Files
awesome-awesomeness/html/websecurity.html
2025-07-18 22:22:32 +02:00

2088 lines
103 KiB
HTML
Raw Blame History

This file contains invisible Unicode characters
This file contains invisible Unicode characters that are indistinguishable to humans but may be processed differently by a computer. If you think that this is intentional, you can safely ignore this warning. Use the Escape button to reveal them.
This file contains Unicode characters that might be confused with other characters. If you think that this is intentional, you can safely ignore this warning. Use the Escape button to reveal them.
<blockquote>
<p>[!IMPORTANT]<br />
My Web Pentest Training is accepted by <a
href="https://www.blackhat.com/us-25/training/schedule/index.html#web-hacking-from--to--44516">Black
Hat 2025</a> 🎉🎉🎉 Please come and join the course with me 🤓</p>
<p>To celebrate this unforgettable moment (and sorry for not updating
the repo since a while), Ill do a complete revamp of all the contents
of this long-lasting repository in the coming weeks to catch up with the
knowledge and tricks that have happened over these years.</p>
</blockquote>
<h1 id="awesome-web-security-awesome">Awesome Web Security <a
href="https://github.com/sindresorhus/awesome"><img
src="https://cdn.rawgit.com/sindresorhus/awesome/d7305f38d29fed78fa85652e3a63e154dd8e8829/media/badge.svg"
alt="Awesome" /></a></h1>
<p><a
href="https://www.w3.org/TR/html5/"><img src="https://upload.wikimedia.org/wikipedia/commons/6/61/HTML5_logo_and_wordmark.svg" align="right" width="70"></a></p>
<blockquote>
<p>🐶 Curated list of Web Security materials and resources.</p>
</blockquote>
<p>Needless to say, most websites suffer from various types of bugs
which may eventually lead to vulnerabilities. Why would this happen so
often? There can be many factors involved including misconfiguration,
shortage of engineers security skills, etc. To combat this, here is a
curated list of Web Security materials and resources for learning
cutting edge penetration techniques, and I highly encourage you to read
this article “<a
href="https://portswigger.net/blog/so-you-want-to-be-a-web-security-researcher">So
you want to be a web security researcher?</a>” first.</p>
<p><em>Please read the <a href="CONTRIBUTING.md">contribution
guidelines</a> before contributing.</em></p>
<hr />
<p align="center">
<b>🌈 Want to strengthen your penetration skills?</b><br>I would
recommend playing some
<a href="https://github.com/apsdehal/awesome-ctf" target="_blank">awesome-ctf</a>s.
</p>
<hr />
<p>If you enjoy this awesome list and would like to support it, check
out my <a href="https://www.patreon.com/boik">Patreon</a> page
:)<br>Also, dont forget to check out my <a
href="https://github.com/qazbnm456">repos</a> 🐾 or say <em>hi</em> on
my <a href="https://twitter.com/qazbnm456">Twitter</a>!</p>
<h2 id="contents">Contents</h2>
<ul>
<li><a href="#digests">Digests</a></li>
<li><a href="#forums">Forums</a></li>
<li><a href="#intro">Introduction</a>
<ul>
<li><a href="#xss---cross-site-scripting">XSS</a></li>
<li><a href="#prototype-pollution">Prototype Pollution</a></li>
<li><a href="#csv-injection">CSV Injection</a></li>
<li><a href="#sql-injection">SQL Injection</a></li>
<li><a href="#command-injection">Command Injection</a></li>
<li><a href="#orm-injection">ORM Injection</a></li>
<li><a href="#ftp-injection">FTP Injection</a></li>
<li><a href="#xxe---xml-external-entity">XXE</a></li>
<li><a href="#csrf---cross-site-request-forgery">CSRF</a></li>
<li><a href="#clickjacking">Clickjacking</a></li>
<li><a href="#ssrf---server-side-request-forgery">SSRF</a></li>
<li><a href="#web-cache-poisoning">Web Cache Poisoning</a></li>
<li><a href="#relative-path-overwrite">Relative Path Overwrite</a></li>
<li><a href="#open-redirect">Open Redirect</a></li>
<li><a href="#saml">SAML</a></li>
<li><a href="#upload">Upload</a></li>
<li><a href="#rails">Rails</a></li>
<li><a href="#angularjs">AngularJS</a></li>
<li><a href="#reactjs">ReactJS</a></li>
<li><a href="#ssltls">SSL/TLS</a></li>
<li><a href="#webmail">Webmail</a></li>
<li><a href="#nfs">NFS</a></li>
<li><a href="#aws">AWS</a></li>
<li><a href="#azure">Azure</a></li>
<li><a href="#fingerprint">Fingerprint</a></li>
<li><a href="#sub-domain-enumeration">Sub Domain Enumeration</a></li>
<li><a href="#crypto">Crypto</a></li>
<li><a href="#web-shell">Web Shell</a></li>
<li><a href="#osint">OSINT</a></li>
<li><a href="#dns-rebinding">DNS Rebinding</a></li>
<li><a href="#deserialization">Deserialization</a></li>
<li><a href="#oauth">OAuth</a></li>
<li><a href="#jwt">JWT</a></li>
</ul></li>
<li><a href="#evasions">Evasions</a>
<ul>
<li><a href="#evasions-xxe">XXE</a></li>
<li><a href="#evasions-csp">CSP</a></li>
<li><a href="#evasions-waf">WAF</a></li>
<li><a href="#evasions-jsmvc">JSMVC</a></li>
<li><a href="#evasions-authentication">Authentication</a></li>
</ul></li>
<li><a href="#tricks">Tricks</a>
<ul>
<li><a href="#tricks-csrf">CSRF</a></li>
<li><a href="#tricks-clickjacking">Clickjacking</a></li>
<li><a href="#tricks-rce">Remote Code Execution</a></li>
<li><a href="#tricks-xss">XSS</a></li>
<li><a href="#tricks-sql-injection">SQL Injection</a></li>
<li><a href="#tricks-nosql-injection">NoSQL Injection</a></li>
<li><a href="#tricks-ftp-injection">FTP Injection</a></li>
<li><a href="#tricks-xxe">XXE</a></li>
<li><a href="#tricks-ssrf">SSRF</a></li>
<li><a href="#tricks-web-cache-poisoning">Web Cache Poisoning</a></li>
<li><a href="#tricks-header-injection">Header Injection</a></li>
<li><a href="#tricks-url">URL</a></li>
<li><a href="#tricks-deserialization">Deserialization</a></li>
<li><a href="#tricks-oauth">OAuth</a></li>
<li><a href="#tricks-others">Others</a></li>
</ul></li>
<li><a href="#browser-exploitation">Browser Exploitation</a></li>
<li><a href="#pocs">PoCs</a>
<ul>
<li><a href="#pocs-database">Database</a></li>
</ul></li>
<li><a href="#cheetsheets">Cheetsheets</a></li>
<li><a href="#tools">Tools</a>
<ul>
<li><a href="#tools-auditing">Auditing</a></li>
<li><a href="#tools-command-injection">Command Injection</a></li>
<li><a href="#tools-reconnaissance">Reconnaissance</a>
<ul>
<li><a href="#tools-osint">OSINT</a></li>
<li><a href="#tools-sub-domain-enumeration">Sub Domain
Enumeration</a></li>
</ul></li>
<li><a href="#tools-code-generating">Code Generating</a></li>
<li><a href="#tools-fuzzing">Fuzzing</a></li>
<li><a href="#tools-scanning">Scanning</a></li>
<li><a href="#tools-penetration-testing">Penetration Testing</a></li>
<li><a href="#tools-leaking">Leaking</a></li>
<li><a href="#tools-offensive">Offensive</a>
<ul>
<li><a href="#tools-xss">XSS</a></li>
<li><a href="#tools-sql-injection">SQL Injection</a></li>
<li><a href="#tools-template-injection">Template Injection</a></li>
<li><a href="#tools-xxe">XXE</a></li>
<li><a href="#tools-csrf">CSRF</a></li>
<li><a href="#tools-ssrf">SSRF</a></li>
</ul></li>
<li><a href="#tools-detecting">Detecting</a></li>
<li><a href="#tools-preventing">Preventing</a></li>
<li><a href="#tools-proxy">Proxy</a></li>
<li><a href="#tools-webshell">Webshell</a></li>
<li><a href="#tools-disassembler">Disassembler</a></li>
<li><a href="#tools-decompiler">Decompiler</a></li>
<li><a href="#tools-dns-rebinding">DNS Rebinding</a></li>
<li><a href="#tools-others">Others</a></li>
</ul></li>
<li><a href="#social-engineering-database">Social Engineering
Database</a></li>
<li><a href="#blogs">Blogs</a></li>
<li><a href="#twitter-users">Twitter Users</a></li>
<li><a href="#practices">Practices</a>
<ul>
<li><a href="#practices-application">Application</a></li>
<li><a href="#practices-aws">AWS</a></li>
<li><a href="#practices-xss">XSS</a></li>
<li><a href="#practices-modsecurity">ModSecurity / OWASP ModSecurity
Core Rule Set</a></li>
</ul></li>
<li><a href="#community">Community</a></li>
<li><a href="#miscellaneous">Miscellaneous</a></li>
</ul>
<h2 id="digests">Digests</h2>
<ul>
<li><a href="https://www.hacker101.com/">Hacker101</a> - Written by <a
href="https://www.hackerone.com/start-hacking">hackerone</a>.</li>
<li><a href="https://portswigger.net/daily-swig">The Daily Swig - Web
security digest</a> - Written by <a
href="https://portswigger.net/">PortSwigger</a>.</li>
<li><a href="https://www.netsparker.com/blog/web-security/">Web
Application Security Zone by Netsparker</a> - Written by <a
href="https://www.netsparker.com/">Netsparker</a>.</li>
<li><a
href="https://www.sneakymonkey.net/2017/04/23/infosec-newbie/">Infosec
Newbie</a> - Written by <a href="https://www.sneakymonkey.net/">Mark
Robinson</a>.</li>
<li><a href="https://bitvijays.github.io/">The Magic of Learning</a> -
Written by <a href="https://bitvijays.github.io/aboutme.html"><span
class="citation" data-cites="bitvijays">@bitvijays</span></a>.</li>
<li><a href="https://trailofbits.github.io/ctf/">CTF Field Guide</a> -
Written by <a href="https://www.trailofbits.com/">Trail of
Bits</a>.</li>
<li><a
href="https://github.com/swisskyrepo/PayloadsAllTheThings/">PayloadsAllTheThings</a>
- Written by <a href="https://github.com/swisskyrepo"><span
class="citation" data-cites="swisskyrepo">@swisskyrepo</span></a>.</li>
<li><a href="https://tldrsec.com/">tl;dr sec</a> - Weekly summary of top
security tools, blog posts, and security research.</li>
</ul>
<h2 id="forums">Forums</h2>
<ul>
<li><a href="http://www.phrack.org/">Phrack Magazine</a> - Ezine written
by and for hackers.</li>
<li><a href="https://thehackernews.com/">The Hacker News</a> - Security
in a serious way.</li>
<li><a href="https://securityweekly.com/">Security Weekly</a> - The
security podcast network.</li>
<li><a href="http://www.theregister.co.uk/">The Register</a> - Biting
the hand that feeds IT.</li>
<li><a href="https://www.darkreading.com/Default.asp">Dark Reading</a> -
Connecting The Information Security Community.</li>
<li><a href="http://en.hackdig.com/">HackDig</a> - Dig high-quality web
security articles for hacker.</li>
</ul>
<p><a name="intro"></a> ## Introduction</p>
<p><a name="xss"></a> ### XSS - Cross-Site Scripting</p>
<ul>
<li><a
href="https://www.google.com/intl/sw/about/appsecurity/learning/xss/">Cross-Site
Scripting Application Security Google</a> - Written by <a
href="https://www.google.com/">Google</a>.</li>
<li><a href="https://github.com/cure53/H5SC">H5SC</a> - Written by <a
href="https://github.com/cure53"><span class="citation"
data-cites="cure53">@cure53</span></a>.</li>
<li><a href="https://github.com/s0md3v/AwesomeXSS">AwesomeXSS</a> -
Written by <a href="https://github.com/s0md3v"><span class="citation"
data-cites="s0md3v">@s0md3v</span></a>.</li>
<li><a href="https://github.com/LucaBongiorni/XSS.png">XSS.png</a> -
Written by <span class="citation"
data-cites="jackmasa">@jackmasa</span>.</li>
<li><a href="https://excess-xss.com/">C.XSS Guide</a> - Written by <a
href="https://github.com/JakobKallin"><span class="citation"
data-cites="JakobKallin">@JakobKallin</span></a> and <a
href="https://www.linkedin.com/in/irenelobovalbuena/">Irene Lobo
Valbuena</a>.</li>
<li><a
href="http://www.paulosyibelo.com/2018/06/the-big-bad-wolf-xss-and-maintaining.html">THE
BIG BAD WOLF - XSS AND MAINTAINING ACCESS</a> - Written by <a
href="http://www.paulosyibelo.com/">Paulos Yibelo</a>.</li>
<li><a
href="https://github.com/payloadbox/xss-payload-list">payloadbox/xss-payload-list</a>
- Written by <a href="https://github.com/payloadbox"><span
class="citation" data-cites="payloadbox">@payloadbox</span></a>.</li>
<li><a
href="https://github.com/swisskyrepo/PayloadsAllTheThings/tree/master/XSS%20Injection">PayloadsAllTheThings
- XSS Injection</a> - Written by <a
href="https://github.com/swisskyrepo"><span class="citation"
data-cites="swisskyrepo">@swisskyrepo</span></a>.</li>
</ul>
<p><a name="prototype-pollution"></a> ### Prototype Pollution</p>
<ul>
<li><a
href="https://github.com/HoLyVieR/prototype-pollution-nsec18/blob/master/paper/JavaScript_prototype_pollution_attack_in_NodeJS.pdf">Prototype
pollution attack in NodeJS application</a> - Written by <a
href="https://github.com/HoLyVieR"><span class="citation"
data-cites="HoLyVieR">@HoLyVieR</span></a>.</li>
<li><a
href="https://research.securitum.com/prototype-pollution-rce-kibana-cve-2019-7609/">Exploiting
prototype pollution RCE in Kibana (CVE-2019-7609)</a> - Written by <a
href="https://twitter.com/securitymb"><span class="citation"
data-cites="securitymb">@securitymb</span></a>.</li>
<li><a href="https://blog.p6.is/Real-World-JS-1/">Real-world JS - 1</a>
- Written by <a href="https://twitter.com/po6ix"><span class="citation"
data-cites="po6ix">@po6ix</span></a>.</li>
</ul>
<p><a name="csv-injection"></a> ### CSV Injection</p>
<ul>
<li><a
href="https://news.webamooz.com/wp-content/uploads/bot/offsecmag/147.pdf">CSV
Injection -&gt; Meterpreter on Pornhub</a> - Written by <a
href="https://blog.zsec.uk/">Andy</a>.</li>
<li><a href="http://georgemauer.net/2017/10/07/csv-injection.html">The
Absurdly Underestimated Dangers of CSV Injection</a> - Written by <a
href="http://georgemauer.net/">George Mauer</a>.</li>
<li><a
href="https://github.com/swisskyrepo/PayloadsAllTheThings/tree/master/CSV%20Injection">PayloadsAllTheThings
- CSV Injection</a> - Written by <a
href="https://github.com/swisskyrepo"><span class="citation"
data-cites="swisskyrepo">@swisskyrepo</span></a>.</li>
</ul>
<p><a name="sql-injection"></a> ### SQL Injection</p>
<ul>
<li><a
href="https://www.netsparker.com/blog/web-security/sql-injection-cheat-sheet/">SQL
Injection Cheat Sheet</a> - Written by <a
href="https://twitter.com/netsparker"><span class="citation"
data-cites="netsparker">@netsparker</span></a>.</li>
<li><a href="https://sqlwiki.netspi.com/">SQL Injection Wiki</a> -
Written by <a href="https://www.netspi.com/">NETSPI</a>.</li>
<li><a href="https://websec.ca/kb/sql_injection">SQL Injection Pocket
Reference</a> - Written by <a href="https://twitter.com/LightOS"><span
class="citation" data-cites="LightOS">@LightOS</span></a>.</li>
<li><a
href="https://github.com/payloadbox/sql-injection-payload-list">payloadbox/sql-injection-payload-list</a>
- Written by <a href="https://github.com/payloadbox"><span
class="citation" data-cites="payloadbox">@payloadbox</span></a>.</li>
<li><a
href="https://github.com/swisskyrepo/PayloadsAllTheThings/tree/master/SQL%20Injection">PayloadsAllTheThings
- SQL Injection</a> - Written by <a
href="https://github.com/swisskyrepo"><span class="citation"
data-cites="swisskyrepo">@swisskyrepo</span></a>.</li>
</ul>
<p><a name="command-injection"></a> ### Command Injection</p>
<ul>
<li><a href="https://github.com/ruby/ruby/pull/1777">Potential command
injection in resolv.rb</a> - Written by <a
href="https://github.com/drigg3r"><span class="citation"
data-cites="drigg3r">@drigg3r</span></a>.</li>
<li><a
href="https://github.com/payloadbox/command-injection-payload-list">payloadbox/command-injection-payload-list</a>
- Written by <a href="https://github.com/payloadbox"><span
class="citation" data-cites="payloadbox">@payloadbox</span></a>.</li>
<li><a
href="https://github.com/swisskyrepo/PayloadsAllTheThings/tree/master/Command%20Injection">PayloadsAllTheThings
- Command Injection</a> - Written by <a
href="https://github.com/swisskyrepo"><span class="citation"
data-cites="swisskyrepo">@swisskyrepo</span></a>.</li>
</ul>
<p><a name="orm-injection"></a> ### ORM Injection</p>
<ul>
<li><a
href="http://blog.h3xstream.com/2014/02/hql-for-pentesters.html">HQL for
pentesters</a> - Written by <a
href="https://twitter.com/h3xstream/"><span class="citation"
data-cites="h3xstream">@h3xstream</span></a>.</li>
<li><a
href="https://www.synacktiv.com/ressources/hql2sql_sstic_2015_en.pdf">HQL
: Hyperinsane Query Language (or how to access the whole SQL API within
a HQL injection ?)</a> - Written by <a
href="https://twitter.com/_m0bius"><span class="citation"
data-cites="_m0bius">@_m0bius</span></a>.</li>
<li><a
href="https://www.slideshare.net/0ang3el/orm2pwn-exploiting-injections-in-hibernate-orm">ORM2Pwn:
Exploiting injections in Hibernate ORM</a> - Written by <a
href="https://0ang3el.blogspot.tw/">Mikhail Egorov</a>.</li>
<li><a href="https://www.slideshare.net/simone.onofri/orm-injection">ORM
Injection</a> - Written by <a href="https://onofri.org/">Simone
Onofri</a>.</li>
</ul>
<p><a name="ftp-injection"></a> ### FTP Injection</p>
<ul>
<li><a
href="http://blog.blindspotsecurity.com/2017/02/advisory-javapython-ftp-injections.html">Advisory:
Java/Python FTP Injections Allow for Firewall Bypass</a> - Written by <a
href="https://plus.google.com/105917618099766831589">Timothy
Morgan</a>.</li>
<li><a href="https://shiftordie.de/blog/2017/02/18/smtp-over-xxe/">SMTP
over XXE how to send emails using Javas XML parser</a> - Written by
<a href="https://shiftordie.de/">Alexander Klink</a>.</li>
</ul>
<p><a name="xxe"></a> ### XXE - XML eXternal Entity</p>
<ul>
<li><a href="https://phonexicum.github.io/infosec/xxe.html">XXE</a> -
Written by <a href="https://twitter.com/phonexicum"><span
class="citation" data-cites="phonexicum">@phonexicum</span></a>.</li>
<li><a href="https://portswigger.net/web-security/xxe">XML external
entity (XXE) injection</a> - Written by <a
href="https://portswigger.net/">portswigger</a>.</li>
<li><a
href="https://www.vsecurity.com/download/publications/XMLDTDEntityAttacks.pdf">XML
Schema, DTD, and Entity Attacks</a> - Written by <a
href="https://twitter.com/ecbftw">Timothy D. Morgan</a> and Omar Al
Ibrahim.</li>
<li><a
href="https://github.com/payloadbox/xxe-injection-payload-list">payloadbox/xxe-injection-payload-list</a>
- Written by <a href="https://github.com/payloadbox"><span
class="citation" data-cites="payloadbox">@payloadbox</span></a></li>
<li><a
href="https://github.com/swisskyrepo/PayloadsAllTheThings/tree/master/XXE%20Injection">PayloadsAllTheThings
- XXE Injection</a> - Written by various contributors.</li>
</ul>
<p><a name="csrf"></a> ### CSRF - Cross-Site Request Forgery</p>
<ul>
<li><a
href="https://medium.com/@jrozner/wiping-out-csrf-ded97ae7e83f">Wiping
Out CSRF</a> - Written by <a href="https://medium.com/@jrozner"><span
class="citation" data-cites="jrozner">@jrozner</span></a>.</li>
<li><a
href="https://github.com/swisskyrepo/PayloadsAllTheThings/tree/master/CSRF%20Injection">PayloadsAllTheThings
- CSRF Injection</a> - Written by <a
href="https://github.com/swisskyrepo"><span class="citation"
data-cites="swisskyrepo">@swisskyrepo</span></a>.</li>
</ul>
<p><a name="clickjacking"></a> ### Clickjacking</p>
<ul>
<li><a
href="https://www.imperva.com/learn/application-security/clickjacking/">Clickjacking</a>
- Written by <a href="https://www.imperva.com/">Imperva</a>.</li>
<li><a
href="https://github.com/cure53/Publications/blob/master/xfo-clickjacking.pdf?raw=true">X-Frame-Options:
All about Clickjacking?</a> - Written by <a
href="http://www.slideshare.net/x00mario">Mario Heiderich</a>.</li>
</ul>
<p><a name="ssrf"></a> ### SSRF - Server-Side Request Forgery</p>
<ul>
<li><a
href="https://docs.google.com/document/d/1v1TkWZtrhzRLy0bYXBcdLUedXGb9njTNIJXa3u9akHM/edit">SSRF
bible. Cheatsheet</a> - Written by <a
href="https://wallarm.com/">Wallarm</a>.</li>
<li><a
href="https://github.com/swisskyrepo/PayloadsAllTheThings/tree/master/Server%20Side%20Request%20Forgery">PayloadsAllTheThings
- Server-Side Request Forgery</a> - Written by <a
href="https://github.com/swisskyrepo"><span class="citation"
data-cites="swisskyrepo">@swisskyrepo</span></a>.</li>
</ul>
<p><a name="web-cache-poisoning"></a> ### Web Cache Poisoning</p>
<ul>
<li><a
href="https://portswigger.net/blog/practical-web-cache-poisoning">Practical
Web Cache Poisoning</a> - Written by <a
href="https://twitter.com/albinowax"><span class="citation"
data-cites="albinowax">@albinowax</span></a>.</li>
<li><a
href="https://github.com/swisskyrepo/PayloadsAllTheThings/tree/master/Web%20Cache%20Deception">PayloadsAllTheThings
- Web Cache Deception</a> - Written by <a
href="https://github.com/swisskyrepo"><span class="citation"
data-cites="swisskyrepo">@swisskyrepo</span></a>.</li>
</ul>
<p><a name="relative-path-overwrite"></a> ### Relative Path
Overwrite</p>
<ul>
<li><a
href="https://blog.acolyer.org/2018/05/28/large-scale-analysis-of-style-injection-by-relative-path-overwrite/">Large-scale
analysis of style injection by relative path overwrite</a> - Written by
<a href="https://blog.acolyer.org/">The Morning Paper</a>.</li>
<li><a href="https://www.mbsd.jp/Whitepaper/rpo.pdf">MBSD Technical
Whitepaper - A few RPO exploitation techniques</a> - Written by <a
href="https://www.mbsd.jp/">Mitsui Bussan Secure Directions,
Inc.</a>.</li>
</ul>
<p><a name="open-redirect"></a> ### Open Redirect</p>
<ul>
<li><a href="https://s0cket7.com/open-redirect-vulnerability/">Open
Redirect Vulnerability</a> - Written by <a
href="https://s0cket7.com/">s0cket7</a>.</li>
<li><a
href="https://github.com/payloadbox/open-redirect-payload-list">payloadbox/open-redirect-payload-list</a>
- Written by <a href="https://github.com/payloadbox"><span
class="citation" data-cites="payloadbox">@payloadbox</span></a>.</li>
<li><a
href="https://github.com/swisskyrepo/PayloadsAllTheThings/tree/master/Open%20Redirect">PayloadsAllTheThings
- Open Redirect</a> - Written by <a
href="https://github.com/swisskyrepo"><span class="citation"
data-cites="swisskyrepo">@swisskyrepo</span></a>.</li>
</ul>
<p><a name="saml"></a> ### Security Assertion Markup Language (SAML)</p>
<ul>
<li><a
href="https://epi052.gitlab.io/notes-to-self/blog/2019-03-07-how-to-test-saml-a-methodology/">How
to Hunt Bugs in SAML; a Methodology - Part I</a> - Written by <a
href="https://epi052.gitlab.io/notes-to-self/">epi</a>.</li>
<li><a
href="https://epi052.gitlab.io/notes-to-self/blog/2019-03-13-how-to-test-saml-a-methodology-part-two/">How
to Hunt Bugs in SAML; a Methodology - Part II</a> - Written by <a
href="https://epi052.gitlab.io/notes-to-self/">epi</a>.</li>
<li><a
href="https://epi052.gitlab.io/notes-to-self/blog/2019-03-16-how-to-test-saml-a-methodology-part-three/">How
to Hunt Bugs in SAML; a Methodology - Part III</a> - Written by <a
href="https://epi052.gitlab.io/notes-to-self/">epi</a>.</li>
<li><a
href="https://github.com/swisskyrepo/PayloadsAllTheThings/tree/master/SAML%20Injection">PayloadsAllTheThings
- SAML Injection</a> - Written by <a
href="https://github.com/swisskyrepo"><span class="citation"
data-cites="swisskyrepo">@swisskyrepo</span></a>.</li>
</ul>
<p><a name="upload"></a> ### Upload</p>
<ul>
<li><a
href="https://www.exploit-db.com/docs/english/45074-file-upload-restrictions-bypass.pdf">File
Upload Restrictions Bypass</a> - Written by <a
href="https://www.exploit-db.com/author/?a=9381">Haboob Team</a>.</li>
<li><a
href="https://github.com/swisskyrepo/PayloadsAllTheThings/tree/master/Upload%20Insecure%20Files">PayloadsAllTheThings
- Upload Insecure Files</a> - Written by <a
href="https://github.com/swisskyrepo"><span class="citation"
data-cites="swisskyrepo">@swisskyrepo</span></a>.</li>
</ul>
<p><a name="rails"></a> ### Rails</p>
<ul>
<li><a href="https://hackmd.io/s/SkuTVw5O-">Rails Security - First
part</a> - Written by <a href="https://github.com/qazbnm456"><span
class="citation" data-cites="qazbnm456">@qazbnm456</span></a>.</li>
<li><a
href="https://github.com/brunofacca/zen-rails-security-checklist">Zen
Rails Security Checklist</a> - Written by <a
href="https://github.com/brunofacca"><span class="citation"
data-cites="brunofacca">@brunofacca</span></a>.</li>
<li><a href="https://rails-sqli.org">Rails SQL Injection</a> - Written
by <a href="https://github.com/presidentbeef"><span class="citation"
data-cites="presidentbeef">@presidentbeef</span></a>.</li>
<li><a href="http://guides.rubyonrails.org/security.html">Official Rails
Security Guide</a> - Written by <a href="https://rubyonrails.org/">Rails
team</a>.</li>
</ul>
<p><a name="angularjs"></a> ### AngularJS</p>
<ul>
<li><a
href="http://blog.portswigger.net/2016/01/xss-without-html-client-side-template.html">XSS
without HTML: Client-Side Template Injection with AngularJS</a> -
Written by <a
href="https://www.blogger.com/profile/10856178524811553475">Gareth
Heyes</a>.</li>
<li><a
href="http://blog.portswigger.net/2017/05/dom-based-angularjs-sandbox-escapes.html">DOM
based Angular sandbox escapes</a> - Written by <a
href="https://twitter.com/garethheyes"><span class="citation"
data-cites="garethheyes">@garethheyes</span></a></li>
</ul>
<p><a name="reactjs"></a> ### ReactJS</p>
<ul>
<li><a href="http://danlec.com/blog/xss-via-a-spoofed-react-element">XSS
via a spoofed React element</a> - Written by <a
href="http://danlec.com/">Daniel LeCheminant</a>.</li>
</ul>
<p><a name="ssl-tls"></a> ### SSL/TLS</p>
<ul>
<li><a
href="https://www.aptive.co.uk/blog/tls-ssl-security-testing/">SSL &amp;
TLS Penetration Testing</a> - Written by <a
href="https://www.aptive.co.uk/">APTIVE</a>.</li>
<li><a href="https://github.com/Hakky54/mutual-tls-ssl">Practical
introduction to SSL/TLS</a> - Written by <a
href="https://github.com/Hakky54"><span class="citation"
data-cites="Hakky54">@Hakky54</span></a>.</li>
</ul>
<p><a name="webmail"></a> ### Webmail</p>
<ul>
<li><a
href="https://blog.ripstech.com/2017/why-mail-is-dangerous-in-php/">Why
mail() is dangerous in PHP</a> - Written by <a
href="https://www.ripstech.com/">Robin Peraglie</a>.</li>
</ul>
<p><a name="nfs"></a> ### NFS</p>
<ul>
<li><a
href="https://pentestacademy.wordpress.com/2017/09/20/nfs/?t=1&amp;cn=ZmxleGlibGVfcmVjc18y&amp;refsrc=email&amp;iid=b34422ce15164e99a193fea0ccc7a02f&amp;uid=1959680352&amp;nid=244+289476616">NFS
| PENETRATION TESTING ACADEMY</a> - Written by <a
href="https://pentestacademy.wordpress.com/">PENETRATION
ACADEMY</a>.</li>
</ul>
<p><a name="aws"></a> ### AWS</p>
<ul>
<li><a
href="https://rhinosecuritylabs.com/penetration-testing/penetration-testing-aws-storage/">PENETRATION
TESTING AWS STORAGE: KICKING THE S3 BUCKET</a> - Written by Dwight
Hohnstein from <a href="https://rhinosecuritylabs.com/">Rhino Security
Labs</a>.</li>
<li><a
href="https://www.virtuesecurity.com/aws-penetration-testing-part-1-s3-buckets/">AWS
PENETRATION TESTING PART 1. S3 BUCKETS</a> - Written by <a
href="https://www.virtuesecurity.com/">VirtueSecurity</a>.</li>
<li><a
href="https://www.virtuesecurity.com/aws-penetration-testing-part-2-s3-iam-ec2/">AWS
PENETRATION TESTING PART 2. S3, IAM, EC2</a> - Written by <a
href="https://www.virtuesecurity.com/">VirtueSecurity</a>.</li>
<li><a
href="https://labs.f-secure.com/blog/misadventures-in-aws">Misadventures
in AWS</a> - Written by Christian Demko</li>
</ul>
<p><a name="azure"></a> ### Azure</p>
<ul>
<li><a
href="https://rhinosecuritylabs.com/cloud-security/common-azure-security-vulnerabilities/">Common
Azure Security Vulnerabilities and Misconfigurations</a> - Written by <a
href="https://twitter.com/rhinobenjamin"><span class="citation"
data-cites="rhinobenjamin">@rhinobenjamin</span></a>.</li>
<li><a
href="https://rhinosecuritylabs.com/azure/cloud-security-risks-part-1-azure-csv-injection-vulnerability/">Cloud
Security Risks (Part 1): Azure CSV Injection Vulnerability</a> - Written
by <a href="https://twitter.com/spengietz"><span class="citation"
data-cites="spengietz">@spengietz</span></a>.</li>
</ul>
<p><a name="fingerprint"></a> ### Fingerprint</p>
<p><a name="sub-domain-enumeration"></a> ### Sub Domain Enumeration</p>
<ul>
<li><a
href="https://blog.appsecco.com/a-penetration-testers-guide-to-sub-domain-enumeration-7d842d5570f6">A
penetration testers guide to sub-domain enumeration</a> - Written by <a
href="https://blog.appsecco.com/@yamakira_">Bharath</a>.</li>
<li><a
href="https://blog.sweepatic.com/art-of-subdomain-enumeration/">The Art
of Subdomain Enumeration</a> - Written by <a
href="https://blog.sweepatic.com/author/patrik/">Patrik Hudak</a>.</li>
</ul>
<p><a name="crypto"></a> ### Crypto</p>
<ul>
<li><a href="https://bettercrypto.org/">Applied Crypto Hardening</a> -
Written by <a href="https://bettercrypto.org/">The bettercrypto.org
Team</a>.</li>
<li><a
href="https://www.csoonline.com/article/3388647/what-is-a-side-channel-attack-how-these-end-runs-around-encryption-put-everyone-at-risk.html">What
is a Side-Channel Attack ?</a> - Written by <a
href="https://www.csoonline.com/author/J.M.-Porup/">J.M Porup</a>.</li>
</ul>
<p><a name="web-shell"></a> ### Web Shell</p>
<ul>
<li><a
href="https://www.tenable.com/blog/hunting-for-web-shells">Hunting for
Web Shells</a> - Written by <a
href="https://www.tenable.com/profile/jacob-baines">Jacob
Baines</a>.</li>
<li><a href="https://blog.netspi.com/hacking-with-jsp-shells/">Hacking
with JSP Shells</a> - Written by <a
href="https://twitter.com/_nullbind"><span class="citation"
data-cites="_nullbind">@_nullbind</span></a>.</li>
</ul>
<p><a name="osint"></a> ### OSINT</p>
<ul>
<li><a
href="https://medium.com/@s3yfullah/hacking-cryptocurrency-miners-with-osint-techniques-677bbb3e0157">Hacking
Cryptocurrency Miners with OSINT Techniques</a> - Written by <a
href="https://medium.com/@s3yfullah"><span class="citation"
data-cites="s3yfullah">@s3yfullah</span></a>.</li>
<li><a
href="https://www.slideshare.net/miaoski/osint-x-uccu-workshop-on-open-source-intelligence">OSINT
x UCCU Workshop on Open Source Intelligence</a> - Written by <a
href="https://www.slideshare.net/miaoski">Philippe Lin</a>.</li>
<li><a href="https://www.youtube.com/watch?v=fzd3zkAI_o4">102 Deep Dive
in the Dark Web OSINT Style Kirby Plessas</a> - Presented by <a
href="https://twitter.com/kirbstr"><span class="citation"
data-cites="kirbstr">@kirbstr</span></a>.</li>
<li><a
href="https://www.blurbiz.io/blog/the-most-complete-guide-to-finding-anyones-email">The
most complete guide to finding anyones email</a> - Written by <a
href="https://www.blurbiz.io/">Timur Daudpota</a>.</li>
</ul>
<p><a name="dns-rebinding"></a> ### DNS Rebinding</p>
<ul>
<li><a
href="https://medium.com/@brannondorsey/attacking-private-networks-from-the-internet-with-dns-rebinding-ea7098a2d325">Attacking
Private Networks from the Internet with DNS Rebinding</a> - Written by
<a href="https://medium.com/@brannondorsey"><span class="citation"
data-cites="brannondorsey">@brannondorsey</span></a></li>
<li><a
href="https://medium.com/@radekk/hackers-can-get-access-to-your-home-router-1ddadd12a7a7">Hacking
home routers from the Internet</a> - Written by <a
href="https://medium.com/@radekk"><span class="citation"
data-cites="radekk">@radekk</span></a></li>
</ul>
<p><a name="deserialization"></a> ### Deserialization</p>
<ul>
<li><a
href="https://foxglovesecurity.com/2015/11/06/what-do-weblogic-websphere-jboss-jenkins-opennms-and-your-application-have-in-common-this-vulnerability/">What
Do WebLogic, WebSphere, JBoss, Jenkins, OpenNMS, and Your Application
Have in Common? This Vulnerability.</a> - Written by <a
href="https://twitter.com/breenmachine"><span class="citation"
data-cites="breenmachine">@breenmachine</span></a>.</li>
<li><a href="https://www.youtube.com/watch?v=eDfGpu3iE4Q">Attacking .NET
deserialization</a> - Written by <a
href="https://twitter.com/pwntester"><span class="citation"
data-cites="pwntester">@pwntester</span></a>.</li>
<li><a href="https://www.youtube.com/watch?v=--6PiuvBGAU">.NET Roulette:
Exploiting Insecure Deserialization in Telerik UI</a> - Written by <a
href="https://twitter.com/noperator"><span class="citation"
data-cites="noperator">@noperator</span></a>.</li>
<li><a
href="https://pentest-tools.com/blog/exploit-dotnetnuke-cookie-deserialization/">How
to exploit the DotNetNuke Cookie Deserialization</a> - Written by <a
href="https://pentest-tools.com/blog/author/pentest-cristian/">CRISTIAN
CORNEA</a>.</li>
<li><a
href="https://www.synacktiv.com/en/publications/how-to-exploit-liferay-cve-2020-7961-quick-journey-to-poc.html">HOW
TO EXPLOIT LIFERAY CVE-2020-7961 : QUICK JOURNEY TO POC</a> - Written by
<a href="https://twitter.com/synacktiv"><span class="citation"
data-cites="synacktiv">@synacktiv</span></a>.</li>
</ul>
<p><a name="oauth"></a> ### OAuth</p>
<ul>
<li><a
href="https://pragmaticwebsecurity.com/courses/introduction-oauth-oidc.html">Introduction
to OAuth 2.0 and OpenID Connect</a> - Written by <a
href="https://twitter.com/PhilippeDeRyck"><span class="citation"
data-cites="PhilippeDeRyck">@PhilippeDeRyck</span></a>.</li>
<li><a
href="https://medium.com/securing/what-is-going-on-with-oauth-2-0-and-why-you-should-not-use-it-for-authentication-5f47597b2611">What
is going on with OAuth 2.0? And why you should not use it for
authentication.</a> - Written by <a
href="https://medium.com/@damianrusinek"><span class="citation"
data-cites="damianrusinek">@damianrusinek</span></a>.</li>
</ul>
<p><a name="jwt"></a> ### JWT</p>
<ul>
<li><a
href="https://r2c.dev/blog/2020/hardcoded-secrets-unverified-tokens-and-other-common-jwt-mistakes/">Hardcoded
secrets, unverified tokens, and other common JWT mistakes</a> - Written
by <a href="https://twitter.com/ermil0v"><span class="citation"
data-cites="ermil0v">@ermil0v</span></a>.</li>
</ul>
<h2 id="evasions">Evasions</h2>
<p><a name="evasions-xxe"></a> ### XXE</p>
<ul>
<li><a
href="https://twitter.com/SpiderSec/status/1191375472690528256">Bypass
Fix of OOB XXE Using Different encoding</a> - Written by <a
href="https://twitter.com/SpiderSec"><span class="citation"
data-cites="SpiderSec">@SpiderSec</span></a>.</li>
</ul>
<p><a name="evasions-csp"></a> ### CSP</p>
<ul>
<li><a href="https://github.com/w3c/webappsec-csp/issues/243">Any
protection against dynamic module import?</a> - Written by <a
href="https://twitter.com/@shhnjk"><span class="citation"
data-cites="shhnjk">@shhnjk</span></a>.</li>
<li><a
href="https://labs.detectify.com/2016/04/04/csp-bypassing-form-action-with-reflected-xss/">CSP:
bypassing form-action with reflected XSS</a> - Written by <a
href="https://labs.detectify.com/">Detectify Labs</a>.</li>
<li><a
href="http://www.paulosyibelo.com/2017/05/twitter-xss-csp-bypass.html">TWITTER
XSS + CSP BYPASS</a> - Written by <a
href="http://www.paulosyibelo.com/">Paulos Yibelo</a>.</li>
<li><a
href="https://lab.wallarm.com/how-to-trick-csp-in-letting-you-run-whatever-you-want-73cb5ff428aa">Neatly
bypassing CSP</a> - Written by <a
href="https://wallarm.com/">Wallarm</a>.</li>
<li><a
href="https://portswigger.net/blog/evading-csp-with-dom-based-dangling-markup">Evading
CSP with DOM-based dangling markup</a> - Written by <a
href="https://portswigger.net/">portswigger</a>.</li>
<li><a
href="https://githubengineering.com/githubs-csp-journey/">GitHubs CSP
journey</a> - Written by <a href="https://github.com/ptoomey3"><span
class="citation" data-cites="ptoomey3">@ptoomey3</span></a>.</li>
<li><a
href="https://githubengineering.com/githubs-post-csp-journey/">GitHubs
post-CSP journey</a> - Written by <a
href="https://github.com/ptoomey3"><span class="citation"
data-cites="ptoomey3">@ptoomey3</span></a>.</li>
</ul>
<p><a name="evasions-waf"></a> ### WAF</p>
<ul>
<li><a
href="https://medium.com/secjuice/waf-evasion-techniques-718026d693d8">Web
Application Firewall (WAF) Evasion Techniques</a> - Written by <a
href="https://twitter.com/secjuice"><span class="citation"
data-cites="secjuice">@secjuice</span></a>.</li>
<li><a
href="https://medium.com/secjuice/web-application-firewall-waf-evasion-techniques-2-125995f3e7b0">Web
Application Firewall (WAF) Evasion Techniques #2</a> - Written by <a
href="https://twitter.com/secjuice"><span class="citation"
data-cites="secjuice">@secjuice</span></a>.</li>
<li><a
href="https://buer.haus/2017/03/08/airbnb-when-bypassing-json-encoding-xss-filter-waf-csp-and-auditor-turns-into-eight-vulnerabilities/">Airbnb
When Bypassing JSON Encoding, XSS Filter, WAF, CSP, and Auditor turns
into Eight Vulnerabilities</a> - Written by <a
href="https://twitter.com/bbuerhaus"><span class="citation"
data-cites="Brett">@Brett</span> Buerhaus</a>.</li>
<li><a
href="https://medium.com/@d0znpp/how-to-bypass-libinjection-in-many-waf-ngwaf-1e2513453c0f">How
to bypass libinjection in many WAF/NGWAF</a> - Written by <a
href="https://medium.com/@d0znpp"><span class="citation"
data-cites="d0znpp">@d0znpp</span></a>.</li>
</ul>
<p><a name="evasions-jsmvc"></a> ### JSMVC</p>
<ul>
<li><a
href="http://www.slideshare.net/x00mario/jsmvcomfg-to-sternly-look-at-javascript-mvc-and-templating-frameworks">JavaScript
MVC and Templating Frameworks</a> - Written by <a
href="http://www.slideshare.net/x00mario">Mario Heiderich</a>.</li>
</ul>
<p><a name="evasions-authentication"></a> ### Authentication</p>
<ul>
<li><a
href="http://blog.malerisch.net/2017/04/trend-micro-threat-discovery-appliance-session-generation-authentication-bypass-cve-2016-8584.html">Trend
Micro Threat Discovery Appliance - Session Generation Authentication
Bypass (CVE-2016-8584)</a> - Written by <a
href="https://twitter.com/malerisch"><span class="citation"
data-cites="malerisch">@malerisch</span></a> and <a
href="https://twitter.com/steventseeley"><span class="citation"
data-cites="steventseeley">@steventseeley</span></a>.</li>
</ul>
<h2 id="tricks">Tricks</h2>
<p><a name="tricks-csrf"></a> ### CSRF</p>
<ul>
<li><a href="https://zhuanlan.zhihu.com/p/32716181">Neat tricks to
bypass CSRF-protection</a> - Written by <a
href="https://twosecurity.io/">Twosecurity</a>.</li>
<li><a
href="https://blog.appsecco.com/exploiting-csrf-on-json-endpoints-with-flash-and-redirects-681d4ad6b31b">Exploiting
CSRF on JSON endpoints with Flash and redirects</a> - Written by <a
href="https://blog.appsecco.com/@riyazwalikar"><span class="citation"
data-cites="riyazwalikar">@riyazwalikar</span></a>.</li>
<li><a href="https://github.com/dxa4481/cssInjection">Stealing CSRF
tokens with CSS injection (without iFrames)</a> - Written by <a
href="https://github.com/dxa4481"><span class="citation"
data-cites="dxa4481">@dxa4481</span></a>.</li>
<li><a
href="https://blog.securityevaluators.com/cracking-javas-rng-for-csrf-ea9cacd231d2">Cracking
Javas RNG for CSRF - Javax Faces and Why CSRF Token Randomness
Matters</a> - Written by <a
href="https://blog.securityevaluators.com/@rramgattie"><span
class="citation" data-cites="rramgattie">@rramgattie</span></a>.</li>
<li><a
href="https://medium.com/@_graphx/if-httponly-you-could-still-csrf-of-cors-you-can-5d7ee2c7443">If
HttpOnly You Could Still CSRF… Of CORS you can!</a> - Written by <a
href="https://twitter.com/GraphX"><span class="citation"
data-cites="GraphX">@GraphX</span></a>.</li>
</ul>
<p><a name="tricks-clickjacking"></a> ### Clickjacking</p>
<ul>
<li><a
href="https://medium.com/@raushanraj_65039/google-clickjacking-6a04132b918a">Clickjackings
in Google worth 14981.7$</a> - Written by <a
href="https://medium.com/@raushanraj_65039"><span class="citation"
data-cites="raushanraj_65039">@raushanraj_65039</span></a>.</li>
</ul>
<p><a name="tricks-rce"></a> ### Remote Code Execution</p>
<ul>
<li><a
href="https://www.thezdi.com/blog/2019/10/23/cve-2019-1306-are-you-my-index">CVE-2019-1306:
ARE YOU MY INDEX?</a> - Written by <a
href="https://twitter.com/yu5k3"><span class="citation"
data-cites="yu5k3">@yu5k3</span></a>.</li>
<li><a href="https://paper.seebug.org/910/">WebLogic RCE (CVE-2019-2725)
Debug Diary</a> - Written by Badcode@Knownsec 404 Team.</li>
<li><a
href="https://foxglovesecurity.com/2015/11/06/what-do-weblogic-websphere-jboss-jenkins-opennms-and-your-application-have-in-common-this-vulnerability/">What
Do WebLogic, WebSphere, JBoss, Jenkins, OpenNMS, and Your Application
Have in Common? This Vulnerability.</a> - Written by <a
href="https://twitter.com/@breenmachine"><span class="citation"
data-cites="breenmachine">@breenmachine</span></a>.</li>
<li><a
href="https://opsecx.com/index.php/2017/02/08/exploiting-node-js-deserialization-bug-for-remote-code-execution/">Exploiting
Node.js deserialization bug for Remote Code Execution</a> - Written by
<a
href="https://opsecx.com/index.php/author/ajinabraham/">OpSecX</a>.</li>
<li><a
href="https://www.ambionics.io/blog/drupal-services-module-rce">DRUPAL
7.X SERVICES MODULE UNSERIALIZE() TO RCE</a> - Written by <a
href="https://www.ambionics.io/">Ambionics Security</a>.</li>
<li><a href="https://capacitorset.github.io/mathjs/">How we exploited a
remote code execution vulnerability in math.js</a> - Written by <a
href="https://github.com/capacitorset"><span class="citation"
data-cites="capacitorset">@capacitorset</span></a>.</li>
<li><a
href="http://exablue.de/blog/2017-03-15-github-enterprise-remote-code-execution.html">GitHub
Enterprise Remote Code Execution</a> - Written by <a
href="https://github.com/iblue"><span class="citation"
data-cites="iblue">@iblue</span></a>.</li>
<li><a
href="https://blog.ripstech.com/2018/moodle-remote-code-execution/">Evil
Teacher: Code Injection in Moodle</a> - Written by <a
href="https://www.ripstech.com/">RIPS Technologies</a>.</li>
<li><a
href="http://blog.orange.tw/2017/07/how-i-chained-4-vulnerabilities-on.html">How
I Chained 4 vulnerabilities on GitHub Enterprise, From SSRF Execution
Chain to RCE!</a> - Written by <a
href="http://blog.orange.tw/">Orange</a>.</li>
<li><a
href="https://sites.google.com/site/testsitehacking/-36k-google-app-engine-rce">$36k
Google App Engine RCE</a> - Written by <a
href="https://sites.google.com/site/testsitehacking/">Ezequiel
Pereira</a>.</li>
<li><a
href="https://codewhitesec.blogspot.com/2018/05/poor-richfaces.html">Poor
RichFaces</a> - Written by <a href="https://www.code-white.com/">CODE
WHITE</a>.</li>
<li><a
href="https://blog.scrt.ch/2018/08/24/remote-code-execution-on-a-facebook-server/">Remote
Code Execution on a Facebook server</a> - Written by <a
href="https://twitter.com/blaklis_"><span class="citation"
data-cites="blaklis_">@blaklis_</span></a>.</li>
</ul>
<p><a name="tricks-xss"></a> ### XSS</p>
<ul>
<li><a
href="https://jlajara.gitlab.io/posts/2019/11/30/XSS_20_characters.html">Exploiting
XSS with 20 characters limitation</a> - Written by <a
href="https://jlajara.gitlab.io/">Jorge Lajara</a>.</li>
<li><a
href="https://www.hahwul.com/2019/11/upgrade-self-xss-to-exploitable-xss.html">Upgrade
self XSS to Exploitable XSS an 3 Ways Technic</a> - Written by <a
href="https://www.hahwul.com/">HAHWUL</a>.</li>
<li><a
href="https://portswigger.net/blog/xss-without-parentheses-and-semi-colons">XSS
without parentheses and semi-colons</a> - Written by <a
href="https://twitter.com/garethheyes"><span class="citation"
data-cites="garethheyes">@garethheyes</span></a>.</li>
<li><a
href="https://medium.com/bugbountywriteup/xss-auditor-the-protector-of-unprotected-f900a5e15b7b">XSS-Auditorthe
protector of unprotected and the deceiver of protected.</a> - Written by
<a href="https://medium.com/@terjanq"><span class="citation"
data-cites="terjanq">@terjanq</span></a>.</li>
<li><a href="https://hackerone.com/reports/293689">Query parameter
reordering causes redirect page to render unsafe URL</a> - Written by <a
href="https://hackerone.com/kenziy">kenziy</a>.</li>
<li><a href="http://www.slideshare.net/x00mario/es6-en">ECMAScript 6
from an Attackers Perspective - Breaking Frameworks, Sandboxes, and
everything else</a> - Written by <a
href="http://www.slideshare.net/x00mario">Mario Heiderich</a>.</li>
<li><a
href="https://medium.com/@marin_m/how-i-found-a-5-000-google-maps-xss-by-fiddling-with-protobuf-963ee0d9caff#.u50nrzhas">How
I found a $5,000 Google Maps XSS (by fiddling with Protobuf)</a> -
Written by <a href="https://medium.com/@marin_m"><span class="citation"
data-cites="marin_m">@marin_m</span></a>.</li>
<li><a
href="https://www.blackhat.com/docs/us-17/thursday/us-17-Lekies-Dont-Trust-The-DOM-Bypassing-XSS-Mitigations-Via-Script-Gadgets.pdf">DONT
TRUST THE DOM: BYPASSING XSS MITIGATIONS VIA SCRIPT GADGETS</a> -
Written by <a href="https://twitter.com/slekies">Sebastian Lekies</a>,
<a href="https://twitter.com/kkotowicz">Krzysztof Kotowicz</a>, and <a
href="https://twitter.com/sirdarckcat">Eduardo Vela</a>.</li>
<li><a
href="http://zhchbin.github.io/2017/08/30/Uber-XSS-via-Cookie/">Uber XSS
via Cookie</a> - Written by <a
href="http://zhchbin.github.io/">zhchbin</a>.</li>
<li><a
href="http://stamone-bug-bounty.blogspot.tw/2017/10/dom-xss-auth14.html">DOM
XSS auth.uber.com</a> - Written by <a
href="http://stamone-bug-bounty.blogspot.tw/">StamOne_</a>.</li>
<li><a href="https://opnsec.com/2018/03/stored-xss-on-facebook/">Stored
XSS on Facebook</a> - Written by <a href="https://opnsec.com/">Enguerran
Gillier</a>.</li>
<li><a
href="https://blog.bentkowski.info/2018/06/xss-in-google-colaboratory-csp-bypass.html">XSS
in Google Colaboratory + CSP bypass</a> - Written by <a
href="https://blog.bentkowski.info/">Michał Bentkowski</a>.</li>
<li><a
href="https://blog.bentkowski.info/2018/09/another-xss-in-google-colaboratory.html">Another
XSS in Google Colaboratory</a> - Written by <a
href="https://blog.bentkowski.info/">Michał Bentkowski</a>.</li>
<li><a
href="https://twitter.com/strukt93/status/931586377665331200"></script>
is filtered ?</a> - Written by <a
href="https://twitter.com/strukt93"><span class="citation"
data-cites="strukt93">@strukt93</span></a>.</li>
<li><a href="https://vinothkumar.me/20000-facebook-dom-xss/">$20000
Facebook DOM XSS</a> - Written by <a
href="https://twitter.com/vinodsparrow"><span class="citation"
data-cites="vinodsparrow">@vinodsparrow</span></a>.</li>
</ul>
<p><a name="tricks-sql-injection"></a> ### SQL Injection</p>
<ul>
<li><a
href="https://www.exploit-db.com/docs/english/37953-mysql-error-based-sql-injection-using-exp.pdf">MySQL
Error Based SQL Injection Using EXP</a> - Written by <a
href="https://twitter.com/osandamalith"><span class="citation"
data-cites="osandamalith">@osandamalith</span></a>.</li>
<li><a
href="http://zombiehelp54.blogspot.jp/2017/02/sql-injection-in-update-query-bug.html">SQL
injection in an UPDATE query - a bug bounty story!</a> - Written by <a
href="http://zombiehelp54.blogspot.jp/">Zombiehelp54</a>.</li>
<li><a
href="http://blog.orange.tw/2017/01/bug-bounty-github-enterprise-sql-injection.html">GitHub
Enterprise SQL Injection</a> - Written by <a
href="http://blog.orange.tw/">Orange</a>.</li>
<li><a
href="https://medium.com/@tomnomnom/making-a-blind-sql-injection-a-little-less-blind-428dcb614ba8">Making
a Blind SQL Injection a little less blind</a> - Written by <a
href="https://twitter.com/TomNomNom">TomNomNom</a>.</li>
<li><a href="https://www.tarlogic.com/en/blog/red-team-tales-0x01/">Red
Team Tales 0x01: From MSSQL to RCE</a> - Written by <a
href="https://www.tarlogic.com/en/cybersecurity-blog/">Tarlogic</a>.</li>
<li><a href="https://pulsesecurity.co.nz/articles/postgres-sqli">SQL
INJECTION AND POSTGRES - AN ADVENTURE TO EVENTUAL RCE</a> - Written by
<a href="https://github.com/denandz"><span class="citation"
data-cites="denandz">@denandz</span></a>.</li>
</ul>
<p><a name="tricks-nosql-injection"></a> ### NoSQL Injection</p>
<ul>
<li><a
href="http://www.petecorey.com/blog/2017/06/12/graphql-nosql-injection-through-json-types/">GraphQL
NoSQL Injection Through JSON Types</a> - Written by <a
href="http://www.petecorey.com/work/">Pete</a>.</li>
</ul>
<p><a name="tricks-ftp-injection"></a> ### FTP Injection</p>
<ul>
<li><a
href="https://media.blackhat.com/eu-13/briefings/Osipov/bh-eu-13-XML-data-osipov-slides.pdf">XML
Out-Of-Band Data Retrieval</a> - Written by <a
href="https://twitter.com/a66at"><span class="citation"
data-cites="a66at">@a66at</span></a> and Alexey Osipov.</li>
<li><a
href="http://lab.onsec.ru/2014/06/xxe-oob-exploitation-at-java-17.html">XXE
OOB exploitation at Java 1.7+</a> - Written by <a
href="http://lab.onsec.ru/">Ivan Novikov</a>.</li>
</ul>
<p><a name="tricks-xxe"></a> ### XXE</p>
<ul>
<li><a href="https://mohemiv.com/all/evil-xml/">Evil XML with two
encodings</a> - Written by <a href="https://mohemiv.com/">Arseniy
Sharoglazov</a>.</li>
<li><a href="http://seclists.org/fulldisclosure/2018/Jul/3">XXE in
WeChat Pay Sdk ( WeChat leave a backdoor on merchant websites)</a> -
Written by <a href="https://twitter.com/codeshtool">Rose
Jackcode</a>.</li>
<li><a
href="https://media.blackhat.com/eu-13/briefings/Osipov/bh-eu-13-XML-data-osipov-slides.pdf">XML
Out-Of-Band Data Retrieval</a> - Written by Timur Yunusov and Alexey
Osipov.</li>
<li><a
href="http://lab.onsec.ru/2014/06/xxe-oob-exploitation-at-java-17.html">XXE
OOB exploitation at Java 1.7+ (2014)</a>: Exfiltration using FTP
protocol - Written by <a href="https://twitter.com/d0znpp/">Ivan
Novikov</a>.</li>
<li><a
href="https://skavans.ru/en/2017/12/02/xxe-oob-extracting-via-httpftp-using-single-opened-port/">XXE
OOB extracting via HTTP+FTP using single opened port</a> - Written by <a
href="https://skavans.ru/">skavans</a>.</li>
<li><a
href="https://2013.appsecusa.org/2013/wp-content/uploads/2013/12/WhatYouDidntKnowAboutXXEAttacks.pdf">What
You Didnt Know About XML External Entities Attacks</a> - Written by <a
href="https://twitter.com/ecbftw">Timothy D. Morgan</a>.</li>
<li><a
href="https://www.synacktiv.com/ressources/synacktiv_drupal_xxe_services.pdf">Pre-authentication
XXE vulnerability in the Services Drupal module</a> - Written by <a
href="https://twitter.com/_m0bius">Renaud Dubourguais</a>.</li>
<li><a
href="https://blog.netspi.com/forcing-xxe-reflection-server-error-messages/">Forcing
XXE Reflection through Server Error Messages</a> - Written by <a
href="https://blog.netspi.com/author/antti-rantasaari/">Antti
Rantasaari</a>.</li>
<li><a
href="https://mohemiv.com/all/exploiting-xxe-with-local-dtd-files/">Exploiting
XXE with local DTD files</a> - Written by <a
href="https://twitter.com/_mohemiv">Arseniy Sharoglazov</a>.</li>
<li><a
href="https://www.gosecure.net/blog/2019/07/16/automating-local-dtd-discovery-for-xxe-exploitation">Automating
local DTD discovery for XXE exploitation</a> - Written by <a
href="https://twitter.com/h3xstream">Philippe Arteau</a>.</li>
</ul>
<p><a name="tricks-ssrf"></a> ### SSRF</p>
<ul>
<li><a
href="http://10degres.net/aws-takeover-through-ssrf-in-javascript/">AWS
takeover through SSRF in JavaScript</a> - Written by <a
href="http://10degres.net/">Gwen</a>.</li>
<li><a href="https://hackerone.com/reports/341876">SSRF in Exchange
leads to ROOT access in all instances</a> - Written by <a
href="https://twitter.com/0xacb"><span class="citation"
data-cites="0xacb">@0xacb</span></a>.</li>
<li><a href="https://hackerone.com/reports/341876">SSRF to ROOT
Access</a> - A $25k bounty for SSRF leading to ROOT Access in all
instances by <a href="https://hackerone.com/0xacb">0xacb</a>.</li>
<li><a
href="https://medium.com/secjuice/php-ssrf-techniques-9d422cb28d51">PHP
SSRF Techniques</a> - Written by <a
href="https://medium.com/@themiddleblue"><span class="citation"
data-cites="themiddleblue">@themiddleblue</span></a>.</li>
<li><a href="https://hackerone.com/reports/115748">SSRF in
https://imgur.com/vidgif/url</a> - Written by <a
href="https://hackerone.com/aesteral">aesteral</a>.</li>
<li><a
href="https://www.auxy.xyz/web%20security/2017/07/06/all-ssrf-knowledge.html">All
you need to know about SSRF and how may we write tools to do
auto-detect</a> - Written by <a href="https://twitter.com/Auxy233"><span
class="citation" data-cites="Auxy233">@Auxy233</span></a>.</li>
<li><a
href="https://www.blackhat.com/docs/us-17/thursday/us-17-Tsai-A-New-Era-Of-SSRF-Exploiting-URL-Parser-In-Trending-Programming-Languages.pdf">A
New Era of SSRF - Exploiting URL Parser in Trending Programming
Languages!</a> - Written by <a
href="http://blog.orange.tw/">Orange</a>.</li>
<li><a href="http://blog.safebuff.com/2016/07/03/SSRF-Tips/">SSRF
Tips</a> - Written by <a
href="http://blog.safebuff.com/">xl7dev</a>.</li>
<li><a
href="https://opnsec.com/2018/07/into-the-borg-ssrf-inside-google-production-network/">Into
the Borg SSRF inside Google production network</a> - Written by <a
href="https://opnsec.com/">opnsec</a>.</li>
<li><a
href="https://medium.com/bugbountywriteup/piercing-the-veil-server-side-request-forgery-to-niprnet-access-c358fd5e249a">Piercing
the Veil: Server Side Request Forgery to NIPRNet access</a> - Written by
<a href="https://medium.com/@alyssa.o.herrera">Alyssa Herrera</a>.</li>
</ul>
<p><a name="tricks-web-cache-poisoning"></a> ### Web Cache Poisoning</p>
<ul>
<li><a
href="https://portswigger.net/blog/bypassing-web-cache-poisoning-countermeasures">Bypassing
Web Cache Poisoning Countermeasures</a> - Written by <a
href="https://twitter.com/albinowax"><span class="citation"
data-cites="albinowax">@albinowax</span></a>.</li>
<li><a
href="https://lab.wallarm.com/cache-poisoning-and-other-dirty-tricks-120468f1053f">Cache
poisoning and other dirty tricks</a> - Written by <a
href="https://wallarm.com/">Wallarm</a>.</li>
</ul>
<p><a name="tricks-header-injection"></a> ### Header Injection</p>
<ul>
<li><a
href="http://blog.blindspotsecurity.com/2017/02/advisory-javapython-ftp-injections.html">Java/Python
FTP Injections Allow for Firewall Bypass</a> - Written by <a
href="https://plus.google.com/105917618099766831589">Timothy
Morgan</a>.</li>
</ul>
<p><a name="tricks-url"></a> ### URL</p>
<ul>
<li><a href="https://noncombatant.org/2017/11/07/problems-of-urls/">Some
Problems Of URLs</a> - Written by <a
href="https://noncombatant.org/about/">Chris Palmer</a>.</li>
<li><a href="https://www.xudongz.com/blog/2017/idn-phishing/">Phishing
with Unicode Domains</a> - Written by <a
href="https://www.xudongz.com/">Xudong Zheng</a>.</li>
<li><a href="https://www.vgrsec.com/post20170219.html">Unicode Domains
are bad and you should feel bad for supporting them</a> - Written by <a
href="https://www.vgrsec.com/">VRGSEC</a>.</li>
<li><a
href="http://blog.blackfan.ru/2017/09/devtwittercom-xss.html">[dev.twitter.com]
XSS</a> - Written by <a href="http://blog.blackfan.ru/">Sergey
Bobrov</a>.</li>
</ul>
<p><a name="tricks-deserialization"></a> ### Deserialization</p>
<ul>
<li><a
href="https://www.nccgroup.trust/uk/about-us/newsroom-and-events/blogs/2018/august/aspnet-resource-files-resx-and-deserialisation-issues/">ASP.NET
resource files (.RESX) and deserialisation issues</a> - Written by <a
href="https://twitter.com/irsdl"><span class="citation"
data-cites="irsdl">@irsdl</span></a>.</li>
</ul>
<p><a name="tricks-oauth"></a> ### OAuth</p>
<ul>
<li><a
href="https://www.amolbaikar.com/facebook-oauth-framework-vulnerability/">Facebook
OAuth Framework Vulnerability</a> - Written by <a
href="https://twitter.com/AmolBaikar"><span class="citation"
data-cites="AmolBaikar">@AmolBaikar</span></a>.</li>
</ul>
<p><a name="tricks-others"></a> ### Others</p>
<ul>
<li><a
href="https://medium.com/free-code-camp/messing-with-the-google-buganizer-system-for-15-600-in-bounties-58f86cc9f9a5">How
I hacked Googles bug tracking system itself for $15,600 in bounties</a>
- Written by <a href="https://medium.com/@alex.birsan"><span
class="citation" data-cites="alex.birsan">@alex.birsan</span></a>.</li>
<li><a
href="https://www.leavesongs.com/SHARE/some-tricks-from-my-secret-group.html">Some
Tricks From My Secret Group</a> - Written by <a
href="https://www.leavesongs.com/">phithon</a>.</li>
<li><a
href="https://github.com/epidemics-scepticism/writing/blob/master/onion-dns-leaks.md">Inducing
DNS Leaks in Onion Web Services</a> - Written by <a
href="https://github.com/epidemics-scepticism"><span class="citation"
data-cites="epidemics-scepticism">@epidemics-scepticism</span></a>.</li>
<li><a
href="https://s1gnalcha0s.github.io/dspl/2018/03/07/Stored-XSS-and-SSRF-Google.html">Stored
XSS, and SSRF in Google using the Dataset Publishing Language</a> -
Written by <a href="https://twitter.com/signalchaos"><span
class="citation" data-cites="signalchaos">@signalchaos</span></a>.</li>
</ul>
<h2 id="browser-exploitation">Browser Exploitation</h2>
<h3
id="frontend-like-sop-bypass-url-spoofing-and-something-like-that">Frontend
(like SOP bypass, URL spoofing, and something like that)</h3>
<ul>
<li><a
href="https://speakerdeck.com/shhnjk/the-world-of-site-isolation-and-compromised-renderer">The
world of Site Isolation and compromised renderer</a> - Written by <a
href="https://twitter.com/shhnjk"><span class="citation"
data-cites="shhnjk">@shhnjk</span></a>.</li>
<li><a
href="https://speakerdeck.com/filedescriptor/the-cookie-monster-in-your-browsers">The
Cookie Monster in Your Browsers</a> - Written by <a
href="https://twitter.com/filedescriptor"><span class="citation"
data-cites="filedescriptor">@filedescriptor</span></a>.</li>
<li><a
href="https://www.blackhat.com/docs/asia-16/materials/asia-16-Baloch-Bypassing-Browser-Security-Policies-For-Fun-And-Profit-wp.pdf">Bypassing
Mobile Browser Security For Fun And Profit</a> - Written by <a
href="https://twitter.com/@rafaybaloch"><span class="citation"
data-cites="rafaybaloch">@rafaybaloch</span></a>.</li>
<li><a
href="https://jameshfisher.com/2019/04/27/the-inception-bar-a-new-phishing-method/">The
inception bar: a new phishing method</a> - Written by <a
href="https://jameshfisher.com/">jameshfisher</a>.</li>
<li><a
href="http://blog.portswigger.net/2016/11/json-hijacking-for-modern-web.html">JSON
hijacking for the modern web</a> - Written by <a
href="https://portswigger.net/">portswigger</a>.</li>
<li><a
href="https://www.facebook.com/ExploitWareLabs/photos/a.361854183878462.84544.338832389513975/1378579648872572/?type=3&amp;theater">IE11
Information disclosure - local file detection</a> - Written by James
Lee.</li>
<li><a
href="https://www.brokenbrowser.com/sop-bypass-uxss-stealing-credentials-pretty-fast/">SOP
bypass / UXSS Stealing Credentials Pretty Fast (Edge)</a> - Written by
<a href="https://twitter.com/magicmac2000">Manuel</a>.</li>
<li><a href="https://bo0om.ru/safari-client-side">Особенности Safari в
client-side атаках</a> - Written by <a
href="https://bo0om.ru/author/admin">Bo0oM</a>.</li>
<li><a
href="https://docs.google.com/document/d/1cbL-X0kV_tQ5rL8XJ3lXkV-j0pt_CfTu5ZSzYrncPDc/">How
do we Stop Spilling the Beans Across Origins?</a> - Written by <a
href="aaj@google.com">aaj at google.com</a> and <a
href="mkwst@google.com">mkwst at google.com</a>.</li>
<li><a
href="https://blog.bentkowski.info/2018/06/setting-arbitrary-request-headers-in.html">Setting
arbitrary request headers in Chromium via CRLF injection</a> - Written
by <a href="https://blog.bentkowski.info/">Michał Bentkowski</a>.</li>
<li><a
href="https://hackernoon.com/im-harvesting-credit-card-numbers-and-passwords-from-your-site-here-s-how-9a8cb347c5b5">Im
harvesting credit card numbers and passwords from your site. Heres
how.</a> - Written by <a
href="https://hackernoon.com/@david.gilbertson">David
Gilbertson</a>.</li>
<li><a href="https://hackerone.com/reports/188086">Sending arbitrary IPC
messages via overriding Function.prototype.apply</a> - Written by <a
href="https://twitter.com/kinugawamasato"><span class="citation"
data-cites="kinugawamasato">@kinugawamasato</span></a>.</li>
<li><a
href="https://ahussam.me/Take-Advantage-of-Out-of-Scope-Domains-in-Bug-Bounty/">Take
Advantage of Out-of-Scope Domains in Bug Bounty Programs</a> - Written
by <a href="https://twitter.com/Abdulahhusam"><span class="citation"
data-cites="Abdulahhusam">@Abdulahhusam</span></a>.</li>
</ul>
<h3
id="backend-core-of-browser-implementation-and-often-refers-to-c-or-c-part">Backend
(core of Browser implementation, and often refers to C or C++ part)</h3>
<ul>
<li><a href="https://habr.com/en/company/drweb/blog/452076/">Breaking UC
Browser</a> - Written by <a href="https://www.drweb.ru/">Доктор
Веб</a>.</li>
<li><a
href="http://www.phrack.org/papers/attacking_javascript_engines.html">Attacking
JavaScript Engines - A case study of JavaScriptCore and
CVE-2016-4622</a> - Written by <a
href="phrack@saelo.net">phrack@saelo.net</a>.</li>
<li><a
href="http://blogs.360.cn/360safe/2016/11/29/three-roads-lead-to-rome-2/">Three
roads lead to Rome</a> - Written by <a
href="https://twitter.com/holynop"><span class="citation"
data-cites="holynop">@holynop</span></a>.</li>
<li><a
href="https://halbecaf.com/2017/05/24/exploiting-a-v8-oob-write/">Exploiting
a V8 OOB write.</a> - Written by <a
href="https://twitter.com/halbecaf"><span class="citation"
data-cites="halbecaf">@halbecaf</span></a>.</li>
<li><a href="https://blogs.securiteam.com/index.php/archives/3379">SSD
Advisory Chrome Turbofan Remote Code Execution</a> - Written by <a
href="https://blogs.securiteam.com/">SecuriTeam Secure Disclosure
(SSD)</a>.</li>
<li><a
href="https://labs.bluefrostsecurity.de/files/Look_Mom_I_Dont_Use_Shellcode-WP.pdf">Look
Mom, I dont use Shellcode - Browser Exploitation Case Study for
Internet Explorer 11</a> - Written by <a
href="http://twitter.com/moritzj"><span class="citation"
data-cites="moritzj">@moritzj</span></a>.</li>
<li><a
href="https://www.zerodayinitiative.com/blog/2018/2/12/pushing-webkits-buttons-with-a-mobile-pwn2own-exploit">PUSHING
WEBKITS BUTTONS WITH A MOBILE PWN2OWN EXPLOIT</a> - Written by <a
href="https://twitter.com/wanderingglitch"><span class="citation"
data-cites="wanderingglitch">@wanderingglitch</span></a>.</li>
<li><a
href="https://blog.ret2.io/2018/06/05/pwn2own-2018-exploit-development/">A
Methodical Approach to Browser Exploitation</a> - Written by <a
href="https://blog.ret2.io/">RET2 SYSTEMS, INC</a>.</li>
<li><a
href="https://doar-e.github.io/blog/2018/07/14/cve-2017-2446-or-jscjsglobalobjectishavingabadtime/">CVE-2017-2446
or JSC::JSGlobalObject::isHavingABadTime.</a> - Written by <a
href="https://doar-e.github.io/">Diary of a reverse-engineer</a>.</li>
<li><a href="https://theori.io/research/escaping-chrome-sandbox">CLEANLY
ESCAPING THE CHROME SANDBOX</a> - Written by <a
href="https://twitter.com/tjbecker_"><span class="citation"
data-cites="tjbecker_">@tjbecker_</span></a>.</li>
<li><a
href="https://blog.ret2.io/2018/06/05/pwn2own-2018-exploit-development/">A
Methodical Approach to Browser Exploitation</a> - Written by <a
href="https://twitter.com/PatrickBiernat"><span class="citation"
data-cites="PatrickBiernat">@PatrickBiernat</span></a>, <a
href="https://twitter.com/gaasedelen"><span class="citation"
data-cites="gaasedelen">@gaasedelen</span></a> and <a
href="https://twitter.com/itszn13"><span class="citation"
data-cites="itszn13">@itszn13</span></a>.</li>
</ul>
<h2 id="pocs">PoCs</h2>
<p><a name="pocs-database"></a> ### Database</p>
<ul>
<li><a href="https://github.com/tunz/js-vuln-db">js-vuln-db</a> -
Collection of JavaScript engine CVEs with PoCs by <a
href="https://github.com/tunz"><span class="citation"
data-cites="tunz">@tunz</span></a>.</li>
<li><a
href="https://github.com/qazbnm456/awesome-cve-poc">awesome-cve-poc</a>
- Curated list of CVE PoCs by <a
href="https://github.com/qazbnm456"><span class="citation"
data-cites="qazbnm456">@qazbnm456</span></a>.</li>
<li><a
href="https://github.com/coffeehb/Some-PoC-oR-ExP">Some-PoC-oR-ExP</a> -
各种漏洞poc、Exp的收集或编写 by <a
href="https://github.com/coffeehb"><span class="citation"
data-cites="coffeehb">@coffeehb</span></a>.</li>
<li><a href="https://github.com/Metnew/uxss-db">uxss-db</a> - Collection
of UXSS CVEs with PoCs by <a href="https://github.com/Metnew"><span
class="citation" data-cites="Metnew">@Metnew</span></a>.</li>
<li><a href="https://sploitus.com/">SPLOITUS</a> - Exploits &amp; Tools
Search Engine by <a href="https://twitter.com/i_bo0om"><span
class="citation" data-cites="i_bo0om">@i_bo0om</span></a>.</li>
<li><a href="https://www.exploit-db.com/">Exploit Database</a> -
ultimate archive of Exploits, Shellcode, and Security Papers by <a
href="https://www.offensive-security.com/">Offensive Security</a>.</li>
</ul>
<h2 id="cheetsheets">Cheetsheets</h2>
<ul>
<li><a href="https://leanpub.com/xss">XSS Cheat Sheet - 2018 Edition</a>
- Written by <a href="https://twitter.com/brutelogic"><span
class="citation" data-cites="brutelogic">@brutelogic</span></a>.</li>
<li><a
href="https://github.com/uppusaikiran/awesome-ctf-cheatsheet">Capture
the Flag CheatSheet</a> - Written by <a
href="https://github.com/uppusaikiran"><span class="citation"
data-cites="uppusaikiran">@uppusaikiran</span></a>.</li>
</ul>
<h2 id="tools">Tools</h2>
<p><a name="tools-auditing"></a> ### Auditing</p>
<ul>
<li><a href="https://github.com/Alfresco/prowler">prowler</a> - Tool for
AWS security assessment, auditing and hardening by <a
href="https://github.com/Alfresco"><span class="citation"
data-cites="Alfresco">@Alfresco</span></a>.</li>
<li><a href="https://github.com/hehnope/slurp">slurp</a> - Evaluate the
security of S3 buckets by <a href="https://github.com/hehnope"><span
class="citation" data-cites="hehnope">@hehnope</span></a>.</li>
<li><a href="https://github.com/hahwul/a2sv">A2SV</a> - Auto Scanning to
SSL Vulnerability by <a href="https://github.com/hahwul"><span
class="citation" data-cites="hahwul">@hahwul</span></a>.</li>
</ul>
<p><a name="tools-command-injection"></a> ### Command Injection</p>
<ul>
<li><a href="https://github.com/commixproject/commix">commix</a> -
Automated All-in-One OS command injection and exploitation tool by <a
href="https://github.com/commixproject"><span class="citation"
data-cites="commixproject">@commixproject</span></a>.</li>
</ul>
<p><a name="tools-reconnaissance"></a> ### Reconnaissance</p>
<p><a name="tools-osint"></a> #### OSINT - Open-Source Intelligence</p>
<ul>
<li><a href="https://www.shodan.io/">Shodan</a> - Shodan is the worlds
first search engine for Internet-connected devices by <a
href="https://twitter.com/shodanhq"><span class="citation"
data-cites="shodanhq">@shodanhq</span></a>.</li>
<li><a href="https://censys.io/">Censys</a> - Censys is a search engine
that allows computer scientists to ask questions about the devices and
networks that compose the Internet by <a
href="https://umich.edu/">University of Michigan</a>.</li>
<li><a href="https://urlscan.io/">urlscan.io</a> - Service which
analyses websites and the resources they request by <a
href="https://twitter.com/heipei"><span class="citation"
data-cites="heipei">@heipei</span></a>.</li>
<li><a href="https://www.zoomeye.org/">ZoomEye</a> - Cyberspace Search
Engine by <a href="https://twitter.com/zoomeye_team"><span
class="citation"
data-cites="zoomeye_team">@zoomeye_team</span></a>.</li>
<li><a href="https://fofa.so/?locale=en">FOFA</a> - Cyberspace Search
Engine by <a href="http://baimaohui.net/">BAIMAOHUI</a>.</li>
<li><a href="https://nti.nsfocus.com/">NSFOCUS</a> - THREAT INTELLIGENCE
PORTAL by NSFOCUS GLOBAL.</li>
<li><a href="https://github.com/s0md3v/Photon">Photon</a> - Incredibly
fast crawler designed for OSINT by <a
href="https://github.com/s0md3v"><span class="citation"
data-cites="s0md3v">@s0md3v</span></a>.</li>
<li><a href="https://github.com/ElevenPaths/FOCA">FOCA</a> - FOCA
(Fingerprinting Organizations with Collected Archives) is a tool used
mainly to find metadata and hidden information in the documents its
scans by <a
href="https://www.elevenpaths.com/index.html">ElevenPaths</a>.</li>
<li><a href="http://www.spiderfoot.net/">SpiderFoot</a> - Open source
footprinting and intelligence-gathering tool by <a
href="https://twitter.com/binarypool"><span class="citation"
data-cites="binarypool">@binarypool</span></a>.</li>
<li><a href="https://github.com/evilsocket/xray">xray</a> - XRay is a
tool for recon, mapping and OSINT gathering from public networks by <a
href="https://github.com/evilsocket"><span class="citation"
data-cites="evilsocket">@evilsocket</span></a>.</li>
<li><a href="https://github.com/michenriksen/Gitrob">gitrob</a> -
Reconnaissance tool for GitHub organizations by <a
href="https://github.com/michenriksen"><span class="citation"
data-cites="michenriksen">@michenriksen</span></a>.</li>
<li><a href="https://github.com/FeeiCN/GSIL">GSIL</a> - Github Sensitive
Information LeakageGithub敏感信息泄露by <a
href="https://github.com/FeeiCN"><span class="citation"
data-cites="FeeiCN">@FeeiCN</span></a>.</li>
<li><a href="https://github.com/0x09AL/raven">raven</a> - raven is a
Linkedin information gathering tool that can be used by pentesters to
gather information about an organization employees using Linkedin by <a
href="https://github.com/0x09AL"><span class="citation"
data-cites="0x09AL">@0x09AL</span></a>.</li>
<li><a href="https://github.com/s0md3v/ReconDog">ReconDog</a> -
Reconnaissance Swiss Army Knife by <a
href="https://github.com/s0md3v"><span class="citation"
data-cites="s0md3v">@s0md3v</span></a>.</li>
<li><a href="https://start.me/p/QRENnO/databases">Databases -
start.me</a> - Various databases which you can use for your OSINT
research by <a href="https://twitter.com/technisette"><span
class="citation" data-cites="technisette">@technisette</span></a>.</li>
<li><a href="https://peoplefindthor.dk/">peoplefindThor</a> - the easy
way to find people on Facebook by <a
href="mailto:postkassen@oejvind.dk?subject=peoplefindthor.dk%20comments">postkassen</a>.</li>
<li><a href="https://github.com/vaguileradiaz/tinfoleak">tinfoleak</a> -
The most complete open-source tool for Twitter intelligence analysis by
<a href="https://github.com/vaguileradiaz"><span class="citation"
data-cites="vaguileradiaz">@vaguileradiaz</span></a>.</li>
<li><a href="https://github.com/evyatarmeged/Raccoon">Raccoon</a> - High
performance offensive security tool for reconnaissance and vulnerability
scanning by <a href="https://github.com/evyatarmeged"><span
class="citation"
data-cites="evyatarmeged">@evyatarmeged</span></a>.</li>
<li><a href="https://github.com/SpiderLabs/social_mapper">Social
Mapper</a> - Social Media Enumeration &amp; Correlation Tool by Jacob
Wilkin(Greenwolf) by <a href="https://github.com/SpiderLabs"><span
class="citation" data-cites="SpiderLabs">@SpiderLabs</span></a>.</li>
<li><a
href="https://github.com/espi0n/Dockerfiles">espi0n/Dockerfiles</a> -
Dockerfiles for various OSINT tools by <a
href="https://github.com/espi0n"><span class="citation"
data-cites="espi0n">@espi0n</span></a>.</li>
</ul>
<p><a name="tools-sub-domain-enumeration"></a> #### Sub Domain
Enumeration</p>
<ul>
<li><a href="https://github.com/aboul3la/Sublist3r">Sublist3r</a> -
Sublist3r is a multi-threaded sub-domain enumeration tool for
penetration testers by <a href="https://github.com/aboul3la"><span
class="citation" data-cites="aboul3la">@aboul3la</span></a>.</li>
<li><a href="https://github.com/ChrisTruncer/EyeWitness">EyeWitness</a>
- EyeWitness is designed to take screenshots of websites, provide some
server header info, and identify default credentials if possible by <a
href="https://github.com/ChrisTruncer"><span class="citation"
data-cites="ChrisTruncer">@ChrisTruncer</span></a>.</li>
<li><a
href="https://github.com/lijiejie/subDomainsBrute">subDomainsBrute</a> -
A simple and fast sub domain brute tool for pentesters by <a
href="https://github.com/lijiejie"><span class="citation"
data-cites="lijiejie">@lijiejie</span></a>.</li>
<li><a href="https://github.com/michenriksen/aquatone">AQUATONE</a> -
Tool for Domain Flyovers by <a
href="https://github.com/michenriksen"><span class="citation"
data-cites="michenriksen">@michenriksen</span></a>.</li>
<li><a
href="https://github.com/eldraco/domain_analyzer">domain_analyzer</a> -
Analyze the security of any domain by finding all the information
possible by <a href="https://github.com/eldraco"><span class="citation"
data-cites="eldraco">@eldraco</span></a>.</li>
<li><a
href="https://www.virustotal.com/en/documentation/searching/#getting-domain-information">VirusTotal
domain information</a> - Searching for domain information by <a
href="https://www.virustotal.com/">VirusTotal</a>.</li>
<li><a
href="https://github.com/google/certificate-transparency">Certificate
Transparency</a> - Googles Certificate Transparency project fixes
several structural flaws in the SSL certificate system by <a
href="https://github.com/google"><span class="citation"
data-cites="google">@google</span></a>.</li>
<li><a href="https://crt.sh/">Certificate Search</a> - Enter an Identity
(Domain Name, Organization Name, etc), a Certificate Fingerprint (SHA-1
or SHA-256) or a crt.sh ID to search certificate(s) by <a
href="https://github.com/crtsh"><span class="citation"
data-cites="crtsh">@crtsh</span></a>.</li>
<li><a href="https://github.com/We5ter/GSDF">GSDF</a> - Domain searcher
named GoogleSSLdomainFinder by <a href="https://github.com/We5ter"><span
class="citation" data-cites="We5ter">@We5ter</span></a>.</li>
</ul>
<p><a name="tools-code-generating"></a> ### Code Generating</p>
<ul>
<li><a href="https://github.com/qazbnm456/VWGen">VWGen</a> - Vulnerable
Web applications Generator by <a
href="https://github.com/qazbnm456"><span class="citation"
data-cites="qazbnm456">@qazbnm456</span></a>.</li>
</ul>
<p><a name="tools-fuzzing"></a> ### Fuzzing</p>
<ul>
<li><a href="https://github.com/xmendez/wfuzz">wfuzz</a> - Web
application bruteforcer by <a href="https://github.com/xmendez"><span
class="citation" data-cites="xmendez">@xmendez</span></a>.</li>
<li><a
href="https://github.com/hack-all-the-things/charsetinspect">charsetinspect</a>
- Script that inspects multi-byte character sets looking for characters
with specific user-defined properties by <a
href="https://github.com/hack-all-the-things"><span class="citation"
data-cites="hack-all-the-things">@hack-all-the-things</span></a>.</li>
<li><a
href="https://github.com/OsandaMalith/IPObfuscator">IPObfuscator</a> -
Simple tool to convert the IP to a DWORD IP by <a
href="https://github.com/OsandaMalith"><span class="citation"
data-cites="OsandaMalith">@OsandaMalith</span></a>.</li>
<li><a href="https://github.com/google/domato">domato</a> - DOM fuzzer
by <a href="https://github.com/google"><span class="citation"
data-cites="google">@google</span></a>.</li>
<li><a href="https://github.com/fuzzdb-project/fuzzdb">FuzzDB</a> -
Dictionary of attack patterns and primitives for black-box application
fault injection and resource discovery.</li>
<li><a href="https://github.com/Nekmo/dirhunt">dirhunt</a> - Web crawler
optimized for searching and analyzing the directory structure of a site
by <a href="https://github.com/Nekmo"><span class="citation"
data-cites="nekmo">@nekmo</span></a>.</li>
<li><a href="https://www.ssllabs.com/ssltest/">ssltest</a> - Online
service that performs a deep analysis of the configuration of any SSL
web server on the public internet. Provided by <a
href="https://www.ssllabs.com">Qualys SSL Labs</a>.</li>
<li><a href="https://github.com/Bo0oM/fuzz.txt">fuzz.txt</a> -
Potentially dangerous files by <a href="https://github.com/Bo0oM"><span
class="citation" data-cites="Bo0oM">@Bo0oM</span></a>.</li>
</ul>
<p><a name="tools-scanning"></a> ### Scanning</p>
<ul>
<li><a href="https://github.com/wpscanteam/wpscan">wpscan</a> - WPScan
is a black box WordPress vulnerability scanner by <a
href="https://github.com/wpscanteam"><span class="citation"
data-cites="wpscanteam">@wpscanteam</span></a>.</li>
<li><a href="https://github.com/drego85/JoomlaScan">JoomlaScan</a> -
Free software to find the components installed in Joomla CMS, built out
of the ashes of Joomscan by <a href="https://github.com/drego85"><span
class="citation" data-cites="drego85">@drego85</span></a>.</li>
<li><a href="https://github.com/m4ll0k/WAScan">WAScan</a> - Is an open
source web application security scanner that uses “black-box” method,
created by <a href="https://github.com/m4ll0k"><span class="citation"
data-cites="m4ll0k">@m4ll0k</span></a>.</li>
<li><a href="https://github.com/projectdiscovery/nuclei">Nuclei</a> -
Nuclei is a fast tool for configurable targeted scanning based on
templates offering massive extensibility and ease of use by <a
href="https://github.com/projectdiscovery"><span class="citation"
data-cites="projectdiscovery">@projectdiscovery</span></a>.</li>
</ul>
<p><a name="tools-penetration-testing"></a> ### Penetration Testing</p>
<ul>
<li><a href="https://portswigger.net/burp/">Burp Suite</a> - Burp Suite
is an integrated platform for performing security testing of web
applications by <a href="https://portswigger.net/">portswigger</a>.</li>
<li><a
href="https://github.com/theInfectedDrake/TIDoS-Framework">TIDoS-Framework</a>
- A comprehensive web application audit framework to cover up everything
from Reconnaissance and OSINT to Vulnerability Analysis by <a
href="https://github.com/theInfectedDrake"><span class="citation"
data-cites="_tID">@_tID</span></a>.</li>
<li><a href="https://github.com/flipkart-incubator/astra">Astra</a> -
Automated Security Testing For REST APIs by <a
href="https://github.com/flipkart-incubator"><span class="citation"
data-cites="flipkart-incubator">@flipkart-incubator</span></a>.</li>
<li><a href="https://github.com/dagrz/aws_pwn">aws_pwn</a> - A
collection of AWS penetration testing junk by <a
href="https://github.com/dagrz"><span class="citation"
data-cites="dagrz">@dagrz</span></a>.</li>
<li><a href="https://buckets.grayhatwarfare.com/">grayhatwarfare</a> -
Public buckets by <a
href="http://www.grayhatwarfare.com/">grayhatwarfare</a>.</li>
</ul>
<p><a name="tools-offensive"></a> ### Offensive</p>
<p><a name="tools-xss"></a> #### XSS - Cross-Site Scripting</p>
<ul>
<li><a href="https://github.com/beefproject/beef">beef</a> - The Browser
Exploitation Framework Project by <a
href="https://beefproject.com">beefproject</a>.</li>
<li><a href="https://github.com/s0md3v/JShell">JShell</a> - Get a
JavaScript shell with XSS by <a href="https://github.com/s0md3v"><span
class="citation" data-cites="s0md3v">@s0md3v</span></a>.</li>
<li><a href="https://github.com/s0md3v/XSStrike">XSStrike</a> - XSStrike
is a program which can fuzz and bruteforce parameters for XSS. It can
also detect and bypass WAFs by <a href="https://github.com/s0md3v"><span
class="citation" data-cites="s0md3v">@s0md3v</span></a>.</li>
<li><a href="https://github.com/evilcos/xssor2">xssor2</a> - XSSOR -
Hack with JavaScript by <a href="https://github.com/evilcos"><span
class="citation" data-cites="evilcos">@evilcos</span></a>.</li>
<li><a href="https://csper.io/evaluator">csp evaluator</a> - A tool for
evaluating content-security-policies by <a
href="http://csper.io">Csper</a>.</li>
</ul>
<p><a name="tools-sql-injection"></a> #### SQL Injection</p>
<ul>
<li><a href="https://github.com/sqlmapproject/sqlmap">sqlmap</a> -
Automatic SQL injection and database takeover tool.</li>
</ul>
<p><a name="tools-template-injection"></a> #### Template Injection</p>
<ul>
<li><a href="https://github.com/epinna/tplmap">tplmap</a> - Code and
Server-Side Template Injection Detection and Exploitation Tool by <a
href="https://github.com/epinna"><span class="citation"
data-cites="epinna">@epinna</span></a>.</li>
</ul>
<p><a name="tools-xxe"></a> #### XXE</p>
<ul>
<li><a href="https://github.com/GoSecure/dtd-finder">dtd-finder</a> -
List DTDs and generate XXE payloads using those local DTDs by <a
href="https://github.com/GoSecure"><span class="citation"
data-cites="GoSecure">@GoSecure</span></a>.</li>
</ul>
<p><a name="tools-csrf"></a> #### Cross Site Request Forgery</p>
<ul>
<li><a href="https://github.com/0xInfection/XSRFProbe">XSRFProbe</a> -
The Prime CSRF Audit &amp; Exploitation Toolkit by <a
href="https://github.com/0xinfection"><span class="citation"
data-cites="0xInfection">@0xInfection</span></a>.</li>
</ul>
<p><a name="tools-ssrf"></a> #### Server-Side Request Forgery</p>
<ul>
<li><a href="https://tools.intigriti.io/redirector/">Open redirect/SSRF
payload generator</a> - Open redirect/SSRF payload generator by <a
href="https://www.intigriti.com/">intigriti</a>.</li>
</ul>
<p><a name="tools-leaking"></a> ### Leaking</p>
<ul>
<li><a href="https://github.com/cure53/HTTPLeaks">HTTPLeaks</a> - All
possible ways, a website can leak HTTP requests by <a
href="https://github.com/cure53"><span class="citation"
data-cites="cure53">@cure53</span></a>.</li>
<li><a href="https://github.com/kost/dvcs-ripper">dvcs-ripper</a> - Rip
web accessible (distributed) version control systems: SVN/GIT/HG… by <a
href="https://github.com/kost"><span class="citation"
data-cites="kost">@kost</span></a>.</li>
<li><a
href="https://github.com/evilpacket/DVCS-Pillage">DVCS-Pillage</a> -
Pillage web accessible GIT, HG and BZR repositories by <a
href="https://github.com/evilpacket"><span class="citation"
data-cites="evilpacket">@evilpacket</span></a>.</li>
<li><a href="https://github.com/UnkL4b/GitMiner">GitMiner</a> - Tool for
advanced mining for content on Github by <a
href="https://github.com/UnkL4b"><span class="citation"
data-cites="UnkL4b">@UnkL4b</span></a>.</li>
<li><a href="https://github.com/zricethezav/gitleaks">gitleaks</a> -
Searches full repo history for secrets and keys by <a
href="https://github.com/zricethezav"><span class="citation"
data-cites="zricethezav">@zricethezav</span></a>.</li>
<li><a
href="https://github.com/maxchehab/CSS-Keylogging">CSS-Keylogging</a> -
Chrome extension and Express server that exploits keylogging abilities
of CSS by <a href="https://github.com/maxchehab"><span class="citation"
data-cites="maxchehab">@maxchehab</span></a>.</li>
<li><a
href="https://github.com/allyshka/pwngitmanager">pwngitmanager</a> - Git
manager for pentesters by <a href="https://github.com/allyshka"><span
class="citation" data-cites="allyshka">@allyshka</span></a>.</li>
<li><a href="https://github.com/hannob/snallygaster">snallygaster</a> -
Tool to scan for secret files on HTTP servers by <a
href="https://github.com/hannob"><span class="citation"
data-cites="hannob">@hannob</span></a>.</li>
<li><a href="https://github.com/GerbenJavado/LinkFinder">LinkFinder</a>
- Python script that finds endpoints in JavaScript files by <a
href="https://github.com/GerbenJavado"><span class="citation"
data-cites="GerbenJavado">@GerbenJavado</span></a>.</li>
</ul>
<p><a name="tools-detecting"></a> ### Detecting</p>
<ul>
<li><a href="https://sqlchop.chaitin.cn/">sqlchop</a> - SQL injection
detection engine by <a href="http://chaitin.com">chaitin</a>.</li>
<li><a href="https://xsschop.chaitin.cn/">xsschop</a> - XSS detection
engine by <a href="http://chaitin.com">chaitin</a>.</li>
<li><a href="https://github.com/RetireJS/retire.js">retire.js</a> -
Scanner detecting the use of JavaScript libraries with known
vulnerabilities by <a href="https://github.com/RetireJS"><span
class="citation" data-cites="RetireJS">@RetireJS</span></a>.</li>
<li><a
href="https://github.com/HynekPetrak/malware-jail">malware-jail</a> -
Sandbox for semi-automatic Javascript malware analysis, deobfuscation
and payload extraction by <a href="https://github.com/HynekPetrak"><span
class="citation" data-cites="HynekPetrak">@HynekPetrak</span></a>.</li>
<li><a
href="https://github.com/auth0/repo-supervisor">repo-supervisor</a> -
Scan your code for security misconfiguration, search for passwords and
secrets.</li>
<li><a href="https://github.com/LewisArdern/bXSS">bXSS</a> - bXSS is a
simple Blind XSS application adapted from <a
href="https://cure53.de/m">cure53.de/m</a> by <a
href="https://github.com/LewisArdern"><span class="citation"
data-cites="LewisArdern">@LewisArdern</span></a>.</li>
<li><a href="https://github.com/baidu/openrasp">OpenRASP</a> - An open
source RASP solution actively maintained by Baidu Inc. With
context-aware detection algorithm the project achieved nearly no false
positives. And less than 3% performance reduction is observed under
heavy server load.</li>
<li><a href="https://github.com/apps/guardrails">GuardRails</a> - A
GitHub App that provides security feedback in Pull Requests.</li>
</ul>
<p><a name="tools-preventing"></a> ### Preventing</p>
<ul>
<li><a href="https://github.com/cure53/DOMPurify">DOMPurify</a> -
DOM-only, super-fast, uber-tolerant XSS sanitizer for HTML, MathML and
SVG by <a href="https://cure53.de/">Cure53</a>.</li>
<li><a href="https://github.com/leizongmin/js-xss">js-xss</a> - Sanitize
untrusted HTML (to prevent XSS) with a configuration specified by a
Whitelist by <a href="https://github.com/leizongmin"><span
class="citation" data-cites="leizongmin">@leizongmin</span></a>.</li>
<li><a href="https://github.com/cossacklabs/acra">Acra</a> - Client-side
encryption engine for SQL databases, with strong selective encryption,
SQL injections prevention and intrusion detection by <a
href="https://www.cossacklabs.com/"><span class="citation"
data-cites="cossacklabs">@cossacklabs</span></a>.</li>
<li><a href="https://csper.io">Csper</a> - A set of tools for
building/evaluating/monitoring content-security-policy to prevent/detect
cross site scripting by <a href="https://csper.io">Csper</a>.</li>
</ul>
<p><a name="tools-proxy"></a> ### Proxy</p>
<ul>
<li><a href="https://www.charlesproxy.com/">Charles</a> - HTTP proxy /
HTTP monitor / Reverse Proxy that enables a developer to view all of the
HTTP and SSL / HTTPS traffic between their machine and the
Internet.</li>
<li><a href="https://github.com/mitmproxy/mitmproxy">mitmproxy</a> -
Interactive TLS-capable intercepting HTTP proxy for penetration testers
and software developers by <a href="https://github.com/mitmproxy"><span
class="citation" data-cites="mitmproxy">@mitmproxy</span></a>.</li>
</ul>
<p><a name="tools-webshell"></a> ### Webshell</p>
<ul>
<li><a href="https://github.com/s0md3v/nano">nano</a> - Family of code
golfed PHP shells by <a href="https://github.com/s0md3v"><span
class="citation" data-cites="s0md3v">@s0md3v</span></a>.</li>
<li><a href="https://github.com/tennc/webshell">webshell</a> - This is a
webshell open source project by <a href="https://github.com/tennc"><span
class="citation" data-cites="tennc">@tennc</span></a>.</li>
<li><a href="https://github.com/epinna/weevely3">Weevely</a> -
Weaponized web shell by <a href="https://github.com/epinna"><span
class="citation" data-cites="epinna">@epinna</span></a>.</li>
<li><a
href="https://github.com/WangYihang/Webshell-Sniper">Webshell-Sniper</a>
- Manage your website via terminal by <a
href="https://github.com/WangYihang"><span class="citation"
data-cites="WangYihang">@WangYihang</span></a>.</li>
<li><a
href="https://github.com/WangYihang/Reverse-Shell-Manager">Reverse-Shell-Manager</a>
- Reverse Shell Manager via Terminal <a
href="https://github.com/WangYihang"><span class="citation"
data-cites="WangYihang">@WangYihang</span></a>.</li>
<li><a
href="https://github.com/lukechilds/reverse-shell">reverse-shell</a> -
Reverse Shell as a Service by <a
href="https://github.com/lukechilds"><span class="citation"
data-cites="lukechilds">@lukechilds</span></a>.</li>
<li><a href="https://github.com/nil0x42/phpsploit">PhpSploit</a> -
Full-featured C2 framework which silently persists on webserver via evil
PHP oneliner by <a href="https://github.com/nil0x42"><span
class="citation" data-cites="nil0x42">@nil0x42</span></a>.</li>
</ul>
<p><a name="tools-disassembler"></a> ### Disassembler</p>
<ul>
<li><a href="https://github.com/plasma-disassembler/plasma">plasma</a> -
Plasma is an interactive disassembler for x86/ARM/MIPS by <a
href="https://github.com/plasma-disassembler"><span class="citation"
data-cites="plasma-disassembler">@plasma-disassembler</span></a>.</li>
<li><a href="https://github.com/radare/radare2">radare2</a> - Unix-like
reverse engineering framework and commandline tools by <a
href="https://github.com/radare"><span class="citation"
data-cites="radare">@radare</span></a>.</li>
<li><a href="https://github.com/hteso/iaito">Iaitō</a> - Qt and C++ GUI
for radare2 reverse engineering framework by <a
href="https://github.com/hteso"><span class="citation"
data-cites="hteso">@hteso</span></a>.</li>
</ul>
<p><a name="tools-decompiler"></a> ### Decompiler</p>
<ul>
<li><a href="http://www.benf.org/other/cfr/">CFR</a> - Another java
decompiler by <a href="https://twitter.com/LeeAtBenf"><span
class="citation" data-cites="LeeAtBenf">@LeeAtBenf</span></a>.</li>
</ul>
<p><a name="tools-dns-rebinding"></a> ### DNS Rebinding</p>
<ul>
<li><a href="https://github.com/brannondorsey/dns-rebind-toolkit">DNS
Rebind Toolkit</a> - DNS Rebind Toolkit is a frontend JavaScript
framework for developing DNS Rebinding exploits against vulnerable hosts
and services on a local area network (LAN) by <a
href="https://github.com/brannondorsey"><span class="citation"
data-cites="brannondorsey">@brannondorsey</span></a></li>
<li><a href="https://github.com/mwrlabs/dref">dref</a> - DNS Rebinding
Exploitation Framework. Dref does the heavy-lifting for DNS rebinding by
<a href="https://github.com/mwrlabs"><span class="citation"
data-cites="mwrlabs">@mwrlabs</span></a></li>
<li><a href="https://github.com/nccgroup/singularity">Singularity of
Origin</a> - It includes the necessary components to rebind the IP
address of the attack server DNS name to the target machines IP address
and to serve attack payloads to exploit vulnerable software on the
target machine by <a href="https://github.com/nccgroup"><span
class="citation" data-cites="nccgroup">@nccgroup</span></a></li>
<li><a href="https://github.com/brannondorsey/whonow">Whonow DNS
Server</a> - A malicious DNS server for executing DNS Rebinding attacks
on the fly by <a href="https://github.com/brannondorsey"><span
class="citation"
data-cites="brannondorsey">@brannondorsey</span></a></li>
</ul>
<p><a name="tools-others"></a> ### Others</p>
<ul>
<li><a
href="https://wiki.skullsecurity.org/index.php?title=Dnslogger">Dnslogger</a>
- DNS Logger by <a href="https://github.com/iagox86"><span
class="citation" data-cites="iagox86">@iagox86</span></a>.</li>
<li><a href="https://github.com/gchq/CyberChef">CyberChef</a> - The
Cyber Swiss Army Knife - a web app for encryption, encoding, compression
and data analysis - by <a href="https://github.com/gchq"><span
class="citation" data-cites="GCHQ">@GCHQ</span></a>.</li>
<li><a
href="https://github.com/b17zr/ntlm_challenger">ntlm_challenger</a> -
Parse NTLM over HTTP challenge messages by <a
href="https://github.com/b17zr"><span class="citation"
data-cites="b17zr">@b17zr</span></a>.</li>
<li><a href="https://github.com/taviso/cefdebug">cefdebug</a> - Minimal
code to connect to a CEF debugger by <a
href="https://github.com/taviso"><span class="citation"
data-cites="taviso">@taviso</span></a>.</li>
<li><a href="https://github.com/taviso/ctftool">ctftool</a> -
Interactive CTF Exploration Tool by <a
href="https://github.com/taviso"><span class="citation"
data-cites="taviso">@taviso</span></a>.</li>
</ul>
<h2 id="social-engineering-database">Social Engineering Database</h2>
<ul>
<li><a href="https://haveibeenpwned.com/">haveibeenpwned</a> - Check if
you have an account that has been compromised in a data breach by <a
href="https://www.troyhunt.com/">Troy Hunt</a>.</li>
</ul>
<h2 id="blogs">Blogs</h2>
<ul>
<li><a href="http://blog.orange.tw/">Orange</a> - Taiwans talented web
penetrator.</li>
<li><a href="https://www.leavesongs.com/">leavesongs</a> - Chinas
talented web penetrator.</li>
<li><a href="http://albinowax.skeletonscribe.net/">James Kettle</a> -
Head of Research at <a href="https://portswigger.net/">PortSwigger Web
Security</a>.</li>
<li><a href="https://www.brokenbrowser.com/">Broken Browser</a> - Fun
with Browser Vulnerabilities.</li>
<li><a href="https://datarift.blogspot.tw/">Scrutiny</a> - Internet
Security through Web Browsers by Dhiraj Mishra.</li>
<li><a href="https://buer.haus/">BRETT BUERHAUS</a> - Vulnerability
disclosures and rambles on application security.</li>
<li><a href="https://www.n0tr00t.com/">n0tr00t</a> - ~# n0tr00t Security
Team.</li>
<li><a href="https://opnsec.com/">OpnSec</a> - Open Mind Security!</li>
<li><a href="https://blog.ripstech.com/tags/security/">RIPS
Technologies</a> - Write-ups for PHP vulnerabilities.</li>
<li><a href="http://blog.0daylabs.com/">0Day Labs</a> - Awesome
bug-bounty and challenges writeups.</li>
<li><a href="https://osandamalith.com/">Blog of Osanda</a> - Security
Researching and Reverse Engineering.</li>
</ul>
<h2 id="twitter-users">Twitter Users</h2>
<ul>
<li><a href="https://twitter.com/HackwithGithub"><span class="citation"
data-cites="HackwithGitHub">@HackwithGitHub</span></a> - Initiative to
showcase open source hacking tools for hackers and pentesters</li>
<li><a href="https://twitter.com/filedescriptor"><span class="citation"
data-cites="filedescriptor">@filedescriptor</span></a> - Active
penetrator often tweets and writes useful articles</li>
<li><a href="https://twitter.com/cure53berlin"><span class="citation"
data-cites="cure53berlin">@cure53berlin</span></a> - <a
href="https://cure53.de/">Cure53</a> is a German cybersecurity
firm.</li>
<li><a href="https://twitter.com/XssPayloads"><span class="citation"
data-cites="XssPayloads">@XssPayloads</span></a> - The wonderland of
JavaScript unexpected usages, and more.</li>
<li><a href="https://twitter.com/kinugawamasato"><span class="citation"
data-cites="kinugawamasato">@kinugawamasato</span></a> - Japanese web
penetrator.</li>
<li><a href="https://twitter.com/h3xstream/"><span class="citation"
data-cites="h3xstream">@h3xstream</span></a> - Security Researcher,
interested in web security, crypto, pentest, static analysis but most of
all, samy is my hero.</li>
<li><a href="https://twitter.com/garethheyes"><span class="citation"
data-cites="garethheyes">@garethheyes</span></a> - English web
penetrator.</li>
<li><a href="https://twitter.com/hasegawayosuke"><span class="citation"
data-cites="hasegawayosuke">@hasegawayosuke</span></a> - Japanese
javascript security researcher.</li>
<li><a href="https://twitter.com/shhnjk"><span class="citation"
data-cites="shhnjk">@shhnjk</span></a> - Web and Browsers Security
Researcher.</li>
</ul>
<h2 id="practices">Practices</h2>
<p><a name="practices-application"></a> ### Application</p>
<ul>
<li><a href="https://github.com/bkimminich/juice-shop">OWASP Juice
Shop</a> - Probably the most modern and sophisticated insecure web
application - Written by <a href="https://github.com/bkimminich"><span
class="citation" data-cites="bkimminich">@bkimminich</span></a> and the
<a href="https://twitter.com/owasp_juiceshop"><span class="citation"
data-cites="owasp_juiceshop">@owasp_juiceshop</span></a> team.</li>
<li><a
href="https://github.com/SecureSkyTechnology/BadLibrary">BadLibrary</a>
- Vulnerable web application for training - Written by <a
href="https://github.com/SecureSkyTechnology"><span class="citation"
data-cites="SecureSkyTechnology">@SecureSkyTechnology</span></a>.</li>
<li><a href="http://hackxor.net/">Hackxor</a> - Realistic web
application hacking game - Written by <a
href="https://twitter.com/albinowax"><span class="citation"
data-cites="albinowax">@albinowax</span></a>.</li>
<li><a href="http://selinuxgame.org/">SELinux Game</a> - Learn SELinux
by doing. Solve Puzzles, show skillz - Written by <a
href="https://twitter.com/selinuxgame"><span class="citation"
data-cites="selinuxgame">@selinuxgame</span></a>.</li>
<li><a href="https://portswigger.net/web-security">Portswigger Web
Security Academy</a> - Free trainings and labs - Written by <a
href="https://portswigger.net/">PortSwigger</a>.</li>
</ul>
<p><a name="practices-aws"></a> ### AWS</p>
<ul>
<li><a href="http://flaws.cloud/">FLAWS</a> - Amazon AWS CTF challenge -
Written by <a href="https://twitter.com/0xdabbad00"><span
class="citation" data-cites="0xdabbad00">@0xdabbad00</span></a>.</li>
<li><a
href="https://github.com/RhinoSecurityLabs/cloudgoat">CloudGoat</a> -
Rhino Security Labs “Vulnerable by Design” AWS infrastructure setup
tool - Written by <a href="https://github.com/RhinoSecurityLabs"><span
class="citation"
data-cites="RhinoSecurityLabs">@RhinoSecurityLabs</span></a>.</li>
</ul>
<p><a name="practices-xss"></a> ### XSS</p>
<ul>
<li><a href="https://xss-game.appspot.com/">XSS game</a> - Google XSS
Challenge - Written by Google.</li>
<li><a href="http://prompt.ml/">prompt(1) to win</a> - Complex 16-Level
XSS Challenge held in summer 2014 (+4 Hidden Levels) - Written by <a
href="https://github.com/cure53"><span class="citation"
data-cites="cure53">@cure53</span></a>.</li>
<li><a href="https://alf.nu/alert1">alert(1) to win</a> - Series of XSS
challenges - Written by <a href="https://twitter.com/steike"><span
class="citation" data-cites="steike">@steike</span></a>.</li>
<li><a href="http://xss-quiz.int21h.jp/">XSS Challenges</a> - Series of
XSS challenges - Written by yamagata21.</li>
</ul>
<p><a name="practices-modsecurity"></a> ### ModSecurity / OWASP
ModSecurity Core Rule Set</p>
<ul>
<li><a href="https://www.netnea.com/cms/apache-tutorials/">ModSecurity /
OWASP ModSecurity Core Rule Set</a> - Series of tutorials to install,
configure and tune ModSecurity and the Core Rule Set - Written by <a
href="https://twitter.com/ChrFolini"><span class="citation"
data-cites="ChrFolini">@ChrFolini</span></a>.</li>
</ul>
<h2 id="community">Community</h2>
<ul>
<li><a href="https://www.reddit.com/r/websecurity/">Reddit</a></li>
<li><a href="http://stackoverflow.com/questions/tagged/security">Stack
Overflow</a></li>
</ul>
<h2 id="miscellaneous">Miscellaneous</h2>
<ul>
<li><a
href="https://github.com/djadmin/awesome-bug-bounty">awesome-bug-bounty</a>
- Comprehensive curated list of available Bug Bounty &amp; Disclosure
Programs and write-ups by <a href="https://github.com/djadmin"><span
class="citation" data-cites="djadmin">@djadmin</span></a>.</li>
<li><a
href="https://github.com/ngalongc/bug-bounty-reference">bug-bounty-reference</a>
- List of bug bounty write-up that is categorized by the bug nature by
<a href="https://github.com/ngalongc"><span class="citation"
data-cites="ngalongc">@ngalongc</span></a>.</li>
<li><a
href="https://sites.google.com/site/bughunteruniversity/behind-the-scenes/presentations/google-vrp-and-unicorns">Google
VRP and Unicorns</a> - Written by <a
href="https://www.linkedin.com/in/daniel-stelter-gliese-170a70a2/">Daniel
Stelter-Gliese</a>.</li>
<li><a
href="http://pwndizzle.blogspot.jp/2014/02/brute-forcing-your-facebook-email-and.html">Brute
Forcing Your Facebook Email and Phone Number</a> - Written by <a
href="http://pwndizzle.blogspot.jp/">PwnDizzle</a>.</li>
<li><a href="http://i.imgur.com/Mr9pvq9.jpg">Pentest + Exploit dev
Cheatsheet wallpaper</a> - Penetration Testing and Exploit Dev
CheatSheet.</li>
<li><a
href="http://www.covert.io/the-definitive-security-datascience-and-machinelearning-guide/">The
Definitive Security Data Science and Machine Learning Guide</a> -
Written by JASON TROS.</li>
<li><a href="https://github.com/x0rz/EQGRP">EQGRP</a> - Decrypted
content of eqgrp-auction-file.tar.xz by <a
href="https://github.com/x0rz"><span class="citation"
data-cites="x0rz">@x0rz</span></a>.</li>
<li><a href="https://github.com/ChALkeR/notes">notes</a> - Some public
notes by <a href="https://github.com/ChALkeR"><span class="citation"
data-cites="ChALkeR">@ChALkeR</span></a>.</li>
<li><a
href="https://githubengineering.com/githubs-bug-bounty-workflow/">A
glimpse into GitHubs Bug Bounty workflow</a> - Written by <a
href="https://github.com/gregose"><span class="citation"
data-cites="gregose">@gregose</span></a>.</li>
<li><a href="https://www.belfercenter.org/CyberPlaybook">Cybersecurity
Campaign Playbook</a> - Written by <a
href="https://www.belfercenter.org/">Belfer Center for Science and
International Affairs</a>.</li>
<li><a
href="https://github.com/rmusser01/Infosec_Reference">Infosec_Reference</a>
- Information Security Reference That Doesnt Suck by <a
href="https://github.com/rmusser01"><span class="citation"
data-cites="rmusser01">@rmusser01</span></a>.</li>
<li><a href="http://iotscanner.bullguard.com/">Internet of Things
Scanner</a> - Check if your internet-connected devices at home are
public on Shodan by <a
href="https://www.bullguard.com/">BullGuard</a>.</li>
<li><a
href="https://docs.google.com/presentation/d/1VpRT8dFyTaFpQa9jhehtmGaC7TqQniMSYbUdlHN6VrY/edit?usp=sharing">The
Bug Hunters Methodology v2.1</a> - Written by <a
href="https://twitter.com/jhaddix"><span class="citation"
data-cites="jhaddix">@jhaddix</span></a>.</li>
<li><a
href="https://sites.google.com/site/testsitehacking/-7-5k-Google-services-mix-up">$7.5k
Google services mix-up</a> - Written by <a
href="https://sites.google.com/site/testsitehacking/">Ezequiel
Pereira</a>.</li>
<li><a
href="https://labs.detectify.com/2018/01/12/how-i-exploited-acme-tls-sni-01-issuing-lets-encrypt-ssl-certs-for-any-domain-using-shared-hosting/">How
I exploited ACME TLS-SNI-01 issuing Lets Encrypt SSL-certs for any
domain using shared hosting</a> - Written by <a
href="https://twitter.com/fransrosen"><span class="citation"
data-cites="fransrosen">@fransrosen</span></a>.</li>
<li><a href="https://voidsec.com/vpn-leak/">TL:DR: VPN leaks users IPs
via WebRTC. Ive tested seventy VPN providers and 16 of them leaks
users IPs via WebRTC (23%)</a> - Written by <a
href="https://voidsec.com/">voidsec</a>.</li>
<li><a
href="https://www.optiv.com/blog/escape-and-evasion-egressing-restricted-networks">Escape
and Evasion Egressing Restricted Networks</a> - Written by <a
href="info@optiv.com">Chris Patten, Tom Steele</a>.</li>
<li><a
href="https://medium.com/@umpox/be-careful-what-you-copy-invisibly-inserting-usernames-into-text-with-zero-width-characters-18b4e6f17b66">Be
careful what you copy: Invisibly inserting usernames into text with
Zero-Width Characters</a> - Written by <a
href="https://medium.com/@umpox"><span class="citation"
data-cites="umpox">@umpox</span></a>.</li>
<li><a
href="https://www.sigpwn.io/blog/2018/4/14/domato-fuzzers-generation-engine-internals">Domato
Fuzzers Generation Engine Internals</a> - Written by <a
href="https://www.sigpwn.io/">sigpwn</a>.</li>
<li><a
href="https://www.evonide.com/side-channel-attacking-browsers-through-css3-features/">CSS
Is So Overpowered It Can Deanonymize Facebook Users</a> - Written by <a
href="https://www.evonide.com/">Ruslan Habalov</a>.</li>
<li><a
href="https://www.slideshare.net/nragupathy/introduction-to-web-application-security-blackhoodie-us-2018">Introduction
to Web Application Security</a> - Written by <a
href="https://twitter.com/itsC0rg1"><span class="citation"
data-cites="itsC0rg1">@itsC0rg1</span></a>, <a
href="https://twitter.com/jmkeads"><span class="citation"
data-cites="jmkeads">@jmkeads</span></a> and <a
href="https://twitter.com/matir"><span class="citation"
data-cites="matir">@matir</span></a>.</li>
<li><a
href="https://www.secjuice.com/finding-real-ips-of-origin-servers-behind-cloudflare-or-tor/">Finding
The Real Origin IPs Hiding Behind CloudFlare or TOR</a> - Written by <a
href="https://www.secjuice.com/author/paul-dannewitz/">Paul
Dannewitz</a>.</li>
<li><a
href="https://dev.to/antogarand/why-facebooks-api-starts-with-a-for-loop-1eob">Why
Facebooks api starts with a for loop</a> - Written by <a
href="https://twitter.com/AntoGarand"><span class="citation"
data-cites="AntoGarand">@AntoGarand</span></a>.</li>
<li><a
href="https://blog.avatao.com/How-I-could-steal-your-photos-from-Google/">How
I could have stolen your photos from Google - my first 3 bug bounty
writeups</a> - Written by <a
href="https://twitter.com/gergoturcsanyi"><span class="citation"
data-cites="gergoturcsanyi">@gergoturcsanyi</span></a>.</li>
<li><a href="https://0day.work/an-example-why-nat-is-not-security/">An
example why NAT is NOT security</a> - Written by <a
href="https://twitter.com/@0daywork"><span class="citation"
data-cites="0daywork">@0daywork</span></a>.</li>
<li><a
href="https://techvomit.net/web-application-penetration-testing-notes/">WEB
APPLICATION PENETRATION TESTING NOTES</a> - Written by <a
href="https://techvomit.net/">Jayson</a>.</li>
<li><a
href="https://segment.com/blog/hacking-with-a-heads-up-display/">Hacking
with a Heads Up Display</a> - Written by <a
href="https://segment.com/blog/authors/david-scrobonia/">David
Scrobonia</a>.</li>
<li><a href="https://slashcrypto.org/data/itsecx2018.pdf">Alexa Top 1
Million Security - Hacking the Big Ones</a> - Written by <a
href="https://twitter.com/slashcrypto"><span class="citation"
data-cites="slashcrypto">@slashcrypto</span></a>.</li>
<li><a
href="http://10degres.net/the-bug-bounty-program-that-changed-my-life/">The
bug bounty program that changed my life</a> - Written by <a
href="http://10degres.net/">Gwen</a>.</li>
<li><a
href="https://pentester.land/list-of-bug-bounty-writeups.html">List of
bug bounty writeups</a> - Written by <a
href="https://pentester.land/">Mariem</a>.</li>
<li><a
href="https://threatvector.cylance.com/en_us/home/implications-of-loading-net-assemblies.html">Implications
of Loading .NET Assemblies</a> - Written by <a
href="https://threatvector.cylance.com/en_us/contributors/brian-wallace.html">Brian
Wallace</a>.</li>
<li><a
href="https://westerns.tokyo/wctf2019-gtf/wctf2019-gtf-slides.pdf">WCTF2019:
Gyotaku The Flag</a> - Written by <a
href="https://twitter.com/t0nk42"><span class="citation"
data-cites="t0nk42">@t0nk42</span></a>.</li>
<li><a
href="https://www.rtcsec.com/2020/04/01-slack-webrtc-turn-compromise/">How
we abused Slacks TURN servers to gain access to internal services</a> -
Written by <a href="https://twitter.com/sandrogauci"><span
class="citation" data-cites="sandrogauci">@sandrogauci</span></a>.</li>
<li><a
href="https://medium.com/walmartlabs/dos-file-path-magic-tricks-5eda7a7a85fa">DOS
File Path Magic Tricks</a> - Written by <a
href="https://medium.com/@clr2of8"><span class="citation"
data-cites="clr2of8">@clr2of8</span></a>.</li>
<li><a
href="https://medium.com/heck-the-packet/how-i-got-my-first-big-bounty-payout-with-tesla-8d28b520162d">How
I got my first big bounty payout with Tesla</a> - Written by <a
href="https://medium.com/@cj.fairhead"><span class="citation"
data-cites="cj.fairhead">@cj.fairhead</span></a>.</li>
</ul>
<h2 id="code-of-conduct">Code of Conduct</h2>
<p>Please note that this project is released with a <a
href="code-of-conduct.md">Contributor Code of Conduct</a>. By
participating in this project you agree to abide by its terms.</p>
<h2 id="license">License</h2>
<p><a href="https://creativecommons.org/publicdomain/zero/1.0/"><img
src="http://mirrors.creativecommons.org/presskit/buttons/88x31/svg/cc-zero.svg"
alt="CC0" /></a></p>
<p>To the extent possible under law, <a
href="https://qazbnm456.github.io/"><span class="citation"
data-cites="qazbnm456">@qazbnm456</span></a> has waived all copyright
and related or neighboring rights to this work.</p>
<p><a
href="https://github.com/qazbnm456/awesome-web-security">websecurity.md
Github</a></p>