bug-bounty-reference
Last updated
Last updated
A list of bug bounty write-up that is categorized by the bug nature, this is inspired by https://github.com/djadmin/awesome-bug-bounty
I have been reading for Bug Bounty write-ups for a few months, I found it extremely useful to read relevant write-up when I found a certain type of vulnerability that I have no idea how to exploit. Let say you found a RPO (Relativce Path Overwrite) in a website, but you have no idea how should you exploit that, then the perfect place to go would be . Or you have found your customer is using oauth mechanism but you have no idea how should we test it, the other perfect place to go would be
My intention is to make a full and complete list of common vulnerability that are publicly disclosed bug bounty write-up, and let Bug Bounty Hunter to use this page as a reference when they want to gain some insight for a particular kind of vulnerability during Bug Hunting, feel free to submit pull request. Okay, enough for chit-chatting, let's get started.
he is able to make stored XSS from a irrelevant domain to main facebook domain
Google oauth bypass
Clickjacking
Alert, God-like Write-up, make sure you know what is ROP before clicking, which I don't =(
Deserialization
Image Tragick
It's Google Vulnerability, so it's worth reading, as generally it is more difficult to find Google vulnerability
by Patrik Fehrenbach
by filedescriptor
in Uber by Jack Whitton
by Jack Whitton
by Jack Whitton
by Ramzes
by secgeek
by Venkat S
by PAULOS YIBELO
by Harry M Gertos
by James Kettle (albinowax)
by Klikki Oy
by Masato Kinugawa
by fransrosen
- by Krzysztof Kotowicz
- by detectify
- by frans
by Klikki Oy
by securityguard
by securityguard
by geekboy
by Marin MoulinierFollow
by Brett
by zhchbin
by frans
by Jelmer de Hen
by Sergey Bobrov
by Arne Swinnen
by Arne Swinnen
by Arne Swinnen
by r0t
by Efkan Gökbaş (mefkan)
by glc
by Orange Tsai
by Brett Buerhaus
by Abood Nour (syndr0me)
by Orange
by Ebrahim Hegazy
by Jack Whitton -
by Jack Whitton
by filedescriptor
by Egor Homakov
by filedescriptor
by Mahmoud G. (zombiehelp54)
by mongo (mongo)
by filedescriptor.
by labsdetectify
by nbsriharsha
By Jack Whitton
By Sriram
by Jack Whitton
by Florian Courtial
by Yasser Ali
by vijay kumar
by phwd
by @aaditya_purani
by Dr.Jones
by Milan A Solanki
by Reginaldo Silva
by Orange Tsai
by Orange Tsai
by Orange Tsai
by Orange Tsai (Sorry its in Chinese Only)
by Ruslan Habalov
by secgeek
by Cure53 (cure53)
by 93c08539 (93c08539)
by Raz0r (ru_raz0r)
by Bitquark
by 5haked
by Michael Stepankin
by @alberto__segura
by buerRCE
by Orange Tsai
by Ebrahim Hegazy
by Ebrahim Hegazy
by Ebrahim Hegazy
by Michael Stepankin
by Wesley Wineberg
by Michiel Prins (michiel)
by meals
by NaHamSec
by c666a323be94d57
by Florian Courtial
by Florian Courtial
by Florian Courtial
by mongo
by secgeek
by secgeek
by secgeek
by Yaaser Ali
by Yaaser Ali
by Duo Labs
by Enguerran Gillier (opnsec)
by Jobert Abma (jobert)
by Gazza (gazza)
by Severus (severus)
by Roy Castillo
by Raja Sekar Durairaj
by phwd
by ?, be honest, thanks to this article, I have found quite a few bugs because of using his method, respect to the author!
by Edgar Boda-Majer (eboda)
by Matthew Temmy (temmyscript)
by Stephen Sclafani
by Stephen Sclafani
by kedrisec
by sean
by detectify
by Raghav Bisht
by vijay kumar
by secgeek
by vijay kumar (vijay_kumar1110)
by Brett Buerhaus
by Brett BUERHAUS
by Josip Franjković
by Fábio Pires (shmoo)
by Egor Homakov
by Arne Swinnen
by POUYA DARABI
by
by Jouko Pynnönen (jouko)
by henryhoggard
by c0rni3sm
by mishre
by Antonio Sanso
by uzsunny
by filedescriptor
by filedescriptor
by Ezequiel Pereira
by geekboy
- by David Vieira-Kurz
by Arne Swinnen
- by geekboy
by Inti De Ceukelaire
by 4lemon
by phwd
by websecurify
by cirw
by websecrify
by w3af
by sirdarckcat
By EdOverflow