- Cross Site Scripting (XSS)
 - Cross Site Request Forgery (CSRF)
 - Clickjacking (UI Redressing Attack)
 - Local File Inclusion (LFI)
 - Subdomain Takeover
 - Denial of Service (DOS)
 - Authentication Bypass
 - SQL injection
 - Insecure Direct Object Reference (IDOR)
 - 2FA Related issues
 - CORS Related issues
 - Server Side Request Forgery (SSRF)
 - Race Condition
 - Remote Code Execution (RCE)
 - Android Pentesting
 - Contributing
 - Maintainers
 
- From P5 to P2 to 100 BXSS
 - Google Acquisition XSS (Apigee)
 - XSS on Microsoft.com via Angular Js template injection
 - Researching Polymorphic Images for XSS on Google Scholar
 - Netflix Party Simple XSS
 - Stored XSS in google nest
 - Self XSS to persistent XSS on login portal
 - Universal XSS affecting Firefox
 - XSS WAF Character limitation bypass like a boss
 - Self XSS to Account Takeover
 - Reflected XSS on Microsoft subdomains
 - The tricky XSS
 - Reflected XSS in AT&T
 - XSS on Google using Acunetix
 - Exploiting websocket application wide XSS
 - Reflected XSS with HTTP Smuggling
 - XSS on Facebook instagram CDN server bypassing signature protection
 - XSS on Facebook's Acquisition Oculus
 - XSS on sony Subdomain
 - Exploiting Self XSS
 - Effortlessly Finding Cross Site Scripting inclusion XSSI
 - Bugbounty a DOM XSS
 - Blind XSS : a mind Game
 - FireFox IOS QR code reader XSS(CVE-2019-17003)
 - HTML injection to XSS
 - CVE-2020-13487 | Authenticated Stored Cross-site Scripting in bbPress
 - XSS at error page of repository code
 - XSS like a Pro
 - How I turned self XSS to stored XSS via CSRF
 - XSS Stored on Outlook web
 - XSS Bug 20 Chars Blind XSS Payload
 - XSS in AMP4EMAIL(DOM clobbering)
 - DOM Based XSS bug bounty writeup
 - XSS will never die
 - 5000 USD XSS issue at avast desktop antivirus
 - XSS to account takeover
 - How Paypal helped me to generate XSS
 - Bypass Uppercase filters like a PRO(XSS advanced methods)
 - Stealing login credentials with reflected XSS
 - bughunting xss on cookie popup warning
 - XSS is love
 - Oneplus XSS vulnerability in customer support portal
 - Exploiting cookie based XSS by finding RCE
 - Stored XSS on zendesk via macros
 - XSS in ZOHO main
 - DOM based XSS in private program
 - Bugbounty writeup : Take Attention and get stored XSSS
 - How I xssed admin account
 - Clickjacking XSS on google
 - Stored XSS on laporbugid
 - Leveraging angularjs based XSS to privilege escalation
 - How I found XSS by searching in shodan
 - Chaining caache poisining to stored XSS
 - XSS to RCE
 - XSS on twitter worth 1120
 - Reflected XSS in ebay.com
 - Cookie based XSS exolpoitation 2300 bug bounty
 - What do netcat -SMTP-self XSS have in common
 - XSS on google custom search engine
 - Story of a Full Account Takeover vulnerability N/A to Accepted
 - Yeah I got p2 in 1 minute stored XSS via markdown editor
 - Stored XSS on indeed
 - Self XSS to evil XSS
 - How a classical XSS can lead to persistent ATO vulnerability
 - Reflected XSS in tokopedia train ticket
 - Bypassing XSS filter and stealing user credit card data
 - Googleplex.com blind XSS
 - Reflected XSS on error page
 - How I was able to get private ticket response panel and fortigate web panel via blind XSS
 - Unicode vs WAF
 - Story of URI based XSS with some simple google dorking
 - Stored XSS on edmodo
 - XSSed my way to 1000
 - Try harder for XSS
 - From parameter pollution to XSS
 - MIME sniffing XSS
 - Stored XSS on techprofile Microsoft
 - Tale of a wormable Twitter XSS
 - XSS attacks google bot index manipulation
 - From Reflected XSS to Account takeover
 - Stealing local storage data through XSS
 - CSRF attack can lead to stored XSS
 - XSS Reflected (filter bypass)
 - XSS protection bypass on hackerone private program
 - Just 5 minutes to get my 2nd Stored XSS on edmodo.com
 - Multiple XSS in skype.com
 - Obtaining XSS using moodle featured and minor bugs
 - XSS on 403 forbidden bypass akamai WAF
 - How I was turn self XSS into reflected XSS
 - A Tale of 3 XSS
 - Stored XSS on Google.com
 - Stored XSS in the Guides gameplaersion (www.dota2.com)
 - Admin google.com reflected XSS
 - Paypal Stored security bypass
 - Paypal DOM XSS main domain
 - Bugbounty : The 5k$ Google XSS
 - Facebook stored XSS
 - Ebay mobile reflected XSS
 - Magix bugbounty XSS writeup
 - Abusing CORS for an XSS on flickr
 - XSS on google groups
 - Oracle XSS
 - Content types and XSS Facebook Studio
 - Admob Creative image XSS
 - Amazon Packaging feedback XSS
 - PaypalTech XSS
 - Persistent XSS on my world
 - Google VRP XSS in device management
 - Google VRP XSS
 - Google VRP Blind XSS
 - WAZE XSS
 - Referer Based XSS
 - How we invented the Tesla DOM XSS
 - Stored XSS on rockstar game
 - How I was able to bypass strong XSS protection in well known website imgur.com
 - Self XSS to Good XSS
 - That escalated quickly : from partial CSRF to reflected XSS to complete CSRF to Stored XSS
 - XSS using dynamically generated js file
 - Bypassing XSS filtering at anchor Tags
 - XSS by tossing cookies
 - Coinbase angularjs dom XSS via kiteworks
 - Medium Content spoofing and XSS
 - Managed Apps and music a tale of two XSSes in Google play
 - Making an XSS triggered by CSP bypass on twitter
 - Escalating XSS in phantomjs image rendering to SSRF
 - Reflected XSS in Simplerisk
 - Stored XSS in the heart of the russian email provider
 - How I built an XSS worm on atmail
 - XSS on bugcrowd and so many other websites main domain
 - Godaddy XSS affects parked domains redirector Processor
 - Stored XSS in Google image search
 - A pair of plotly bugs stored XSS abd AWS metadata
 - Near universal XSS in mcafee web gateway
 - Penetrating Pornhub XSS vulns
 - How I found a 5000 Google maps XSS by fiddling with protobuf
 - Airbnb when bypassing json encoding XSS filter WAF CSP and auditior turns into eight vulnerabilities
 - Lightwight markup a trio of persistent XSS in gitlab
 - XSS ONE BAY
 - SVG XSS in unifi
 - Stored XSS in unifi V4.8.12 controller
 - Turning self XSS into good XSS v2
 - SWF XSS DOM Based XSS
 - XSS filter bypass in Yahoo Dev flurry
 - XSS on Flickr
 - Two vulnerabilities makes an exploit XSS and csrf in bing
 - Runkeeper stored XSS
 - Google sleeping XSS awakens 5k bounty
 - Poisoning the well compromising godaddy customer support with blind XSS
 - UBER turning self XSS to good XSS
 - XSS on facebook via png content types
 - Cloudflare XSS
 - How I found XSS Vulnerability in Google
 - XSS to RCE
 - One payload to XSS them all
 - Self XSS on komunitas
 - Reclected XSS on alibabacloud
 - Self XSS on komunitas bukalapak
 - A real XSS in OLX
 - Self XSS using IE adobes
 - Stealing local storage through XSS
 - 1000 USD in 5mins Stored XSS in Outlook
 - OLX reflected XSS
 - My first stored XSS on edmodo.com
 - Hack your form new vector for BXSS
 - How I found Blind XSS vulnerability in redacted.com
 - 3 XSS in protonmail for iOS
 - XSS in edmodo wihinin 5 mins
 - Stil work redirect Yahoo subdomain XSS
 - XSS in azure devOps
 - Shopify reflected XSS
 - Muliple Stored XSS on tokopedia
 - Stored XSS on edmodo
 - A unique XSS scenario 1000 Bounty
 - Protonmail XSS Stored
 - Chaining tricky ouath exploitation to stored XSS
 - Antihack XSS to php uplaod
 - Reflected XSS in zomato
 - XSS through SWF file
 - Hackyourform BXSS
 - Reflected XSS on ASUS
 - Stored XSS via Alternate text at zendesk support
 - How I stumbled upon a stored XSS : my first bug bounty story
 - Cookie based Self XSS to Good XSS
 - Reflected XSS on amazon
 - XSS worm : a creative use of web application vulnerability
 - Google code in XSS
 - Self XSS on indeed.com
 - How I accidentally found XSS in Protonmail for iOS app
 - XML XSS in yandex.ru by accident
 - Critical Stored XSS vulnerability
 - XSS bypass using META tag in realestate.postnl.nl
 - Edmodo XSS bug
 - XSS in hiden input fields
 - How I discovered XSS that affected over 20 uber subdomains
 - DOM based XSS or why you should not rely on cloudflare too much
 - XSS in dynamics 365
 - XSS deface with html and how to convert the html into charcode
 - Cookie based injection XSS making explitable with exploiting other vulns
 - XSS with put in ghost blog
 - XSS using a Bug in safari and why blacklists are stupid
 - Magic XSS with two parameters
 - DOM XSS bug affecting tinder shopify Yelp
 - Persistent XSS unvalidated open graph embed at linkedin.com
 - My first 0day exploit CSP Bypass Reflected XSS
 - Google Stored XSS in payments
 - XSS on dropbox
 - Weaponizing XSS attacking internal domains
 - How I XSSed UBER and bypassed CSP
 - RXSS and CSRF bypass to Account takeover
 - Another XSS in google collaboratory
 - How I bypassed AKAMAI waf in overstock.com
 - Reflected XSS at philips.com
 - XSS vulnerabilities in multiple iframe busters affecting top tier sites
 - Reflected DOM XSS and clickjacking silvergoldbull
 - Stored XSS vulnerability in h1 private
 - Authbypass SQLi and XSS
 - Stored XSS vulnerability in tumblr
 - XSS in google code jam
 - Mapbox XSS
 - My first valid XSS
 - Stored XSS in webcomponents.org
 - 3 minutes XSS
 - icloud.com DOM based XSS
 - XSS at hubspot and in email areas
 - Self XSS leads to blind XSS and Reflected XSS
 - Refltected XSS primagames.com
 - Stored XSS in gameskinny
 - Blind XSS in Chrome experments Google
 - Yahoo two XSSI vulnerabilities chained to steal user information (750$)
 - How I found XSS on amazon
 - A blind XSS in messengers twins
 - XSS in microsoft Subdomain
 - Persistent XSS at ah.nl
 - The 12000 intersection betwenn clickjaking , XSS and DOS
 - XSS in google collaboratory CSP bypass
 - How I found blind XSS in apple
 - Reflected XSS on amazon.com
 - How I found XSS in 360totalsecurity
 - The 2.5 BTC Stored XSS
 - XSS Vulnerability in Netflix
 - A story of a UXSS via DOM XSS clickjacking in steam inventory helper
 - How I found XSS via SSRF vulnerability
 - Searching for XSS found ldap injection
 - how I converted SSRF to XSS in a SSRF vulnerable JIRA
 - Reflected XSS in Yahoo subdomain
 - Account takeover and blind XSS
 - How I found 5 stored XSS on a private program
 - Persistent XSS to steal passwords(Paypal)
 - Self XSS + CSRF to stored XSS
 - Stored XSS in yahoo and subdomains
 - XSS in microsoft
 - Blind XSS at customer support panel
 - Reflected XSS on stackoverflow
 - Stored XSS in Yahoo
 - XSS 403 forbidden Bypass
 - Turning self XSS into non self XSS via authorization issue at paypal
 - A story of stored XSS bypass
 - Mangobaaz hacked XSS to credentials
 - How I got stored XSS using file upload
 - Bypassing CSP to abusing XSS filter in edge
 - XSS to session Hijacking
 - Reflected XSS on www.zomato.com
 - XSS in subdomain of yahoo
 - XSS in yahoo.net subdomain
 - Reflected XSS moongaloop swf version 62x
 - Google adwords 3133.7 Stored XSS
 - How I found a surprising XSS vulnerability on oracle netsuite
 - Stored XSS on snapchat
 - How I was able to bypass XSS protection on h1 private program
 - Reflected XSS possible
 - XSS via angularjs template injection hostinger
 - Microsoft follow feature XSS (CVE-2017-8514)
 - XSS protection bypass made my quickest bounty ever
 - Taking note XSS to RCE in the simplenote electron client
 - VMWARE official vcdx reflected XSS
 - How I pwned a company using IDOR and Blind XSS
 - From Recon to DOM based XSS
 - Local file read via XSS
 - Non persistent XSS at microsoft
 - A Stored XSS in google (double kill)
 - Filter bypass to Reflected XSS on finance.yahoo.com (mobile version)
 - 900$ XSS in yahoo : recon wins
 - How I bypassed practos firewall and triggered an XSS vulnerability
 - Stored XSS to full information disclosure
 - Story of parameter specific XSS
 - Chaining self XSS with UI redressing leading to session hijacking
 - Stored XSS with arbitrary cookie installation
 - Reflective XSS and Open redirect on indeed.com subdomain
 - How I found reflected XSS on Yahoo subdomain
 - Dont just alert(1) because XSS is more fun
 - UBER XSS by helpe of KNOXSS
 - Reflected XSS in Yahoo
 - Reflected XSS on ww.yahoo.com
 - XSS because of wrong content type header
 
- How a simple CSRF attack turned into a P1
 - How I exploited the json csrf with method override technique
 - How I found CSRF(my first bounty)
 - Exploiting websocket application wide XSS and CSRF
 - Site wide CSRF on popular program
 - Using CSRF I got weird account takeover
 - CSRF CSRF CSRF
 - Google Bugbounty CSRF in learndigital.withgoogle.com
 - CSRF token bypass [a tale of 2k bug]
 - 2FA bypass via CSRF attack
 - Stored iframe injection CSRF account takeover
 - Instagram delete media CSRF
 - An inconsistent CSRF
 - Bypass CSRF with clickjacking worth 1250
 - Sitewide CSRF graphql
 - Account takeover using CSRF json based
 - CORS to CSRF attack
 - My first CSRF to account takeover
 - 4x chained CSRFs chained for account takeover
 - CSRF can lead to stored XSS
 - Yet other examples of abusing CSRF in logout
 - Wordpress CSRF to RCE
 - Bruteforce user IDs via CSRF to delete all the users with CSRF attack
 - CSRF Bypass using cross frame scripting
 - Account takeover via CSRF
 - A very useful technique to bypass the CSRF protection
 - CSRF account takeover exlpained automated manual bugbounty
 - CSRF to account takeover
 - How I got 500USD from microsoft for CSRF vulnerability
 - Critical Bypass CSRF protection
 - RXSS CSRF bypass to full account takeover
 - Youtube CSRF
 - Self XSS + CSRF = Stored XSS
 - Ribose IDOR with simple CSRF bypass unrestrcited changes and deletion to other photo profile
 - JSON CSRF attack on a social networking site
 - Hacking facebook oculus integration CSRF
 - Amazon leaking CSRF token using service worker
 - Facebook graphql CSRF
 - Chain the vulnerabilities and take your report impact on the moon csrf to html injection
 - Partial CSRF to Full CSRF
 - Stealing access token of one drive integration by chain csrf vulnerability
 - Metasploit web project kill all running taks CSRF CVE-2017-5244
 - Messenger site wide CSRF
 - Hacking Facebook CSRF device login flow
 - Two vulnerabilities makes an exploit XSS and CSRF in bing
 - How I bypassed Facebook in 2016
 - Ubiquiti bugbounty unifi generic CSRF protection Bypass
 - Bypass Facebook CSRF
 - Facebook CSRF full account takeover
 
- Google Bug bounty Clickjacking on Google payment
 - Google APIs Clickjacking worth 1337$
 - Clickjacking + XSS on Google org
 - Bypass CSRF with clickjacking on Google org
 - 1800 worth Clickjacking
 - Account takeover with clickjacking
 - Clickjacking on google CSE
 - How I accidentally found clickjacking in Facebook
 - Clickjacking on google myaccount worth 7500
 - Clickjacking in google docs and void typing feature
 - Reflected DOM XSS and Clickjacking
 - binary.com clickjacking vulnerability exploiting HTML5 security features
 - 12000 intersection betwen clickjacking XSS and denial of service
 - Steam fire and paste : a story of uxss via DOM XSS and Clickjacking in steam inventory helper
 - Yet another Google Clickjacking
 - Redressing instagram leaking application tokens via instagram clickjacking vulnerability
 - Self XSS to Good XSS and Clickjacking
 - Microsoft Yammer clickjacking exploiting HTML5 security features
 - Firefox find my device clickjacking
 - Whatsapp Clickjacking vulnerability
 - Telegram WEB client clickjacking vulnerability
 - Facebook Clickjacking : how we put a new dress on facebook UI
 
- RFI LFI Writeup
 - My first LFI
 - Bug bounty LFI at Google.com
 - Google LFI on production servers in redacted.google.com
 - LFI to 10 server pwn
 - LFI in apigee portals
 - Chain the bugs to pwn an organisation LFI unrestricted file upload to RCE
 - How we got LFI in apache drill recom like a boss
 - Bugbounty journey from LFI to RCE
 - LFI to RCE on deutche telekom bugbounty
 - From LFI to RCE via PHP sessions
 - magix bugbounty magix.com XSS RCE SQLI and LFI
 - LFI in nokia maps
 
- How I bought my way to subdomain takeover on tokopedia
 - Subdomain Takeover via pantheon
 - Subdomain takeover : a unique way
 - Escalating subdomain takeover to steal sensitive stuff
 - Subdomain takeover awarded 200
 - Subdomain takeover via wufoo service
 - Subdomain takeover via Hubspot
 - Souq.com subdomain takeover
 - Subdomain takeover : new level
 - Subdomain takeover due to misconfigured project settings for custom domain
 - Subdomain takeover via shopify vendor
 - Subdomain takeover via unsecured s3 bucket
 - Subdomain takeover worth 200
 - Subdomain takeover via campaignmonitor
 - How to do 55000 subdomain takeover in a blink of an eye
 - Subdomain takeover Starbucks (Part 2)
 - Subdomain takeover Starbucks
 - Uber wildcard subdomain takeover
 - Bugcrowd domain subdomain takeover vulnerability
 - Subdomain takeover vulnerability (Lamborghini Hacked)
 - Authentication bypass on uber's SSO via subdomain takeover
 - Authentication bypass on SSO ubnt.com via Subdomain takeover of ping.ubnt.com
 
- Long String DOS
 - AIRDOS
 - Denial of Service DOS vulnerability in script loader (CVE-2018-6389)
 - Github actions DOS
 - Application level denial of service
 - Banner grabbing to DOS and memory corruption
 - DOS across Facebook endpoints
 - DOS on WAF protected sites
 - DOS on Facebook android app using zero width no break characters
 - Whatsapp DOS vulnerability on android and iOS
 - Whatsapp DOS vulnerability in iOS android
 
- Touch ID authentication Bypass on evernote and dropbox iOS apps
 - Oauth authentication bypass on airbnb acquistion using wierd 1 char open redirect
 - Two factor authentication bypass
 - Instagram multi factor authentication bypass
 - Authentication bypass in nodejs application
 - Symantec authentication Bypass
 - Authentication bypass in CISCO meraki
 - Slack SAML authentocation bypass
 - Authentication bypass on UBER's SSO
 - Authentication Bypass on airbnb via oauth tokens theft
 - Inspect element leads to stripe account lockout authentication Bypass
 - Authentication bypass on SSO ubnt.com
 
- Tricky oracle SQLI situation
 - Exploiting “Google BigQuery” SQLI
 - SQLI via stopping the redirection to a login page
 - Finding SQLI with white box analysis a recent bug example
 - Bypassing a crappy WAF to exploit a blind SQLI
 - SQL Injection in private-site.com/login.php
 - Exploiting tricky blind SQLI
 - SQLI in forget password fucntion
 - SQLI Bug Bounty
 - File Upload blind SQLI
 - SQL Injection
 - SQLI through User Agent
 - SQLI in insert update query without comma
 - SQLI for 50 bounty
 - Abusing MYSQL CLients
 - SQLI Authentication Bypass AutoTrader Webmail
 - ZOL Zimbabwe Authentication Bypass to XSS & SQLi
 - SQLI bootcamp.nutanix.com
 - SQLI in University of Cambridge
 - Making a blind SQLI a little less Blind SQLI
 - SQLI amd silly WAF
 - Attacking Postgresql Database
 - Bypassing Host Header to SQL injection to dumping Database — An unusual case of SQL injection
 - A 5 minute SQLI
 - Union based SQLI writeup
 - SQLI with load file and into outfile
 - SQLI is Everywhere
 - SQLI in Update Query Bug
 - Blind SQLI Hootsuite
 - Yahoo – Root Access SQLI – tw.yahoo.com
 - Step by Step Exploiting SQLI in Oculus
 - Magix Bug Bounty: magix.com (RCE, SQLi) and xara.com (LFI, XSS)
 - Tesla Motors blind SQLI
 - SQLI in Nokia Sites
 
- Disclose Private Dashboard Chart's name and data in Facebook Analytics
 - Disclosing privately shared gaming clips of any user
 - Adding anyone including non-friend and blocked people as co-host in personal event!
 - Page analyst could view job application details
 - Deleting Anyone's Video Poll
 
- 2FA Bypass via logical rate limiting Bypass
 - Bypass 2FA in a website
 - Weird and simple 2FA bypass
 - How I cracked 2FA with simple factor bruteforce
 - Instagram account is reactivated without entering 2FA
 - How to bypass 2FA with a HTTP header
 - How I hacked 40k user accounts of microsoft using 2FA bypass outlook
 - How I abused 2FA to maintain persistence after password recovery change google microsoft instragram
 - Bypass hackerone 2FA
 - Facebook Bug bounty : How I was able to enumerate instagram accounts who had enabled 2FA
 
- CORS bug on google's 404 page (rewarded)
 - CORS misconfiguration leading to private information disclosure
 - CORS misconfiguration account takeover out of scope to grab items in scope
 - Chrome CORS
 - Bypassing CORS
 - CORS to CSRF attack
 - An unexploited CORS misconfiguration reflecting further issues
 - Think outside the scope advanced cors exploitation techniques
 - A simple CORS misconfiguration leaked private post of twitter facebook instagram
 - Explpoiting CORS misconfiguration
 - Full account takeover through CORS with connection sockets
 - Exploiting insecure CORS API api.artsy.net
 - Pre domain wildcard CORS exploitation
 - Exploiting misconfigured CORS on popular BTC site
 - Abusing CORS for an XSS on flickr
 
- Exploiting an SSRF trials and tribulations
 - SSRF on PDF generator
 - Google VRP SSRF in Google cloud platform stackdriver
 - Vimeo upload function SSRF
 - SSRF via ffmeg processing
 - My first SSRF using DNS rebinding
 - Bugbounty simple SSRF
 - SSRF reading local files from downnotifier server
 - SSRF vulnerability
 - Gain adfly SMTP access with SSRF via gopher protocol
 - Blind SSRF in stripe.com due to senntry misconfiguration
 - SSRF port issue hidden approch
 - The jorney of web cache firewall bypass to SSRF to AWS credentials compromise
 - SSRF to local file read and abusing aws metadata
 - pdfreactor SSRF to root level local files read which lead to RCE
 - SSRF trick : SSRF XSPA in micosoft's bing webwaster
 - Downnotifeer SSRF
 - Escalating SSRF to RCE
 - Vimeo SSRF with code execution potential
 - SSRF in slack
 - Exploiting SSRF like a boss
 - AWS takeover SSRF javascript
 - Into the borg of SSRF inside google production network
 - SSRF to local file disclosure
 - How I found an SSRF in yahoo guesthouse (recon wins)
 - Reading internal files using SSRF vulnerability
 - Airbnb chaining third party open redirect into SSRF via liveperson chat
 
- Exploiting a Race condition vulnerabililty
 - Race condition that could result to RCE a story with an app
 - Creating thinking is our everything : Race condition and business logic
 - Chaining improper authorization to Race condition to harvest credit card details
 - A Race condition bug in Facebook chat groups
 - Race condition bypassing team limit
 - Race condition on web
 - Race condition bugs on Facebook
 - Hacking Banks With Race Conditions
 - Race Condition Bug In Web App: A Use Case
 - RACE Condition vulnerability found in bug-bounty program
 - How to check Race Conditions in Web Applications
 
- Microsoft RCE bugbounty
 - OTP bruteforce account takeover
 - Attacking helpdesk RCE chain on deskpro with bitdefender
 - Remote image upload leads to RCE inject malicious code
 - Finding a p1 in one minute with shodan.io RCE
 - From recon to optimizing RCE results simple story with one of the biggest ICT company
 - Uploading backdoor for fun and profit RCE DB creds P1
 - Responsible Disclosure breaking out of a sandboxed editor to perform RCE
 - Wordpress design flaw leads to woocommerce RCE
 - Path traversal while uploading results in RCE
 - RCE jenkins instance
 - Traversing the path to RCE
 - How I chained 4 bugs features into RCE on amazon
 - RCE due to showexceptions
 - Yahoo luminate RCE
 - Latex to RCE private bug bounty program
 - How I got hall of fame in two fortune 500 companies an RCE story
 - RCE by uploading a web config
 - 36k Google app engine RCE
 - How I found 2.9 RCE at yahoo
 - Bypass firewall to get RCE
 - RCE vulnerabilite in yahoo subdomain
 - RCE in duolingos tinycards app from android
 - Unrestricted file upload to RCE
 - Getting a RCE (CTF WAY)
 - RCE starwars
 - How I got 5500 from yahoo for RCE
 - RCE in Addthis
 - Paypal RCE
 - My First RCE (Stressed Employee gets me 2x bounty)
 - Abusing ImageMagick to obtain RCE
 - How Snapdeal Kept their Users Data at Risk!
 - RCE via ImageTragick
 - How I Cracked 2FA with Simple Factor Brute-force!
 - Found RCE but got Duplicated
 - “Recon” helped Samsung protect their production repositories of SamsungTv, eCommerce eStores
 - IDOR to RCE
 - RCE on AEM instance without JAVA knowledge
 - RCE with Flask Jinja tempelate Injection
 - Race Condition that could result to RCE
 - Chaining Two 0-Days to Compromise An Uber Wordpress
 - Oculus Identity Verification bypass through Brute Force
 - Used RCE as Root on marathon Instance
 - Two easy RCE in Atlassian Products
 - RCE in Ruby using mustache templates
 - About a Sucuri RCE…and How Not to Handle Bug Bounty Reports
 - Source code disclosure vulnerability
 - Bypassing custom Token Authentication in a Mobile App
 - Facebook’s Burglary Shopping List
 - From SSRF To RCE in PDFReacter
 - Apache strust RCE
 - Dell KACE K1000 Remote Code Execution
 - Handlebars Tempelate Injection and RCE
 - Leaked Salesforce API access token at IKEA.com
 - Zero Day RCE on Mozilla's AWS Network
 - Escalating SSRF to RCE
 - Fixed : Brute-force Instagram account’s passwords
 - Bug Bounty 101 — Always Check The Source Code
 - ASUS RCE vulnerability on rma.asus-europe.eu
 - Magento – RCE & Local File Read with low privilege admin rights
 - RCE in Nokia.com
 - Two RCE in SharePoint
 - Token Brute-Force to Account Take-over to Privilege Escalation to Organization Take-Over
 - RCE in Hubspot with EL injection in HubL
 - Github Desktop RCE
 - eBay Source Code leak
 - Facebook source code disclosure in ads API
 - XS-Searching Google’s bug tracker to find out vulnerable source code
 
- Buffer Overflow Attack Book pdf
 - Github Repository on Buffer Overflow Attack
 - Stack-Based Buffer Overflow Attacks: Explained and Examples
 - How Buffer Overflow Attacks Work
 - Binary Exploitation: Buffer Overflows
 - WHAT IS A BUFFER OVERFLOW? LEARN ABOUT BUFFER OVERRUN VULNERABILITIES, EXPLOITS & ATTACKS
 
- Open Pull Requests
 - Send me links of writeups to My Twitter : 0xAsm0d3us
 
This Repo is maintained by :