bug-bounty-writeups icon indicating copy to clipboard operation
bug-bounty-writeups copied to clipboard

A curated list of available Bug Bounty & Disclosure Programs and Write-ups.

bug bounty writeups

A list of available Bug Bounty & Disclosure Programs and Write-ups.

Table of Contents

  • Cross Site Scripting (XSS)
  • Cross Site Request Forgery (CSRF)
  • Clickjacking (UI Redressing Attack)
  • Local File Inclusion (LFI)
  • Subdomain Takeover
  • Denial of Service (DOS)
  • Authentication Bypass
  • SQL injection
  • Insecure Direct Object Reference (IDOR)
  • 2FA bypass
  • Server Side Request Forgery (SSRF)
  • Race Condition
  • Remote Code Execution (RCE)
  • External XML Entity Attack (XXE)
  • Insecure Deserialization
  • Business Logic Flaw
  • HTTP Header Injection
  • Server-Side Template Injection (SSTI)
  • Broken link hijacking (BLH)
  • DOM-based vulnerabilities
  • Cross-origin resource sharing (CORS)
  • HTTP request smuggling
  • OS command injection
  • Directory traversal
  • WebSockets Attack
  • Web cache poisoning
  • Information disclosure
  • CRLF injection

Cross Site Scripting (XSS)

Cross Site Request Forgery (CSRF)

Clickjacking (UI Redressing Attack)

Local File Inclusion (LFI)

Subdomain Takeover

Denial of Service (DOS)

Authentication Bypass

SQL injection

Insecure Direct Object Reference (IDOR)

2FA bypass

Server Side Request Forgery (SSRF)

Race Condition

Remote Code Execution (RCE)

External XML Entity Attack (XXE)

Insecure Deserialization

Business Logic Flaw

HTTP Header Injection

Server-Side Template Injection (SSTI)

Broken link hijacking (BLH)

DOM-based vulnerabilities

Cross-origin resource sharing (CORS)

HTTP request smuggling

OS command injection

Directory traversal

WebSockets Attack

Web cache poisoning

Information disclosure

CRLF injection

Made By

kh4sh3i

License

CC0-1.0 License