank Account/Payment Method](https://www.indoappsec.in/2019/12/airbnb-steal-earning-of-airbnb-hosts-by.html) - by [Vijay Kumar ](https://twitter.com/IndoAppSec)
     89 +- [GraphQL IDOR leads to information disclosure](https://medium.com/@R0X4R/graphql-idor-leads-to-information-disclosure-175eb560170d) - by [@R0X4R](https://twitter.com/R0X4R)
     90 + 
    77 91  ## Misc
    78 92  - [Writing a Simple Buffer Overflow Exploit](https://www.youtube.com/watch?v=oS2O75H57qU) - by LiveOverflow
     93 +- [Hacking GitHub with Unicode's dotless 'i'](https://eng.getwisdom.io/hacking-github-with-unicode-dotless-i/)
     94 +- [Abusing autoresponders and email bounces](https://medium.com/intigriti/abusing-autoresponders-and-email-bounces-9b1995eb53c2) - by securinti
     95 +- [Abusing HTTP hop-by-hop request headers](https://nathandavison.com/blog/abusing-http-hop-by-hop-request-headers) - by [@nj_dav](https://twitter.com/nj_dav)
    79 96   
    80 97  ---
    81 98  back to [Intro Page](/README.md)
  • ■ ■ ■ ■ ■ ■
    assets/setup.md
    skipped 6 lines
    7 7  https://www.linux.com/learn/easy-lamp-server-installation<br>
    8 8  - Setting up virtualbox + linux
    9 9  https://linuxconfig.org/how-to-install-kali-linux-on-virtualbox
     10 +- Docker For Pentesting And Bug Bounty Hunting
     11 +https://www.youtube.com/watch?v=5G6tA8Q9AuQ
    10 12  - Basics of UNIX
    11 13  https://lifehacker.com/5633909/who-needs-a-mouse-learn-to-use-the-command-line-for-almost-anything
    12 14  - Setting up Burp
    skipped 8 lines
  • ■ ■ ■ ■ ■ ■
    assets/tools.md
    skipped 43 lines
    44 44  |[Spyse.com](https://spyse.com/)|New Search Engine made for pentesters and cyber security specialists|[Spyse Team](https://spyse.com/about)|
    45 45  |[crt.sh](https://crt.sh)|SSL certificate search tool|[Sectigo](https://sectigo.com/)|
    46 46  |[Virus Total](https://www.virustotal.com)|WHOIS, DNS, and subdomain recon|[Virus Total Team](https://support.virustotal.com/hc/en-us/categories/360000160117-About-us)|
     47 +|[ZoomEye](https://www.zoomeye.org/)|Search engine for specific network components|[Team from Knownsec](https://www.knownsec.com/)|
     48 +|[We Leak Info](https://weleakinfo.com/)|Databreach Search Engine|[We Leak Info](https://twitter.com/weleakinfo)|
     49 +|[NerdyData](https://nerdydata.com/)|Search Engine for Source Code|[NerdyData](https://www.crunchbase.com/organization/nerdydata)|
     50 +|[Crunchbase](https://www.crunchbase.com/)|For finding Information about Businesses and their acquisitions|[TechCrunch](https://techcrunch.com)|
     51 +|[Searchcode](https://searchcode.com/)|Helping you find real world examples of functions, API's and libraries over 90 languages across multiple sources|[searchcode](https://searchcode.com/about/#team)|
     52 + 
     53 + 
     54 + 
     55 + 
     56 + 
     57 + 
     58 + 
    47 59  ### Exploitation
    48 60  | Name | Description | Written in | Created by |
    49 61  |------ |------------- | ------------ |------------- |
    skipped 9 lines
    59 71  |Frida||||
    60 72  |[dex2jar](https://github.com/pxb1988/dex2jar)|Useful to convert dex files into jar to decompile the application.|Java, Smali|Bob Pan|
    61 73  |[andriller](https://github.com/den4uk/andriller)|Andriller - is software utility with a collection of forensic tools for smartphones. It performs read-only, forensically sound, non-destructive acquisition from Android devices. [andriller.com](https://www.andriller.com/)|Python|[Denis Sazonov](https://github.com/den4uk)|
     74 +|[Mobile Security Framework (MobSF)](https://github.com/MobSF/Mobile-Security-Framework-MobSF/)|Mobile Security Framework (MobSF) is an automated, all-in-one mobile application (Android/iOS/Windows) pen-testing, malware analysis and security assessment framework capable of performing static and dynamic analysis. MobSF support mobile app binaries (APK, IPA & APPX) along with zipped source code and provides REST APIs for seamless integration with your CI/CD or DevSecOps pipeline.The Dynamic Analyzer helps you to perform runtime security assessment and interactive instrumented testing.|Python|MobSF Team|
    62 75   
    63 76  ### Others
    64 77  | Name | Description | Written in | Created by |
    skipped 5 lines
  • ■ ■ ■ ■ ■
    assets/vulns.md
    skipped 13 lines
    14 14  - [OWASP XSS](https://www.owasp.org/index.php/Cross-site_Scripting_(XSS))
    15 15  - [A comprehensive tutorial on cross-site scripting](https://excess-xss.com)
    16 16  - [Google Application Security (XSS Guide)](https://www.google.com/intl/am_AD/about/appsecurity/learning/xss/)
    17  - - [What is PHP and why is XSS so common there?](https://www.youtube.com/watch?v=Q2mGcbkX550) - by LiveOverflow
     17 +- [What is PHP and why is XSS so common there?](https://www.youtube.com/watch?v=Q2mGcbkX550) - by LiveOverflow
    18 18   
    19 19  ## Cross-Site Request Forgery (CSRF)
    20 20  - [Cross-Site Request Forgery Attack](https://www.youtube.com/watch?v=eWEgUcHPle0) - by PwnFunction
    skipped 10 lines
    31 31  - [HTTP Parameter Pollution Attacks](https://www.youtube.com/watch?v=QVZBl8yxVX0) - by PwnFunction
    32 32  ## Logic Errors
    33 33  - [Finding Your First Bug: Business Logic Errors](https://www.youtube.com/watch?v=RobCqW2KwGs) - by InsiderPhD
     34 +## Remote Code Execution
     35 +- [Finding Your First Bug: Goal Setting / Remote Code Execution (RCE)](https://www.youtube.com/watch?v=5BTvTE3gEq8) - by InsiderPhD
    34 36  ---
    35 37  back to [Intro Page](/README.md)
Please wait...
Page is in error, reload to recover