Updating conversion, creating readmes
This commit is contained in:
@@ -1,23 +1,23 @@
|
||||
[38;5;12m [39m[38;2;255;187;0m[1m[4mAwesome Web Security [0m[38;5;14m[1m[4m![0m[38;2;255;187;0m[1m[4mAwesome[0m[38;5;14m[1m[4m (https://cdn.rawgit.com/sindresorhus/awesome/d7305f38d29fed78fa85652e3a63e154dd8e8829/media/badge.svg)[0m[38;2;255;187;0m[1m[4m (https://github.com/sindresorhus/awesome)[0m
|
||||
[38;5;12m [39m[38;2;255;187;0m[1m[4mAwesome Web Security [0m[38;5;14m[1m[4m![0m[38;2;255;187;0m[1m[4mAwesome[0m[38;5;14m[1m[4m (https://cdn.rawgit.com/sindresorhus/awesome/d7305f38d29fed78fa85652e3a63e154dd8e8829/media/badge.svg)[0m[38;2;255;187;0m[1m[4m (https://github.com/sindresorhus/awesome)[0m
|
||||
|
||||
[38;5;12m (https://www.w3.org/TR/html5/)[39m
|
||||
|
||||
[38;5;11m[1m▐[0m[38;5;12m [39m[38;5;12m🐶 Curated list of Web Security materials and resources.[39m
|
||||
|
||||
[38;5;12mNeedless[39m[38;5;12m [39m[38;5;12mto[39m[38;5;12m [39m[38;5;12msay,[39m[38;5;12m [39m[38;5;12mmost[39m[38;5;12m [39m[38;5;12mwebsites[39m[38;5;12m [39m[38;5;12msuffer[39m[38;5;12m [39m[38;5;12mfrom[39m[38;5;12m [39m[38;5;12mvarious[39m[38;5;12m [39m[38;5;12mtypes[39m[38;5;12m [39m[38;5;12mof[39m[38;5;12m [39m[38;5;12mbugs[39m[38;5;12m [39m[38;5;12mwhich[39m[38;5;12m [39m[38;5;12mmay[39m[38;5;12m [39m[38;5;12meventually[39m[38;5;12m [39m[38;5;12mlead[39m[38;5;12m [39m[38;5;12mto[39m[38;5;12m [39m[38;5;12mvulnerabilities.[39m[38;5;12m [39m[38;5;12mWhy[39m[38;5;12m [39m[38;5;12mwould[39m[38;5;12m [39m[38;5;12mthis[39m[38;5;12m [39m[38;5;12mhappen[39m[38;5;12m [39m[38;5;12mso[39m[38;5;12m [39m[38;5;12moften?[39m[38;5;12m [39m[38;5;12mThere[39m[38;5;12m [39m[38;5;12mcan[39m[38;5;12m [39m[38;5;12mbe[39m[38;5;12m [39m[38;5;12mmany[39m[38;5;12m [39m[38;5;12mfactors[39m[38;5;12m [39m[38;5;12minvolved[39m[38;5;12m [39m[38;5;12mincluding[39m[38;5;12m [39m[38;5;12mmisconfiguration,[39m[38;5;12m [39m
|
||||
[38;5;12mshortage[39m[38;5;12m [39m[38;5;12mof[39m[38;5;12m [39m[38;5;12mengineers'[39m[38;5;12m [39m[38;5;12msecurity[39m[38;5;12m [39m[38;5;12mskills,[39m[38;5;12m [39m[38;5;12metc.[39m[38;5;12m [39m[38;5;12mTo[39m[38;5;12m [39m[38;5;12mcombat[39m[38;5;12m [39m[38;5;12mthis,[39m[38;5;12m [39m[38;5;12mhere[39m[38;5;12m [39m[38;5;12mis[39m[38;5;12m [39m[38;5;12ma[39m[38;5;12m [39m[38;5;12mcurated[39m[38;5;12m [39m[38;5;12mlist[39m[38;5;12m [39m[38;5;12mof[39m[38;5;12m [39m[38;5;12mWeb[39m[38;5;12m [39m[38;5;12mSecurity[39m[38;5;12m [39m[38;5;12mmaterials[39m[38;5;12m [39m[38;5;12mand[39m[38;5;12m [39m[38;5;12mresources[39m[38;5;12m [39m[38;5;12mfor[39m[38;5;12m [39m[38;5;12mlearning[39m[38;5;12m [39m[38;5;12mcutting[39m[38;5;12m [39m[38;5;12medge[39m[38;5;12m [39m[38;5;12mpenetration[39m[38;5;12m [39m[38;5;12mtechniques,[39m[38;5;12m [39m[38;5;12mand[39m[38;5;12m [39m[38;5;12mI[39m[38;5;12m [39m[38;5;12mhighly[39m[38;5;12m [39m[38;5;12mencourage[39m[38;5;12m [39m[38;5;12myou[39m[38;5;12m [39m[38;5;12mto[39m[38;5;12m [39m[38;5;12mread[39m[38;5;12m [39m
|
||||
[38;5;12mthis[39m[38;5;12m [39m[38;5;12marticle[39m[38;5;12m [39m[38;5;12m"[39m[38;5;14m[1mSo[0m[38;5;14m[1m [0m[38;5;14m[1myou[0m[38;5;14m[1m [0m[38;5;14m[1mwant[0m[38;5;14m[1m [0m[38;5;14m[1mto[0m[38;5;14m[1m [0m[38;5;14m[1mbe[0m[38;5;14m[1m [0m[38;5;14m[1ma[0m[38;5;14m[1m [0m[38;5;14m[1mweb[0m[38;5;14m[1m [0m[38;5;14m[1msecurity[0m[38;5;14m[1m [0m[38;5;14m[1mresearcher?[0m[38;5;12m [39m[38;5;12m(https://portswigger.net/blog/so-you-want-to-be-a-web-security-researcher)"[39m[38;5;12m [39m[38;5;12mfirst.[39m
|
||||
[38;5;12mNeedless[39m[38;5;12m [39m[38;5;12mto[39m[38;5;12m [39m[38;5;12msay,[39m[38;5;12m [39m[38;5;12mmost[39m[38;5;12m [39m[38;5;12mwebsites[39m[38;5;12m [39m[38;5;12msuffer[39m[38;5;12m [39m[38;5;12mfrom[39m[38;5;12m [39m[38;5;12mvarious[39m[38;5;12m [39m[38;5;12mtypes[39m[38;5;12m [39m[38;5;12mof[39m[38;5;12m [39m[38;5;12mbugs[39m[38;5;12m [39m[38;5;12mwhich[39m[38;5;12m [39m[38;5;12mmay[39m[38;5;12m [39m[38;5;12meventually[39m[38;5;12m [39m[38;5;12mlead[39m[38;5;12m [39m[38;5;12mto[39m[38;5;12m [39m[38;5;12mvulnerabilities.[39m[38;5;12m [39m[38;5;12mWhy[39m[38;5;12m [39m[38;5;12mwould[39m[38;5;12m [39m[38;5;12mthis[39m[38;5;12m [39m[38;5;12mhappen[39m[38;5;12m [39m[38;5;12mso[39m[38;5;12m [39m[38;5;12moften?[39m[38;5;12m [39m[38;5;12mThere[39m[38;5;12m [39m[38;5;12mcan[39m[38;5;12m [39m[38;5;12mbe[39m[38;5;12m [39m[38;5;12mmany[39m[38;5;12m [39m[38;5;12mfactors[39m[38;5;12m [39m[38;5;12minvolved[39m[38;5;12m [39m[38;5;12mincluding[39m[38;5;12m [39m[38;5;12mmisconfiguration,[39m[38;5;12m [39m[38;5;12mshortage[39m[38;5;12m [39m[38;5;12mof[39m[38;5;12m [39m[38;5;12mengineers'[39m[38;5;12m [39m
|
||||
[38;5;12msecurity[39m[38;5;12m [39m[38;5;12mskills,[39m[38;5;12m [39m[38;5;12metc.[39m[38;5;12m [39m[38;5;12mTo[39m[38;5;12m [39m[38;5;12mcombat[39m[38;5;12m [39m[38;5;12mthis,[39m[38;5;12m [39m[38;5;12mhere[39m[38;5;12m [39m[38;5;12mis[39m[38;5;12m [39m[38;5;12ma[39m[38;5;12m [39m[38;5;12mcurated[39m[38;5;12m [39m[38;5;12mlist[39m[38;5;12m [39m[38;5;12mof[39m[38;5;12m [39m[38;5;12mWeb[39m[38;5;12m [39m[38;5;12mSecurity[39m[38;5;12m [39m[38;5;12mmaterials[39m[38;5;12m [39m[38;5;12mand[39m[38;5;12m [39m[38;5;12mresources[39m[38;5;12m [39m[38;5;12mfor[39m[38;5;12m [39m[38;5;12mlearning[39m[38;5;12m [39m[38;5;12mcutting[39m[38;5;12m [39m[38;5;12medge[39m[38;5;12m [39m[38;5;12mpenetration[39m[38;5;12m [39m[38;5;12mtechniques,[39m[38;5;12m [39m[38;5;12mand[39m[38;5;12m [39m[38;5;12mI[39m[38;5;12m [39m[38;5;12mhighly[39m[38;5;12m [39m[38;5;12mencourage[39m[38;5;12m [39m[38;5;12myou[39m[38;5;12m [39m[38;5;12mto[39m[38;5;12m [39m[38;5;12mread[39m[38;5;12m [39m[38;5;12mthis[39m[38;5;12m [39m[38;5;12marticle[39m[38;5;12m [39m[38;5;12m"[39m[38;5;14m[1mSo[0m[38;5;14m[1m [0m[38;5;14m[1myou[0m[38;5;14m[1m [0m[38;5;14m[1mwant[0m[38;5;14m[1m [0m[38;5;14m[1mto[0m[38;5;14m[1m [0m[38;5;14m[1mbe[0m[38;5;14m[1m [0m[38;5;14m[1ma[0m[38;5;14m[1m [0m[38;5;14m[1mweb[0m[38;5;14m[1m [0m[38;5;14m[1msecurity[0m[38;5;14m[1m [0m
|
||||
[38;5;14m[1mresearcher?[0m[38;5;12m [39m[38;5;12m(https://portswigger.net/blog/so-you-want-to-be-a-web-security-researcher)"[39m[38;5;12m [39m[38;5;12mfirst.[39m
|
||||
|
||||
[48;2;30;30;40m[38;5;13m[3mPlease read the [0m[48;2;30;30;40m[38;5;14m[1m[3mcontribution guidelines[0m[48;2;30;30;40m[38;5;13m[3m (CONTRIBUTING.md) before contributing.[0m
|
||||
|
||||
[38;5;238m―――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――[39m
|
||||
[38;5;238m――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――[39m
|
||||
|
||||
|
||||
|
||||
[38;5;238m―――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――[39m
|
||||
[38;5;238m――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――――[39m
|
||||
|
||||
[38;5;12mIf[39m[38;5;12m [39m[38;5;12myou[39m[38;5;12m [39m[38;5;12menjoy[39m[38;5;12m [39m[38;5;12mthis[39m[38;5;12m [39m[38;5;12mawesome[39m[38;5;12m [39m[38;5;12mlist[39m[38;5;12m [39m[38;5;12mand[39m[38;5;12m [39m[38;5;12mwould[39m[38;5;12m [39m[38;5;12mlike[39m[38;5;12m [39m[38;5;12mto[39m[38;5;12m [39m[38;5;12msupport[39m[38;5;12m [39m[38;5;12mit,[39m[38;5;12m [39m[38;5;12mcheck[39m[38;5;12m [39m[38;5;12mout[39m[38;5;12m [39m[38;5;12mmy[39m[38;5;12m [39m[38;5;14m[1mPatreon[0m[38;5;12m [39m[38;5;12m(https://www.patreon.com/boik)[39m[38;5;12m [39m[38;5;12mpage[39m[38;5;12m [39m[38;5;12m:)Also,[39m[38;5;12m [39m[38;5;12mdon't[39m[38;5;12m [39m[38;5;12mforget[39m[38;5;12m [39m[38;5;12mto[39m[38;5;12m [39m[38;5;12mcheck[39m[38;5;12m [39m[38;5;12mout[39m[38;5;12m [39m[38;5;12mmy[39m[38;5;12m [39m[38;5;14m[1mrepos[0m[38;5;12m [39m[38;5;12m(https://github.com/qazbnm456)[39m[38;5;12m [39m[38;5;12m🐾[39m[38;5;12m [39m[38;5;12mor[39m[38;5;12m [39m[38;5;12msay[39m[38;5;12m [39m[48;2;30;30;40m[38;5;13m[3mhi[0m[38;5;12m [39m[38;5;12mon[39m[38;5;12m [39m[38;5;12mmy[39m[38;5;12m [39m
|
||||
[38;5;14m[1mTwitter[0m[38;5;12m [39m[38;5;12m(https://twitter.com/qazbnm456)![39m
|
||||
[38;5;12mIf[39m[38;5;12m [39m[38;5;12myou[39m[38;5;12m [39m[38;5;12menjoy[39m[38;5;12m [39m[38;5;12mthis[39m[38;5;12m [39m[38;5;12mawesome[39m[38;5;12m [39m[38;5;12mlist[39m[38;5;12m [39m[38;5;12mand[39m[38;5;12m [39m[38;5;12mwould[39m[38;5;12m [39m[38;5;12mlike[39m[38;5;12m [39m[38;5;12mto[39m[38;5;12m [39m[38;5;12msupport[39m[38;5;12m [39m[38;5;12mit,[39m[38;5;12m [39m[38;5;12mcheck[39m[38;5;12m [39m[38;5;12mout[39m[38;5;12m [39m[38;5;12mmy[39m[38;5;12m [39m[38;5;14m[1mPatreon[0m[38;5;12m [39m[38;5;12m(https://www.patreon.com/boik)[39m[38;5;12m [39m[38;5;12mpage[39m[38;5;12m [39m[38;5;12m:)Also,[39m[38;5;12m [39m[38;5;12mdon't[39m[38;5;12m [39m[38;5;12mforget[39m[38;5;12m [39m[38;5;12mto[39m[38;5;12m [39m[38;5;12mcheck[39m[38;5;12m [39m[38;5;12mout[39m[38;5;12m [39m[38;5;12mmy[39m[38;5;12m [39m[38;5;14m[1mrepos[0m[38;5;12m [39m[38;5;12m(https://github.com/qazbnm456)[39m[38;5;12m [39m[38;5;12m🐾[39m[38;5;12m [39m[38;5;12mor[39m[38;5;12m [39m[38;5;12msay[39m[38;5;12m [39m[48;2;30;30;40m[38;5;13m[3mhi[0m[38;5;12m [39m[38;5;12mon[39m[38;5;12m [39m[38;5;12mmy[39m[38;5;12m [39m[38;5;14m[1mTwitter[0m[38;5;12m [39m
|
||||
[38;5;12m(https://twitter.com/qazbnm456)![39m
|
||||
|
||||
[38;2;255;187;0m[4mContents[0m
|
||||
|
||||
@@ -158,8 +158,7 @@
|
||||
|
||||
[38;2;255;187;0m[4mPrototype Pollution[0m
|
||||
|
||||
[38;5;12m-[39m[38;5;12m [39m[38;5;14m[1mPrototype[0m[38;5;14m[1m [0m[38;5;14m[1mpollution[0m[38;5;14m[1m [0m[38;5;14m[1mattack[0m[38;5;14m[1m [0m[38;5;14m[1min[0m[38;5;14m[1m [0m[38;5;14m[1mNodeJS[0m[38;5;14m[1m [0m[38;5;14m[1mapplication[0m[38;5;12m [39m[38;5;12m(https://github.com/HoLyVieR/prototype-pollution-nsec18/blob/master/paper/JavaScript_prototype_pollution_attack_in_NodeJS.pdf)[39m[38;5;12m [39m[38;5;12m-[39m[38;5;12m [39m[38;5;12mWritten[39m[38;5;12m [39m[38;5;12mby[39m[38;5;12m [39m[38;5;14m[1m@HoLyVieR[0m[38;5;12m [39m
|
||||
[38;5;12m(https://github.com/HoLyVieR).[39m
|
||||
[38;5;12m- [39m[38;5;14m[1mPrototype pollution attack in NodeJS application[0m[38;5;12m (https://github.com/HoLyVieR/prototype-pollution-nsec18/blob/master/paper/JavaScript_prototype_pollution_attack_in_NodeJS.pdf) - Written by [39m[38;5;14m[1m@HoLyVieR[0m[38;5;12m (https://github.com/HoLyVieR).[39m
|
||||
[38;5;12m- [39m[38;5;14m[1mExploiting prototype pollution – RCE in Kibana (CVE-2019-7609)[0m[38;5;12m (https://research.securitum.com/prototype-pollution-rce-kibana-cve-2019-7609/) - Written by [39m[38;5;14m[1m@securitymb[0m[38;5;12m (https://twitter.com/securitymb).[39m
|
||||
[38;5;12m- [39m[38;5;14m[1mReal-world JS - 1[0m[38;5;12m (https://blog.p6.is/Real-World-JS-1/) - Written by [39m[38;5;14m[1m@po6ix[0m[38;5;12m (https://twitter.com/po6ix).[39m
|
||||
|
||||
@@ -190,16 +189,14 @@
|
||||
[38;2;255;187;0m[4mORM Injection[0m
|
||||
|
||||
[38;5;12m- [39m[38;5;14m[1mHQL for pentesters[0m[38;5;12m (http://blog.h3xstream.com/2014/02/hql-for-pentesters.html) - Written by [39m[38;5;14m[1m@h3xstream[0m[38;5;12m (https://twitter.com/h3xstream/).[39m
|
||||
[38;5;12m-[39m[38;5;12m [39m[38;5;14m[1mHQL[0m[38;5;14m[1m [0m[38;5;14m[1m:[0m[38;5;14m[1m [0m[38;5;14m[1mHyperinsane[0m[38;5;14m[1m [0m[38;5;14m[1mQuery[0m[38;5;14m[1m [0m[38;5;14m[1mLanguage[0m[38;5;14m[1m [0m[38;5;14m[1m(or[0m[38;5;14m[1m [0m[38;5;14m[1mhow[0m[38;5;14m[1m [0m[38;5;14m[1mto[0m[38;5;14m[1m [0m[38;5;14m[1maccess[0m[38;5;14m[1m [0m[38;5;14m[1mthe[0m[38;5;14m[1m [0m[38;5;14m[1mwhole[0m[38;5;14m[1m [0m[38;5;14m[1mSQL[0m[38;5;14m[1m [0m[38;5;14m[1mAPI[0m[38;5;14m[1m [0m[38;5;14m[1mwithin[0m[38;5;14m[1m [0m[38;5;14m[1ma[0m[38;5;14m[1m [0m[38;5;14m[1mHQL[0m[38;5;14m[1m [0m[38;5;14m[1minjection[0m[38;5;14m[1m [0m[38;5;14m[1m?)[0m[38;5;12m [39m[38;5;12m(https://www.synacktiv.com/ressources/hql2sql_sstic_2015_en.pdf)[39m[38;5;12m [39m[38;5;12m-[39m[38;5;12m [39m[38;5;12mWritten[39m[38;5;12m [39m[38;5;12mby[39m[38;5;12m [39m[38;5;14m[1m@_m0bius[0m[38;5;12m [39m
|
||||
[38;5;12m(https://twitter.com/_m0bius).[39m
|
||||
[38;5;12m- [39m[38;5;14m[1mHQL : Hyperinsane Query Language (or how to access the whole SQL API within a HQL injection ?)[0m[38;5;12m (https://www.synacktiv.com/ressources/hql2sql_sstic_2015_en.pdf) - Written by [39m[38;5;14m[1m@_m0bius[0m[38;5;12m (https://twitter.com/_m0bius).[39m
|
||||
[38;5;12m- [39m[38;5;14m[1mORM2Pwn: Exploiting injections in Hibernate ORM[0m[38;5;12m (https://www.slideshare.net/0ang3el/orm2pwn-exploiting-injections-in-hibernate-orm) - Written by [39m[38;5;14m[1mMikhail Egorov[0m[38;5;12m (https://0ang3el.blogspot.tw/).[39m
|
||||
[38;5;12m- [39m[38;5;14m[1mORM Injection[0m[38;5;12m (https://www.slideshare.net/simone.onofri/orm-injection) - Written by [39m[38;5;14m[1mSimone Onofri[0m[38;5;12m (https://onofri.org/).[39m
|
||||
|
||||
|
||||
[38;2;255;187;0m[4mFTP Injection[0m
|
||||
|
||||
[38;5;12m-[39m[38;5;12m [39m[38;5;14m[1mAdvisory:[0m[38;5;14m[1m [0m[38;5;14m[1mJava/Python[0m[38;5;14m[1m [0m[38;5;14m[1mFTP[0m[38;5;14m[1m [0m[38;5;14m[1mInjections[0m[38;5;14m[1m [0m[38;5;14m[1mAllow[0m[38;5;14m[1m [0m[38;5;14m[1mfor[0m[38;5;14m[1m [0m[38;5;14m[1mFirewall[0m[38;5;14m[1m [0m[38;5;14m[1mBypass[0m[38;5;12m [39m[38;5;12m(http://blog.blindspotsecurity.com/2017/02/advisory-javapython-ftp-injections.html)[39m[38;5;12m [39m[38;5;12m-[39m[38;5;12m [39m[38;5;12mWritten[39m[38;5;12m [39m[38;5;12mby[39m[38;5;12m [39m[38;5;14m[1mTimothy[0m[38;5;14m[1m [0m[38;5;14m[1mMorgan[0m[38;5;12m [39m
|
||||
[38;5;12m(https://plus.google.com/105917618099766831589).[39m
|
||||
[38;5;12m- [39m[38;5;14m[1mAdvisory: Java/Python FTP Injections Allow for Firewall Bypass[0m[38;5;12m (http://blog.blindspotsecurity.com/2017/02/advisory-javapython-ftp-injections.html) - Written by [39m[38;5;14m[1mTimothy Morgan[0m[38;5;12m (https://plus.google.com/105917618099766831589).[39m
|
||||
[38;5;12m- [39m[38;5;14m[1mSMTP over XXE − how to send emails using Java's XML parser[0m[38;5;12m (https://shiftordie.de/blog/2017/02/18/smtp-over-xxe/) - Written by [39m[38;5;14m[1mAlexander Klink[0m[38;5;12m (https://shiftordie.de/).[39m
|
||||
|
||||
|
||||
@@ -227,8 +224,7 @@
|
||||
[38;2;255;187;0m[4mSSRF - Server-Side Request Forgery[0m
|
||||
|
||||
[38;5;12m- [39m[38;5;14m[1mSSRF bible. Cheatsheet[0m[38;5;12m (https://docs.google.com/document/d/1v1TkWZtrhzRLy0bYXBcdLUedXGb9njTNIJXa3u9akHM/edit) - Written by [39m[38;5;14m[1mWallarm[0m[38;5;12m (https://wallarm.com/).[39m
|
||||
[38;5;12m-[39m[38;5;12m [39m[38;5;14m[1mPayloadsAllTheThings[0m[38;5;14m[1m [0m[38;5;14m[1m-[0m[38;5;14m[1m [0m[38;5;14m[1mServer-Side[0m[38;5;14m[1m [0m[38;5;14m[1mRequest[0m[38;5;14m[1m [0m[38;5;14m[1mForgery[0m[38;5;12m [39m[38;5;12m(https://github.com/swisskyrepo/PayloadsAllTheThings/tree/master/Server%20Side%20Request%20Forgery)[39m[38;5;12m [39m[38;5;12m-[39m[38;5;12m [39m[38;5;12mWritten[39m[38;5;12m [39m[38;5;12mby[39m[38;5;12m [39m[38;5;14m[1m@swisskyrepo[0m[38;5;12m [39m
|
||||
[38;5;12m(https://github.com/swisskyrepo).[39m
|
||||
[38;5;12m- [39m[38;5;14m[1mPayloadsAllTheThings - Server-Side Request Forgery[0m[38;5;12m (https://github.com/swisskyrepo/PayloadsAllTheThings/tree/master/Server%20Side%20Request%20Forgery) - Written by [39m[38;5;14m[1m@swisskyrepo[0m[38;5;12m (https://github.com/swisskyrepo).[39m
|
||||
|
||||
|
||||
[38;2;255;187;0m[4mWeb Cache Poisoning[0m
|
||||
@@ -239,8 +235,7 @@
|
||||
|
||||
[38;2;255;187;0m[4mRelative Path Overwrite[0m
|
||||
|
||||
[38;5;12m-[39m[38;5;12m [39m[38;5;14m[1mLarge-scale[0m[38;5;14m[1m [0m[38;5;14m[1manalysis[0m[38;5;14m[1m [0m[38;5;14m[1mof[0m[38;5;14m[1m [0m[38;5;14m[1mstyle[0m[38;5;14m[1m [0m[38;5;14m[1minjection[0m[38;5;14m[1m [0m[38;5;14m[1mby[0m[38;5;14m[1m [0m[38;5;14m[1mrelative[0m[38;5;14m[1m [0m[38;5;14m[1mpath[0m[38;5;14m[1m [0m[38;5;14m[1moverwrite[0m[38;5;12m [39m[38;5;12m(https://blog.acolyer.org/2018/05/28/large-scale-analysis-of-style-injection-by-relative-path-overwrite/)[39m[38;5;12m [39m[38;5;12m-[39m[38;5;12m [39m[38;5;12mWritten[39m[38;5;12m [39m[38;5;12mby[39m[38;5;12m [39m[38;5;14m[1mThe[0m[38;5;14m[1m [0m[38;5;14m[1mMorning[0m[38;5;14m[1m [0m[38;5;14m[1mPaper[0m[38;5;12m [39m
|
||||
[38;5;12m(https://blog.acolyer.org/).[39m
|
||||
[38;5;12m- [39m[38;5;14m[1mLarge-scale analysis of style injection by relative path overwrite[0m[38;5;12m (https://blog.acolyer.org/2018/05/28/large-scale-analysis-of-style-injection-by-relative-path-overwrite/) - Written by [39m[38;5;14m[1mThe Morning Paper[0m[38;5;12m (https://blog.acolyer.org/).[39m
|
||||
[38;5;12m- [39m[38;5;14m[1mMBSD Technical Whitepaper - A few RPO exploitation techniques[0m[38;5;12m (https://www.mbsd.jp/Whitepaper/rpo.pdf) - Written by [39m[38;5;14m[1mMitsui Bussan Secure Directions, Inc.[0m[38;5;12m (https://www.mbsd.jp/).[39m
|
||||
|
||||
|
||||
@@ -255,8 +250,7 @@
|
||||
|
||||
[38;5;12m- [39m[38;5;14m[1mHow to Hunt Bugs in SAML; a Methodology - Part I[0m[38;5;12m (https://epi052.gitlab.io/notes-to-self/blog/2019-03-07-how-to-test-saml-a-methodology/) - Written by [39m[38;5;14m[1mepi[0m[38;5;12m (https://epi052.gitlab.io/notes-to-self/).[39m
|
||||
[38;5;12m- [39m[38;5;14m[1mHow to Hunt Bugs in SAML; a Methodology - Part II[0m[38;5;12m (https://epi052.gitlab.io/notes-to-self/blog/2019-03-13-how-to-test-saml-a-methodology-part-two/) - Written by [39m[38;5;14m[1mepi[0m[38;5;12m (https://epi052.gitlab.io/notes-to-self/).[39m
|
||||
[38;5;12m-[39m[38;5;12m [39m[38;5;14m[1mHow[0m[38;5;14m[1m [0m[38;5;14m[1mto[0m[38;5;14m[1m [0m[38;5;14m[1mHunt[0m[38;5;14m[1m [0m[38;5;14m[1mBugs[0m[38;5;14m[1m [0m[38;5;14m[1min[0m[38;5;14m[1m [0m[38;5;14m[1mSAML;[0m[38;5;14m[1m [0m[38;5;14m[1ma[0m[38;5;14m[1m [0m[38;5;14m[1mMethodology[0m[38;5;14m[1m [0m[38;5;14m[1m-[0m[38;5;14m[1m [0m[38;5;14m[1mPart[0m[38;5;14m[1m [0m[38;5;14m[1mIII[0m[38;5;12m [39m[38;5;12m(https://epi052.gitlab.io/notes-to-self/blog/2019-03-16-how-to-test-saml-a-methodology-part-three/)[39m[38;5;12m [39m[38;5;12m-[39m[38;5;12m [39m[38;5;12mWritten[39m[38;5;12m [39m[38;5;12mby[39m[38;5;12m [39m[38;5;14m[1mepi[0m[38;5;12m [39m
|
||||
[38;5;12m(https://epi052.gitlab.io/notes-to-self/).[39m
|
||||
[38;5;12m- [39m[38;5;14m[1mHow to Hunt Bugs in SAML; a Methodology - Part III[0m[38;5;12m (https://epi052.gitlab.io/notes-to-self/blog/2019-03-16-how-to-test-saml-a-methodology-part-three/) - Written by [39m[38;5;14m[1mepi[0m[38;5;12m (https://epi052.gitlab.io/notes-to-self/).[39m
|
||||
[38;5;12m- [39m[38;5;14m[1mPayloadsAllTheThings - SAML Injection[0m[38;5;12m (https://github.com/swisskyrepo/PayloadsAllTheThings/tree/master/SAML%20Injection) - Written by [39m[38;5;14m[1m@swisskyrepo[0m[38;5;12m (https://github.com/swisskyrepo).[39m
|
||||
|
||||
|
||||
@@ -276,8 +270,7 @@
|
||||
|
||||
[38;2;255;187;0m[4mAngularJS[0m
|
||||
|
||||
[38;5;12m-[39m[38;5;12m [39m[38;5;14m[1mXSS[0m[38;5;14m[1m [0m[38;5;14m[1mwithout[0m[38;5;14m[1m [0m[38;5;14m[1mHTML:[0m[38;5;14m[1m [0m[38;5;14m[1mClient-Side[0m[38;5;14m[1m [0m[38;5;14m[1mTemplate[0m[38;5;14m[1m [0m[38;5;14m[1mInjection[0m[38;5;14m[1m [0m[38;5;14m[1mwith[0m[38;5;14m[1m [0m[38;5;14m[1mAngularJS[0m[38;5;12m [39m[38;5;12m(http://blog.portswigger.net/2016/01/xss-without-html-client-side-template.html)[39m[38;5;12m [39m[38;5;12m-[39m[38;5;12m [39m[38;5;12mWritten[39m[38;5;12m [39m[38;5;12mby[39m[38;5;12m [39m[38;5;14m[1mGareth[0m[38;5;14m[1m [0m[38;5;14m[1mHeyes[0m[38;5;12m [39m
|
||||
[38;5;12m(https://www.blogger.com/profile/10856178524811553475).[39m
|
||||
[38;5;12m- [39m[38;5;14m[1mXSS without HTML: Client-Side Template Injection with AngularJS[0m[38;5;12m (http://blog.portswigger.net/2016/01/xss-without-html-client-side-template.html) - Written by [39m[38;5;14m[1mGareth Heyes[0m[38;5;12m (https://www.blogger.com/profile/10856178524811553475).[39m
|
||||
[38;5;12m- [39m[38;5;14m[1mDOM based Angular sandbox escapes[0m[38;5;12m (http://blog.portswigger.net/2017/05/dom-based-angularjs-sandbox-escapes.html) - Written by [39m[38;5;14m[1m@garethheyes[0m[38;5;12m (https://twitter.com/garethheyes)[39m
|
||||
|
||||
|
||||
@@ -299,14 +292,13 @@
|
||||
|
||||
[38;2;255;187;0m[4mNFS[0m
|
||||
|
||||
[38;5;12m-[39m[38;5;12m [39m[38;5;14m[1mNFS[0m[38;5;14m[1m [0m[38;5;14m[1m|[0m[38;5;14m[1m [0m[38;5;14m[1mPENETRATION[0m[38;5;14m[1m [0m[38;5;14m[1mTESTING[0m[38;5;14m[1m [0m[38;5;14m[1mACADEMY[0m[38;5;12m [39m[38;5;12m(https://pentestacademy.wordpress.com/2017/09/20/nfs/?t=1&cn=ZmxleGlibGVfcmVjc18y&refsrc=email&iid=b34422ce15164e99a193fea0ccc7a02f&uid=1959680352&nid=244+289476616)[39m[38;5;12m [39m[38;5;12m-[39m[38;5;12m [39m[38;5;12mWritten[39m
|
||||
[38;5;12mby[39m[38;5;12m [39m[38;5;14m[1mPENETRATION[0m[38;5;14m[1m [0m[38;5;14m[1mACADEMY[0m[38;5;12m [39m[38;5;12m(https://pentestacademy.wordpress.com/).[39m
|
||||
[38;5;12m-[39m[38;5;12m [39m[38;5;14m[1mNFS[0m[38;5;14m[1m [0m[38;5;14m[1m|[0m[38;5;14m[1m [0m[38;5;14m[1mPENETRATION[0m[38;5;14m[1m [0m[38;5;14m[1mTESTING[0m[38;5;14m[1m [0m[38;5;14m[1mACADEMY[0m[38;5;12m [39m[38;5;12m(https://pentestacademy.wordpress.com/2017/09/20/nfs/?t=1&cn=ZmxleGlibGVfcmVjc18y&refsrc=email&iid=b34422ce15164e99a193fea0ccc7a02f&uid=1959680352&nid=244+289476616)[39m[38;5;12m [39m[38;5;12m-[39m[38;5;12m [39m[38;5;12mWritten[39m[38;5;12m [39m[38;5;12mby[39m[38;5;12m [39m[38;5;14m[1mPENETRATION[0m[38;5;14m[1m [0m[38;5;14m[1mACADEMY[0m[38;5;12m [39m
|
||||
[38;5;12m(https://pentestacademy.wordpress.com/).[39m
|
||||
|
||||
|
||||
[38;2;255;187;0m[4mAWS[0m
|
||||
|
||||
[38;5;12m-[39m[38;5;12m [39m[38;5;14m[1mPENETRATION[0m[38;5;14m[1m [0m[38;5;14m[1mTESTING[0m[38;5;14m[1m [0m[38;5;14m[1mAWS[0m[38;5;14m[1m [0m[38;5;14m[1mSTORAGE:[0m[38;5;14m[1m [0m[38;5;14m[1mKICKING[0m[38;5;14m[1m [0m[38;5;14m[1mTHE[0m[38;5;14m[1m [0m[38;5;14m[1mS3[0m[38;5;14m[1m [0m[38;5;14m[1mBUCKET[0m[38;5;12m [39m[38;5;12m(https://rhinosecuritylabs.com/penetration-testing/penetration-testing-aws-storage/)[39m[38;5;12m [39m[38;5;12m-[39m[38;5;12m [39m[38;5;12mWritten[39m[38;5;12m [39m[38;5;12mby[39m[38;5;12m [39m[38;5;12mDwight[39m[38;5;12m [39m[38;5;12mHohnstein[39m[38;5;12m [39m[38;5;12mfrom[39m[38;5;12m [39m[38;5;14m[1mRhino[0m[38;5;14m[1m [0m[38;5;14m[1mSecurity[0m[38;5;14m[1m [0m[38;5;14m[1mLabs[0m[38;5;12m [39m
|
||||
[38;5;12m(https://rhinosecuritylabs.com/).[39m
|
||||
[38;5;12m- [39m[38;5;14m[1mPENETRATION TESTING AWS STORAGE: KICKING THE S3 BUCKET[0m[38;5;12m (https://rhinosecuritylabs.com/penetration-testing/penetration-testing-aws-storage/) - Written by Dwight Hohnstein from [39m[38;5;14m[1mRhino Security Labs[0m[38;5;12m (https://rhinosecuritylabs.com/).[39m
|
||||
[38;5;12m- [39m[38;5;14m[1mAWS PENETRATION TESTING PART 1. S3 BUCKETS[0m[38;5;12m (https://www.virtuesecurity.com/aws-penetration-testing-part-1-s3-buckets/) - Written by [39m[38;5;14m[1mVirtueSecurity[0m[38;5;12m (https://www.virtuesecurity.com/).[39m
|
||||
[38;5;12m- [39m[38;5;14m[1mAWS PENETRATION TESTING PART 2. S3, IAM, EC2[0m[38;5;12m (https://www.virtuesecurity.com/aws-penetration-testing-part-2-s3-iam-ec2/) - Written by [39m[38;5;14m[1mVirtueSecurity[0m[38;5;12m (https://www.virtuesecurity.com/).[39m
|
||||
[38;5;12m- [39m[38;5;14m[1mMisadventures in AWS[0m[38;5;12m (https://labs.f-secure.com/blog/misadventures-in-aws) - Written by Christian Demko[39m
|
||||
@@ -314,10 +306,8 @@
|
||||
|
||||
[38;2;255;187;0m[4mAzure[0m
|
||||
|
||||
[38;5;12m-[39m[38;5;12m [39m[38;5;14m[1mCommon[0m[38;5;14m[1m [0m[38;5;14m[1mAzure[0m[38;5;14m[1m [0m[38;5;14m[1mSecurity[0m[38;5;14m[1m [0m[38;5;14m[1mVulnerabilities[0m[38;5;14m[1m [0m[38;5;14m[1mand[0m[38;5;14m[1m [0m[38;5;14m[1mMisconfigurations[0m[38;5;12m [39m[38;5;12m(https://rhinosecuritylabs.com/cloud-security/common-azure-security-vulnerabilities/)[39m[38;5;12m [39m[38;5;12m-[39m[38;5;12m [39m[38;5;12mWritten[39m[38;5;12m [39m[38;5;12mby[39m[38;5;12m [39m[38;5;14m[1m@rhinobenjamin[0m[38;5;12m [39m
|
||||
[38;5;12m(https://twitter.com/rhinobenjamin).[39m
|
||||
[38;5;12m-[39m[38;5;12m [39m[38;5;14m[1mCloud[0m[38;5;14m[1m [0m[38;5;14m[1mSecurity[0m[38;5;14m[1m [0m[38;5;14m[1mRisks[0m[38;5;14m[1m [0m[38;5;14m[1m(Part[0m[38;5;14m[1m [0m[38;5;14m[1m1):[0m[38;5;14m[1m [0m[38;5;14m[1mAzure[0m[38;5;14m[1m [0m[38;5;14m[1mCSV[0m[38;5;14m[1m [0m[38;5;14m[1mInjection[0m[38;5;14m[1m [0m[38;5;14m[1mVulnerability[0m[38;5;12m [39m[38;5;12m(https://rhinosecuritylabs.com/azure/cloud-security-risks-part-1-azure-csv-injection-vulnerability/)[39m[38;5;12m [39m[38;5;12m-[39m[38;5;12m [39m[38;5;12mWritten[39m[38;5;12m [39m[38;5;12mby[39m[38;5;12m [39m[38;5;14m[1m@spengietz[0m[38;5;12m [39m
|
||||
[38;5;12m(https://twitter.com/spengietz).[39m
|
||||
[38;5;12m- [39m[38;5;14m[1mCommon Azure Security Vulnerabilities and Misconfigurations[0m[38;5;12m (https://rhinosecuritylabs.com/cloud-security/common-azure-security-vulnerabilities/) - Written by [39m[38;5;14m[1m@rhinobenjamin[0m[38;5;12m (https://twitter.com/rhinobenjamin).[39m
|
||||
[38;5;12m- [39m[38;5;14m[1mCloud Security Risks (Part 1): Azure CSV Injection Vulnerability[0m[38;5;12m (https://rhinosecuritylabs.com/azure/cloud-security-risks-part-1-azure-csv-injection-vulnerability/) - Written by [39m[38;5;14m[1m@spengietz[0m[38;5;12m (https://twitter.com/spengietz).[39m
|
||||
|
||||
|
||||
[38;2;255;187;0m[4mFingerprint[0m
|
||||
@@ -325,8 +315,7 @@
|
||||
|
||||
[38;2;255;187;0m[4mSub Domain Enumeration[0m
|
||||
|
||||
[38;5;12m-[39m[38;5;12m [39m[38;5;14m[1mA[0m[38;5;14m[1m [0m[38;5;14m[1mpenetration[0m[38;5;14m[1m [0m[38;5;14m[1mtester’s[0m[38;5;14m[1m [0m[38;5;14m[1mguide[0m[38;5;14m[1m [0m[38;5;14m[1mto[0m[38;5;14m[1m [0m[38;5;14m[1msub-domain[0m[38;5;14m[1m [0m[38;5;14m[1menumeration[0m[38;5;12m [39m[38;5;12m(https://blog.appsecco.com/a-penetration-testers-guide-to-sub-domain-enumeration-7d842d5570f6)[39m[38;5;12m [39m[38;5;12m-[39m[38;5;12m [39m[38;5;12mWritten[39m[38;5;12m [39m[38;5;12mby[39m[38;5;12m [39m[38;5;14m[1mBharath[0m[38;5;12m [39m
|
||||
[38;5;12m(https://blog.appsecco.com/@yamakira_).[39m
|
||||
[38;5;12m- [39m[38;5;14m[1mA penetration tester’s guide to sub-domain enumeration[0m[38;5;12m (https://blog.appsecco.com/a-penetration-testers-guide-to-sub-domain-enumeration-7d842d5570f6) - Written by [39m[38;5;14m[1mBharath[0m[38;5;12m (https://blog.appsecco.com/@yamakira_).[39m
|
||||
[38;5;12m- [39m[38;5;14m[1mThe Art of Subdomain Enumeration[0m[38;5;12m (https://blog.sweepatic.com/art-of-subdomain-enumeration/) - Written by [39m[38;5;14m[1mPatrik Hudak[0m[38;5;12m (https://blog.sweepatic.com/author/patrik/).[39m
|
||||
|
||||
|
||||
@@ -364,23 +353,20 @@
|
||||
[38;5;12m(https://foxglovesecurity.com/2015/11/06/what-do-weblogic-websphere-jboss-jenkins-opennms-and-your-application-have-in-common-this-vulnerability/)[39m[38;5;12m [39m[38;5;12m-[39m[38;5;12m [39m[38;5;12mWritten[39m[38;5;12m [39m[38;5;12mby[39m[38;5;12m [39m[38;5;14m[1m@breenmachine[0m[38;5;12m [39m[38;5;12m(https://twitter.com/breenmachine).[39m
|
||||
[38;5;12m- [39m[38;5;14m[1mAttacking .NET deserialization[0m[38;5;12m (https://www.youtube.com/watch?v=eDfGpu3iE4Q) - Written by [39m[38;5;14m[1m@pwntester[0m[38;5;12m (https://twitter.com/pwntester).[39m
|
||||
[38;5;12m- [39m[38;5;14m[1m.NET Roulette: Exploiting Insecure Deserialization in Telerik UI[0m[38;5;12m (https://www.youtube.com/watch?v=--6PiuvBGAU) - Written by [39m[38;5;14m[1m@noperator[0m[38;5;12m (https://twitter.com/noperator).[39m
|
||||
[38;5;12m-[39m[38;5;12m [39m[38;5;14m[1mHow[0m[38;5;14m[1m [0m[38;5;14m[1mto[0m[38;5;14m[1m [0m[38;5;14m[1mexploit[0m[38;5;14m[1m [0m[38;5;14m[1mthe[0m[38;5;14m[1m [0m[38;5;14m[1mDotNetNuke[0m[38;5;14m[1m [0m[38;5;14m[1mCookie[0m[38;5;14m[1m [0m[38;5;14m[1mDeserialization[0m[38;5;12m [39m[38;5;12m(https://pentest-tools.com/blog/exploit-dotnetnuke-cookie-deserialization/)[39m[38;5;12m [39m[38;5;12m-[39m[38;5;12m [39m[38;5;12mWritten[39m[38;5;12m [39m[38;5;12mby[39m[38;5;12m [39m[38;5;14m[1mCRISTIAN[0m[38;5;14m[1m [0m[38;5;14m[1mCORNEA[0m[38;5;12m [39m
|
||||
[38;5;12m(https://pentest-tools.com/blog/author/pentest-cristian/).[39m
|
||||
[38;5;12m-[39m[38;5;12m [39m[38;5;14m[1mHOW[0m[38;5;14m[1m [0m[38;5;14m[1mTO[0m[38;5;14m[1m [0m[38;5;14m[1mEXPLOIT[0m[38;5;14m[1m [0m[38;5;14m[1mLIFERAY[0m[38;5;14m[1m [0m[38;5;14m[1mCVE-2020-7961[0m[38;5;14m[1m [0m[38;5;14m[1m:[0m[38;5;14m[1m [0m[38;5;14m[1mQUICK[0m[38;5;14m[1m [0m[38;5;14m[1mJOURNEY[0m[38;5;14m[1m [0m[38;5;14m[1mTO[0m[38;5;14m[1m [0m[38;5;14m[1mPOC[0m[38;5;12m [39m[38;5;12m(https://www.synacktiv.com/en/publications/how-to-exploit-liferay-cve-2020-7961-quick-journey-to-poc.html)[39m[38;5;12m [39m[38;5;12m-[39m[38;5;12m [39m[38;5;12mWritten[39m[38;5;12m [39m[38;5;12mby[39m[38;5;12m [39m[38;5;14m[1m@synacktiv[0m[38;5;12m [39m
|
||||
[38;5;12m(https://twitter.com/synacktiv).[39m
|
||||
[38;5;12m- [39m[38;5;14m[1mHow to exploit the DotNetNuke Cookie Deserialization[0m[38;5;12m (https://pentest-tools.com/blog/exploit-dotnetnuke-cookie-deserialization/) - Written by [39m[38;5;14m[1mCRISTIAN CORNEA[0m[38;5;12m (https://pentest-tools.com/blog/author/pentest-cristian/).[39m
|
||||
[38;5;12m- [39m[38;5;14m[1mHOW TO EXPLOIT LIFERAY CVE-2020-7961 : QUICK JOURNEY TO POC[0m[38;5;12m (https://www.synacktiv.com/en/publications/how-to-exploit-liferay-cve-2020-7961-quick-journey-to-poc.html) - Written by [39m[38;5;14m[1m@synacktiv[0m[38;5;12m (https://twitter.com/synacktiv).[39m
|
||||
|
||||
|
||||
[38;2;255;187;0m[4mOAuth[0m
|
||||
|
||||
[38;5;12m- [39m[38;5;14m[1mIntroduction to OAuth 2.0 and OpenID Connect[0m[38;5;12m (https://pragmaticwebsecurity.com/courses/introduction-oauth-oidc.html) - Written by [39m[38;5;14m[1m@PhilippeDeRyck[0m[38;5;12m (https://twitter.com/PhilippeDeRyck).[39m
|
||||
[38;5;12m-[39m[38;5;12m [39m[38;5;14m[1mWhat[0m[38;5;14m[1m [0m[38;5;14m[1mis[0m[38;5;14m[1m [0m[38;5;14m[1mgoing[0m[38;5;14m[1m [0m[38;5;14m[1mon[0m[38;5;14m[1m [0m[38;5;14m[1mwith[0m[38;5;14m[1m [0m[38;5;14m[1mOAuth[0m[38;5;14m[1m [0m[38;5;14m[1m2.0?[0m[38;5;14m[1m [0m[38;5;14m[1mAnd[0m[38;5;14m[1m [0m[38;5;14m[1mwhy[0m[38;5;14m[1m [0m[38;5;14m[1myou[0m[38;5;14m[1m [0m[38;5;14m[1mshould[0m[38;5;14m[1m [0m[38;5;14m[1mnot[0m[38;5;14m[1m [0m[38;5;14m[1muse[0m[38;5;14m[1m [0m[38;5;14m[1mit[0m[38;5;14m[1m [0m[38;5;14m[1mfor[0m[38;5;14m[1m [0m[38;5;14m[1mauthentication.[0m[38;5;12m [39m[38;5;12m(https://medium.com/securing/what-is-going-on-with-oauth-2-0-and-why-you-should-not-use-it-for-authentication-5f47597b2611)[39m[38;5;12m [39m[38;5;12m-[39m[38;5;12m [39m
|
||||
[38;5;12mWritten[39m[38;5;12m [39m[38;5;12mby[39m[38;5;12m [39m[38;5;14m[1m@damianrusinek[0m[38;5;12m [39m[38;5;12m(https://medium.com/@damianrusinek).[39m
|
||||
[38;5;12m-[39m[38;5;12m [39m[38;5;14m[1mWhat[0m[38;5;14m[1m [0m[38;5;14m[1mis[0m[38;5;14m[1m [0m[38;5;14m[1mgoing[0m[38;5;14m[1m [0m[38;5;14m[1mon[0m[38;5;14m[1m [0m[38;5;14m[1mwith[0m[38;5;14m[1m [0m[38;5;14m[1mOAuth[0m[38;5;14m[1m [0m[38;5;14m[1m2.0?[0m[38;5;14m[1m [0m[38;5;14m[1mAnd[0m[38;5;14m[1m [0m[38;5;14m[1mwhy[0m[38;5;14m[1m [0m[38;5;14m[1myou[0m[38;5;14m[1m [0m[38;5;14m[1mshould[0m[38;5;14m[1m [0m[38;5;14m[1mnot[0m[38;5;14m[1m [0m[38;5;14m[1muse[0m[38;5;14m[1m [0m[38;5;14m[1mit[0m[38;5;14m[1m [0m[38;5;14m[1mfor[0m[38;5;14m[1m [0m[38;5;14m[1mauthentication.[0m[38;5;12m [39m[38;5;12m(https://medium.com/securing/what-is-going-on-with-oauth-2-0-and-why-you-should-not-use-it-for-authentication-5f47597b2611)[39m[38;5;12m [39m[38;5;12m-[39m[38;5;12m [39m[38;5;12mWritten[39m[38;5;12m [39m[38;5;12mby[39m[38;5;12m [39m[38;5;14m[1m@damianrusinek[0m
|
||||
[38;5;12m(https://medium.com/@damianrusinek).[39m
|
||||
|
||||
|
||||
[38;2;255;187;0m[4mJWT[0m
|
||||
|
||||
[38;5;12m-[39m[38;5;12m [39m[38;5;14m[1mHardcoded[0m[38;5;14m[1m [0m[38;5;14m[1msecrets,[0m[38;5;14m[1m [0m[38;5;14m[1munverified[0m[38;5;14m[1m [0m[38;5;14m[1mtokens,[0m[38;5;14m[1m [0m[38;5;14m[1mand[0m[38;5;14m[1m [0m[38;5;14m[1mother[0m[38;5;14m[1m [0m[38;5;14m[1mcommon[0m[38;5;14m[1m [0m[38;5;14m[1mJWT[0m[38;5;14m[1m [0m[38;5;14m[1mmistakes[0m[38;5;12m [39m[38;5;12m(https://r2c.dev/blog/2020/hardcoded-secrets-unverified-tokens-and-other-common-jwt-mistakes/)[39m[38;5;12m [39m[38;5;12m-[39m[38;5;12m [39m[38;5;12mWritten[39m[38;5;12m [39m[38;5;12mby[39m[38;5;12m [39m[38;5;14m[1m@ermil0v[0m[38;5;12m [39m
|
||||
[38;5;12m(https://twitter.com/ermil0v).[39m
|
||||
[38;5;12m- [39m[38;5;14m[1mHardcoded secrets, unverified tokens, and other common JWT mistakes[0m[38;5;12m (https://r2c.dev/blog/2020/hardcoded-secrets-unverified-tokens-and-other-common-jwt-mistakes/) - Written by [39m[38;5;14m[1m@ermil0v[0m[38;5;12m (https://twitter.com/ermil0v).[39m
|
||||
|
||||
[38;2;255;187;0m[4mEvasions[0m
|
||||
|
||||
@@ -412,15 +398,13 @@
|
||||
|
||||
[38;2;255;187;0m[4mJSMVC[0m
|
||||
|
||||
[38;5;12m-[39m[38;5;12m [39m[38;5;14m[1mJavaScript[0m[38;5;14m[1m [0m[38;5;14m[1mMVC[0m[38;5;14m[1m [0m[38;5;14m[1mand[0m[38;5;14m[1m [0m[38;5;14m[1mTemplating[0m[38;5;14m[1m [0m[38;5;14m[1mFrameworks[0m[38;5;12m [39m[38;5;12m(http://www.slideshare.net/x00mario/jsmvcomfg-to-sternly-look-at-javascript-mvc-and-templating-frameworks)[39m[38;5;12m [39m[38;5;12m-[39m[38;5;12m [39m[38;5;12mWritten[39m[38;5;12m [39m[38;5;12mby[39m[38;5;12m [39m[38;5;14m[1mMario[0m[38;5;14m[1m [0m[38;5;14m[1mHeiderich[0m[38;5;12m [39m
|
||||
[38;5;12m(http://www.slideshare.net/x00mario).[39m
|
||||
[38;5;12m- [39m[38;5;14m[1mJavaScript MVC and Templating Frameworks[0m[38;5;12m (http://www.slideshare.net/x00mario/jsmvcomfg-to-sternly-look-at-javascript-mvc-and-templating-frameworks) - Written by [39m[38;5;14m[1mMario Heiderich[0m[38;5;12m (http://www.slideshare.net/x00mario).[39m
|
||||
|
||||
|
||||
[38;2;255;187;0m[4mAuthentication[0m
|
||||
|
||||
[38;5;12m-[39m[38;5;12m [39m[38;5;14m[1mTrend[0m[38;5;14m[1m [0m[38;5;14m[1mMicro[0m[38;5;14m[1m [0m[38;5;14m[1mThreat[0m[38;5;14m[1m [0m[38;5;14m[1mDiscovery[0m[38;5;14m[1m [0m[38;5;14m[1mAppliance[0m[38;5;14m[1m [0m[38;5;14m[1m-[0m[38;5;14m[1m [0m[38;5;14m[1mSession[0m[38;5;14m[1m [0m[38;5;14m[1mGeneration[0m[38;5;14m[1m [0m[38;5;14m[1mAuthentication[0m[38;5;14m[1m [0m[38;5;14m[1mBypass[0m[38;5;14m[1m [0m[38;5;14m[1m(CVE-2016-8584)[0m[38;5;12m [39m
|
||||
[38;5;12m(http://blog.malerisch.net/2017/04/trend-micro-threat-discovery-appliance-session-generation-authentication-bypass-cve-2016-8584.html)[39m[38;5;12m [39m[38;5;12m-[39m[38;5;12m [39m[38;5;12mWritten[39m[38;5;12m [39m[38;5;12mby[39m[38;5;12m [39m[38;5;14m[1m@malerisch[0m[38;5;12m [39m[38;5;12m(https://twitter.com/malerisch)[39m[38;5;12m [39m[38;5;12mand[39m[38;5;12m [39m[38;5;14m[1m@steventseeley[0m[38;5;12m [39m
|
||||
[38;5;12m(https://twitter.com/steventseeley).[39m
|
||||
[38;5;12m-[39m[38;5;12m [39m[38;5;14m[1mTrend[0m[38;5;14m[1m [0m[38;5;14m[1mMicro[0m[38;5;14m[1m [0m[38;5;14m[1mThreat[0m[38;5;14m[1m [0m[38;5;14m[1mDiscovery[0m[38;5;14m[1m [0m[38;5;14m[1mAppliance[0m[38;5;14m[1m [0m[38;5;14m[1m-[0m[38;5;14m[1m [0m[38;5;14m[1mSession[0m[38;5;14m[1m [0m[38;5;14m[1mGeneration[0m[38;5;14m[1m [0m[38;5;14m[1mAuthentication[0m[38;5;14m[1m [0m[38;5;14m[1mBypass[0m[38;5;14m[1m [0m[38;5;14m[1m(CVE-2016-8584)[0m[38;5;12m [39m[38;5;12m(http://blog.malerisch.net/2017/04/trend-micro-threat-discovery-appliance-session-generation-authentication-bypass-cve-2016-8584.html)[39m[38;5;12m [39m[38;5;12m-[39m
|
||||
[38;5;12mWritten[39m[38;5;12m [39m[38;5;12mby[39m[38;5;12m [39m[38;5;14m[1m@malerisch[0m[38;5;12m [39m[38;5;12m(https://twitter.com/malerisch)[39m[38;5;12m [39m[38;5;12mand[39m[38;5;12m [39m[38;5;14m[1m@steventseeley[0m[38;5;12m [39m[38;5;12m(https://twitter.com/steventseeley).[39m
|
||||
|
||||
[38;2;255;187;0m[4mTricks[0m
|
||||
|
||||
@@ -428,8 +412,7 @@
|
||||
[38;2;255;187;0m[4mCSRF[0m
|
||||
|
||||
[38;5;12m- [39m[38;5;14m[1mNeat tricks to bypass CSRF-protection[0m[38;5;12m (https://zhuanlan.zhihu.com/p/32716181) - Written by [39m[38;5;14m[1mTwosecurity[0m[38;5;12m (https://twosecurity.io/).[39m
|
||||
[38;5;12m-[39m[38;5;12m [39m[38;5;14m[1mExploiting[0m[38;5;14m[1m [0m[38;5;14m[1mCSRF[0m[38;5;14m[1m [0m[38;5;14m[1mon[0m[38;5;14m[1m [0m[38;5;14m[1mJSON[0m[38;5;14m[1m [0m[38;5;14m[1mendpoints[0m[38;5;14m[1m [0m[38;5;14m[1mwith[0m[38;5;14m[1m [0m[38;5;14m[1mFlash[0m[38;5;14m[1m [0m[38;5;14m[1mand[0m[38;5;14m[1m [0m[38;5;14m[1mredirects[0m[38;5;12m [39m[38;5;12m(https://blog.appsecco.com/exploiting-csrf-on-json-endpoints-with-flash-and-redirects-681d4ad6b31b)[39m[38;5;12m [39m[38;5;12m-[39m[38;5;12m [39m[38;5;12mWritten[39m[38;5;12m [39m[38;5;12mby[39m[38;5;12m [39m[38;5;14m[1m@riyazwalikar[0m[38;5;12m [39m
|
||||
[38;5;12m(https://blog.appsecco.com/@riyazwalikar).[39m
|
||||
[38;5;12m- [39m[38;5;14m[1mExploiting CSRF on JSON endpoints with Flash and redirects[0m[38;5;12m (https://blog.appsecco.com/exploiting-csrf-on-json-endpoints-with-flash-and-redirects-681d4ad6b31b) - Written by [39m[38;5;14m[1m@riyazwalikar[0m[38;5;12m (https://blog.appsecco.com/@riyazwalikar).[39m
|
||||
[38;5;12m- [39m[38;5;14m[1mStealing CSRF tokens with CSS injection (without iFrames)[0m[38;5;12m (https://github.com/dxa4481/cssInjection) - Written by [39m[38;5;14m[1m@dxa4481[0m[38;5;12m (https://github.com/dxa4481).[39m
|
||||
[38;5;12m-[39m[38;5;12m [39m[38;5;14m[1mCracking[0m[38;5;14m[1m [0m[38;5;14m[1mJava’s[0m[38;5;14m[1m [0m[38;5;14m[1mRNG[0m[38;5;14m[1m [0m[38;5;14m[1mfor[0m[38;5;14m[1m [0m[38;5;14m[1mCSRF[0m[38;5;14m[1m [0m[38;5;14m[1m-[0m[38;5;14m[1m [0m[38;5;14m[1mJavax[0m[38;5;14m[1m [0m[38;5;14m[1mFaces[0m[38;5;14m[1m [0m[38;5;14m[1mand[0m[38;5;14m[1m [0m[38;5;14m[1mWhy[0m[38;5;14m[1m [0m[38;5;14m[1mCSRF[0m[38;5;14m[1m [0m[38;5;14m[1mToken[0m[38;5;14m[1m [0m[38;5;14m[1mRandomness[0m[38;5;14m[1m [0m[38;5;14m[1mMatters[0m[38;5;12m [39m[38;5;12m(https://blog.securityevaluators.com/cracking-javas-rng-for-csrf-ea9cacd231d2)[39m[38;5;12m [39m[38;5;12m-[39m[38;5;12m [39m[38;5;12mWritten[39m[38;5;12m [39m[38;5;12mby[39m[38;5;12m [39m[38;5;14m[1m@rramgattie[0m[38;5;12m [39m
|
||||
[38;5;12m(https://blog.securityevaluators.com/@rramgattie).[39m
|
||||
@@ -464,14 +447,12 @@
|
||||
[38;5;12m- [39m[38;5;14m[1mExploiting XSS with 20 characters limitation[0m[38;5;12m (https://jlajara.gitlab.io/posts/2019/11/30/XSS_20_characters.html) - Written by [39m[38;5;14m[1mJorge Lajara[0m[38;5;12m (https://jlajara.gitlab.io/).[39m
|
||||
[38;5;12m- [39m[38;5;14m[1mUpgrade self XSS to Exploitable XSS an 3 Ways Technic[0m[38;5;12m (https://www.hahwul.com/2019/11/upgrade-self-xss-to-exploitable-xss.html) - Written by [39m[38;5;14m[1mHAHWUL[0m[38;5;12m (https://www.hahwul.com/).[39m
|
||||
[38;5;12m- [39m[38;5;14m[1mXSS without parentheses and semi-colons[0m[38;5;12m (https://portswigger.net/blog/xss-without-parentheses-and-semi-colons) - Written by [39m[38;5;14m[1m@garethheyes[0m[38;5;12m (https://twitter.com/garethheyes).[39m
|
||||
[38;5;12m-[39m[38;5;12m [39m[38;5;14m[1mXSS-Auditor[0m[38;5;14m[1m [0m[38;5;14m[1m—[0m[38;5;14m[1m [0m[38;5;14m[1mthe[0m[38;5;14m[1m [0m[38;5;14m[1mprotector[0m[38;5;14m[1m [0m[38;5;14m[1mof[0m[38;5;14m[1m [0m[38;5;14m[1munprotected[0m[38;5;14m[1m [0m[38;5;14m[1mand[0m[38;5;14m[1m [0m[38;5;14m[1mthe[0m[38;5;14m[1m [0m[38;5;14m[1mdeceiver[0m[38;5;14m[1m [0m[38;5;14m[1mof[0m[38;5;14m[1m [0m[38;5;14m[1mprotected.[0m[38;5;12m [39m[38;5;12m(https://medium.com/bugbountywriteup/xss-auditor-the-protector-of-unprotected-f900a5e15b7b)[39m[38;5;12m [39m[38;5;12m-[39m[38;5;12m [39m[38;5;12mWritten[39m[38;5;12m [39m[38;5;12mby[39m[38;5;12m [39m[38;5;14m[1m@terjanq[0m[38;5;12m [39m
|
||||
[38;5;12m(https://medium.com/@terjanq).[39m
|
||||
[38;5;12m- [39m[38;5;14m[1mXSS-Auditor — the protector of unprotected and the deceiver of protected.[0m[38;5;12m (https://medium.com/bugbountywriteup/xss-auditor-the-protector-of-unprotected-f900a5e15b7b) - Written by [39m[38;5;14m[1m@terjanq[0m[38;5;12m (https://medium.com/@terjanq).[39m
|
||||
[38;5;12m- [39m[38;5;14m[1mQuery parameter reordering causes redirect page to render unsafe URL[0m[38;5;12m (https://hackerone.com/reports/293689) - Written by [39m[38;5;14m[1mkenziy[0m[38;5;12m (https://hackerone.com/kenziy).[39m
|
||||
[38;5;12m- [39m[38;5;14m[1mECMAScript 6 from an Attacker's Perspective - Breaking Frameworks, Sandboxes, and everything else[0m[38;5;12m (http://www.slideshare.net/x00mario/es6-en) - Written by [39m[38;5;14m[1mMario Heiderich[0m[38;5;12m (http://www.slideshare.net/x00mario).[39m
|
||||
[38;5;12m-[39m[38;5;12m [39m[38;5;14m[1mHow[0m[38;5;14m[1m [0m[38;5;14m[1mI[0m[38;5;14m[1m [0m[38;5;14m[1mfound[0m[38;5;14m[1m [0m[38;5;14m[1ma[0m[38;5;14m[1m [0m[38;5;14m[1m$5,000[0m[38;5;14m[1m [0m[38;5;14m[1mGoogle[0m[38;5;14m[1m [0m[38;5;14m[1mMaps[0m[38;5;14m[1m [0m[38;5;14m[1mXSS[0m[38;5;14m[1m [0m[38;5;14m[1m(by[0m[38;5;14m[1m [0m[38;5;14m[1mfiddling[0m[38;5;14m[1m [0m[38;5;14m[1mwith[0m[38;5;14m[1m [0m[38;5;14m[1mProtobuf)[0m[38;5;12m [39m[38;5;12m(https://medium.com/@marin_m/how-i-found-a-5-000-google-maps-xss-by-fiddling-with-protobuf-963ee0d9caff#.u50nrzhas)[39m[38;5;12m [39m[38;5;12m-[39m[38;5;12m [39m[38;5;12mWritten[39m[38;5;12m [39m[38;5;12mby[39m[38;5;12m [39m[38;5;14m[1m@marin_m[0m[38;5;12m [39m
|
||||
[38;5;12m(https://medium.com/@marin_m).[39m
|
||||
[38;5;12m-[39m[38;5;12m [39m[38;5;14m[1mDON'T[0m[38;5;14m[1m [0m[38;5;14m[1mTRUST[0m[38;5;14m[1m [0m[38;5;14m[1mTHE[0m[38;5;14m[1m [0m[38;5;14m[1mDOM:[0m[38;5;14m[1m [0m[38;5;14m[1mBYPASSING[0m[38;5;14m[1m [0m[38;5;14m[1mXSS[0m[38;5;14m[1m [0m[38;5;14m[1mMITIGATIONS[0m[38;5;14m[1m [0m[38;5;14m[1mVIA[0m[38;5;14m[1m [0m[38;5;14m[1mSCRIPT[0m[38;5;14m[1m [0m[38;5;14m[1mGADGETS[0m[38;5;12m [39m[38;5;12m(https://www.blackhat.com/docs/us-17/thursday/us-17-Lekies-Dont-Trust-The-DOM-Bypassing-XSS-Mitigations-Via-Script-Gadgets.pdf)[39m[38;5;12m [39m[38;5;12m-[39m[38;5;12m [39m[38;5;12mWritten[39m[38;5;12m [39m[38;5;12mby[39m[38;5;12m [39m
|
||||
[38;5;14m[1mSebastian[0m[38;5;14m[1m [0m[38;5;14m[1mLekies[0m[38;5;12m [39m[38;5;12m(https://twitter.com/slekies),[39m[38;5;12m [39m[38;5;14m[1mKrzysztof[0m[38;5;14m[1m [0m[38;5;14m[1mKotowicz[0m[38;5;12m [39m[38;5;12m(https://twitter.com/kkotowicz),[39m[38;5;12m [39m[38;5;12mand[39m[38;5;12m [39m[38;5;14m[1mEduardo[0m[38;5;14m[1m [0m[38;5;14m[1mVela[0m[38;5;12m [39m[38;5;12m(https://twitter.com/sirdarckcat).[39m
|
||||
[38;5;12m- [39m[38;5;14m[1mHow I found a $5,000 Google Maps XSS (by fiddling with Protobuf)[0m[38;5;12m (https://medium.com/@marin_m/how-i-found-a-5-000-google-maps-xss-by-fiddling-with-protobuf-963ee0d9caff#.u50nrzhas) - Written by [39m[38;5;14m[1m@marin_m[0m[38;5;12m (https://medium.com/@marin_m).[39m
|
||||
[38;5;12m-[39m[38;5;12m [39m[38;5;14m[1mDON'T[0m[38;5;14m[1m [0m[38;5;14m[1mTRUST[0m[38;5;14m[1m [0m[38;5;14m[1mTHE[0m[38;5;14m[1m [0m[38;5;14m[1mDOM:[0m[38;5;14m[1m [0m[38;5;14m[1mBYPASSING[0m[38;5;14m[1m [0m[38;5;14m[1mXSS[0m[38;5;14m[1m [0m[38;5;14m[1mMITIGATIONS[0m[38;5;14m[1m [0m[38;5;14m[1mVIA[0m[38;5;14m[1m [0m[38;5;14m[1mSCRIPT[0m[38;5;14m[1m [0m[38;5;14m[1mGADGETS[0m[38;5;12m [39m[38;5;12m(https://www.blackhat.com/docs/us-17/thursday/us-17-Lekies-Dont-Trust-The-DOM-Bypassing-XSS-Mitigations-Via-Script-Gadgets.pdf)[39m[38;5;12m [39m[38;5;12m-[39m[38;5;12m [39m[38;5;12mWritten[39m[38;5;12m [39m[38;5;12mby[39m[38;5;12m [39m[38;5;14m[1mSebastian[0m[38;5;14m[1m [0m[38;5;14m[1mLekies[0m[38;5;12m [39m
|
||||
[38;5;12m(https://twitter.com/slekies),[39m[38;5;12m [39m[38;5;14m[1mKrzysztof[0m[38;5;14m[1m [0m[38;5;14m[1mKotowicz[0m[38;5;12m [39m[38;5;12m(https://twitter.com/kkotowicz),[39m[38;5;12m [39m[38;5;12mand[39m[38;5;12m [39m[38;5;14m[1mEduardo[0m[38;5;14m[1m [0m[38;5;14m[1mVela[0m[38;5;12m [39m[38;5;12m(https://twitter.com/sirdarckcat).[39m
|
||||
[38;5;12m- [39m[38;5;14m[1mUber XSS via Cookie[0m[38;5;12m (http://zhchbin.github.io/2017/08/30/Uber-XSS-via-Cookie/) - Written by [39m[38;5;14m[1mzhchbin[0m[38;5;12m (http://zhchbin.github.io/).[39m
|
||||
[38;5;12m- [39m[38;5;14m[1mDOM XSS – auth.uber.com[0m[38;5;12m (http://stamone-bug-bounty.blogspot.tw/2017/10/dom-xss-auth14.html) - Written by [39m[38;5;14m[1mStamOne_[0m[38;5;12m (http://stamone-bug-bounty.blogspot.tw/).[39m
|
||||
[38;5;12m- [39m[38;5;14m[1mStored XSS on Facebook[0m[38;5;12m (https://opnsec.com/2018/03/stored-xss-on-facebook/) - Written by [39m[38;5;14m[1mEnguerran Gillier[0m[38;5;12m (https://opnsec.com/).[39m
|
||||
@@ -509,8 +490,7 @@
|
||||
[38;5;12m- [39m[38;5;14m[1mXML Out-Of-Band Data Retrieval[0m[38;5;12m (https://media.blackhat.com/eu-13/briefings/Osipov/bh-eu-13-XML-data-osipov-slides.pdf) - Written by Timur Yunusov and Alexey Osipov.[39m
|
||||
[38;5;12m- [39m[38;5;14m[1mXXE OOB exploitation at Java 1.7+ (2014)[0m[38;5;12m (http://lab.onsec.ru/2014/06/xxe-oob-exploitation-at-java-17.html): Exfiltration using FTP protocol - Written by [39m[38;5;14m[1mIvan Novikov[0m[38;5;12m (https://twitter.com/d0znpp/).[39m
|
||||
[38;5;12m- [39m[38;5;14m[1mXXE OOB extracting via HTTP+FTP using single opened port[0m[38;5;12m (https://skavans.ru/en/2017/12/02/xxe-oob-extracting-via-httpftp-using-single-opened-port/) - Written by [39m[38;5;14m[1mskavans[0m[38;5;12m (https://skavans.ru/).[39m
|
||||
[38;5;12m-[39m[38;5;12m [39m[38;5;14m[1mWhat[0m[38;5;14m[1m [0m[38;5;14m[1mYou[0m[38;5;14m[1m [0m[38;5;14m[1mDidn't[0m[38;5;14m[1m [0m[38;5;14m[1mKnow[0m[38;5;14m[1m [0m[38;5;14m[1mAbout[0m[38;5;14m[1m [0m[38;5;14m[1mXML[0m[38;5;14m[1m [0m[38;5;14m[1mExternal[0m[38;5;14m[1m [0m[38;5;14m[1mEntities[0m[38;5;14m[1m [0m[38;5;14m[1mAttacks[0m[38;5;12m [39m[38;5;12m(https://2013.appsecusa.org/2013/wp-content/uploads/2013/12/WhatYouDidntKnowAboutXXEAttacks.pdf)[39m[38;5;12m [39m[38;5;12m-[39m[38;5;12m [39m[38;5;12mWritten[39m[38;5;12m [39m[38;5;12mby[39m[38;5;12m [39m[38;5;14m[1mTimothy[0m[38;5;14m[1m [0m[38;5;14m[1mD.[0m[38;5;14m[1m [0m[38;5;14m[1mMorgan[0m[38;5;12m [39m
|
||||
[38;5;12m(https://twitter.com/ecbftw).[39m
|
||||
[38;5;12m- [39m[38;5;14m[1mWhat You Didn't Know About XML External Entities Attacks[0m[38;5;12m (https://2013.appsecusa.org/2013/wp-content/uploads/2013/12/WhatYouDidntKnowAboutXXEAttacks.pdf) - Written by [39m[38;5;14m[1mTimothy D. Morgan[0m[38;5;12m (https://twitter.com/ecbftw).[39m
|
||||
[38;5;12m- [39m[38;5;14m[1mPre-authentication XXE vulnerability in the Services Drupal module[0m[38;5;12m (https://www.synacktiv.com/ressources/synacktiv_drupal_xxe_services.pdf) - Written by [39m[38;5;14m[1mRenaud Dubourguais[0m[38;5;12m (https://twitter.com/_m0bius).[39m
|
||||
[38;5;12m- [39m[38;5;14m[1mForcing XXE Reflection through Server Error Messages[0m[38;5;12m (https://blog.netspi.com/forcing-xxe-reflection-server-error-messages/) - Written by [39m[38;5;14m[1mAntti Rantasaari[0m[38;5;12m (https://blog.netspi.com/author/antti-rantasaari/).[39m
|
||||
[38;5;12m- [39m[38;5;14m[1mExploiting XXE with local DTD files[0m[38;5;12m (https://mohemiv.com/all/exploiting-xxe-with-local-dtd-files/) - Written by [39m[38;5;14m[1mArseniy Sharoglazov[0m[38;5;12m (https://twitter.com/_mohemiv).[39m
|
||||
@@ -525,8 +505,8 @@
|
||||
[38;5;12m- [39m[38;5;14m[1mPHP SSRF Techniques[0m[38;5;12m (https://medium.com/secjuice/php-ssrf-techniques-9d422cb28d51) - Written by [39m[38;5;14m[1m@themiddleblue[0m[38;5;12m (https://medium.com/@themiddleblue).[39m
|
||||
[38;5;12m- [39m[38;5;14m[1mSSRF in https://imgur.com/vidgif/url[0m[38;5;12m (https://hackerone.com/reports/115748) - Written by [39m[38;5;14m[1maesteral[0m[38;5;12m (https://hackerone.com/aesteral).[39m
|
||||
[38;5;12m- [39m[38;5;14m[1mAll you need to know about SSRF and how may we write tools to do auto-detect[0m[38;5;12m (https://www.auxy.xyz/web%20security/2017/07/06/all-ssrf-knowledge.html) - Written by [39m[38;5;14m[1m@Auxy233[0m[38;5;12m (https://twitter.com/Auxy233).[39m
|
||||
[38;5;12m-[39m[38;5;12m [39m[38;5;14m[1mA[0m[38;5;14m[1m [0m[38;5;14m[1mNew[0m[38;5;14m[1m [0m[38;5;14m[1mEra[0m[38;5;14m[1m [0m[38;5;14m[1mof[0m[38;5;14m[1m [0m[38;5;14m[1mSSRF[0m[38;5;14m[1m [0m[38;5;14m[1m-[0m[38;5;14m[1m [0m[38;5;14m[1mExploiting[0m[38;5;14m[1m [0m[38;5;14m[1mURL[0m[38;5;14m[1m [0m[38;5;14m[1mParser[0m[38;5;14m[1m [0m[38;5;14m[1min[0m[38;5;14m[1m [0m[38;5;14m[1mTrending[0m[38;5;14m[1m [0m[38;5;14m[1mProgramming[0m[38;5;14m[1m [0m[38;5;14m[1mLanguages![0m[38;5;12m [39m
|
||||
[38;5;12m(https://www.blackhat.com/docs/us-17/thursday/us-17-Tsai-A-New-Era-Of-SSRF-Exploiting-URL-Parser-In-Trending-Programming-Languages.pdf)[39m[38;5;12m [39m[38;5;12m-[39m[38;5;12m [39m[38;5;12mWritten[39m[38;5;12m [39m[38;5;12mby[39m[38;5;12m [39m[38;5;14m[1mOrange[0m[38;5;12m [39m[38;5;12m(http://blog.orange.tw/).[39m
|
||||
[38;5;12m-[39m[38;5;12m [39m[38;5;14m[1mA[0m[38;5;14m[1m [0m[38;5;14m[1mNew[0m[38;5;14m[1m [0m[38;5;14m[1mEra[0m[38;5;14m[1m [0m[38;5;14m[1mof[0m[38;5;14m[1m [0m[38;5;14m[1mSSRF[0m[38;5;14m[1m [0m[38;5;14m[1m-[0m[38;5;14m[1m [0m[38;5;14m[1mExploiting[0m[38;5;14m[1m [0m[38;5;14m[1mURL[0m[38;5;14m[1m [0m[38;5;14m[1mParser[0m[38;5;14m[1m [0m[38;5;14m[1min[0m[38;5;14m[1m [0m[38;5;14m[1mTrending[0m[38;5;14m[1m [0m[38;5;14m[1mProgramming[0m[38;5;14m[1m [0m[38;5;14m[1mLanguages![0m[38;5;12m [39m[38;5;12m(https://www.blackhat.com/docs/us-17/thursday/us-17-Tsai-A-New-Era-Of-SSRF-Exploiting-URL-Parser-In-Trending-Programming-Languages.pdf)[39m[38;5;12m [39m[38;5;12m-[39m[38;5;12m [39m[38;5;12mWritten[39m[38;5;12m [39m[38;5;12mby[39m[38;5;12m [39m[38;5;14m[1mOrange[0m[38;5;12m [39m
|
||||
[38;5;12m(http://blog.orange.tw/).[39m
|
||||
[38;5;12m- [39m[38;5;14m[1mSSRF Tips[0m[38;5;12m (http://blog.safebuff.com/2016/07/03/SSRF-Tips/) - Written by [39m[38;5;14m[1mxl7dev[0m[38;5;12m (http://blog.safebuff.com/).[39m
|
||||
[38;5;12m- [39m[38;5;14m[1mInto the Borg – SSRF inside Google production network[0m[38;5;12m (https://opnsec.com/2018/07/into-the-borg-ssrf-inside-google-production-network/) - Written by [39m[38;5;14m[1mopnsec[0m[38;5;12m (https://opnsec.com/).[39m
|
||||
[38;5;12m-[39m[38;5;12m [39m[38;5;14m[1mPiercing[0m[38;5;14m[1m [0m[38;5;14m[1mthe[0m[38;5;14m[1m [0m[38;5;14m[1mVeil:[0m[38;5;14m[1m [0m[38;5;14m[1mServer[0m[38;5;14m[1m [0m[38;5;14m[1mSide[0m[38;5;14m[1m [0m[38;5;14m[1mRequest[0m[38;5;14m[1m [0m[38;5;14m[1mForgery[0m[38;5;14m[1m [0m[38;5;14m[1mto[0m[38;5;14m[1m [0m[38;5;14m[1mNIPRNet[0m[38;5;14m[1m [0m[38;5;14m[1maccess[0m[38;5;12m [39m[38;5;12m(https://medium.com/bugbountywriteup/piercing-the-veil-server-side-request-forgery-to-niprnet-access-c358fd5e249a)[39m[38;5;12m [39m[38;5;12m-[39m[38;5;12m [39m[38;5;12mWritten[39m[38;5;12m [39m[38;5;12mby[39m[38;5;12m [39m[38;5;14m[1mAlyssa[0m[38;5;14m[1m [0m[38;5;14m[1mHerrera[0m[38;5;12m [39m
|
||||
@@ -541,8 +521,7 @@
|
||||
|
||||
[38;2;255;187;0m[4mHeader Injection[0m
|
||||
|
||||
[38;5;12m-[39m[38;5;12m [39m[38;5;14m[1mJava/Python[0m[38;5;14m[1m [0m[38;5;14m[1mFTP[0m[38;5;14m[1m [0m[38;5;14m[1mInjections[0m[38;5;14m[1m [0m[38;5;14m[1mAllow[0m[38;5;14m[1m [0m[38;5;14m[1mfor[0m[38;5;14m[1m [0m[38;5;14m[1mFirewall[0m[38;5;14m[1m [0m[38;5;14m[1mBypass[0m[38;5;12m [39m[38;5;12m(http://blog.blindspotsecurity.com/2017/02/advisory-javapython-ftp-injections.html)[39m[38;5;12m [39m[38;5;12m-[39m[38;5;12m [39m[38;5;12mWritten[39m[38;5;12m [39m[38;5;12mby[39m[38;5;12m [39m[38;5;14m[1mTimothy[0m[38;5;14m[1m [0m[38;5;14m[1mMorgan[0m[38;5;12m [39m
|
||||
[38;5;12m(https://plus.google.com/105917618099766831589).[39m
|
||||
[38;5;12m- [39m[38;5;14m[1mJava/Python FTP Injections Allow for Firewall Bypass[0m[38;5;12m (http://blog.blindspotsecurity.com/2017/02/advisory-javapython-ftp-injections.html) - Written by [39m[38;5;14m[1mTimothy Morgan[0m[38;5;12m (https://plus.google.com/105917618099766831589).[39m
|
||||
|
||||
|
||||
[38;2;255;187;0m[4mURL[0m
|
||||
@@ -555,8 +534,8 @@
|
||||
|
||||
[38;2;255;187;0m[4mDeserialization[0m
|
||||
|
||||
[38;5;12m-[39m[38;5;12m [39m[38;5;14m[1mASP.NET[0m[38;5;14m[1m [0m[38;5;14m[1mresource[0m[38;5;14m[1m [0m[38;5;14m[1mfiles[0m[38;5;14m[1m [0m[38;5;14m[1m(.RESX)[0m[38;5;14m[1m [0m[38;5;14m[1mand[0m[38;5;14m[1m [0m[38;5;14m[1mdeserialisation[0m[38;5;14m[1m [0m[38;5;14m[1missues[0m[38;5;12m [39m[38;5;12m(https://www.nccgroup.trust/uk/about-us/newsroom-and-events/blogs/2018/august/aspnet-resource-files-resx-and-deserialisation-issues/)[39m[38;5;12m [39m[38;5;12m-[39m[38;5;12m [39m[38;5;12mWritten[39m[38;5;12m [39m[38;5;12mby[39m[38;5;12m [39m
|
||||
[38;5;14m[1m@irsdl[0m[38;5;12m [39m[38;5;12m(https://twitter.com/irsdl).[39m
|
||||
[38;5;12m-[39m[38;5;12m [39m[38;5;14m[1mASP.NET[0m[38;5;14m[1m [0m[38;5;14m[1mresource[0m[38;5;14m[1m [0m[38;5;14m[1mfiles[0m[38;5;14m[1m [0m[38;5;14m[1m(.RESX)[0m[38;5;14m[1m [0m[38;5;14m[1mand[0m[38;5;14m[1m [0m[38;5;14m[1mdeserialisation[0m[38;5;14m[1m [0m[38;5;14m[1missues[0m[38;5;12m [39m[38;5;12m(https://www.nccgroup.trust/uk/about-us/newsroom-and-events/blogs/2018/august/aspnet-resource-files-resx-and-deserialisation-issues/)[39m[38;5;12m [39m[38;5;12m-[39m[38;5;12m [39m[38;5;12mWritten[39m[38;5;12m [39m[38;5;12mby[39m[38;5;12m [39m[38;5;14m[1m@irsdl[0m[38;5;12m [39m
|
||||
[38;5;12m(https://twitter.com/irsdl).[39m
|
||||
|
||||
|
||||
[38;2;255;187;0m[4mOAuth[0m
|
||||
@@ -566,8 +545,8 @@
|
||||
|
||||
[38;2;255;187;0m[4mOthers[0m
|
||||
|
||||
[38;5;12m-[39m[38;5;12m [39m[38;5;14m[1mHow[0m[38;5;14m[1m [0m[38;5;14m[1mI[0m[38;5;14m[1m [0m[38;5;14m[1mhacked[0m[38;5;14m[1m [0m[38;5;14m[1mGoogle’s[0m[38;5;14m[1m [0m[38;5;14m[1mbug[0m[38;5;14m[1m [0m[38;5;14m[1mtracking[0m[38;5;14m[1m [0m[38;5;14m[1msystem[0m[38;5;14m[1m [0m[38;5;14m[1mitself[0m[38;5;14m[1m [0m[38;5;14m[1mfor[0m[38;5;14m[1m [0m[38;5;14m[1m$15,600[0m[38;5;14m[1m [0m[38;5;14m[1min[0m[38;5;14m[1m [0m[38;5;14m[1mbounties[0m[38;5;12m [39m[38;5;12m(https://medium.com/free-code-camp/messing-with-the-google-buganizer-system-for-15-600-in-bounties-58f86cc9f9a5)[39m[38;5;12m [39m[38;5;12m-[39m[38;5;12m [39m[38;5;12mWritten[39m[38;5;12m [39m[38;5;12mby[39m[38;5;12m [39m
|
||||
[38;5;14m[1m@alex.birsan[0m[38;5;12m [39m[38;5;12m(https://medium.com/@alex.birsan).[39m
|
||||
[38;5;12m-[39m[38;5;12m [39m[38;5;14m[1mHow[0m[38;5;14m[1m [0m[38;5;14m[1mI[0m[38;5;14m[1m [0m[38;5;14m[1mhacked[0m[38;5;14m[1m [0m[38;5;14m[1mGoogle’s[0m[38;5;14m[1m [0m[38;5;14m[1mbug[0m[38;5;14m[1m [0m[38;5;14m[1mtracking[0m[38;5;14m[1m [0m[38;5;14m[1msystem[0m[38;5;14m[1m [0m[38;5;14m[1mitself[0m[38;5;14m[1m [0m[38;5;14m[1mfor[0m[38;5;14m[1m [0m[38;5;14m[1m$15,600[0m[38;5;14m[1m [0m[38;5;14m[1min[0m[38;5;14m[1m [0m[38;5;14m[1mbounties[0m[38;5;12m [39m[38;5;12m(https://medium.com/free-code-camp/messing-with-the-google-buganizer-system-for-15-600-in-bounties-58f86cc9f9a5)[39m[38;5;12m [39m[38;5;12m-[39m[38;5;12m [39m[38;5;12mWritten[39m[38;5;12m [39m[38;5;12mby[39m[38;5;12m [39m[38;5;14m[1m@alex.birsan[0m[38;5;12m [39m
|
||||
[38;5;12m(https://medium.com/@alex.birsan).[39m
|
||||
[38;5;12m- [39m[38;5;14m[1mSome Tricks From My Secret Group[0m[38;5;12m (https://www.leavesongs.com/SHARE/some-tricks-from-my-secret-group.html) - Written by [39m[38;5;14m[1mphithon[0m[38;5;12m (https://www.leavesongs.com/).[39m
|
||||
[38;5;12m- [39m[38;5;14m[1mInducing DNS Leaks in Onion Web Services[0m[38;5;12m (https://github.com/epidemics-scepticism/writing/blob/master/onion-dns-leaks.md) - Written by [39m[38;5;14m[1m@epidemics-scepticism[0m[38;5;12m (https://github.com/epidemics-scepticism).[39m
|
||||
[38;5;12m- [39m[38;5;14m[1mStored XSS, and SSRF in Google using the Dataset Publishing Language[0m[38;5;12m (https://s1gnalcha0s.github.io/dspl/2018/03/07/Stored-XSS-and-SSRF-Google.html) - Written by [39m[38;5;14m[1m@signalchaos[0m[38;5;12m (https://twitter.com/signalchaos).[39m
|
||||
@@ -585,11 +564,10 @@
|
||||
[38;5;12m- [39m[38;5;14m[1mIE11 Information disclosure - local file detection[0m[38;5;12m (https://www.facebook.com/ExploitWareLabs/photos/a.361854183878462.84544.338832389513975/1378579648872572/?type=3&theater) - Written by James Lee.[39m
|
||||
[38;5;12m- [39m[38;5;14m[1mSOP bypass / UXSS – Stealing Credentials Pretty Fast (Edge)[0m[38;5;12m (https://www.brokenbrowser.com/sop-bypass-uxss-stealing-credentials-pretty-fast/) - Written by [39m[38;5;14m[1mManuel[0m[38;5;12m (https://twitter.com/magicmac2000).[39m
|
||||
[38;5;12m- [39m[38;5;14m[1mОсобенности Safari в client-side атаках[0m[38;5;12m (https://bo0om.ru/safari-client-side) - Written by [39m[38;5;14m[1mBo0oM[0m[38;5;12m (https://bo0om.ru/author/admin).[39m
|
||||
[38;5;12m-[39m[38;5;12m [39m[38;5;14m[1mHow[0m[38;5;14m[1m [0m[38;5;14m[1mdo[0m[38;5;14m[1m [0m[38;5;14m[1mwe[0m[38;5;14m[1m [0m[38;5;14m[1mStop[0m[38;5;14m[1m [0m[38;5;14m[1mSpilling[0m[38;5;14m[1m [0m[38;5;14m[1mthe[0m[38;5;14m[1m [0m[38;5;14m[1mBeans[0m[38;5;14m[1m [0m[38;5;14m[1mAcross[0m[38;5;14m[1m [0m[38;5;14m[1mOrigins?[0m[38;5;12m [39m[38;5;12m(https://docs.google.com/document/d/1cbL-X0kV_tQ5rL8XJ3lXkV-j0pt_CfTu5ZSzYrncPDc/)[39m[38;5;12m [39m[38;5;12m-[39m[38;5;12m [39m[38;5;12mWritten[39m[38;5;12m [39m[38;5;12mby[39m[38;5;12m [39m[38;5;14m[1maaj[0m[38;5;14m[1m [0m[38;5;14m[1mat[0m[38;5;14m[1m [0m[38;5;14m[1mgoogle.com[0m[38;5;12m [39m[38;5;12m(aaj@google.com)[39m[38;5;12m [39m[38;5;12mand[39m[38;5;12m [39m[38;5;14m[1mmkwst[0m[38;5;14m[1m [0m[38;5;14m[1mat[0m[38;5;14m[1m [0m[38;5;14m[1mgoogle.com[0m[38;5;12m [39m
|
||||
[38;5;12m(mkwst@google.com).[39m
|
||||
[38;5;12m- [39m[38;5;14m[1mHow do we Stop Spilling the Beans Across Origins?[0m[38;5;12m (https://docs.google.com/document/d/1cbL-X0kV_tQ5rL8XJ3lXkV-j0pt_CfTu5ZSzYrncPDc/) - Written by [39m[38;5;14m[1maaj at google.com[0m[38;5;12m (aaj@google.com) and [39m[38;5;14m[1mmkwst at google.com[0m[38;5;12m (mkwst@google.com).[39m
|
||||
[38;5;12m- [39m[38;5;14m[1mSetting arbitrary request headers in Chromium via CRLF injection[0m[38;5;12m (https://blog.bentkowski.info/2018/06/setting-arbitrary-request-headers-in.html) - Written by [39m[38;5;14m[1mMichał Bentkowski[0m[38;5;12m (https://blog.bentkowski.info/).[39m
|
||||
[38;5;12m-[39m[38;5;12m [39m[38;5;14m[1mI’m[0m[38;5;14m[1m [0m[38;5;14m[1mharvesting[0m[38;5;14m[1m [0m[38;5;14m[1mcredit[0m[38;5;14m[1m [0m[38;5;14m[1mcard[0m[38;5;14m[1m [0m[38;5;14m[1mnumbers[0m[38;5;14m[1m [0m[38;5;14m[1mand[0m[38;5;14m[1m [0m[38;5;14m[1mpasswords[0m[38;5;14m[1m [0m[38;5;14m[1mfrom[0m[38;5;14m[1m [0m[38;5;14m[1myour[0m[38;5;14m[1m [0m[38;5;14m[1msite.[0m[38;5;14m[1m [0m[38;5;14m[1mHere’s[0m[38;5;14m[1m [0m[38;5;14m[1mhow.[0m[38;5;12m [39m[38;5;12m(https://hackernoon.com/im-harvesting-credit-card-numbers-and-passwords-from-your-site-here-s-how-9a8cb347c5b5)[39m[38;5;12m [39m[38;5;12m-[39m[38;5;12m [39m[38;5;12mWritten[39m[38;5;12m [39m[38;5;12mby[39m[38;5;12m [39m[38;5;14m[1mDavid[0m[38;5;14m[1m [0m
|
||||
[38;5;14m[1mGilbertson[0m[38;5;12m [39m[38;5;12m(https://hackernoon.com/@david.gilbertson).[39m
|
||||
[38;5;12m-[39m[38;5;12m [39m[38;5;14m[1mI’m[0m[38;5;14m[1m [0m[38;5;14m[1mharvesting[0m[38;5;14m[1m [0m[38;5;14m[1mcredit[0m[38;5;14m[1m [0m[38;5;14m[1mcard[0m[38;5;14m[1m [0m[38;5;14m[1mnumbers[0m[38;5;14m[1m [0m[38;5;14m[1mand[0m[38;5;14m[1m [0m[38;5;14m[1mpasswords[0m[38;5;14m[1m [0m[38;5;14m[1mfrom[0m[38;5;14m[1m [0m[38;5;14m[1myour[0m[38;5;14m[1m [0m[38;5;14m[1msite.[0m[38;5;14m[1m [0m[38;5;14m[1mHere’s[0m[38;5;14m[1m [0m[38;5;14m[1mhow.[0m[38;5;12m [39m[38;5;12m(https://hackernoon.com/im-harvesting-credit-card-numbers-and-passwords-from-your-site-here-s-how-9a8cb347c5b5)[39m[38;5;12m [39m[38;5;12m-[39m[38;5;12m [39m[38;5;12mWritten[39m[38;5;12m [39m[38;5;12mby[39m[38;5;12m [39m[38;5;14m[1mDavid[0m[38;5;14m[1m [0m[38;5;14m[1mGilbertson[0m[38;5;12m [39m
|
||||
[38;5;12m(https://hackernoon.com/@david.gilbertson).[39m
|
||||
[38;5;12m- [39m[38;5;14m[1mSending arbitrary IPC messages via overriding Function.prototype.apply[0m[38;5;12m (https://hackerone.com/reports/188086) - Written by [39m[38;5;14m[1m@kinugawamasato[0m[38;5;12m (https://twitter.com/kinugawamasato).[39m
|
||||
[38;5;12m- [39m[38;5;14m[1mTake Advantage of Out-of-Scope Domains in Bug Bounty Programs[0m[38;5;12m (https://ahussam.me/Take-Advantage-of-Out-of-Scope-Domains-in-Bug-Bounty/) - Written by [39m[38;5;14m[1m@Abdulahhusam[0m[38;5;12m (https://twitter.com/Abdulahhusam).[39m
|
||||
|
||||
@@ -600,16 +578,13 @@
|
||||
[38;5;12m- [39m[38;5;14m[1mThree roads lead to Rome[0m[38;5;12m (http://blogs.360.cn/360safe/2016/11/29/three-roads-lead-to-rome-2/) - Written by [39m[38;5;14m[1m@holynop[0m[38;5;12m (https://twitter.com/holynop).[39m
|
||||
[38;5;12m- [39m[38;5;14m[1mExploiting a V8 OOB write.[0m[38;5;12m (https://halbecaf.com/2017/05/24/exploiting-a-v8-oob-write/) - Written by [39m[38;5;14m[1m@halbecaf[0m[38;5;12m (https://twitter.com/halbecaf).[39m
|
||||
[38;5;12m- [39m[38;5;14m[1mSSD Advisory – Chrome Turbofan Remote Code Execution[0m[38;5;12m (https://blogs.securiteam.com/index.php/archives/3379) - Written by [39m[38;5;14m[1mSecuriTeam Secure Disclosure (SSD)[0m[38;5;12m (https://blogs.securiteam.com/).[39m
|
||||
[38;5;12m-[39m[38;5;12m [39m[38;5;14m[1mLook[0m[38;5;14m[1m [0m[38;5;14m[1mMom,[0m[38;5;14m[1m [0m[38;5;14m[1mI[0m[38;5;14m[1m [0m[38;5;14m[1mdon't[0m[38;5;14m[1m [0m[38;5;14m[1muse[0m[38;5;14m[1m [0m[38;5;14m[1mShellcode[0m[38;5;14m[1m [0m[38;5;14m[1m-[0m[38;5;14m[1m [0m[38;5;14m[1mBrowser[0m[38;5;14m[1m [0m[38;5;14m[1mExploitation[0m[38;5;14m[1m [0m[38;5;14m[1mCase[0m[38;5;14m[1m [0m[38;5;14m[1mStudy[0m[38;5;14m[1m [0m[38;5;14m[1mfor[0m[38;5;14m[1m [0m[38;5;14m[1mInternet[0m[38;5;14m[1m [0m[38;5;14m[1mExplorer[0m[38;5;14m[1m [0m[38;5;14m[1m11[0m[38;5;12m [39m[38;5;12m(https://labs.bluefrostsecurity.de/files/Look_Mom_I_Dont_Use_Shellcode-WP.pdf)[39m[38;5;12m [39m[38;5;12m-[39m[38;5;12m [39m[38;5;12mWritten[39m[38;5;12m [39m[38;5;12mby[39m[38;5;12m [39m[38;5;14m[1m@moritzj[0m[38;5;12m [39m
|
||||
[38;5;12m(http://twitter.com/moritzj).[39m
|
||||
[38;5;12m-[39m[38;5;12m [39m[38;5;14m[1mPUSHING[0m[38;5;14m[1m [0m[38;5;14m[1mWEBKIT'S[0m[38;5;14m[1m [0m[38;5;14m[1mBUTTONS[0m[38;5;14m[1m [0m[38;5;14m[1mWITH[0m[38;5;14m[1m [0m[38;5;14m[1mA[0m[38;5;14m[1m [0m[38;5;14m[1mMOBILE[0m[38;5;14m[1m [0m[38;5;14m[1mPWN2OWN[0m[38;5;14m[1m [0m[38;5;14m[1mEXPLOIT[0m[38;5;12m [39m[38;5;12m(https://www.zerodayinitiative.com/blog/2018/2/12/pushing-webkits-buttons-with-a-mobile-pwn2own-exploit)[39m[38;5;12m [39m[38;5;12m-[39m[38;5;12m [39m[38;5;12mWritten[39m[38;5;12m [39m[38;5;12mby[39m[38;5;12m [39m[38;5;14m[1m@wanderingglitch[0m[38;5;12m [39m
|
||||
[38;5;12m(https://twitter.com/wanderingglitch).[39m
|
||||
[38;5;12m- [39m[38;5;14m[1mLook Mom, I don't use Shellcode - Browser Exploitation Case Study for Internet Explorer 11[0m[38;5;12m (https://labs.bluefrostsecurity.de/files/Look_Mom_I_Dont_Use_Shellcode-WP.pdf) - Written by [39m[38;5;14m[1m@moritzj[0m[38;5;12m (http://twitter.com/moritzj).[39m
|
||||
[38;5;12m- [39m[38;5;14m[1mPUSHING WEBKIT'S BUTTONS WITH A MOBILE PWN2OWN EXPLOIT[0m[38;5;12m (https://www.zerodayinitiative.com/blog/2018/2/12/pushing-webkits-buttons-with-a-mobile-pwn2own-exploit) - Written by [39m[38;5;14m[1m@wanderingglitch[0m[38;5;12m (https://twitter.com/wanderingglitch).[39m
|
||||
[38;5;12m- [39m[38;5;14m[1mA Methodical Approach to Browser Exploitation[0m[38;5;12m (https://blog.ret2.io/2018/06/05/pwn2own-2018-exploit-development/) - Written by [39m[38;5;14m[1mRET2 SYSTEMS, INC[0m[38;5;12m (https://blog.ret2.io/).[39m
|
||||
[38;5;12m-[39m[38;5;12m [39m[38;5;14m[1mCVE-2017-2446[0m[38;5;14m[1m [0m[38;5;14m[1mor[0m[38;5;14m[1m [0m[38;5;14m[1mJSC::JSGlobalObject::isHavingABadTime.[0m[38;5;12m [39m[38;5;12m(https://doar-e.github.io/blog/2018/07/14/cve-2017-2446-or-jscjsglobalobjectishavingabadtime/)[39m[38;5;12m [39m[38;5;12m-[39m[38;5;12m [39m[38;5;12mWritten[39m[38;5;12m [39m[38;5;12mby[39m[38;5;12m [39m[38;5;14m[1mDiary[0m[38;5;14m[1m [0m[38;5;14m[1mof[0m[38;5;14m[1m [0m[38;5;14m[1ma[0m[38;5;14m[1m [0m[38;5;14m[1mreverse-engineer[0m[38;5;12m [39m
|
||||
[38;5;12m(https://doar-e.github.io/).[39m
|
||||
[38;5;12m- [39m[38;5;14m[1mCVE-2017-2446 or JSC::JSGlobalObject::isHavingABadTime.[0m[38;5;12m (https://doar-e.github.io/blog/2018/07/14/cve-2017-2446-or-jscjsglobalobjectishavingabadtime/) - Written by [39m[38;5;14m[1mDiary of a reverse-engineer[0m[38;5;12m (https://doar-e.github.io/).[39m
|
||||
[38;5;12m- [39m[38;5;14m[1mCLEANLY ESCAPING THE CHROME SANDBOX[0m[38;5;12m (https://theori.io/research/escaping-chrome-sandbox) - Written by [39m[38;5;14m[1m@tjbecker_[0m[38;5;12m (https://twitter.com/tjbecker_).[39m
|
||||
[38;5;12m-[39m[38;5;12m [39m[38;5;14m[1mA[0m[38;5;14m[1m [0m[38;5;14m[1mMethodical[0m[38;5;14m[1m [0m[38;5;14m[1mApproach[0m[38;5;14m[1m [0m[38;5;14m[1mto[0m[38;5;14m[1m [0m[38;5;14m[1mBrowser[0m[38;5;14m[1m [0m[38;5;14m[1mExploitation[0m[38;5;12m [39m[38;5;12m(https://blog.ret2.io/2018/06/05/pwn2own-2018-exploit-development/)[39m[38;5;12m [39m[38;5;12m-[39m[38;5;12m [39m[38;5;12mWritten[39m[38;5;12m [39m[38;5;12mby[39m[38;5;12m [39m[38;5;14m[1m@PatrickBiernat[0m[38;5;12m [39m[38;5;12m(https://twitter.com/PatrickBiernat),[39m[38;5;12m [39m[38;5;14m[1m@gaasedelen[0m[38;5;12m [39m
|
||||
[38;5;12m(https://twitter.com/gaasedelen)[39m[38;5;12m [39m[38;5;12mand[39m[38;5;12m [39m[38;5;14m[1m@itszn13[0m[38;5;12m [39m[38;5;12m(https://twitter.com/itszn13).[39m
|
||||
[38;5;12m-[39m[38;5;12m [39m[38;5;14m[1mA[0m[38;5;14m[1m [0m[38;5;14m[1mMethodical[0m[38;5;14m[1m [0m[38;5;14m[1mApproach[0m[38;5;14m[1m [0m[38;5;14m[1mto[0m[38;5;14m[1m [0m[38;5;14m[1mBrowser[0m[38;5;14m[1m [0m[38;5;14m[1mExploitation[0m[38;5;12m [39m[38;5;12m(https://blog.ret2.io/2018/06/05/pwn2own-2018-exploit-development/)[39m[38;5;12m [39m[38;5;12m-[39m[38;5;12m [39m[38;5;12mWritten[39m[38;5;12m [39m[38;5;12mby[39m[38;5;12m [39m[38;5;14m[1m@PatrickBiernat[0m[38;5;12m [39m[38;5;12m(https://twitter.com/PatrickBiernat),[39m[38;5;12m [39m[38;5;14m[1m@gaasedelen[0m[38;5;12m [39m[38;5;12m(https://twitter.com/gaasedelen)[39m[38;5;12m [39m[38;5;12mand[39m[38;5;12m [39m
|
||||
[38;5;14m[1m@itszn13[0m[38;5;12m [39m[38;5;12m(https://twitter.com/itszn13).[39m
|
||||
|
||||
[38;2;255;187;0m[4mPoCs[0m
|
||||
|
||||
@@ -661,8 +636,7 @@
|
||||
[38;5;12m- [39m[38;5;14m[1mxray[0m[38;5;12m (https://github.com/evilsocket/xray) - XRay is a tool for recon, mapping and OSINT gathering from public networks by [39m[38;5;14m[1m@evilsocket[0m[38;5;12m (https://github.com/evilsocket).[39m
|
||||
[38;5;12m- [39m[38;5;14m[1mgitrob[0m[38;5;12m (https://github.com/michenriksen/Gitrob) - Reconnaissance tool for GitHub organizations by [39m[38;5;14m[1m@michenriksen[0m[38;5;12m (https://github.com/michenriksen).[39m
|
||||
[38;5;12m- [39m[38;5;14m[1mGSIL[0m[38;5;12m (https://github.com/FeeiCN/GSIL) - Github Sensitive Information Leakage(Github敏感信息泄露)by [39m[38;5;14m[1m@FeeiCN[0m[38;5;12m (https://github.com/FeeiCN).[39m
|
||||
[38;5;12m-[39m[38;5;12m [39m[38;5;14m[1mraven[0m[38;5;12m [39m[38;5;12m(https://github.com/0x09AL/raven)[39m[38;5;12m [39m[38;5;12m-[39m[38;5;12m [39m[38;5;12mraven[39m[38;5;12m [39m[38;5;12mis[39m[38;5;12m [39m[38;5;12ma[39m[38;5;12m [39m[38;5;12mLinkedin[39m[38;5;12m [39m[38;5;12minformation[39m[38;5;12m [39m[38;5;12mgathering[39m[38;5;12m [39m[38;5;12mtool[39m[38;5;12m [39m[38;5;12mthat[39m[38;5;12m [39m[38;5;12mcan[39m[38;5;12m [39m[38;5;12mbe[39m[38;5;12m [39m[38;5;12mused[39m[38;5;12m [39m[38;5;12mby[39m[38;5;12m [39m[38;5;12mpentesters[39m[38;5;12m [39m[38;5;12mto[39m[38;5;12m [39m[38;5;12mgather[39m[38;5;12m [39m[38;5;12minformation[39m[38;5;12m [39m[38;5;12mabout[39m[38;5;12m [39m[38;5;12man[39m[38;5;12m [39m[38;5;12morganization[39m[38;5;12m [39m[38;5;12memployees[39m[38;5;12m [39m[38;5;12musing[39m[38;5;12m [39m[38;5;12mLinkedin[39m[38;5;12m [39m[38;5;12mby[39m[38;5;12m [39m[38;5;14m[1m@0x09AL[0m[38;5;12m [39m
|
||||
[38;5;12m(https://github.com/0x09AL).[39m
|
||||
[38;5;12m- [39m[38;5;14m[1mraven[0m[38;5;12m (https://github.com/0x09AL/raven) - raven is a Linkedin information gathering tool that can be used by pentesters to gather information about an organization employees using Linkedin by [39m[38;5;14m[1m@0x09AL[0m[38;5;12m (https://github.com/0x09AL).[39m
|
||||
[38;5;12m- [39m[38;5;14m[1mReconDog[0m[38;5;12m (https://github.com/s0md3v/ReconDog) - Reconnaissance Swiss Army Knife by [39m[38;5;14m[1m@s0md3v[0m[38;5;12m (https://github.com/s0md3v).[39m
|
||||
[38;5;12m- [39m[38;5;14m[1mDatabases - start.me[0m[38;5;12m (https://start.me/p/QRENnO/databases) - Various databases which you can use for your OSINT research by [39m[38;5;14m[1m@technisette[0m[38;5;12m (https://twitter.com/technisette).[39m
|
||||
[38;5;12m- [39m[38;5;14m[1mpeoplefindThor[0m[38;5;12m (https://peoplefindthor.dk/) - the easy way to find people on Facebook by [39m[38;5;14m[1mpostkassen[0m[38;5;12m (mailto:postkassen@oejvind.dk?subject=peoplefindthor.dk comments).[39m
|
||||
@@ -681,10 +655,8 @@
|
||||
[38;5;12m- [39m[38;5;14m[1mAQUATONE[0m[38;5;12m (https://github.com/michenriksen/aquatone) - Tool for Domain Flyovers by [39m[38;5;14m[1m@michenriksen[0m[38;5;12m (https://github.com/michenriksen).[39m
|
||||
[38;5;12m- [39m[38;5;14m[1mdomain_analyzer[0m[38;5;12m (https://github.com/eldraco/domain_analyzer) - Analyze the security of any domain by finding all the information possible by [39m[38;5;14m[1m@eldraco[0m[38;5;12m (https://github.com/eldraco).[39m
|
||||
[38;5;12m- [39m[38;5;14m[1mVirusTotal domain information[0m[38;5;12m (https://www.virustotal.com/en/documentation/searching/#getting-domain-information) - Searching for domain information by [39m[38;5;14m[1mVirusTotal[0m[38;5;12m (https://www.virustotal.com/).[39m
|
||||
[38;5;12m-[39m[38;5;12m [39m[38;5;14m[1mCertificate[0m[38;5;14m[1m [0m[38;5;14m[1mTransparency[0m[38;5;12m [39m[38;5;12m(https://github.com/google/certificate-transparency)[39m[38;5;12m [39m[38;5;12m-[39m[38;5;12m [39m[38;5;12mGoogle's[39m[38;5;12m [39m[38;5;12mCertificate[39m[38;5;12m [39m[38;5;12mTransparency[39m[38;5;12m [39m[38;5;12mproject[39m[38;5;12m [39m[38;5;12mfixes[39m[38;5;12m [39m[38;5;12mseveral[39m[38;5;12m [39m[38;5;12mstructural[39m[38;5;12m [39m[38;5;12mflaws[39m[38;5;12m [39m[38;5;12min[39m[38;5;12m [39m[38;5;12mthe[39m[38;5;12m [39m[38;5;12mSSL[39m[38;5;12m [39m[38;5;12mcertificate[39m[38;5;12m [39m[38;5;12msystem[39m[38;5;12m [39m[38;5;12mby[39m[38;5;12m [39m[38;5;14m[1m@google[0m[38;5;12m [39m
|
||||
[38;5;12m(https://github.com/google).[39m
|
||||
[38;5;12m-[39m[38;5;12m [39m[38;5;14m[1mCertificate[0m[38;5;14m[1m [0m[38;5;14m[1mSearch[0m[38;5;12m [39m[38;5;12m(https://crt.sh/)[39m[38;5;12m [39m[38;5;12m-[39m[38;5;12m [39m[38;5;12mEnter[39m[38;5;12m [39m[38;5;12man[39m[38;5;12m [39m[38;5;12mIdentity[39m[38;5;12m [39m[38;5;12m(Domain[39m[38;5;12m [39m[38;5;12mName,[39m[38;5;12m [39m[38;5;12mOrganization[39m[38;5;12m [39m[38;5;12mName,[39m[38;5;12m [39m[38;5;12metc),[39m[38;5;12m [39m[38;5;12ma[39m[38;5;12m [39m[38;5;12mCertificate[39m[38;5;12m [39m[38;5;12mFingerprint[39m[38;5;12m [39m[38;5;12m(SHA-1[39m[38;5;12m [39m[38;5;12mor[39m[38;5;12m [39m[38;5;12mSHA-256)[39m[38;5;12m [39m[38;5;12mor[39m[38;5;12m [39m[38;5;12ma[39m[38;5;12m [39m[38;5;12mcrt.sh[39m[38;5;12m [39m[38;5;12mID[39m[38;5;12m [39m[38;5;12mto[39m[38;5;12m [39m[38;5;12msearch[39m[38;5;12m [39m[38;5;12mcertificate(s)[39m[38;5;12m [39m[38;5;12mby[39m[38;5;12m [39m[38;5;14m[1m@crtsh[0m[38;5;12m [39m
|
||||
[38;5;12m(https://github.com/crtsh).[39m
|
||||
[38;5;12m- [39m[38;5;14m[1mCertificate Transparency[0m[38;5;12m (https://github.com/google/certificate-transparency) - Google's Certificate Transparency project fixes several structural flaws in the SSL certificate system by [39m[38;5;14m[1m@google[0m[38;5;12m (https://github.com/google).[39m
|
||||
[38;5;12m- [39m[38;5;14m[1mCertificate Search[0m[38;5;12m (https://crt.sh/) - Enter an Identity (Domain Name, Organization Name, etc), a Certificate Fingerprint (SHA-1 or SHA-256) or a crt.sh ID to search certificate(s) by [39m[38;5;14m[1m@crtsh[0m[38;5;12m (https://github.com/crtsh).[39m
|
||||
[38;5;12m- [39m[38;5;14m[1mGSDF[0m[38;5;12m (https://github.com/We5ter/GSDF) - Domain searcher named GoogleSSLdomainFinder by [39m[38;5;14m[1m@We5ter[0m[38;5;12m (https://github.com/We5ter).[39m
|
||||
|
||||
|
||||
@@ -702,8 +674,7 @@
|
||||
[38;5;12m- [39m[38;5;14m[1mdomato[0m[38;5;12m (https://github.com/google/domato) - DOM fuzzer by [39m[38;5;14m[1m@google[0m[38;5;12m (https://github.com/google).[39m
|
||||
[38;5;12m- [39m[38;5;14m[1mFuzzDB[0m[38;5;12m (https://github.com/fuzzdb-project/fuzzdb) - Dictionary of attack patterns and primitives for black-box application fault injection and resource discovery.[39m
|
||||
[38;5;12m- [39m[38;5;14m[1mdirhunt[0m[38;5;12m (https://github.com/Nekmo/dirhunt) - Web crawler optimized for searching and analyzing the directory structure of a site by [39m[38;5;14m[1m@nekmo[0m[38;5;12m (https://github.com/Nekmo).[39m
|
||||
[38;5;12m-[39m[38;5;12m [39m[38;5;14m[1mssltest[0m[38;5;12m [39m[38;5;12m(https://www.ssllabs.com/ssltest/)[39m[38;5;12m [39m[38;5;12m-[39m[38;5;12m [39m[38;5;12mOnline[39m[38;5;12m [39m[38;5;12mservice[39m[38;5;12m [39m[38;5;12mthat[39m[38;5;12m [39m[38;5;12mperforms[39m[38;5;12m [39m[38;5;12ma[39m[38;5;12m [39m[38;5;12mdeep[39m[38;5;12m [39m[38;5;12manalysis[39m[38;5;12m [39m[38;5;12mof[39m[38;5;12m [39m[38;5;12mthe[39m[38;5;12m [39m[38;5;12mconfiguration[39m[38;5;12m [39m[38;5;12mof[39m[38;5;12m [39m[38;5;12many[39m[38;5;12m [39m[38;5;12mSSL[39m[38;5;12m [39m[38;5;12mweb[39m[38;5;12m [39m[38;5;12mserver[39m[38;5;12m [39m[38;5;12mon[39m[38;5;12m [39m[38;5;12mthe[39m[38;5;12m [39m[38;5;12mpublic[39m[38;5;12m [39m[38;5;12minternet.[39m[38;5;12m [39m[38;5;12mProvided[39m[38;5;12m [39m[38;5;12mby[39m[38;5;12m [39m[38;5;14m[1mQualys[0m[38;5;14m[1m [0m[38;5;14m[1mSSL[0m[38;5;14m[1m [0m[38;5;14m[1mLabs[0m[38;5;12m [39m
|
||||
[38;5;12m(https://www.ssllabs.com).[39m
|
||||
[38;5;12m- [39m[38;5;14m[1mssltest[0m[38;5;12m (https://www.ssllabs.com/ssltest/) - Online service that performs a deep analysis of the configuration of any SSL web server on the public internet. Provided by [39m[38;5;14m[1mQualys SSL Labs[0m[38;5;12m (https://www.ssllabs.com).[39m
|
||||
[38;5;12m- [39m[38;5;14m[1mfuzz.txt[0m[38;5;12m (https://github.com/Bo0oM/fuzz.txt) - Potentially dangerous files by [39m[38;5;14m[1m@Bo0oM[0m[38;5;12m (https://github.com/Bo0oM).[39m
|
||||
|
||||
|
||||
@@ -784,8 +755,8 @@
|
||||
[38;5;12m- [39m[38;5;14m[1mmalware-jail[0m[38;5;12m (https://github.com/HynekPetrak/malware-jail) - Sandbox for semi-automatic Javascript malware analysis, deobfuscation and payload extraction by [39m[38;5;14m[1m@HynekPetrak[0m[38;5;12m (https://github.com/HynekPetrak).[39m
|
||||
[38;5;12m- [39m[38;5;14m[1mrepo-supervisor[0m[38;5;12m (https://github.com/auth0/repo-supervisor) - Scan your code for security misconfiguration, search for passwords and secrets.[39m
|
||||
[38;5;12m- [39m[38;5;14m[1mbXSS[0m[38;5;12m (https://github.com/LewisArdern/bXSS) - bXSS is a simple Blind XSS application adapted from [39m[38;5;14m[1mcure53.de/m[0m[38;5;12m (https://cure53.de/m) by [39m[38;5;14m[1m@LewisArdern[0m[38;5;12m (https://github.com/LewisArdern).[39m
|
||||
[38;5;12m-[39m[38;5;12m [39m[38;5;14m[1mOpenRASP[0m[38;5;12m [39m[38;5;12m(https://github.com/baidu/openrasp)[39m[38;5;12m [39m[38;5;12m-[39m[38;5;12m [39m[38;5;12mAn[39m[38;5;12m [39m[38;5;12mopen[39m[38;5;12m [39m[38;5;12msource[39m[38;5;12m [39m[38;5;12mRASP[39m[38;5;12m [39m[38;5;12msolution[39m[38;5;12m [39m[38;5;12mactively[39m[38;5;12m [39m[38;5;12mmaintained[39m[38;5;12m [39m[38;5;12mby[39m[38;5;12m [39m[38;5;12mBaidu[39m[38;5;12m [39m[38;5;12mInc.[39m[38;5;12m [39m[38;5;12mWith[39m[38;5;12m [39m[38;5;12mcontext-aware[39m[38;5;12m [39m[38;5;12mdetection[39m[38;5;12m [39m[38;5;12malgorithm[39m[38;5;12m [39m[38;5;12mthe[39m[38;5;12m [39m[38;5;12mproject[39m[38;5;12m [39m[38;5;12machieved[39m[38;5;12m [39m[38;5;12mnearly[39m[38;5;12m [39m[38;5;12mno[39m[38;5;12m [39m[38;5;12mfalse[39m[38;5;12m [39m[38;5;12mpositives.[39m[38;5;12m [39m[38;5;12mAnd[39m[38;5;12m [39m[38;5;12mless[39m[38;5;12m [39m
|
||||
[38;5;12mthan[39m[38;5;12m [39m[38;5;12m3%[39m[38;5;12m [39m[38;5;12mperformance[39m[38;5;12m [39m[38;5;12mreduction[39m[38;5;12m [39m[38;5;12mis[39m[38;5;12m [39m[38;5;12mobserved[39m[38;5;12m [39m[38;5;12munder[39m[38;5;12m [39m[38;5;12mheavy[39m[38;5;12m [39m[38;5;12mserver[39m[38;5;12m [39m[38;5;12mload.[39m
|
||||
[38;5;12m-[39m[38;5;12m [39m[38;5;14m[1mOpenRASP[0m[38;5;12m [39m[38;5;12m(https://github.com/baidu/openrasp)[39m[38;5;12m [39m[38;5;12m-[39m[38;5;12m [39m[38;5;12mAn[39m[38;5;12m [39m[38;5;12mopen[39m[38;5;12m [39m[38;5;12msource[39m[38;5;12m [39m[38;5;12mRASP[39m[38;5;12m [39m[38;5;12msolution[39m[38;5;12m [39m[38;5;12mactively[39m[38;5;12m [39m[38;5;12mmaintained[39m[38;5;12m [39m[38;5;12mby[39m[38;5;12m [39m[38;5;12mBaidu[39m[38;5;12m [39m[38;5;12mInc.[39m[38;5;12m [39m[38;5;12mWith[39m[38;5;12m [39m[38;5;12mcontext-aware[39m[38;5;12m [39m[38;5;12mdetection[39m[38;5;12m [39m[38;5;12malgorithm[39m[38;5;12m [39m[38;5;12mthe[39m[38;5;12m [39m[38;5;12mproject[39m[38;5;12m [39m[38;5;12machieved[39m[38;5;12m [39m[38;5;12mnearly[39m[38;5;12m [39m[38;5;12mno[39m[38;5;12m [39m[38;5;12mfalse[39m[38;5;12m [39m[38;5;12mpositives.[39m[38;5;12m [39m[38;5;12mAnd[39m[38;5;12m [39m[38;5;12mless[39m[38;5;12m [39m[38;5;12mthan[39m[38;5;12m [39m[38;5;12m3%[39m[38;5;12m [39m[38;5;12mperformance[39m[38;5;12m [39m
|
||||
[38;5;12mreduction[39m[38;5;12m [39m[38;5;12mis[39m[38;5;12m [39m[38;5;12mobserved[39m[38;5;12m [39m[38;5;12munder[39m[38;5;12m [39m[38;5;12mheavy[39m[38;5;12m [39m[38;5;12mserver[39m[38;5;12m [39m[38;5;12mload.[39m
|
||||
[38;5;12m- [39m[38;5;14m[1mGuardRails[0m[38;5;12m (https://github.com/apps/guardrails) - A GitHub App that provides security feedback in Pull Requests.[39m
|
||||
|
||||
|
||||
@@ -793,8 +764,7 @@
|
||||
|
||||
[38;5;12m- [39m[38;5;14m[1mDOMPurify[0m[38;5;12m (https://github.com/cure53/DOMPurify) - DOM-only, super-fast, uber-tolerant XSS sanitizer for HTML, MathML and SVG by [39m[38;5;14m[1mCure53[0m[38;5;12m (https://cure53.de/).[39m
|
||||
[38;5;12m- [39m[38;5;14m[1mjs-xss[0m[38;5;12m (https://github.com/leizongmin/js-xss) - Sanitize untrusted HTML (to prevent XSS) with a configuration specified by a Whitelist by [39m[38;5;14m[1m@leizongmin[0m[38;5;12m (https://github.com/leizongmin).[39m
|
||||
[38;5;12m-[39m[38;5;12m [39m[38;5;14m[1mAcra[0m[38;5;12m [39m[38;5;12m(https://github.com/cossacklabs/acra)[39m[38;5;12m [39m[38;5;12m-[39m[38;5;12m [39m[38;5;12mClient-side[39m[38;5;12m [39m[38;5;12mencryption[39m[38;5;12m [39m[38;5;12mengine[39m[38;5;12m [39m[38;5;12mfor[39m[38;5;12m [39m[38;5;12mSQL[39m[38;5;12m [39m[38;5;12mdatabases,[39m[38;5;12m [39m[38;5;12mwith[39m[38;5;12m [39m[38;5;12mstrong[39m[38;5;12m [39m[38;5;12mselective[39m[38;5;12m [39m[38;5;12mencryption,[39m[38;5;12m [39m[38;5;12mSQL[39m[38;5;12m [39m[38;5;12minjections[39m[38;5;12m [39m[38;5;12mprevention[39m[38;5;12m [39m[38;5;12mand[39m[38;5;12m [39m[38;5;12mintrusion[39m[38;5;12m [39m[38;5;12mdetection[39m[38;5;12m [39m[38;5;12mby[39m[38;5;12m [39m[38;5;14m[1m@cossacklabs[0m[38;5;12m [39m
|
||||
[38;5;12m(https://www.cossacklabs.com/).[39m
|
||||
[38;5;12m- [39m[38;5;14m[1mAcra[0m[38;5;12m (https://github.com/cossacklabs/acra) - Client-side encryption engine for SQL databases, with strong selective encryption, SQL injections prevention and intrusion detection by [39m[38;5;14m[1m@cossacklabs[0m[38;5;12m (https://www.cossacklabs.com/).[39m
|
||||
[38;5;12m- [39m[38;5;14m[1mCsper[0m[38;5;12m (https://csper.io) - A set of tools for building/evaluating/monitoring content-security-policy to prevent/detect cross site scripting by [39m[38;5;14m[1mCsper[0m[38;5;12m (https://csper.io).[39m
|
||||
|
||||
|
||||
@@ -829,11 +799,11 @@
|
||||
|
||||
[38;2;255;187;0m[4mDNS Rebinding[0m
|
||||
|
||||
[38;5;12m-[39m[38;5;12m [39m[38;5;14m[1mDNS[0m[38;5;14m[1m [0m[38;5;14m[1mRebind[0m[38;5;14m[1m [0m[38;5;14m[1mToolkit[0m[38;5;12m [39m[38;5;12m(https://github.com/brannondorsey/dns-rebind-toolkit)[39m[38;5;12m [39m[38;5;12m-[39m[38;5;12m [39m[38;5;12mDNS[39m[38;5;12m [39m[38;5;12mRebind[39m[38;5;12m [39m[38;5;12mToolkit[39m[38;5;12m [39m[38;5;12mis[39m[38;5;12m [39m[38;5;12ma[39m[38;5;12m [39m[38;5;12mfrontend[39m[38;5;12m [39m[38;5;12mJavaScript[39m[38;5;12m [39m[38;5;12mframework[39m[38;5;12m [39m[38;5;12mfor[39m[38;5;12m [39m[38;5;12mdeveloping[39m[38;5;12m [39m[38;5;12mDNS[39m[38;5;12m [39m[38;5;12mRebinding[39m[38;5;12m [39m[38;5;12mexploits[39m[38;5;12m [39m[38;5;12magainst[39m[38;5;12m [39m[38;5;12mvulnerable[39m[38;5;12m [39m[38;5;12mhosts[39m[38;5;12m [39m[38;5;12mand[39m[38;5;12m [39m[38;5;12mservices[39m[38;5;12m [39m[38;5;12mon[39m[38;5;12m [39m[38;5;12ma[39m
|
||||
[38;5;12mlocal[39m[38;5;12m [39m[38;5;12marea[39m[38;5;12m [39m[38;5;12mnetwork[39m[38;5;12m [39m[38;5;12m(LAN)[39m[38;5;12m [39m[38;5;12mby[39m[38;5;12m [39m[38;5;14m[1m@brannondorsey[0m[38;5;12m [39m[38;5;12m(https://github.com/brannondorsey)[39m
|
||||
[38;5;12m-[39m[38;5;12m [39m[38;5;14m[1mDNS[0m[38;5;14m[1m [0m[38;5;14m[1mRebind[0m[38;5;14m[1m [0m[38;5;14m[1mToolkit[0m[38;5;12m [39m[38;5;12m(https://github.com/brannondorsey/dns-rebind-toolkit)[39m[38;5;12m [39m[38;5;12m-[39m[38;5;12m [39m[38;5;12mDNS[39m[38;5;12m [39m[38;5;12mRebind[39m[38;5;12m [39m[38;5;12mToolkit[39m[38;5;12m [39m[38;5;12mis[39m[38;5;12m [39m[38;5;12ma[39m[38;5;12m [39m[38;5;12mfrontend[39m[38;5;12m [39m[38;5;12mJavaScript[39m[38;5;12m [39m[38;5;12mframework[39m[38;5;12m [39m[38;5;12mfor[39m[38;5;12m [39m[38;5;12mdeveloping[39m[38;5;12m [39m[38;5;12mDNS[39m[38;5;12m [39m[38;5;12mRebinding[39m[38;5;12m [39m[38;5;12mexploits[39m[38;5;12m [39m[38;5;12magainst[39m[38;5;12m [39m[38;5;12mvulnerable[39m[38;5;12m [39m[38;5;12mhosts[39m[38;5;12m [39m[38;5;12mand[39m[38;5;12m [39m[38;5;12mservices[39m[38;5;12m [39m[38;5;12mon[39m[38;5;12m [39m[38;5;12ma[39m[38;5;12m [39m[38;5;12mlocal[39m[38;5;12m [39m[38;5;12marea[39m[38;5;12m [39m[38;5;12mnetwork[39m[38;5;12m [39m[38;5;12m(LAN)[39m
|
||||
[38;5;12mby[39m[38;5;12m [39m[38;5;14m[1m@brannondorsey[0m[38;5;12m [39m[38;5;12m(https://github.com/brannondorsey)[39m
|
||||
[38;5;12m- [39m[38;5;14m[1mdref[0m[38;5;12m (https://github.com/mwrlabs/dref) - DNS Rebinding Exploitation Framework. Dref does the heavy-lifting for DNS rebinding by [39m[38;5;14m[1m@mwrlabs[0m[38;5;12m (https://github.com/mwrlabs)[39m
|
||||
[38;5;12m-[39m[38;5;12m [39m[38;5;14m[1mSingularity[0m[38;5;14m[1m [0m[38;5;14m[1mof[0m[38;5;14m[1m [0m[38;5;14m[1mOrigin[0m[38;5;12m [39m[38;5;12m(https://github.com/nccgroup/singularity)[39m[38;5;12m [39m[38;5;12m-[39m[38;5;12m [39m[38;5;12mIt[39m[38;5;12m [39m[38;5;12mincludes[39m[38;5;12m [39m[38;5;12mthe[39m[38;5;12m [39m[38;5;12mnecessary[39m[38;5;12m [39m[38;5;12mcomponents[39m[38;5;12m [39m[38;5;12mto[39m[38;5;12m [39m[38;5;12mrebind[39m[38;5;12m [39m[38;5;12mthe[39m[38;5;12m [39m[38;5;12mIP[39m[38;5;12m [39m[38;5;12maddress[39m[38;5;12m [39m[38;5;12mof[39m[38;5;12m [39m[38;5;12mthe[39m[38;5;12m [39m[38;5;12mattack[39m[38;5;12m [39m[38;5;12mserver[39m[38;5;12m [39m[38;5;12mDNS[39m[38;5;12m [39m[38;5;12mname[39m[38;5;12m [39m[38;5;12mto[39m[38;5;12m [39m[38;5;12mthe[39m[38;5;12m [39m[38;5;12mtarget[39m[38;5;12m [39m[38;5;12mmachine's[39m[38;5;12m [39m[38;5;12mIP[39m[38;5;12m [39m[38;5;12maddress[39m[38;5;12m [39m[38;5;12mand[39m[38;5;12m [39m[38;5;12mto[39m[38;5;12m [39m[38;5;12mserve[39m[38;5;12m [39m
|
||||
[38;5;12mattack[39m[38;5;12m [39m[38;5;12mpayloads[39m[38;5;12m [39m[38;5;12mto[39m[38;5;12m [39m[38;5;12mexploit[39m[38;5;12m [39m[38;5;12mvulnerable[39m[38;5;12m [39m[38;5;12msoftware[39m[38;5;12m [39m[38;5;12mon[39m[38;5;12m [39m[38;5;12mthe[39m[38;5;12m [39m[38;5;12mtarget[39m[38;5;12m [39m[38;5;12mmachine[39m[38;5;12m [39m[38;5;12mby[39m[38;5;12m [39m[38;5;14m[1m@nccgroup[0m[38;5;12m [39m[38;5;12m(https://github.com/nccgroup)[39m
|
||||
[38;5;12m-[39m[38;5;12m [39m[38;5;14m[1mSingularity[0m[38;5;14m[1m [0m[38;5;14m[1mof[0m[38;5;14m[1m [0m[38;5;14m[1mOrigin[0m[38;5;12m [39m[38;5;12m(https://github.com/nccgroup/singularity)[39m[38;5;12m [39m[38;5;12m-[39m[38;5;12m [39m[38;5;12mIt[39m[38;5;12m [39m[38;5;12mincludes[39m[38;5;12m [39m[38;5;12mthe[39m[38;5;12m [39m[38;5;12mnecessary[39m[38;5;12m [39m[38;5;12mcomponents[39m[38;5;12m [39m[38;5;12mto[39m[38;5;12m [39m[38;5;12mrebind[39m[38;5;12m [39m[38;5;12mthe[39m[38;5;12m [39m[38;5;12mIP[39m[38;5;12m [39m[38;5;12maddress[39m[38;5;12m [39m[38;5;12mof[39m[38;5;12m [39m[38;5;12mthe[39m[38;5;12m [39m[38;5;12mattack[39m[38;5;12m [39m[38;5;12mserver[39m[38;5;12m [39m[38;5;12mDNS[39m[38;5;12m [39m[38;5;12mname[39m[38;5;12m [39m[38;5;12mto[39m[38;5;12m [39m[38;5;12mthe[39m[38;5;12m [39m[38;5;12mtarget[39m[38;5;12m [39m[38;5;12mmachine's[39m[38;5;12m [39m[38;5;12mIP[39m[38;5;12m [39m[38;5;12maddress[39m[38;5;12m [39m[38;5;12mand[39m[38;5;12m [39m[38;5;12mto[39m[38;5;12m [39m[38;5;12mserve[39m[38;5;12m [39m[38;5;12mattack[39m[38;5;12m [39m[38;5;12mpayloads[39m[38;5;12m [39m[38;5;12mto[39m[38;5;12m [39m[38;5;12mexploit[39m[38;5;12m [39m
|
||||
[38;5;12mvulnerable[39m[38;5;12m [39m[38;5;12msoftware[39m[38;5;12m [39m[38;5;12mon[39m[38;5;12m [39m[38;5;12mthe[39m[38;5;12m [39m[38;5;12mtarget[39m[38;5;12m [39m[38;5;12mmachine[39m[38;5;12m [39m[38;5;12mby[39m[38;5;12m [39m[38;5;14m[1m@nccgroup[0m[38;5;12m [39m[38;5;12m(https://github.com/nccgroup)[39m
|
||||
[38;5;12m- [39m[38;5;14m[1mWhonow DNS Server[0m[38;5;12m (https://github.com/brannondorsey/whonow) - A malicious DNS server for executing DNS Rebinding attacks on the fly by [39m[38;5;14m[1m@brannondorsey[0m[38;5;12m (https://github.com/brannondorsey)[39m
|
||||
|
||||
|
||||
@@ -880,8 +850,8 @@
|
||||
|
||||
[38;2;255;187;0m[4mApplication[0m
|
||||
|
||||
[38;5;12m-[39m[38;5;12m [39m[38;5;14m[1mOWASP[0m[38;5;14m[1m [0m[38;5;14m[1mJuice[0m[38;5;14m[1m [0m[38;5;14m[1mShop[0m[38;5;12m [39m[38;5;12m(https://github.com/bkimminich/juice-shop)[39m[38;5;12m [39m[38;5;12m-[39m[38;5;12m [39m[38;5;12mProbably[39m[38;5;12m [39m[38;5;12mthe[39m[38;5;12m [39m[38;5;12mmost[39m[38;5;12m [39m[38;5;12mmodern[39m[38;5;12m [39m[38;5;12mand[39m[38;5;12m [39m[38;5;12msophisticated[39m[38;5;12m [39m[38;5;12minsecure[39m[38;5;12m [39m[38;5;12mweb[39m[38;5;12m [39m[38;5;12mapplication[39m[38;5;12m [39m[38;5;12m-[39m[38;5;12m [39m[38;5;12mWritten[39m[38;5;12m [39m[38;5;12mby[39m[38;5;12m [39m[38;5;14m[1m@bkimminich[0m[38;5;12m [39m[38;5;12m(https://github.com/bkimminich)[39m[38;5;12m [39m[38;5;12mand[39m[38;5;12m [39m[38;5;12mthe[39m[38;5;12m [39m
|
||||
[38;5;14m[1m@owasp_juiceshop[0m[38;5;12m [39m[38;5;12m(https://twitter.com/owasp_juiceshop)[39m[38;5;12m [39m[38;5;12mteam.[39m
|
||||
[38;5;12m-[39m[38;5;12m [39m[38;5;14m[1mOWASP[0m[38;5;14m[1m [0m[38;5;14m[1mJuice[0m[38;5;14m[1m [0m[38;5;14m[1mShop[0m[38;5;12m [39m[38;5;12m(https://github.com/bkimminich/juice-shop)[39m[38;5;12m [39m[38;5;12m-[39m[38;5;12m [39m[38;5;12mProbably[39m[38;5;12m [39m[38;5;12mthe[39m[38;5;12m [39m[38;5;12mmost[39m[38;5;12m [39m[38;5;12mmodern[39m[38;5;12m [39m[38;5;12mand[39m[38;5;12m [39m[38;5;12msophisticated[39m[38;5;12m [39m[38;5;12minsecure[39m[38;5;12m [39m[38;5;12mweb[39m[38;5;12m [39m[38;5;12mapplication[39m[38;5;12m [39m[38;5;12m-[39m[38;5;12m [39m[38;5;12mWritten[39m[38;5;12m [39m[38;5;12mby[39m[38;5;12m [39m[38;5;14m[1m@bkimminich[0m[38;5;12m [39m[38;5;12m(https://github.com/bkimminich)[39m[38;5;12m [39m[38;5;12mand[39m[38;5;12m [39m[38;5;12mthe[39m[38;5;12m [39m[38;5;14m[1m@owasp_juiceshop[0m[38;5;12m [39m
|
||||
[38;5;12m(https://twitter.com/owasp_juiceshop)[39m[38;5;12m [39m[38;5;12mteam.[39m
|
||||
[38;5;12m- [39m[38;5;14m[1mBadLibrary[0m[38;5;12m (https://github.com/SecureSkyTechnology/BadLibrary) - Vulnerable web application for training - Written by [39m[38;5;14m[1m@SecureSkyTechnology[0m[38;5;12m (https://github.com/SecureSkyTechnology).[39m
|
||||
[38;5;12m- [39m[38;5;14m[1mHackxor[0m[38;5;12m (http://hackxor.net/) - Realistic web application hacking game - Written by [39m[38;5;14m[1m@albinowax[0m[38;5;12m (https://twitter.com/albinowax).[39m
|
||||
[38;5;12m- [39m[38;5;14m[1mSELinux Game[0m[38;5;12m (http://selinuxgame.org/) - Learn SELinux by doing. Solve Puzzles, show skillz - Written by [39m[38;5;14m[1m@selinuxgame[0m[38;5;12m (https://twitter.com/selinuxgame).[39m
|
||||
@@ -916,8 +886,7 @@
|
||||
|
||||
[38;5;12m- [39m[38;5;14m[1mawesome-bug-bounty[0m[38;5;12m (https://github.com/djadmin/awesome-bug-bounty) - Comprehensive curated list of available Bug Bounty & Disclosure Programs and write-ups by [39m[38;5;14m[1m@djadmin[0m[38;5;12m (https://github.com/djadmin).[39m
|
||||
[38;5;12m- [39m[38;5;14m[1mbug-bounty-reference[0m[38;5;12m (https://github.com/ngalongc/bug-bounty-reference) - List of bug bounty write-up that is categorized by the bug nature by [39m[38;5;14m[1m@ngalongc[0m[38;5;12m (https://github.com/ngalongc).[39m
|
||||
[38;5;12m-[39m[38;5;12m [39m[38;5;14m[1mGoogle[0m[38;5;14m[1m [0m[38;5;14m[1mVRP[0m[38;5;14m[1m [0m[38;5;14m[1mand[0m[38;5;14m[1m [0m[38;5;14m[1mUnicorns[0m[38;5;12m [39m[38;5;12m(https://sites.google.com/site/bughunteruniversity/behind-the-scenes/presentations/google-vrp-and-unicorns)[39m[38;5;12m [39m[38;5;12m-[39m[38;5;12m [39m[38;5;12mWritten[39m[38;5;12m [39m[38;5;12mby[39m[38;5;12m [39m[38;5;14m[1mDaniel[0m[38;5;14m[1m [0m[38;5;14m[1mStelter-Gliese[0m[38;5;12m [39m
|
||||
[38;5;12m(https://www.linkedin.com/in/daniel-stelter-gliese-170a70a2/).[39m
|
||||
[38;5;12m- [39m[38;5;14m[1mGoogle VRP and Unicorns[0m[38;5;12m (https://sites.google.com/site/bughunteruniversity/behind-the-scenes/presentations/google-vrp-and-unicorns) - Written by [39m[38;5;14m[1mDaniel Stelter-Gliese[0m[38;5;12m (https://www.linkedin.com/in/daniel-stelter-gliese-170a70a2/).[39m
|
||||
[38;5;12m- [39m[38;5;14m[1mBrute Forcing Your Facebook Email and Phone Number[0m[38;5;12m (http://pwndizzle.blogspot.jp/2014/02/brute-forcing-your-facebook-email-and.html) - Written by [39m[38;5;14m[1mPwnDizzle[0m[38;5;12m (http://pwndizzle.blogspot.jp/).[39m
|
||||
[38;5;12m- [39m[38;5;14m[1mPentest + Exploit dev Cheatsheet wallpaper[0m[38;5;12m (http://i.imgur.com/Mr9pvq9.jpg) - Penetration Testing and Exploit Dev CheatSheet.[39m
|
||||
[38;5;12m- [39m[38;5;14m[1mThe Definitive Security Data Science and Machine Learning Guide[0m[38;5;12m (http://www.covert.io/the-definitive-security-datascience-and-machinelearning-guide/) - Written by JASON TROS.[39m
|
||||
@@ -933,25 +902,22 @@
|
||||
[38;5;12m(https://labs.detectify.com/2018/01/12/how-i-exploited-acme-tls-sni-01-issuing-lets-encrypt-ssl-certs-for-any-domain-using-shared-hosting/)[39m[38;5;12m [39m[38;5;12m-[39m[38;5;12m [39m[38;5;12mWritten[39m[38;5;12m [39m[38;5;12mby[39m[38;5;12m [39m[38;5;14m[1m@fransrosen[0m[38;5;12m [39m[38;5;12m(https://twitter.com/fransrosen).[39m
|
||||
[38;5;12m- [39m[38;5;14m[1mTL:DR: VPN leaks users’ IPs via WebRTC. I’ve tested seventy VPN providers and 16 of them leaks users’ IPs via WebRTC (23%)[0m[38;5;12m (https://voidsec.com/vpn-leak/) - Written by [39m[38;5;14m[1mvoidsec[0m[38;5;12m (https://voidsec.com/).[39m
|
||||
[38;5;12m- [39m[38;5;14m[1mEscape and Evasion Egressing Restricted Networks[0m[38;5;12m (https://www.optiv.com/blog/escape-and-evasion-egressing-restricted-networks) - Written by [39m[38;5;14m[1mChris Patten, Tom Steele[0m[38;5;12m (info@optiv.com).[39m
|
||||
[38;5;12m-[39m[38;5;12m [39m[38;5;14m[1mBe[0m[38;5;14m[1m [0m[38;5;14m[1mcareful[0m[38;5;14m[1m [0m[38;5;14m[1mwhat[0m[38;5;14m[1m [0m[38;5;14m[1myou[0m[38;5;14m[1m [0m[38;5;14m[1mcopy:[0m[38;5;14m[1m [0m[38;5;14m[1mInvisibly[0m[38;5;14m[1m [0m[38;5;14m[1minserting[0m[38;5;14m[1m [0m[38;5;14m[1musernames[0m[38;5;14m[1m [0m[38;5;14m[1minto[0m[38;5;14m[1m [0m[38;5;14m[1mtext[0m[38;5;14m[1m [0m[38;5;14m[1mwith[0m[38;5;14m[1m [0m[38;5;14m[1mZero-Width[0m[38;5;14m[1m [0m[38;5;14m[1mCharacters[0m[38;5;12m [39m
|
||||
[38;5;12m(https://medium.com/@umpox/be-careful-what-you-copy-invisibly-inserting-usernames-into-text-with-zero-width-characters-18b4e6f17b66)[39m[38;5;12m [39m[38;5;12m-[39m[38;5;12m [39m[38;5;12mWritten[39m[38;5;12m [39m[38;5;12mby[39m[38;5;12m [39m[38;5;14m[1m@umpox[0m[38;5;12m [39m[38;5;12m(https://medium.com/@umpox).[39m
|
||||
[38;5;12m-[39m[38;5;12m [39m[38;5;14m[1mBe[0m[38;5;14m[1m [0m[38;5;14m[1mcareful[0m[38;5;14m[1m [0m[38;5;14m[1mwhat[0m[38;5;14m[1m [0m[38;5;14m[1myou[0m[38;5;14m[1m [0m[38;5;14m[1mcopy:[0m[38;5;14m[1m [0m[38;5;14m[1mInvisibly[0m[38;5;14m[1m [0m[38;5;14m[1minserting[0m[38;5;14m[1m [0m[38;5;14m[1musernames[0m[38;5;14m[1m [0m[38;5;14m[1minto[0m[38;5;14m[1m [0m[38;5;14m[1mtext[0m[38;5;14m[1m [0m[38;5;14m[1mwith[0m[38;5;14m[1m [0m[38;5;14m[1mZero-Width[0m[38;5;14m[1m [0m[38;5;14m[1mCharacters[0m[38;5;12m [39m[38;5;12m(https://medium.com/@umpox/be-careful-what-you-copy-invisibly-inserting-usernames-into-text-with-zero-width-characters-18b4e6f17b66)[39m[38;5;12m [39m[38;5;12m-[39m[38;5;12m [39m
|
||||
[38;5;12mWritten[39m[38;5;12m [39m[38;5;12mby[39m[38;5;12m [39m[38;5;14m[1m@umpox[0m[38;5;12m [39m[38;5;12m(https://medium.com/@umpox).[39m
|
||||
[38;5;12m- [39m[38;5;14m[1mDomato Fuzzer's Generation Engine Internals[0m[38;5;12m (https://www.sigpwn.io/blog/2018/4/14/domato-fuzzers-generation-engine-internals) - Written by [39m[38;5;14m[1msigpwn[0m[38;5;12m (https://www.sigpwn.io/).[39m
|
||||
[38;5;12m- [39m[38;5;14m[1mCSS Is So Overpowered It Can Deanonymize Facebook Users[0m[38;5;12m (https://www.evonide.com/side-channel-attacking-browsers-through-css3-features/) - Written by [39m[38;5;14m[1mRuslan Habalov[0m[38;5;12m (https://www.evonide.com/).[39m
|
||||
[38;5;12m-[39m[38;5;12m [39m[38;5;14m[1mIntroduction[0m[38;5;14m[1m [0m[38;5;14m[1mto[0m[38;5;14m[1m [0m[38;5;14m[1mWeb[0m[38;5;14m[1m [0m[38;5;14m[1mApplication[0m[38;5;14m[1m [0m[38;5;14m[1mSecurity[0m[38;5;12m [39m[38;5;12m(https://www.slideshare.net/nragupathy/introduction-to-web-application-security-blackhoodie-us-2018)[39m[38;5;12m [39m[38;5;12m-[39m[38;5;12m [39m[38;5;12mWritten[39m[38;5;12m [39m[38;5;12mby[39m[38;5;12m [39m[38;5;14m[1m@itsC0rg1[0m[38;5;12m [39m[38;5;12m(https://twitter.com/itsC0rg1),[39m[38;5;12m [39m[38;5;14m[1m@jmkeads[0m[38;5;12m [39m
|
||||
[38;5;12m(https://twitter.com/jmkeads)[39m[38;5;12m [39m[38;5;12mand[39m[38;5;12m [39m[38;5;14m[1m@matir[0m[38;5;12m [39m[38;5;12m(https://twitter.com/matir).[39m
|
||||
[38;5;12m-[39m[38;5;12m [39m[38;5;14m[1mFinding[0m[38;5;14m[1m [0m[38;5;14m[1mThe[0m[38;5;14m[1m [0m[38;5;14m[1mReal[0m[38;5;14m[1m [0m[38;5;14m[1mOrigin[0m[38;5;14m[1m [0m[38;5;14m[1mIPs[0m[38;5;14m[1m [0m[38;5;14m[1mHiding[0m[38;5;14m[1m [0m[38;5;14m[1mBehind[0m[38;5;14m[1m [0m[38;5;14m[1mCloudFlare[0m[38;5;14m[1m [0m[38;5;14m[1mor[0m[38;5;14m[1m [0m[38;5;14m[1mTOR[0m[38;5;12m [39m[38;5;12m(https://www.secjuice.com/finding-real-ips-of-origin-servers-behind-cloudflare-or-tor/)[39m[38;5;12m [39m[38;5;12m-[39m[38;5;12m [39m[38;5;12mWritten[39m[38;5;12m [39m[38;5;12mby[39m[38;5;12m [39m[38;5;14m[1mPaul[0m[38;5;14m[1m [0m[38;5;14m[1mDannewitz[0m[38;5;12m [39m
|
||||
[38;5;12m(https://www.secjuice.com/author/paul-dannewitz/).[39m
|
||||
[38;5;12m- [39m[38;5;14m[1mFinding The Real Origin IPs Hiding Behind CloudFlare or TOR[0m[38;5;12m (https://www.secjuice.com/finding-real-ips-of-origin-servers-behind-cloudflare-or-tor/) - Written by [39m[38;5;14m[1mPaul Dannewitz[0m[38;5;12m (https://www.secjuice.com/author/paul-dannewitz/).[39m
|
||||
[38;5;12m- [39m[38;5;14m[1mWhy Facebook's api starts with a for loop[0m[38;5;12m (https://dev.to/antogarand/why-facebooks-api-starts-with-a-for-loop-1eob) - Written by [39m[38;5;14m[1m@AntoGarand[0m[38;5;12m (https://twitter.com/AntoGarand).[39m
|
||||
[38;5;12m-[39m[38;5;12m [39m[38;5;14m[1mHow[0m[38;5;14m[1m [0m[38;5;14m[1mI[0m[38;5;14m[1m [0m[38;5;14m[1mcould[0m[38;5;14m[1m [0m[38;5;14m[1mhave[0m[38;5;14m[1m [0m[38;5;14m[1mstolen[0m[38;5;14m[1m [0m[38;5;14m[1myour[0m[38;5;14m[1m [0m[38;5;14m[1mphotos[0m[38;5;14m[1m [0m[38;5;14m[1mfrom[0m[38;5;14m[1m [0m[38;5;14m[1mGoogle[0m[38;5;14m[1m [0m[38;5;14m[1m-[0m[38;5;14m[1m [0m[38;5;14m[1mmy[0m[38;5;14m[1m [0m[38;5;14m[1mfirst[0m[38;5;14m[1m [0m[38;5;14m[1m3[0m[38;5;14m[1m [0m[38;5;14m[1mbug[0m[38;5;14m[1m [0m[38;5;14m[1mbounty[0m[38;5;14m[1m [0m[38;5;14m[1mwriteups[0m[38;5;12m [39m[38;5;12m(https://blog.avatao.com/How-I-could-steal-your-photos-from-Google/)[39m[38;5;12m [39m[38;5;12m-[39m[38;5;12m [39m[38;5;12mWritten[39m[38;5;12m [39m[38;5;12mby[39m[38;5;12m [39m[38;5;14m[1m@gergoturcsanyi[0m[38;5;12m [39m
|
||||
[38;5;12m(https://twitter.com/gergoturcsanyi).[39m
|
||||
[38;5;12m- [39m[38;5;14m[1mHow I could have stolen your photos from Google - my first 3 bug bounty writeups[0m[38;5;12m (https://blog.avatao.com/How-I-could-steal-your-photos-from-Google/) - Written by [39m[38;5;14m[1m@gergoturcsanyi[0m[38;5;12m (https://twitter.com/gergoturcsanyi).[39m
|
||||
[38;5;12m- [39m[38;5;14m[1mAn example why NAT is NOT security[0m[38;5;12m (https://0day.work/an-example-why-nat-is-not-security/) - Written by [39m[38;5;14m[1m@0daywork[0m[38;5;12m (https://twitter.com/@0daywork).[39m
|
||||
[38;5;12m- [39m[38;5;14m[1mWEB APPLICATION PENETRATION TESTING NOTES[0m[38;5;12m (https://techvomit.net/web-application-penetration-testing-notes/) - Written by [39m[38;5;14m[1mJayson[0m[38;5;12m (https://techvomit.net/).[39m
|
||||
[38;5;12m- [39m[38;5;14m[1mHacking with a Heads Up Display[0m[38;5;12m (https://segment.com/blog/hacking-with-a-heads-up-display/) - Written by [39m[38;5;14m[1mDavid Scrobonia[0m[38;5;12m (https://segment.com/blog/authors/david-scrobonia/).[39m
|
||||
[38;5;12m- [39m[38;5;14m[1mAlexa Top 1 Million Security - Hacking the Big Ones[0m[38;5;12m (https://slashcrypto.org/data/itsecx2018.pdf) - Written by [39m[38;5;14m[1m@slashcrypto[0m[38;5;12m (https://twitter.com/slashcrypto).[39m
|
||||
[38;5;12m- [39m[38;5;14m[1mThe bug bounty program that changed my life[0m[38;5;12m (http://10degres.net/the-bug-bounty-program-that-changed-my-life/) - Written by [39m[38;5;14m[1mGwen[0m[38;5;12m (http://10degres.net/).[39m
|
||||
[38;5;12m- [39m[38;5;14m[1mList of bug bounty writeups[0m[38;5;12m (https://pentester.land/list-of-bug-bounty-writeups.html) - Written by [39m[38;5;14m[1mMariem[0m[38;5;12m (https://pentester.land/).[39m
|
||||
[38;5;12m-[39m[38;5;12m [39m[38;5;14m[1mImplications[0m[38;5;14m[1m [0m[38;5;14m[1mof[0m[38;5;14m[1m [0m[38;5;14m[1mLoading[0m[38;5;14m[1m [0m[38;5;14m[1m.NET[0m[38;5;14m[1m [0m[38;5;14m[1mAssemblies[0m[38;5;12m [39m[38;5;12m(https://threatvector.cylance.com/en_us/home/implications-of-loading-net-assemblies.html)[39m[38;5;12m [39m[38;5;12m-[39m[38;5;12m [39m[38;5;12mWritten[39m[38;5;12m [39m[38;5;12mby[39m[38;5;12m [39m[38;5;14m[1mBrian[0m[38;5;14m[1m [0m[38;5;14m[1mWallace[0m[38;5;12m [39m
|
||||
[38;5;12m(https://threatvector.cylance.com/en_us/contributors/brian-wallace.html).[39m
|
||||
[38;5;12m- [39m[38;5;14m[1mImplications of Loading .NET Assemblies[0m[38;5;12m (https://threatvector.cylance.com/en_us/home/implications-of-loading-net-assemblies.html) - Written by [39m[38;5;14m[1mBrian Wallace[0m[38;5;12m (https://threatvector.cylance.com/en_us/contributors/brian-wallace.html).[39m
|
||||
[38;5;12m- [39m[38;5;14m[1mWCTF2019: Gyotaku The Flag[0m[38;5;12m (https://westerns.tokyo/wctf2019-gtf/wctf2019-gtf-slides.pdf) - Written by [39m[38;5;14m[1m@t0nk42[0m[38;5;12m (https://twitter.com/t0nk42).[39m
|
||||
[38;5;12m- [39m[38;5;14m[1mHow we abused Slack's TURN servers to gain access to internal services[0m[38;5;12m (https://www.rtcsec.com/2020/04/01-slack-webrtc-turn-compromise/) - Written by [39m[38;5;14m[1m@sandrogauci[0m[38;5;12m (https://twitter.com/sandrogauci).[39m
|
||||
[38;5;12m- [39m[38;5;14m[1mDOS File Path Magic Tricks[0m[38;5;12m (https://medium.com/walmartlabs/dos-file-path-magic-tricks-5eda7a7a85fa) - Written by [39m[38;5;14m[1m@clr2of8[0m[38;5;12m (https://medium.com/@clr2of8).[39m
|
||||
|
||||
Reference in New Issue
Block a user