ReconDock By Kdairatchi
Go To ReconDock
MyRepo
MyRepo
  • Pastebin Services
  • Awesome Ai Talk
  • Bug Bounty Testing, Techniques, and Tools
  • Cybersources
  • Targets
  • Bug checklist
  • Bug Bounty Platforms
  • Awesome Bug Bounty Tips Awesome
    • CVE Exploits and PoC Collection
  • ============ Awesome Bugs
    • Awesome One-liner Bug Bounty
  • Awesome CS Courses
  • Awesome Cyber Co
  • Awesome Dev
  • Awesome Free Certs
  • Awesome Git
  • Awesome Github
  • Awesome Go
  • Awesome Interviews
  • Awesome Keys
  • Awesome Mac OpenSource
  • Awesome Mac
  • Awesome Python
    • Awesome Tool
  • Awesome-Selfhosted
    • Awesome Hacker Search Engines
  • Awesome Shell
  • Awesome Shodan Search Queries
  • Awesome Static Website Services Awesome
  • Awesome Vulnerable Applications
  • Awesome WAF
  • Awesome First PR Opportunities
  • Awesome-Bugbounty-Writeups
  • Awesome-web3-Security awesome
  • Bug-Bounty
  • CTF Tools
  • Awesome Blockchain Bug Bounty
  • Awesome Bug Bounty
  • awesome-design-systems
  • Awesome Google VRP Writeups
  • Web Scraping
  • awesome
  • bug-bounty-reference
  • the-book-of-secret-knowledge
  • APACHE
  • AWS
  • AZURE
  • CISCO
  • CLOUDFLARE
  • Cross Origin Resource Sharing (CORS)
  • CRLF Injection || HTTP Response Splitting
  • CSV Injection
  • Content Injection
  • CRLF Injection || HTTP Response Splitting
  • JENKINS
  • JIRA
  • LFI
  • OR
  • PostgreSQL Environment Variable Manipulation Vulnerability
  • RCE
  • Recon
  • SSRF
  • Proof OF Concept (POC): SharePoint Vulnerability Detection
  • Template Injection
  • WORDPRESS
  • XSLT Injection
  • XSS
  • XXE
  • Books
  • Firebase Subdomain Enumeration & PoC Testing
  • SQLI
  • Special Tools
  • Account Takeover
  • Authentication
  • Broken Link Hijacking
  • Business Logic Errors
  • Default Credentials
  • Email Spoofing
  • ExposedAPIkeys
  • ForgotPasswordFunctionality
  • JWT Vulnerabilities
  • OWASPTestingChecklist1
  • Tabnabbing
  • Web Cache Poisoning
  • Wordpress Endpoints to look
  • lfi_vulnerble_targets
  • (LFI)passwrd
  • LostSec
  • POCS
    • CVES
      • CVE-2021-36873
      • BreadcrumbsSQL_Injection_cve_2024
      • CVE-2024-0195
      • CVE-2024-29269 Exploit
  • 403-ByPass
  • Chat-bot_xss_payloads
  • burp
    • Match & Replace
    • Zap
  • cloudflare-waf-bypass
  • infosec
    • Customize the bash shell environments
    • automation
    • Website Ideas
  • 2FA bypass
  • Account Takeover
  • OWASP Web Application Security Testing Checklist
  • Projects
  • OWASP Top Ten
  • links
  • Bug Bounty Builder ¯\(ツ)/¯
  • Awesome
    • AllAboutBugBounty: All about bug bounty (bypasses, payloads, and etc)
  • Cheatsheets
  • Checklists
    • Here’s a clear, step by step breakdown of commands, tools, and objectives for each section in your Web Security Testing Guide (WSTG). Each test includes easy to follow commands, explanations, and examples where applicable.
  • Dorks
  • Scripts
  • Loads
  • OWASP
    • Checklist
  • ai
    • Ai Best for Information and Coding
  • Medium Recent Writeups
  • 🌟 Useful Extensions for Bug Bounty Hunting 🌟
  • Customize the bash shell environments
  • Fabric
    • Test Application Platform Configuration
  • Docker
  • Git auto
  • Bug Bounty Beginner's Roadmap
  • Methodology 2025
    • Advanced Recon Methodology
Powered by GitBook
On this page
  • Bug Bounty Reference
  • Introduction
  • XSSI
  • Email Related
  • Money Stealing
  • 2017 Local File Inclusion
  • Miscellaneous

bug-bounty-reference

PreviousawesomeNextthe-book-of-secret-knowledge

Last updated 4 months ago

Bug Bounty Reference

A list of bug bounty write-up that is categorized by the bug nature, this is inspired by https://github.com/djadmin/awesome-bug-bounty

Introduction

I have been reading for Bug Bounty write-ups for a few months, I found it extremely useful to read relevant write-up when I found a certain type of vulnerability that I have no idea how to exploit. Let say you found a RPO (Relativce Path Overwrite) in a website, but you have no idea how should you exploit that, then the perfect place to go would be . Or you have found your customer is using oauth mechanism but you have no idea how should we test it, the other perfect place to go would be

My intention is to make a full and complete list of common vulnerability that are publicly disclosed bug bounty write-up, and let Bug Bounty Hunter to use this page as a reference when they want to gain some insight for a particular kind of vulnerability during Bug Hunting, feel free to submit pull request. Okay, enough for chit-chatting, let's get started.

Cross-Site Scripting (XSS)

    • he is able to make stored XSS from a irrelevant domain to main facebook domain

Brute Force

SQL Injection

Stealing Access Token

Google oauth bypass

Clickjacking

CSRF

Remote Code Execution

    • Alert, God-like Write-up, make sure you know what is ROP before clicking, which I don't =(

Deserialization

Image Tragick

Direct Object Reference (IDOR)

    • It's Google Vulnerability, so it's worth reading, as generally it is more difficult to find Google vulnerability

XXE

Unrestricted File Upload

Server Side Request Forgery (SSRF)

Race Condition

Business Logic Flaw

Authentication Bypass

HTTP Header Injection

Subdomain Takeover

XSSI

Email Related

Money Stealing

2017 Local File Inclusion

Miscellaneous

by Patrik Fehrenbach

by filedescriptor

in Uber by Jack Whitton

by Jack Whitton

by Jack Whitton

by Ramzes

by secgeek

by Venkat S

by PAULOS YIBELO

by Harry M Gertos

by James Kettle (albinowax)

by Klikki Oy

by Masato Kinugawa

by fransrosen

- by Krzysztof Kotowicz

- by detectify

- by frans

by Klikki Oy

by securityguard

by securityguard

by geekboy

by Marin MoulinierFollow

by Brett

by zhchbin

by frans

by Jelmer de Hen

by Sergey Bobrov

by Arne Swinnen

by Arne Swinnen

by Arne Swinnen

by r0t

by Efkan Gökbaş (mefkan)

by glc

by Orange Tsai

by Brett Buerhaus

by Abood Nour (syndr0me)

by Orange

by Ebrahim Hegazy

by Jack Whitton -

by Jack Whitton

by filedescriptor

by Egor Homakov

by filedescriptor

by Mahmoud G. (zombiehelp54)

by mongo (mongo)

by filedescriptor.

by labsdetectify

by nbsriharsha

By Jack Whitton

By Sriram

by Jack Whitton

by Florian Courtial

by Yasser Ali

by vijay kumar

by phwd

by @aaditya_purani

by Dr.Jones

by Milan A Solanki

by Reginaldo Silva

by Orange Tsai

by Orange Tsai

by Orange Tsai

by Orange Tsai (Sorry its in Chinese Only)

by Ruslan Habalov

by secgeek

by Cure53 (cure53)

by 93c08539 (93c08539)

by Raz0r (ru_raz0r)

by Bitquark

by 5haked

by Michael Stepankin

by @alberto__segura

by buerRCE

by Orange Tsai

by Ebrahim Hegazy

by Ebrahim Hegazy

by Ebrahim Hegazy

by Michael Stepankin

by Wesley Wineberg

by Michiel Prins (michiel)

by meals

by NaHamSec

by c666a323be94d57

by Florian Courtial

by Florian Courtial

by Florian Courtial

by mongo

by secgeek

by secgeek

by secgeek

by Yaaser Ali

by Yaaser Ali

by Duo Labs

by Enguerran Gillier (opnsec)

by Jobert Abma (jobert)

by Gazza (gazza)

by Severus (severus)

by Roy Castillo

by Raja Sekar Durairaj

by phwd

by ?, be honest, thanks to this article, I have found quite a few bugs because of using his method, respect to the author!

by Edgar Boda-Majer (eboda)

by Matthew Temmy (temmyscript)

by Stephen Sclafani

by Stephen Sclafani

by kedrisec

by sean

by detectify

by Raghav Bisht

by vijay kumar

by secgeek

by vijay kumar (vijay_kumar1110)

by Brett Buerhaus

by Brett BUERHAUS

by Josip Franjković

by Fábio Pires (shmoo)

by Egor Homakov

by Arne Swinnen

by POUYA DARABI

by

by Jouko Pynnönen (jouko)

by henryhoggard

by c0rni3sm

by mishre

by Antonio Sanso

by uzsunny

by filedescriptor

by filedescriptor

by Ezequiel Pereira

by geekboy

- by David Vieira-Kurz

by Arne Swinnen

- by geekboy

by Inti De Ceukelaire

by 4lemon

by phwd

by websecurify

by cirw

by websecrify

by w3af

by sirdarckcat

By EdOverflow

Sleeping stored Google XSS Awakens a $5000 Bounty
RPO that lead to information leakage in Google
God-like XSS, Log-in, Log-out, Log-in
An XSS on Facebook via PNGs & Wonky Content Types
Stored XSS in *.ebay.com
Complicated, Best Report of Google XSS
Tricky Html Injection and Possible XSS in sms-be-vip.twitter.com
Command Injection in Google Console
Facebook's Moves - OAuth XSS
Stored XSS in Google Docs (Bug Bounty)
Stored XSS on developer.uber.com via admin account compromise in Uber
Yahoo Mail stored XSS
Abusing XSS Filter: One ^ leads to XSS(CVE-2016-3212)
Youtube XSS
Best Google XSS again
IE & Edge URL parsin Problem
Google XSS subdomain Clickjacking
Google Japan Book XSS
Flash XSS mega nz
xss in google IE, Host Header Reflection
Years ago Google xss
xss in google by IE weird behavior
xss in Yahoo Fantasy Sport
xss in Yahoo Mail Again, worth $10000
Sleeping XSS in Google
Decoding a .htpasswd to earn a payload of money
Google Account Takeover
AirBnb Bug Bounty: Turning Self-XSS into Good-XSS #2
Uber Self XSS to Global XSS
How I found a $5,000 Google Maps XSS (by fiddling with Protobuf)
Airbnb – When Bypassing JSON Encoding, XSS Filter, WAF, CSP, and Auditor turns into Eight Vulnerabilities
XSSI, Client Side Brute Force
postMessage XSS Bypass
XSS in Uber via Cookie
Stealing contact form data on www.hackerone.com using Marketo Forms XSS with postMessage frame-jumping and jQuery-JSONP
XSS due to improper regex in third party js Uber 7k XSS
XSS in TinyMCE 2.4.0
Pass uncoded URL in IE11 to cause XSS
Twitter XSS by stopping redirection and javascript scheme
Auth DOM Uber XSS
XSS in www.yahoo.com
Stored XSS, and SSRF in Google using the Dataset Publishing Language
Stored XSS on Snapchat
Researching Polymorphic Images for XSS on Google Scholar
OLX Bug Bounty: Reflected XSS in 404 Page
Web Authentication Endpoint Credentials Brute-Force Vulnerability
InstaBrute: Two Ways to Brute-force Instagram Account Credentials
How I Could Compromise 4% (Locked) Instagram Accounts
Possibility to brute force invite codes in riders.uber.com
Brute-Forcing invite codes in partners.uber.com
SQL injection in Wordpress Plugin Huge IT Video Gallery in Uber
SQL Injection on sctrack.email.uber.com.cn
Yahoo – Root Access SQL Injection – tw.yahoo.com
Multiple vulnerabilities in a WordPress plugin at drive.uber.com
GitHub Enterprise SQL Injection
Yahoo SQL Injection to Remote Code Exection to Root Privilege
Facebook Access Token Stolen
Obtaining Login Tokens for an Outlook, Office or Azure Account
Bypassing Digits web authentication's host validation with HPP
Bypass of redirect_uri validation with /../ in GitHub
Bypassing callback_url validation on Digits
Stealing livechat token and using it to chat as the user - user information disclosure
Change any Uber user's password through /rt/users/passwordless-signup - Account Takeover (critical)
Internet Explorer has a URL problem, on GitHub
How I made LastPass give me all your passwords
Steal Google Oauth in Microsoft
Steal FB Access Token
Paypal Access Token Leaked
Steal FB Access Token
Appengine Cool Bug
Slack post message real life experience
Bypass redirect_uri
Stealing Facebook Messenger nonce worth 15k
Steal Oculus Nonce and Oauth Flow Bypass
Bypassing Google Authentication on Periscope's Administration Panel
Play a game, get Subscribed to my channel - YouTube Clickjacking Bug | #GoogleVRP
Messenger.com CSRF that show you the steps when you check for CSRF
Paypal bug bounty: Updating the Paypal.me profile picture without consent (CSRF attack)
Hacking PayPal Accounts with one click (Patched)
Add tweet to collection CSRF
Facebookmarketingdevelopers.com: Proxies, CSRF Quandry and API Fun
How i Hacked your Beats account ? Apple Bug Bounty
FORM POST JSON: JSON CSRF on POST Heartbeats API
Hacking Facebook accounts using CSRF in Oculus-Facebook integration
JDWP Remote Code Execution in PayPal
XXE in OpenID: one bug to rule them all, or how I found a Remote Code Execution flaw affecting Facebook's servers
How I Hacked Facebook, and Found Someone's Backdoor Script
How I Chained 4 vulnerabilities on GitHub Enterprise, From SSRF Execution Chain to RCE!
uber.com may RCE by Flask Jinja2 Template Injection
Yahoo Bug Bounty - *.login.yahoo.com Remote Code Execution
How we broke PHP, hacked Pornhub and earned $20,000
RCE deal to tricky file upload
WordPress SOME bug in plupload.flash.swf leading to RCE in Automatic
Read-Only user can execute arbitraty shell commands on AirOS
Remote Code Execution by impage upload!
Popping a shell on the Oculus developer portal
Crazy! PornHub RCE AGAIN!!! How I hacked Pornhub for fun and profit - 10,000$
PayPal Node.js code injection (RCE)
eBay PHP Parameter Injection lead to RCE
Yahoo Acqusition RCE
Command Injection Vulnerability in Hostinger
RCE in Airbnb by Ruby Injection
RCE in Imgur by Command Line
RCE in git.imgur.com by abusing out dated software
RCE in Disclosure
Remote Code Execution by struct2 Yahoo Server
Command Injection in Yahoo Acquisition
$50k RCE in JetBrains IDE
Telekom.de Remote Command Execution!
Magento Remote Code Execution Vulnerability!
Yahoo! Remote Command Execution Vulnerability
Java Deserialization in manager.paypal.com
Instagram's Million Dollar Bug
(Ruby Cookie Deserialization RCE on facebooksearch.algolia.com
Java deserialization
Exploiting ImageMagick to get RCE on Polyvore (Yahoo Acquisition)
Exploting ImageMagick to get RCE on HackerOne
Trello bug bounty: Access server's files using ImageTragick
40k fb rce
Yahoo Bleed 1
Yahoo Bleed 2
Trello bug bounty: The websocket receives data when a public company creates a team visible board
Trello bug bounty: Payments informations are sent to the webhook when a team changes its visibility
Change any user's password in Uber
Vulnerability in Youtube allowed moving comments from any video to another
Twitter Vulnerability Could Credit Cards from Any Twitter Account
One Vulnerability allowed deleting comments of any user in all Yahoo sites
Microsoft-careers.com Remote Password Reset
How I could change your eBay password
Duo Security Researchers Uncover Bypass of PayPal’s Two-Factor Authentication
How I got access to millions of [redacted] accounts
All Vimeo Private videos disclosure via Authorization Bypass with Excellent Technical Description
Urgent: attacker can access every data source on Bime
Downloading password protected / restricted videos on Vimeo
Get organization info base on uuid in Uber
How I Exposed your Primary Facebook Email Address (Bug worth $4500)
DOB disclosed using “Facebook Graph API Reverse Engineering”
Change the description of a video without publish_actions permission in Facebook
Response To Request Injection (RTRI)
Leak of all project names and all user names , even across applications on Harvest
Changing paymentProfileUuid when booking a trip allows free rides at Uber
View private tweet
Hacking Facebook’s Legacy API, Part 1: Making Calls on Behalf of Any User
Hacking Facebook’s Legacy API, Part 2: Stealing User Sessions
Delete FB Video
Delete FB Video
Viewing private Airbnb Messages
IDOR tweet as any user
Mass Assignment, Response to Request Injection, Admin Escalation
Getting any Facebook user's friend list and partial payment card details
Manipulation of ETH balance
How we got read access on Google’s production servers
Blind OOB XXE At UBER 26+ Domains Hacked
XXE through SAML
XXE in Uber to read local files
File Upload XSS in image uploading of App in mopub
RCE deal to tricky file upload
File Upload XSS in image uploading of App in mopub in Twitter
ESEA Server-Side Request Forgery and Querying AWS Meta Data
SSRF to pivot internal network
SSRF to LFI
SSRF to query google internal server
SSRF by using third party Open redirect
SSRF tips from BugBountyHQ of Images
SSRF to RCE
XXE at Twitter
Blog post: Cracking the Lens: Targeting HTTP’s Hidden Attack-Surface
Plotly AWS Metadata SSRF (and a stored XSS)
Race conditions on Facebook, DigitalOcean and others (fixed)
Race Conditions in Popular reports feature in HackerOne
Hacking Starbuck for unlimited money
How I Could Steal Money from Instagram, Google and Microsoft
Facebook - bypass ads account's roles vulnerability 2015
Uber Eat for Free
OneLogin authentication bypass on WordPress sites via XMLRPC in Uber
2FA PayPal Bypass
SAML Bug in Github worth 15000
Authentication bypass on Airbnb via OAuth tokens theft
Administrative Panel Access
Flickr Oauth Misconfiguration
Slack SAML authentication bypass
Shopify admin authentication bypass using partners.shopify.com
Twitter Overflow Trilogy in Twitter
Twitter CRLF
Adblock Plus and (a little) more in Google
$10k host header
Hijacking tons of Instapage expired users Domains & Subdomains
Reading Emails in Uber Subdomains
Slack Bug Journey
Subdomain takeover and chain it to perform authentication bypass
Hacker.One Subdomain Takeover
Plain Text Reading by XSSI
JSON hijacking
OWASP XSSI
Japan Identifier based XSSI attacks
JSON Hijack Slide
This domain is my domain - G Suite A record vulnerability
I got emails - G Suite Vulnerability
How I snooped into your private Slack messages [Slack Bug bounty worth $2,500]
Reading Uber’s Internal Emails [Uber Bug Bounty report worth $10,000]
Slack Yammer Takeover by using TicketTrick
How I could have mass uploaded from every Flickr account!
Round error issue -> produce money for free in Bitcoin Site
Disclosure Local File Inclusion by Symlink
Facebook Symlink Local File Inclusion
Gitlab Symlink Local File Inclusion
Gitlab Symlink Local File Inclusion Part II
Multiple Company LFI
LFI by video conversion, excited about this trick!
SAML Pen Test Good Paper
A list of FB writeup collected by phwd
NoSQL Injection
CORS in action
CORS in Fb messenger
Web App Methodologies
XXE Cheatsheet
The road to hell is paved with SAML Assertions, Microsoft Vulnerability
Study this if you like to learn Mongo SQL Injection
Mongo DB Injection again
w3af speech about modern vulnerability
Web cache attack that lead to account takeover
A talk to teach you how to use SAML Raider
XSS Checklist when you have no idea how to exploit the bug
CTF write up, Great for Bug Bounty
It turns out every site uses jquery mobile with Open Redirect is vulnerable to XSS
Bypass CSP by using google-analytics
Payment Issue with Paypal
Browser Exploitation in Chinese
XSS bypass filter
Markup Impropose Sanitization
Breaking XSS mitigations via Script Gadget
X41 Browser Security White Paper
Bug Bounty Cheatsheets
Messing with the Google Buganizer System for $15,600 in Bounties
Electron Security White Paper
Twitter's Vine Source code dump - $10080
SAML Bible
Bypassing Google’s authentication to access their Internal Admin panels — Vishnu Prasad P G
Smart Contract Vulnerabilities
here
here
XSSI
Cross-Site Scripting (XSS)
Brute Force
SQL Injection (SQLi)
External XML Entity Attack (XXE)
Remote Code Execution (RCE)
Deserialization
Image Tragick
Cross-Site Request Forgery (CSRF)
Insecure Direct Object Reference (IDOR)
Stealing Access Token
Google Oauth Login Bypass
Server Side Request Forgery (SSRF)
Unrestricted File Upload
Race Condition
Business Logic Flaw
Authentication Bypass
HTTP Header Injection
Email Related
Money Stealing
Miscellaneous