BugBounty & Hacking Resources
@projectzeroTM
1.18K
subscribers
25
photos
1
video
5
files
366
links
Download Telegram
Join
BugBounty & Hacking Resources
1.18K subscribers
BugBounty & Hacking Resources
https://www.wetest.net/blog/a-comprehensive-guide-to-xss-attacks-and-defenses-862.html
www.wetest.net
A Comprehensive Guide to XSS Attacks and Defenses
This article provides a detailed introduction to XSS(Cross Site Scripting) vulnerability attacks and defenses, including vulnerability basics, XSS fundamentals, encoding basics, XSS Payload, and XSS attack defense.
❤
2
🔥
2
BugBounty & Hacking Resources
https://medium.com/@mrhavit/breaking-tiktok-our-journey-to-finding-an-account-takeover-vulnerability-b0646aba1c4b
Medium
Breaking TikTok: Our Journey to Finding an Account Takeover Vulnerability
Hello, fellow security researchers and bug bounty hunters!
❤
3
BugBounty & Hacking Resources
https://www.yeswehack.com/learn-bug-bounty/dom-explorer-tool-parse-html?utm_source=twitter&utm_medium=social&utm_campaign=dom-explorer-tool
YesWeHack
Dom-Explorer launched to reveal how browsers parse HTML, mutated XSS
Learn about Dom-Explorer, a new open-source tool for understanding how popular browsers parse HTML and uncovering mutation XSS vulnerabilities.
🔥
2
❤
1
BugBounty & Hacking Resources
https://www.mdsec.co.uk/2024/10/when-wafs-go-awry-common-detection-evasion-techniques-for-web-application-firewalls/
MDSec
When WAFs Go Awry: Common Detection & Evasion Techniques for Web Application Firewalls - MDSec
Web Application Firewalls (WAFs) help to protect web applications by monitoring, filtering, and blocking HTTP traffic to and from a web service. However, WAFs are too often relied upon as...
🔥
2
❤
1
BugBounty & Hacking Resources
https://x.com/05__Yash/status/1853803857433837638
❤
2
BugBounty & Hacking Resources
https://x.com/0x0SojalSec/status/1853532267215519991
❤
2
🔥
2
BugBounty & Hacking Resources
https://blog.sicuranext.com/breaking-down-multipart-parsers-validation-bypass/
Sicuranext Blog
Breaking Down Multipart Parsers: File upload validation bypass
TL;DR: Basically, all multipart/form-data parsers fail to fully comply with the RFC, and when it comes to validating filenames or content uploaded by users, there are always numerous ways to bypass validation. We'll test various bypass techniques against…
❤
2
BugBounty & Hacking Resources
https://x.com/d4d89704243/status/1854562239547674971
👍
4
🔥
2
BugBounty & Hacking Resources
https://htmlparser.info/parser/
htmlparser.info
Idiosyncrasies of the HTML parser
This book will highlight the ins and outs of the HTML parser, and contains almost-impossible quizzes.
👍
3
🔥
2
BugBounty & Hacking Resources
https://x.com/renniepak/status/1854526392895000842?t=Ttm1lYBHpNaqd_7WUQUnrA&s=19
❤
2
BugBounty & Hacking Resources
https://abrahack.com/posts/learnpress-sqli/
Abrahack's Blog
Learnpress SQLi
Full Disclosure of CVE-2024-8522 & CVE-2024-8529
❤
2
BugBounty & Hacking Resources
https://web.archive.org/web/20181224143634/https://security.szurek.pl/exploit-bypass-php-escapeshellarg-escapeshellcmd.html
❤
3
🔥
2
BugBounty & Hacking Resources
https://meydi.hashnode.dev/master-of-xss-waf-bypass-part-1
my first blog post
❤
13
👍
2
🔥
1
👌
1
BugBounty & Hacking Resources
https://medium.com/@RaunakGupta1922/mastering-idor-the-ultimate-resource-guide-84e44052f70c
Medium
All You Need to Master IDOR: A Complete Resource Guide
Today, I’m excited to share all the resource I documented and personally used to master IDOR Vulnerability, soo lessssss gooo!!!!!
❤
3
🔥
1
BugBounty & Hacking Resources
https://mizu.re/post/exploring-the-dompurify-library-bypasses-and-fixes
mizu.re
Exploring the DOMPurify library: Bypasses and Fixes (1/2). Tags:Article - Article - Web - mXSS
🔥
3
BugBounty & Hacking Resources
https://portswigger.net/research/hidden-oauth-attack-vectors
PortSwigger Research
Hidden OAuth attack vectors
Intro The OAuth2 authorization protocol has been under fire for the past ten years. You've probably already heard about plenty of "return_uri" tricks, token leakages, CSRF-style attacks on clients, an
❤
5
🔥
2
BugBounty & Hacking Resources
JSONP on
page.gitlab.com
https://x.com/omidxrz/status/1857821012991045845
❤
5
🔥
2
BugBounty & Hacking Resources
https://www.youtube.com/watch?v=zOPjz-sPyQM
YouTube
DEF CON 32 - Listen to the Whispers: Web Timing Attacks that Actually Work - James Kettle
Websites are riddled with timing oracles eager to divulge their innermost secrets. It's time we started listening to them.
In this session, I'll unleash novel attack concepts to coax out server secrets including masked misconfigurations, blind data-structure…
❤
4
🔥
3
BugBounty & Hacking Resources
https://x.com/omidxrz/status/1858161571869962320?t=-HbofN6e15yF_I4iXyLFkw&s=19
X (formerly Twitter)
Omid Rezaei (@omidxrz) on X
Cloudflare:
https://t.co/KPMQl9QG0g
❤
1
BugBounty & Hacking Resources
https://0x999.net/blog/exploring-javascript-events-bypassing-wafs-via-character-normalization
#xss
0x999.net
Exploring Javascript events & Bypassing WAFs via character normalization
This blog post explores advanced techniques for bypassing WAFs by leveraging quirks in JavaScript event handling, alternative encodings, and character normalization. It demonstrates how discrepancies in how web application firewalls and browsers parse attributes…
🔥
4
BugBounty & Hacking Resources
https://blog.voorivex.team/from-an-android-hook-to-rce-5000-bounty
Voorivex's Team
Android Exploit to RCE: $5000 Bounty
Discover how reverse engineering led to a $5000 bounty by exploiting a critical vulnerability in a popular Android app
❤
4
👎
3