├── 2FA_bypassing.pdf ├── ARPcon.pdf ├── Abusing_functions_for_bug_bounty.pdf ├── Book_of_tips_by_aditya_shende.pdf ├── Git-Recon.pdf ├── README.md └── What_to_hunt_as_beginner....pdf /2FA_bypassing.pdf: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/kongsec/Vulnerabilities-Approach-Slides/8e483cc55048a87d8e8669306996310672b031e2/2FA_bypassing.pdf -------------------------------------------------------------------------------- /ARPcon.pdf: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/kongsec/Vulnerabilities-Approach-Slides/8e483cc55048a87d8e8669306996310672b031e2/ARPcon.pdf -------------------------------------------------------------------------------- /Abusing_functions_for_bug_bounty.pdf: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/kongsec/Vulnerabilities-Approach-Slides/8e483cc55048a87d8e8669306996310672b031e2/Abusing_functions_for_bug_bounty.pdf -------------------------------------------------------------------------------- /Book_of_tips_by_aditya_shende.pdf: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/kongsec/Vulnerabilities-Approach-Slides/8e483cc55048a87d8e8669306996310672b031e2/Book_of_tips_by_aditya_shende.pdf -------------------------------------------------------------------------------- /Git-Recon.pdf: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/kongsec/Vulnerabilities-Approach-Slides/8e483cc55048a87d8e8669306996310672b031e2/Git-Recon.pdf -------------------------------------------------------------------------------- /README.md: -------------------------------------------------------------------------------- 1 | # Vulnerabilities-Approach-Slides 2 | PDF slides 3 | 4 | This repo totally includes material about approach for hunt and hacks xD :) 5 | -------------------------------------------------------------------------------- /What_to_hunt_as_beginner....pdf: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/kongsec/Vulnerabilities-Approach-Slides/8e483cc55048a87d8e8669306996310672b031e2/What_to_hunt_as_beginner....pdf --------------------------------------------------------------------------------