Bypassing WAFs and cracking XOR with Hackvertor
https://portswigger.net/research/bypassing-wafs-and-cracking-xor-with-hackvertor
  
  https://portswigger.net/research/bypassing-wafs-and-cracking-xor-with-hackvertor
PortSwigger Research
  
  Bypassing WAFs and cracking XOR with Hackvertor
  You might not be aware of the Hackvertor extension I've been working on lately. It features tag based conversion that is far more powerful than the inbuilt decoder in Burp. The idea behind tag based c
  Multiple sites for Obfuscation or JavaScript code obscurity.
http://utf-8.jp/public/aaencode.html
http://utf-8.jp/public/jjencode.html
http://www.jsfuck.com
#JS
#OBF
  http://utf-8.jp/public/aaencode.html
http://utf-8.jp/public/jjencode.html
http://www.jsfuck.com
#JS
#OBF
“Undetectable C# & C++ Reverse Shells” by Bank Security https://link.medium.com/kIIc9Ch5b4
  
  Medium
  
  Undetectable C# & C++ Reverse Shells
  Technical overview of different way to spawn a reverse shell on a victim machine
  ■■■□□ From Recon to Optimizing RCE Results - Simple Story with One of the Biggest ICT Company in the World
https://medium.com/@YoKoKho/from-recon-to-optimizing-rce-results-simple-story-with-one-of-the-biggest-ict-company-in-the-ea710bca487a
  
  https://medium.com/@YoKoKho/from-recon-to-optimizing-rce-results-simple-story-with-one-of-the-biggest-ict-company-in-the-ea710bca487a
Medium
  
  From Recon to Optimizing RCE Results - Simple Story with One of the Biggest ICT Company in the World
  How I Finally could Got into an Internal Network (and could accessing all of their internal assets) by Using Various Vulnerabilities.
  Source Code + Sensitive Information Disclosure lead to InstaMoney and SendGrind Account Takeover
https://medium.com/@denypradana/source-code-sensitive-information-disclosure-lead-to-instamoney-and-sendgrind-account-takeover-fc9adf7d8501
  https://medium.com/@denypradana/source-code-sensitive-information-disclosure-lead-to-instamoney-and-sendgrind-account-takeover-fc9adf7d8501
Fun with Amazon S3— Leaks and bucket takeover attack
https://medium.com/@woj_ciech/fun-with-amazon-s3-leaks-and-bucket-takeover-attack-ddb17da1c431
  
  https://medium.com/@woj_ciech/fun-with-amazon-s3-leaks-and-bucket-takeover-attack-ddb17da1c431
Medium
  
  Fun with Amazon S3— Leaks and bucket takeover attack
  Amazon S3 joins to the LeakLooker family, now tool looks for exposed buckets and potential takeovers.
  [ Writeup — Bugbounty Facebook ] Disclosure the verified phone number in Checkpoint.
https://medium.com/@tiendat253/writeup-bugbounty-facebook-disclosure-the-verified-phone-number-in-checkpoint-aa652faeaf21
  https://medium.com/@tiendat253/writeup-bugbounty-facebook-disclosure-the-verified-phone-number-in-checkpoint-aa652faeaf21
HOW I BYPASSED 2 FACTOR AUTHENTICATION
https://medium.com/@manralhemant10/how-i-bypassed-2-factor-authentication-899750421331
  
  https://medium.com/@manralhemant10/how-i-bypassed-2-factor-authentication-899750421331
Medium
  
  HOW I BYPASSED 2 FACTOR AUTHENTICATION
  INTRODUCTION:
  “Recon Everything” by SACHIN GROVER https://link.medium.com/ReykAnzk23
  
  Medium
  
  Recon Everything
  Bug Bounty Hunting Tip #1- Always read the Source Code
  ExploitHub pinned «“Recon Everything” by SACHIN GROVER https://link.medium.com/ReykAnzk23»
  Tale of Account Takeovers (Part-1)
https://medium.com/@bathinivijaysimhareddy/tale-of-account-takeovers-part-1-b24e1f3c3187
  
  https://medium.com/@bathinivijaysimhareddy/tale-of-account-takeovers-part-1-b24e1f3c3187
Medium
  
  Tale of Account Takeovers (Part-1)
  Hello guys, I’m here with a new blog post on account takeover vulnerabilities which have been reported by me. I’ve started bug bounty in…