├── CheckList ├── mindmap.png ├── Web_Checklist_by_Chintan_Gurjar.pdf ├── Web_Penetration_Testing_Methodology@2x.png └── Web_Application_Penetration_Testing_Checklist_by_Tushar_Verma.pdf ├── Subdomain_Takeover ├── dns.png ├── cname.png ├── cname_buy.png ├── subdomain_takeover.png ├── Easy_Methods.md ├── Subdomain_Takeover.md └── Sub_or_top_level_domain_takeover.md ├── Sign_Up_Functionality ├── Signup_Mindmap.png └── Hunting_for_bugs_in_signup_feature.md ├── CMS ├── Moodle.md ├── Drupal.md ├── AEM.md └── wordpress.md ├── Authentication_Bypass ├── account_ban_bypass.md ├── OTP_Bypass.md └── 2FA_Bypasses.md ├── Password_Reset_Functionality ├── Account_Takeover_By_Password_Reset_Functionality.md ├── README.md ├── Password_Reset_Token_Leakage.md ├── Password_Reset_Flaws_by_Sm4rty.md └── Top_5_Password_Reset_Bugs ├── OAuth ├── README.md └── OAuth 2.0 Hunting Methodology.md ├── Rate_limit ├── No Rate-limit on Promo.md ├── No Rate-Limit on Verify-PhoneNo.md ├── No Rate-limit on Verify-email.md ├── No Rate-limit on forget-password.md ├── No Rate-limit on Invite User.md ├── README.md └── RateLimitBypass.md ├── SSTI └── SSTI.md ├── Sensitive_Info_Leaks ├── Shodan_cve_dorks.md ├── Version_Leak.md ├── Github_Recon_Method.md ├── Google_Dorks.md └── Github-dorks.md ├── MFA_Bypasses ├── README.md └── 2FA_Bypass.md ├── CONTRIBUTING.md ├── JIRA └── README.md ├── CORS ├── CORS_Bypasses.md └── CORS.md ├── .github └── FUNDING.yml ├── CSRF ├── README.md └── Cross_Site_Request_Forgery_Bypass.md ├── Open_Redirection ├── Open_Redirection_Bypass.md └── find_OpenRedirect_trick.md ├── XXE ├── XXE_Methods.md └── Billion_Laugh_Attack.md ├── HTML_Injection └── HTML_Injection_on_password_reset_page.md ├── CVES └── easycve.md ├── Parameter_Pollution └── Parameter_Pollution_in_social_sharing_buttons.md ├── EXIF_Geo_Data_Not_Stripped └── exif_geo.md ├── SSRF ├── Blind_SSRF.md └── SSRF-old.md ├── Status_Code_Bypass ├── README.md └── 403Bypass.md ├── API_Testing ├── Reverse_Engineer_an_API.md └── Hidden_API_Functionality_Exposure.md ├── Weak_Password_Policy └── Weak_password_policy.md ├── BrokenLinkHijacking └── BrokenLinkHijacking.md ├── Misconfigurations ├── Default_Credential_And_Admin_Panel.md ├── S3-Bucket_Misconfig.md └── Docker.md ├── Tabnabbing └── Tabnabbing.md ├── Host-Header └── Host-Header.md ├── Recon ├── Workflow.md ├── subdomain_enumeration.md └── Github_Dorking.md ├── GraphQL └── GraphQL.md ├── XSS ├── XSS_Bypass.md ├── Automated_XSS.md ├── post_message_xss.md ├── Bypass_CSP.md └── Xss.md ├── File_Upload └── old_file_upload_bypass.md ├── Account_Takeovers_Methodologies └── Account_Takeovers_Methods.md ├── HTTP_Desync └── http_desync.md ├── CODE_OF_CONDUCT.md ├── Application_Level_DoS └── ALD_Methods.md ├── JWT └── OLD_JWT_ATTACK_Notes.md ├── Web_Source_Review └── codereviewtips.md ├── IDOR └── IDOR-Old.md ├── FindOriginIP └── FindOrigin.md ├── WAF_Bypasses └── WAF_Bypass_Using_headers.md ├── Broken_Auth_And_Session_Management └── Session_based_bugs.md ├── SQLi └── SQL_Injection.md ├── SUMMARY.md └── Race_Condition └── race_conditions.md /CheckList/mindmap.png: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/attacker-codeninja/HowToHunt/HEAD/CheckList/mindmap.png -------------------------------------------------------------------------------- /Subdomain_Takeover/dns.png: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/attacker-codeninja/HowToHunt/HEAD/Subdomain_Takeover/dns.png -------------------------------------------------------------------------------- /Subdomain_Takeover/cname.png: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/attacker-codeninja/HowToHunt/HEAD/Subdomain_Takeover/cname.png -------------------------------------------------------------------------------- /Subdomain_Takeover/cname_buy.png: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/attacker-codeninja/HowToHunt/HEAD/Subdomain_Takeover/cname_buy.png -------------------------------------------------------------------------------- /Sign_Up_Functionality/Signup_Mindmap.png: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/attacker-codeninja/HowToHunt/HEAD/Sign_Up_Functionality/Signup_Mindmap.png -------------------------------------------------------------------------------- /Subdomain_Takeover/subdomain_takeover.png: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/attacker-codeninja/HowToHunt/HEAD/Subdomain_Takeover/subdomain_takeover.png -------------------------------------------------------------------------------- /CheckList/Web_Checklist_by_Chintan_Gurjar.pdf: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/attacker-codeninja/HowToHunt/HEAD/CheckList/Web_Checklist_by_Chintan_Gurjar.pdf -------------------------------------------------------------------------------- /CheckList/Web_Penetration_Testing_Methodology@2x.png: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/attacker-codeninja/HowToHunt/HEAD/CheckList/Web_Penetration_Testing_Methodology@2x.png -------------------------------------------------------------------------------- /CheckList/Web_Application_Penetration_Testing_Checklist_by_Tushar_Verma.pdf: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/attacker-codeninja/HowToHunt/HEAD/CheckList/Web_Application_Penetration_Testing_Checklist_by_Tushar_Verma.pdf -------------------------------------------------------------------------------- /CMS/Moodle.md: -------------------------------------------------------------------------------- 1 | ## Mass Hunting XSS — Moodle 2 | * [https://dewangpanchal98.medium.com/mass-hunting-xss-moodle-ed4b50c82516](https://dewangpanchal98.medium.com/mass-hunting-xss-moodle-ed4b50c82516) 3 | 4 | ## Author: 5 | [@th3.d1p4k](https://twitter.com/DipakPanchal05) 6 | -------------------------------------------------------------------------------- /Authentication_Bypass/account_ban_bypass.md: -------------------------------------------------------------------------------- 1 | ### How to bypass account ban 2 | 3 | Steps: 4 | ``` 5 | If you got ban from xyz.com try to see other domain like forms etc where you need the same account to login. 6 | you maybe able to login from forms.xyz.com and its a bypass I found it on a hackerone private program. 7 | ``` 8 | -------------------------------------------------------------------------------- /CMS/Drupal.md: -------------------------------------------------------------------------------- 1 | ## Drupal Nodes 2 | 3 | Tips: 4 | ``` 5 | If you hunt on a Drupal website: fuzz with intruder on '/node/$' where '$' is a number (from 1 to 500 for example). 6 | You could find hidden pages (test, dev) which are not referenced by the search engines. 7 | ``` 8 | 9 | * [adrien_jeanneau](https://twitter.com/adrien_jeanneau/status/1273952564430725123?t=SUinUf09jxjRXu1yF9AQDg&s=19) 10 | -------------------------------------------------------------------------------- /Password_Reset_Functionality/Account_Takeover_By_Password_Reset_Functionality.md: -------------------------------------------------------------------------------- 1 | 2 | ``` 3 | 1. email= victim@gmail.com&email=attacker@gmil.com 4 | 2. email= victim@gmail.com%20email=attacker@gmil.com 5 | 3. email= victim@gmail.com |email=attacker@gmil.com 6 | 4. email= victim@gmail.com%0d%0acc:attacker@gmil.com 7 | 5. email= victim@gmail.com&code= my password reset token 8 | ``` 9 | ### Authors 10 | 11 | @tamimhasan404 12 | -------------------------------------------------------------------------------- /Password_Reset_Functionality/README.md: -------------------------------------------------------------------------------- 1 | # Password Reset Mindmap 2 |  3 | 4 | # Source 5 | * [Twitter](https://twitter.com/N008x/status/1302515523557548032/photo/1) 6 | * [Blog](https://anugrahsr.github.io/posts/10-Password-reset-flaws/) 7 | # Authors 8 | * [KathanP19](https://twitter.com/KathanP19) 9 | -------------------------------------------------------------------------------- /OAuth/README.md: -------------------------------------------------------------------------------- 1 | # Some MindMap 2 | --- 3 | ### OAuth by Hack3rSr0lls 4 |  5 | 6 | ### Source 7 | * [https://twitter.com/hackerscrolls/status/1269266750467649538](https://twitter.com/hackerscrolls/status/1269266750467649538) 8 | 9 | ### Author 10 | * [KathanP19](https://twitter.com/KathanP19) 11 | -------------------------------------------------------------------------------- /Rate_limit/No Rate-limit on Promo.md: -------------------------------------------------------------------------------- 1 | ## No Rate-Limit on Promo 2 | 3 | ### Steps To Reproduce: 4 | - 1) Go to URL - `https://abc.target.com/product/121/checkout/promo` 5 | - 2) Navigate to `Offer/Promo/Coupon code` option 6 | - 3) Enter the random digit 7 | - 4) `Intercept the Request` and Send to intruder 8 | - 5) Apply payload & `Start attack` 9 | 10 | ### Impact : 11 | - Financial Loss, an attacker can easily bruteforce all promo/coupon/Offer codes. -------------------------------------------------------------------------------- /SSTI/SSTI.md: -------------------------------------------------------------------------------- 1 | # Some MindMaps 2 | --- 3 | ### SSTI Finding Attack Vector by @what_web 4 |  5 | 6 | ### Source 7 | * [https://twitter.com/jae_hak99/status/1331967876417327104?s=20](https://twitter.com/jae_hak99/status/1331967876417327104?s=20) 8 | 9 | ### Tools 10 | + [tplmap](https://github.com/epinna/tplmap) 11 | ### Author 12 | * [0xsunil](https://twitter.com/0xsunil) 13 | -------------------------------------------------------------------------------- /Sensitive_Info_Leaks/Shodan_cve_dorks.md: -------------------------------------------------------------------------------- 1 | ## CVE's Shodan Dorks. 2 | 3 | * Big IP shodan Search:- 4 | 5 | `http.title:"BIG-IP®-Redirect" org:Org` 6 | 7 | * CVE 2020-3452 8 | 9 | ` http.html_hash:-628873716 10 | “set-cookie: webvpn;”` 11 | 12 | * CVE CVE-2019-11510 13 | 14 | `http.html:/dana-na/` 15 | 16 | * CVE-2020–5902 17 | 18 | ```inurl:/tmui/login.jsp``` 19 | 20 | 21 | ## Author: 22 | - [@manasH4rsh](https://twitter.com/manasH4rsh) 23 | - [Fani Malik](https://twitter.com/FaniMalikHack) 24 | -------------------------------------------------------------------------------- /CMS/AEM.md: -------------------------------------------------------------------------------- 1 | ## Adobe Experience Manager 2 | 3 | ### Tools 4 | + [aem-hacker](https://github.com/0ang3el/aem-hacker) 5 | + [aemscan](https://github.com/Raz0r/aemscan) 6 | 7 | ### Wordlist for fuzzing 8 | + [aem.txt](https://raw.githubusercontent.com/clarkvoss/AEM-List/main/paths) 9 | 10 | ### Resources 11 | + [Approaching AEM](https://www.bugcrowd.com/resources/webinar/aem-hacker-approaching-adobe-experience-manager-web-apps/) 12 | + [Securing AEM](https://www.slideshare.net/0ang3el/securing-aem-webapps-by-hacking-them) 13 | -------------------------------------------------------------------------------- /MFA_Bypasses/README.md: -------------------------------------------------------------------------------- 1 | # Some MindMaps 2 | --- 3 | ### 2FA Bypass by Hack3rScr0lls 4 |  5 | 6 | ### Source 7 | * [https://twitter.com/hackerscrolls/status/1256276376019230720](https://twitter.com/hackerscrolls/status/1256276376019230720) 8 | 9 | ### 2FA Bypass by Harshbothra 10 | * [MindMap](https://www.mindmeister.com/1736437018?t=SEeZOmvt01) 11 | 12 | ### Author 13 | * [KathanP19](https://twitter.com/KathanP19) 14 | -------------------------------------------------------------------------------- /Password_Reset_Functionality/Password_Reset_Token_Leakage.md: -------------------------------------------------------------------------------- 1 | Password Reset Token Leakage 2 | 3 | Steps: 4 | 1.Sent a password reset request using forget password 5 | 2.Check your email 6 | 3.copy your reset page link and paste in another tab and make burp intercept on. 7 | 4.Look for every request if you find similiar token that is in reset link with other domain like: bat.bing.com or facebook.com 8 | 5.Than there is reset password token leakage. 9 | 10 | ### Authors 11 | 12 | * [@Virdoex_hunter](https://twitter.com/Virdoex_hunter) 13 | -------------------------------------------------------------------------------- /CONTRIBUTING.md: -------------------------------------------------------------------------------- 1 | ## Contributing 2 | 3 | If you have any ideas for things we should include, please use ONE of the following methods to submit them: 4 | 5 | * Send us pull requests 6 | * Create an issue in the project (with links, and we'll parse and incorporate them) 7 | * Message us on twitter `https://twitter.com/KathanP19` or `https://twitter.com/remonsec` with content to add. 8 | 9 | Significant effort is made to give attribution for these content whenever possible, and if you are a content owner or know who the original author/curator is, please let us know so we can give proper credit. 10 | -------------------------------------------------------------------------------- /Sensitive_Info_Leaks/Version_Leak.md: -------------------------------------------------------------------------------- 1 | # Version Leak 2 | 3 | ``` 4 | step1. go to the target says- https://redacted.com 5 | step2. open view page source 6 | step3. check for path, directories 7 | step4. go that path says- https://redacted.com/theme/css/file.css 8 | step5. try to visit all directories and check it is accessible or not. 9 | step5. if it is give 403 10 | step6. add %0, %m, %2e, says- https://redacted.com/%0theme and then check the response, it will show the running server name, and version information. 11 | ``` 12 | - And check for also css path url, sometime it contain some path. 13 | -------------------------------------------------------------------------------- /JIRA/README.md: -------------------------------------------------------------------------------- 1 | 2 | ## Blogs 3 | - Jira vulnerabilities and how they are exploited in the wild - [thehackerish Blog](https://thehackerish.com/jira-vulnerabilities-and-how-they-are-exploited-in-the-wild/) 4 | 5 | 6 | # Tools 7 | - [Jira-Lens](https://github.com/MayankPandey01/Jira-Lens) [Jira-Lens 🔍 is a Python Based vulnerability Scanner for JIRA.This tool Performs 25+ Checks including CVE's and Multiple Disclosures on the Provided JIRA Instance] 8 | 9 | 10 | # Author 11 | **Name:** Mayank Pandey 12 | 13 | **Handle:** [@mayank_pandey01](https://twitter.com/mayank_pandey01) 14 | 15 | -------------------------------------------------------------------------------- /CORS/CORS_Bypasses.md: -------------------------------------------------------------------------------- 1 | # CORS Bypass 2 | 1. `Origin:null` 3 | 2. `Origin:attacker.com` 4 | 3. `Origin:attacker.target.com` 5 | 4. `Origin:attackertarget.com` 6 | 5. `Origin:sub.attackertarget.com` 7 | 6. `Origin:attacker.com and then change the method Get to post/Post to Get` 8 | 7. `Origin:sub.attacker target.com` 9 | 8. `Origin:sub.attacker%target.com` 10 | 9. `Origin:attacker.com/target.com` 11 | 12 | ### Authors 13 | 14 | * [@tamimhasan404](https://twitter.com/tamimhasan404) 15 | 16 | # Reference Tweets 17 | https://twitter.com/trbughunters/status/1287023673845612546 18 | 19 | https://twitter.com/Paresh_parmar1/status/1265251507655630848 20 | 21 | https://twitter.com/Alra3ees/status/1141504347089584128 22 | -------------------------------------------------------------------------------- /.github/FUNDING.yml: -------------------------------------------------------------------------------- 1 | # These are supported funding model platforms 2 | 3 | github: # Replace with up to 4 GitHub Sponsors-enabled usernames e.g., [user1, user2] 4 | patreon: # Replace with a single Patreon username 5 | open_collective: # Replace with a single Open Collective username 6 | ko_fi: # Replace with a single Ko-fi username 7 | tidelift: # Replace with a single Tidelift platform-name/package-name e.g., npm/babel 8 | community_bridge: # Replace with a single Community Bridge project-name e.g., cloud-foundry 9 | liberapay: # Replace with a single Liberapay username 10 | issuehunt: # Replace with a single IssueHunt username 11 | otechie: # Replace with a single Otechie username 12 | custom: ['https://www.buymeacoffee.com/kathanp19'] 13 | -------------------------------------------------------------------------------- /CSRF/README.md: -------------------------------------------------------------------------------- 1 | # Some MindMap 2 | --- 3 | ### 6 CSRF Bypass by Hack3rSr0lls 4 |  5 | 6 | ### CSRF Mindmap 7 |  8 | 9 | ### Source 10 | * [https://twitter.com/hackerscrolls/status/1265217322308046849](https://twitter.com/hackerscrolls/status/1265217322308046849) 11 | 12 | ### Author 13 | * [KathanP19](https://twitter.com/KathanP19) 14 | -------------------------------------------------------------------------------- /Open_Redirection/Open_Redirection_Bypass.md: -------------------------------------------------------------------------------- 1 | # Open Redirection Bypass Trick: 2 | 3 | This bypass I found in a application while I doing pentesting. I hope it will helps you too! 4 | 5 | 1. While you I trying to redirect https://targetweb.com?url=http://attackersite.com it did not redirected! 6 | 2. I Created a new subdomain with with www.targetweb.com.attackersite.com 7 | 3. And when I tried to redirect with https://targetweb.com?url=www.targetweb.com.attackersite.com 8 | 4. It will successfully redirected to the www.targetweb.com.attackersite.com website! 9 | 5. Due to the bad regex it has been successfully bypass their protection! 10 | 11 | ### Authors: 12 | * [@bishal0x01](https://twitter.com/bishal0x01) 13 | 14 | ### Reference Tweets: 15 | * https://twitter.com/bishal0x01/status/1262021038080053248 16 | -------------------------------------------------------------------------------- /XXE/XXE_Methods.md: -------------------------------------------------------------------------------- 1 | # XML External Entities. 2 | These are my methods to check and hunt for XML External Entities. 3 | I might be missing a lot of things but as the community believe in "sharing is caring" by @CXVVMVII. 4 | 5 | ## Methods 6 | 1. Convert the content type from "application/json"/"application/x-www-form-urlencoded" to "applcation/xml". 7 | 2. File Uploads allows for docx/xlcs/pdf/zip , unzip the package and add your evil xml code into the xml files. 8 | 3. If svg allowed in picture upload , you can inject xml in svgs. 9 | 4. If the web app offers RSS feeds , add your milicious code into the RSS. 10 | 5. Fuzz for /soap api , some applications still running soap apis 11 | 6. If the target web app allows for SSO integration, you can inject your milicious xml code in the SAML request/reponse 12 | 13 | ## Twitter: 14 | * [whitechaitai](https://twitter.com/whitechaitai) 15 | -------------------------------------------------------------------------------- /Rate_limit/No Rate-Limit on Verify-PhoneNo.md: -------------------------------------------------------------------------------- 1 | ## Flaw-Name : Unlimited SMS Triggering 2 | --- 3 | ### Steps To Reproduce 4 | - 1 - Open this url `https://target.com/phone-number-verify` 5 | - 2 - Enter the `victim's mob. number` 6 | - 3 - `Intercept the request` and send the request to intruder 7 | - 4 - Use payload type as `NULL payloads` and set the payload count & `start attack` 8 | --- 9 | ### Impact : 10 | - If the company is using any email service software API(such as AWS,GCP..etc) or some tool that has been bought for the emails being sent on the support domain, the rate limit can result in `financial loss` and it can also `slow down your services` as huge/mass mails will `lead to disruption of data` that original user might send or the quota that has been bought might be exhausted. 11 | --- 12 | ### Mitigation - 13 | 14 | - 1 - IP Based Blocking 15 | - 2 - Captcha 16 | - 3 - Firewall 17 | - 4 - Reducing the number of API requests 18 | -------------------------------------------------------------------------------- /Rate_limit/No Rate-limit on Verify-email.md: -------------------------------------------------------------------------------- 1 | ## Flaw-Name : Unlimited Email Triggering 2 | --- 3 | ### Steps To Reproduce : 4 | - 1 - Navigate to : `https://abc.target.com/verify-email` 5 | - 2 - `Intercept` the request in BurpSuite 6 | - 3 - Send the request to `Intruder` and clear the payload position 7 | - 4 - Use `Null payloads` as payload type and set the payload count to 100 8 | - 5 - `Start attack` 9 | 10 | --- 11 | ### Impact : 12 | - If the company is using any email service software API or some tool that has been bought for the emails being sent on the support domain, the rate limit can result in `financial loss` and it can also `slow down your services` as huge/mass mails will `lead to disruption of data` that original user might send or the quota that has been bought might be exhausted. 13 | --- 14 | ### Mitigation : 15 | 16 | - 1 - IP Based Blocking 17 | - 2 - Captcha 18 | - 3 - Firewall 19 | - 4 - Reducing the number of API requests 20 | -------------------------------------------------------------------------------- /HTML_Injection/HTML_Injection_on_password_reset_page.md: -------------------------------------------------------------------------------- 1 | 2 | ## Summary 3 | Password reset links are usually addressed to your account name followed by the reset link. Also if the application allows 4 | you to have your account name with tags and special characters then you should try this. 5 | 6 | ### Steps 7 | 8 | 1. Create your account 9 | 2. Edit your name to `
3 |
4 | ## Tools to use
5 | 1. FoxyProxy
6 | 2. mitmweb
7 | 3. mitmproxy2swagger
8 | 4. https://editor.swagger.io/
9 | 5. Postman
10 |
11 | ## Steps to Reproduce
12 | 1. **Foxyproxy:** Turn on 8080 port using Foxy Proxy.(Label it anything you want)
13 | 2. **mitmweb:** Run `sudo mitmweb` and then go to mitm.it and install & import the certificate.
14 | 3. **Explore Website w/ API's functionalities:** Go to the website w/ api that you want to gather the API endpoints from and explore it's functionalities.