Skip to the content.

Bug Bounty Cheat Sheet

📚 Reference 🔎 Vulnerabilities
Bug Bounty Platforms XSS
Books SQLi
Special Tools SSRF
Recon CRLF Injection
Practice Platforms CSV Injection
Bug Bounty Tips LFI
  XXE
  RCE
  Open Redirect
  Crypto
  Template Injection
  Content Injection
  XSLT Injection
  Buffer Overflow Attack

Contents

Cross Site Scripting (XSS)

Cross Site Request Forgery (CSRF)

Clickjacking (UI redressing attack)

Local File Inclusion (LFI)

Subdomain Takeover

Denial of Service (DOS)

Authentication Bypass

SQL Injection(SQLI)

Server Side Request Forgery (SSRF)

Race Condition

Remote Code Execution (RCE)

Buffer Overflow Writeups

-Buffer Overflow Attack Book pdf -Github Reposirtory on Buffer Overflow Attack -Stack-Based Buffer Overflow Attacks: Explained and Examples -How Buffer Overflow Attacks Work -Binary Exploitation: Buffer Overflows -WHAT IS A BUFFER OVERFLOW? LEARN ABOUT BUFFER OVERRUN VULNERABILITIES, EXPLOITS & ATTACKS

Contributing

We welcome contributions from the public.

Using the issue tracker 💡

The issue tracker is the preferred channel for bug reports and features requests. GitHub issues

Issues and labels 🏷

Our bug tracker utilizes several labels to help organize and identify issues.

Guidelines for bug reports 🐛

Use the GitHub issue search — check if the issue has already been reported.

Style Guide

We like to keep our Markdown files as uniform as possible. So if you submit a PR, make sure to follow this style guide (we will not be angry if you do not).

Bitcoin : 35ptN6ZEsuQpJWpCLuw2RQL176MB6yBfaS