<?xml version="1.0" encoding="UTF-8"?>
<rss version="2.0" xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/">
	<channel>
		<title><![CDATA[I Red Team DEV - Writes-up ]]></title>
		<link>https://ired.dev/</link>
		<description><![CDATA[I Red Team DEV - https://ired.dev]]></description>
		<pubDate>Tue, 05 May 2026 12:15:39 +0000</pubDate>
		<generator>MyBB</generator>
		<item>
			<title><![CDATA[#WebApp_Security]]></title>
			<link>https://ired.dev/showthread.php?tid=33</link>
			<pubDate>Sun, 06 Jul 2025 21:03:37 +0000</pubDate>
			<dc:creator><![CDATA[<a href="https://ired.dev/member.php?action=profile&uid=2">Unix_Root</a>]]></dc:creator>
			<guid isPermaLink="false">https://ired.dev/showthread.php?tid=33</guid>
			<description><![CDATA[#WebApp_Security<br />
Bug Bounty Cheat Sheet, Ver.1.0.<br />
1. Account Takeover (ATO) (<a href="https://github.com/swisskyrepo/PayloadsAllTheThings/tree/master/Account%20Takeover" target="_blank" rel="noopener" class="mycode_url">https://github.com/swisskyrepo/PayloadsA...20Takeover</a>)<br />
2. API Key and Token Leaks (<a href="https://github.com/swisskyrepo/PayloadsAllTheThings/tree/master/API%20Key%20Leaks" target="_blank" rel="noopener" class="mycode_url">https://github.com/swisskyrepo/PayloadsA...ey%20Leaks</a>)<br />
3. Bypass Upload Tricky (<a href="https://github.com/swisskyrepo/PayloadsAllTheThings/tree/master/Upload%20Insecure%20Files" target="_blank" rel="noopener" class="mycode_url">https://github.com/swisskyrepo/PayloadsA...re%20Files</a>)<br />
4. Clickjacking (<a href="https://github.com/swisskyrepo/PayloadsAllTheThings/tree/master/Clickjacking" target="_blank" rel="noopener" class="mycode_url">https://github.com/swisskyrepo/PayloadsA...ickjacking</a>)<br />
5. Client Side Path Traversal (CSPT) (<a href="https://github.com/swisskyrepo/PayloadsAllTheThings/tree/master/Client%20Side%20Path%20Traversal" target="_blank" rel="noopener" class="mycode_url">https://github.com/swisskyrepo/PayloadsA...0Traversal</a>)<br />
6. Command Injection (<a href="https://github.com/swisskyrepo/PayloadsAllTheThings/tree/master/Command%20Injection" target="_blank" rel="noopener" class="mycode_url">https://github.com/swisskyrepo/PayloadsA...0Injection</a>)<br />
7. Content Injection (<a href="https://github.com/EdOverflow/bugbounty-cheatsheet/blob/master/cheatsheets/content-injection.md" target="_blank" rel="noopener" class="mycode_url">https://github.com/EdOverflow/bugbounty-...jection.md</a>)<br />
8. CORS (<a href="https://github.com/swisskyrepo/PayloadsAllTheThings/tree/master/CORS%20Misconfiguration)/OAuth" target="_blank" rel="noopener" class="mycode_url">https://github.com/swisskyrepo/PayloadsA...ion)/OAuth</a> (<a href="https://github.com/swisskyrepo/PayloadsAllTheThings/tree/master/OAuth%20Misconfiguration" target="_blank" rel="noopener" class="mycode_url">https://github.com/swisskyrepo/PayloadsA...figuration</a>) Misconfiguration<br />
9. CRLF Injection (<a href="https://github.com/swisskyrepo/PayloadsAllTheThings/tree/master/CRLF%20Injection" target="_blank" rel="noopener" class="mycode_url">https://github.com/swisskyrepo/PayloadsA...0Injection</a>)<br />
10. CSV Injection (<a href="https://github.com/swisskyrepo/PayloadsAllTheThings/tree/master/CSV%20Injection" target="_blank" rel="noopener" class="mycode_url">https://github.com/swisskyrepo/PayloadsA...0Injection</a>)<br />
11. Cross-Site WebSocket Hijacking (CSWSH) (<a href="https://github.com/swisskyrepo/PayloadsAllTheThings/tree/master/Web%20Sockets)/Request" target="_blank" rel="noopener" class="mycode_url">https://github.com/swisskyrepo/PayloadsA...s)/Request</a> Forgery (CSRF/XSRF) (<a href="https://github.com/swisskyrepo/PayloadsAllTheThings/tree/master/Cross-Site%20Request%20Forgery" target="_blank" rel="noopener" class="mycode_url">https://github.com/swisskyrepo/PayloadsA...%20Forgery</a>)<br />
12. DNS Rebinding (<a href="https://github.com/swisskyrepo/PayloadsAllTheThings/tree/master/DNS%20Rebinding" target="_blank" rel="noopener" class="mycode_url">https://github.com/swisskyrepo/PayloadsA...0Rebinding</a>)<br />
13. DOM Clobbering (<a href="https://github.com/swisskyrepo/PayloadsAllTheThings/tree/master/DOM%20Clobbering" target="_blank" rel="noopener" class="mycode_url">https://github.com/swisskyrepo/PayloadsA...Clobbering</a>)<br />
14. Dependency Confusion (<a href="https://github.com/swisskyrepo/PayloadsAllTheThings/tree/master/Dependency%20Confusion" target="_blank" rel="noopener" class="mycode_url">https://github.com/swisskyrepo/PayloadsA...0Confusion</a>)<br />
15. Directory Traversal (<a href="https://github.com/swisskyrepo/PayloadsAllTheThings/tree/master/Directory%20Traversal" target="_blank" rel="noopener" class="mycode_url">https://github.com/swisskyrepo/PayloadsA...0Traversal</a>)<br />
16. External Variable Modification (<a href="https://github.com/swisskyrepo/PayloadsAllTheThings/tree/master/External%20Variable%20Modification" target="_blank" rel="noopener" class="mycode_url">https://github.com/swisskyrepo/PayloadsA...dification</a>)<br />
17. File Inclusion/LFI (<a href="https://github.com/swisskyrepo/PayloadsAllTheThings/tree/master/File%20Inclusion" target="_blank" rel="noopener" class="mycode_url">https://github.com/swisskyrepo/PayloadsA...0Inclusion</a>)<br />
18. GraphQL Injection (<a href="https://github.com/swisskyrepo/PayloadsAllTheThings/tree/master/GraphQL%20Injection" target="_blank" rel="noopener" class="mycode_url">https://github.com/swisskyrepo/PayloadsA...0Injection</a>)<br />
19. HTTP Request Smuggling (<a href="https://github.com/swisskyrepo/PayloadsAllTheThings/tree/master/Request%20Smuggling)/Parameter" target="_blank" rel="noopener" class="mycode_url">https://github.com/swisskyrepo/PayloadsA.../Parameter</a> Pollution (HPP) (<a href="https://github.com/swisskyrepo/PayloadsAllTheThings/tree/master/HTTP%20Parameter%20Pollution" target="_blank" rel="noopener" class="mycode_url">https://github.com/swisskyrepo/PayloadsA...0Pollution</a>)<br />
20. Insecure Deserialization (<a href="https://github.com/swisskyrepo/PayloadsAllTheThings/tree/master/Insecure%20Deserialization)/Direct" target="_blank" rel="noopener" class="mycode_url">https://github.com/swisskyrepo/PayloadsA...on)/Direct</a> Object References (<a href="https://github.com/swisskyrepo/PayloadsAllTheThings/tree/master/Insecure%20Direct%20Object%20References)/Management" target="_blank" rel="noopener" class="mycode_url">https://github.com/swisskyrepo/PayloadsA...Management</a> Interface (<a href="https://github.com/swisskyrepo/PayloadsAllTheThings/tree/master/Insecure%20Management%20Interface)/Randomness" target="_blank" rel="noopener" class="mycode_url">https://github.com/swisskyrepo/PayloadsA...Randomness</a> (<a href="https://github.com/swisskyrepo/PayloadsAllTheThings/tree/master/Insecure%20Randomness)/Source" target="_blank" rel="noopener" class="mycode_url">https://github.com/swisskyrepo/PayloadsA...ss)/Source</a> Code Management (<a href="https://github.com/swisskyrepo/PayloadsAllTheThings/tree/master/Insecure%20Source%20Code%20Management" target="_blank" rel="noopener" class="mycode_url">https://github.com/swisskyrepo/PayloadsA...Management</a>)<br />
21. LDAP Injection (<a href="https://github.com/swisskyrepo/PayloadsAllTheThings/tree/master/LDAP%20Injection" target="_blank" rel="noopener" class="mycode_url">https://github.com/swisskyrepo/PayloadsA...0Injection</a>)<br />
22. LaTeX Injection (<a href="https://github.com/swisskyrepo/PayloadsAllTheThings/tree/master/LaTeX%20Injection" target="_blank" rel="noopener" class="mycode_url">https://github.com/swisskyrepo/PayloadsA...0Injection</a>)<br />
23. Mass Assignment (<a href="https://github.com/swisskyrepo/PayloadsAllTheThings/tree/master/Mass%20Assignment" target="_blank" rel="noopener" class="mycode_url">https://github.com/swisskyrepo/PayloadsA...Assignment</a>)<br />
24. Memory Exhaustion (DoS) (<a href="https://github.com/swisskyrepo/PayloadsAllTheThings/tree/master/Denial%20of%20Service" target="_blank" rel="noopener" class="mycode_url">https://github.com/swisskyrepo/PayloadsA...%20Service</a>)<br />
25. NoSQL Injection (<a href="https://github.com/swisskyrepo/PayloadsAllTheThings/tree/master/NoSQL%20Injection" target="_blank" rel="noopener" class="mycode_url">https://github.com/swisskyrepo/PayloadsA...0Injection</a>)<br />
26. ORM Leak (<a href="https://github.com/swisskyrepo/PayloadsAllTheThings/tree/master/ORM%20Leak" target="_blank" rel="noopener" class="mycode_url">https://github.com/swisskyrepo/PayloadsA...ORM%20Leak</a>)<br />
27. Open URL Redirect (<a href="https://github.com/swisskyrepo/PayloadsAllTheThings/tree/master/Open%20Redirect" target="_blank" rel="noopener" class="mycode_url">https://github.com/swisskyrepo/PayloadsA...20Redirect</a>)<br />
28. Prompt Injection (<a href="https://github.com/swisskyrepo/PayloadsAllTheThings/tree/master/Prompt%20Injection" target="_blank" rel="noopener" class="mycode_url">https://github.com/swisskyrepo/PayloadsA...0Injection</a>)<br />
29. Prototype Pollution (<a href="https://github.com/swisskyrepo/PayloadsAllTheThings/tree/master/Prototype%20Pollution" target="_blank" rel="noopener" class="mycode_url">https://github.com/swisskyrepo/PayloadsA...0Pollution</a>)<br />
30. Race Condition (<a href="https://github.com/swisskyrepo/PayloadsAllTheThings/tree/master/Race%20Condition" target="_blank" rel="noopener" class="mycode_url">https://github.com/swisskyrepo/PayloadsA...0Condition</a>)<br />
31. Regular Expression DoS (ReDoS) (<a href="https://github.com/swisskyrepo/PayloadsAllTheThings/tree/master/Regular%20Expression" target="_blank" rel="noopener" class="mycode_url">https://github.com/swisskyrepo/PayloadsA...Expression</a>)<br />
32. SAML Injection (<a href="https://github.com/swisskyrepo/PayloadsAllTheThings/tree/master/SAML%20Injection" target="_blank" rel="noopener" class="mycode_url">https://github.com/swisskyrepo/PayloadsA...0Injection</a>)<br />
33. SQL Injection (SQLi) (<a href="https://github.com/swisskyrepo/PayloadsAllTheThings/tree/master/SQL%20Injection" target="_blank" rel="noopener" class="mycode_url">https://github.com/swisskyrepo/PayloadsA...0Injection</a>)<br />
34. Server Side Include Injection (<a href="https://github.com/swisskyrepo/PayloadsAllTheThings/tree/master/Server%20Side%20Include%20Injection)/Request" target="_blank" rel="noopener" class="mycode_url">https://github.com/swisskyrepo/PayloadsA...n)/Request</a> Forgery (<a href="https://github.com/swisskyrepo/PayloadsAllTheThings/tree/master/Server%20Side%20Request%20Forgery)/Template" target="_blank" rel="noopener" class="mycode_url">https://github.com/swisskyrepo/PayloadsA...)/Template</a> Injection (<a href="https://github.com/swisskyrepo/PayloadsAllTheThings/tree/master/Server%20Side%20Template%20Injection" target="_blank" rel="noopener" class="mycode_url">https://github.com/swisskyrepo/PayloadsA...0Injection</a>)<br />
35. SMTP Header Injection (<a href="https://www.acunetix.com/blog/articles/email-header-injection" target="_blank" rel="noopener" class="mycode_url">https://www.acunetix.com/blog/articles/e...-injection</a>)<br />
36. Tabnabbing (<a href="https://github.com/swisskyrepo/PayloadsAllTheThings/tree/master/Tabnabbing" target="_blank" rel="noopener" class="mycode_url">https://github.com/swisskyrepo/PayloadsA...Tabnabbing</a>)<br />
37. Type Juggling (<a href="https://github.com/swisskyrepo/PayloadsAllTheThings/tree/master/Type%20Juggling" target="_blank" rel="noopener" class="mycode_url">https://github.com/swisskyrepo/PayloadsA...20Juggling</a>)<br />
38. Web Cache Deception (<a href="https://github.com/swisskyrepo/PayloadsAllTheThings/tree/master/Web%20Cache%20Deception" target="_blank" rel="noopener" class="mycode_url">https://github.com/swisskyrepo/PayloadsA...0Deception</a>)<br />
39. XPATH (<a href="https://github.com/swisskyrepo/PayloadsAllTheThings/tree/master/XPATH%20Injection)/XSLT" target="_blank" rel="noopener" class="mycode_url">https://github.com/swisskyrepo/PayloadsA...tion)/XSLT</a> (<a href="https://github.com/swisskyrepo/PayloadsAllTheThings/tree/master/XSLT%20Injection)/XSS" target="_blank" rel="noopener" class="mycode_url">https://github.com/swisskyrepo/PayloadsA...ction)/XSS</a> (<a href="https://github.com/swisskyrepo/PayloadsAllTheThings/tree/master/XSS%20Injection)/XXE" target="_blank" rel="noopener" class="mycode_url">https://github.com/swisskyrepo/PayloadsA...ction)/XXE</a> Injection (<a href="https://github.com/swisskyrepo/PayloadsAllTheThings/tree/master/XXE%20Injection" target="_blank" rel="noopener" class="mycode_url">https://github.com/swisskyrepo/PayloadsA...0Injection</a>)<br />
40. Zip Slip Command Execution (<a href="https://github.com/snyk/zip-slip-vulnerability" target="_blank" rel="noopener" class="mycode_url">https://github.com/snyk/zip-slip-vulnerability</a>)]]></description>
			<content:encoded><![CDATA[#WebApp_Security<br />
Bug Bounty Cheat Sheet, Ver.1.0.<br />
1. Account Takeover (ATO) (<a href="https://github.com/swisskyrepo/PayloadsAllTheThings/tree/master/Account%20Takeover" target="_blank" rel="noopener" class="mycode_url">https://github.com/swisskyrepo/PayloadsA...20Takeover</a>)<br />
2. API Key and Token Leaks (<a href="https://github.com/swisskyrepo/PayloadsAllTheThings/tree/master/API%20Key%20Leaks" target="_blank" rel="noopener" class="mycode_url">https://github.com/swisskyrepo/PayloadsA...ey%20Leaks</a>)<br />
3. Bypass Upload Tricky (<a href="https://github.com/swisskyrepo/PayloadsAllTheThings/tree/master/Upload%20Insecure%20Files" target="_blank" rel="noopener" class="mycode_url">https://github.com/swisskyrepo/PayloadsA...re%20Files</a>)<br />
4. Clickjacking (<a href="https://github.com/swisskyrepo/PayloadsAllTheThings/tree/master/Clickjacking" target="_blank" rel="noopener" class="mycode_url">https://github.com/swisskyrepo/PayloadsA...ickjacking</a>)<br />
5. Client Side Path Traversal (CSPT) (<a href="https://github.com/swisskyrepo/PayloadsAllTheThings/tree/master/Client%20Side%20Path%20Traversal" target="_blank" rel="noopener" class="mycode_url">https://github.com/swisskyrepo/PayloadsA...0Traversal</a>)<br />
6. Command Injection (<a href="https://github.com/swisskyrepo/PayloadsAllTheThings/tree/master/Command%20Injection" target="_blank" rel="noopener" class="mycode_url">https://github.com/swisskyrepo/PayloadsA...0Injection</a>)<br />
7. Content Injection (<a href="https://github.com/EdOverflow/bugbounty-cheatsheet/blob/master/cheatsheets/content-injection.md" target="_blank" rel="noopener" class="mycode_url">https://github.com/EdOverflow/bugbounty-...jection.md</a>)<br />
8. CORS (<a href="https://github.com/swisskyrepo/PayloadsAllTheThings/tree/master/CORS%20Misconfiguration)/OAuth" target="_blank" rel="noopener" class="mycode_url">https://github.com/swisskyrepo/PayloadsA...ion)/OAuth</a> (<a href="https://github.com/swisskyrepo/PayloadsAllTheThings/tree/master/OAuth%20Misconfiguration" target="_blank" rel="noopener" class="mycode_url">https://github.com/swisskyrepo/PayloadsA...figuration</a>) Misconfiguration<br />
9. CRLF Injection (<a href="https://github.com/swisskyrepo/PayloadsAllTheThings/tree/master/CRLF%20Injection" target="_blank" rel="noopener" class="mycode_url">https://github.com/swisskyrepo/PayloadsA...0Injection</a>)<br />
10. CSV Injection (<a href="https://github.com/swisskyrepo/PayloadsAllTheThings/tree/master/CSV%20Injection" target="_blank" rel="noopener" class="mycode_url">https://github.com/swisskyrepo/PayloadsA...0Injection</a>)<br />
11. Cross-Site WebSocket Hijacking (CSWSH) (<a href="https://github.com/swisskyrepo/PayloadsAllTheThings/tree/master/Web%20Sockets)/Request" target="_blank" rel="noopener" class="mycode_url">https://github.com/swisskyrepo/PayloadsA...s)/Request</a> Forgery (CSRF/XSRF) (<a href="https://github.com/swisskyrepo/PayloadsAllTheThings/tree/master/Cross-Site%20Request%20Forgery" target="_blank" rel="noopener" class="mycode_url">https://github.com/swisskyrepo/PayloadsA...%20Forgery</a>)<br />
12. DNS Rebinding (<a href="https://github.com/swisskyrepo/PayloadsAllTheThings/tree/master/DNS%20Rebinding" target="_blank" rel="noopener" class="mycode_url">https://github.com/swisskyrepo/PayloadsA...0Rebinding</a>)<br />
13. DOM Clobbering (<a href="https://github.com/swisskyrepo/PayloadsAllTheThings/tree/master/DOM%20Clobbering" target="_blank" rel="noopener" class="mycode_url">https://github.com/swisskyrepo/PayloadsA...Clobbering</a>)<br />
14. Dependency Confusion (<a href="https://github.com/swisskyrepo/PayloadsAllTheThings/tree/master/Dependency%20Confusion" target="_blank" rel="noopener" class="mycode_url">https://github.com/swisskyrepo/PayloadsA...0Confusion</a>)<br />
15. Directory Traversal (<a href="https://github.com/swisskyrepo/PayloadsAllTheThings/tree/master/Directory%20Traversal" target="_blank" rel="noopener" class="mycode_url">https://github.com/swisskyrepo/PayloadsA...0Traversal</a>)<br />
16. External Variable Modification (<a href="https://github.com/swisskyrepo/PayloadsAllTheThings/tree/master/External%20Variable%20Modification" target="_blank" rel="noopener" class="mycode_url">https://github.com/swisskyrepo/PayloadsA...dification</a>)<br />
17. File Inclusion/LFI (<a href="https://github.com/swisskyrepo/PayloadsAllTheThings/tree/master/File%20Inclusion" target="_blank" rel="noopener" class="mycode_url">https://github.com/swisskyrepo/PayloadsA...0Inclusion</a>)<br />
18. GraphQL Injection (<a href="https://github.com/swisskyrepo/PayloadsAllTheThings/tree/master/GraphQL%20Injection" target="_blank" rel="noopener" class="mycode_url">https://github.com/swisskyrepo/PayloadsA...0Injection</a>)<br />
19. HTTP Request Smuggling (<a href="https://github.com/swisskyrepo/PayloadsAllTheThings/tree/master/Request%20Smuggling)/Parameter" target="_blank" rel="noopener" class="mycode_url">https://github.com/swisskyrepo/PayloadsA.../Parameter</a> Pollution (HPP) (<a href="https://github.com/swisskyrepo/PayloadsAllTheThings/tree/master/HTTP%20Parameter%20Pollution" target="_blank" rel="noopener" class="mycode_url">https://github.com/swisskyrepo/PayloadsA...0Pollution</a>)<br />
20. Insecure Deserialization (<a href="https://github.com/swisskyrepo/PayloadsAllTheThings/tree/master/Insecure%20Deserialization)/Direct" target="_blank" rel="noopener" class="mycode_url">https://github.com/swisskyrepo/PayloadsA...on)/Direct</a> Object References (<a href="https://github.com/swisskyrepo/PayloadsAllTheThings/tree/master/Insecure%20Direct%20Object%20References)/Management" target="_blank" rel="noopener" class="mycode_url">https://github.com/swisskyrepo/PayloadsA...Management</a> Interface (<a href="https://github.com/swisskyrepo/PayloadsAllTheThings/tree/master/Insecure%20Management%20Interface)/Randomness" target="_blank" rel="noopener" class="mycode_url">https://github.com/swisskyrepo/PayloadsA...Randomness</a> (<a href="https://github.com/swisskyrepo/PayloadsAllTheThings/tree/master/Insecure%20Randomness)/Source" target="_blank" rel="noopener" class="mycode_url">https://github.com/swisskyrepo/PayloadsA...ss)/Source</a> Code Management (<a href="https://github.com/swisskyrepo/PayloadsAllTheThings/tree/master/Insecure%20Source%20Code%20Management" target="_blank" rel="noopener" class="mycode_url">https://github.com/swisskyrepo/PayloadsA...Management</a>)<br />
21. LDAP Injection (<a href="https://github.com/swisskyrepo/PayloadsAllTheThings/tree/master/LDAP%20Injection" target="_blank" rel="noopener" class="mycode_url">https://github.com/swisskyrepo/PayloadsA...0Injection</a>)<br />
22. LaTeX Injection (<a href="https://github.com/swisskyrepo/PayloadsAllTheThings/tree/master/LaTeX%20Injection" target="_blank" rel="noopener" class="mycode_url">https://github.com/swisskyrepo/PayloadsA...0Injection</a>)<br />
23. Mass Assignment (<a href="https://github.com/swisskyrepo/PayloadsAllTheThings/tree/master/Mass%20Assignment" target="_blank" rel="noopener" class="mycode_url">https://github.com/swisskyrepo/PayloadsA...Assignment</a>)<br />
24. Memory Exhaustion (DoS) (<a href="https://github.com/swisskyrepo/PayloadsAllTheThings/tree/master/Denial%20of%20Service" target="_blank" rel="noopener" class="mycode_url">https://github.com/swisskyrepo/PayloadsA...%20Service</a>)<br />
25. NoSQL Injection (<a href="https://github.com/swisskyrepo/PayloadsAllTheThings/tree/master/NoSQL%20Injection" target="_blank" rel="noopener" class="mycode_url">https://github.com/swisskyrepo/PayloadsA...0Injection</a>)<br />
26. ORM Leak (<a href="https://github.com/swisskyrepo/PayloadsAllTheThings/tree/master/ORM%20Leak" target="_blank" rel="noopener" class="mycode_url">https://github.com/swisskyrepo/PayloadsA...ORM%20Leak</a>)<br />
27. Open URL Redirect (<a href="https://github.com/swisskyrepo/PayloadsAllTheThings/tree/master/Open%20Redirect" target="_blank" rel="noopener" class="mycode_url">https://github.com/swisskyrepo/PayloadsA...20Redirect</a>)<br />
28. Prompt Injection (<a href="https://github.com/swisskyrepo/PayloadsAllTheThings/tree/master/Prompt%20Injection" target="_blank" rel="noopener" class="mycode_url">https://github.com/swisskyrepo/PayloadsA...0Injection</a>)<br />
29. Prototype Pollution (<a href="https://github.com/swisskyrepo/PayloadsAllTheThings/tree/master/Prototype%20Pollution" target="_blank" rel="noopener" class="mycode_url">https://github.com/swisskyrepo/PayloadsA...0Pollution</a>)<br />
30. Race Condition (<a href="https://github.com/swisskyrepo/PayloadsAllTheThings/tree/master/Race%20Condition" target="_blank" rel="noopener" class="mycode_url">https://github.com/swisskyrepo/PayloadsA...0Condition</a>)<br />
31. Regular Expression DoS (ReDoS) (<a href="https://github.com/swisskyrepo/PayloadsAllTheThings/tree/master/Regular%20Expression" target="_blank" rel="noopener" class="mycode_url">https://github.com/swisskyrepo/PayloadsA...Expression</a>)<br />
32. SAML Injection (<a href="https://github.com/swisskyrepo/PayloadsAllTheThings/tree/master/SAML%20Injection" target="_blank" rel="noopener" class="mycode_url">https://github.com/swisskyrepo/PayloadsA...0Injection</a>)<br />
33. SQL Injection (SQLi) (<a href="https://github.com/swisskyrepo/PayloadsAllTheThings/tree/master/SQL%20Injection" target="_blank" rel="noopener" class="mycode_url">https://github.com/swisskyrepo/PayloadsA...0Injection</a>)<br />
34. Server Side Include Injection (<a href="https://github.com/swisskyrepo/PayloadsAllTheThings/tree/master/Server%20Side%20Include%20Injection)/Request" target="_blank" rel="noopener" class="mycode_url">https://github.com/swisskyrepo/PayloadsA...n)/Request</a> Forgery (<a href="https://github.com/swisskyrepo/PayloadsAllTheThings/tree/master/Server%20Side%20Request%20Forgery)/Template" target="_blank" rel="noopener" class="mycode_url">https://github.com/swisskyrepo/PayloadsA...)/Template</a> Injection (<a href="https://github.com/swisskyrepo/PayloadsAllTheThings/tree/master/Server%20Side%20Template%20Injection" target="_blank" rel="noopener" class="mycode_url">https://github.com/swisskyrepo/PayloadsA...0Injection</a>)<br />
35. SMTP Header Injection (<a href="https://www.acunetix.com/blog/articles/email-header-injection" target="_blank" rel="noopener" class="mycode_url">https://www.acunetix.com/blog/articles/e...-injection</a>)<br />
36. Tabnabbing (<a href="https://github.com/swisskyrepo/PayloadsAllTheThings/tree/master/Tabnabbing" target="_blank" rel="noopener" class="mycode_url">https://github.com/swisskyrepo/PayloadsA...Tabnabbing</a>)<br />
37. Type Juggling (<a href="https://github.com/swisskyrepo/PayloadsAllTheThings/tree/master/Type%20Juggling" target="_blank" rel="noopener" class="mycode_url">https://github.com/swisskyrepo/PayloadsA...20Juggling</a>)<br />
38. Web Cache Deception (<a href="https://github.com/swisskyrepo/PayloadsAllTheThings/tree/master/Web%20Cache%20Deception" target="_blank" rel="noopener" class="mycode_url">https://github.com/swisskyrepo/PayloadsA...0Deception</a>)<br />
39. XPATH (<a href="https://github.com/swisskyrepo/PayloadsAllTheThings/tree/master/XPATH%20Injection)/XSLT" target="_blank" rel="noopener" class="mycode_url">https://github.com/swisskyrepo/PayloadsA...tion)/XSLT</a> (<a href="https://github.com/swisskyrepo/PayloadsAllTheThings/tree/master/XSLT%20Injection)/XSS" target="_blank" rel="noopener" class="mycode_url">https://github.com/swisskyrepo/PayloadsA...ction)/XSS</a> (<a href="https://github.com/swisskyrepo/PayloadsAllTheThings/tree/master/XSS%20Injection)/XXE" target="_blank" rel="noopener" class="mycode_url">https://github.com/swisskyrepo/PayloadsA...ction)/XXE</a> Injection (<a href="https://github.com/swisskyrepo/PayloadsAllTheThings/tree/master/XXE%20Injection" target="_blank" rel="noopener" class="mycode_url">https://github.com/swisskyrepo/PayloadsA...0Injection</a>)<br />
40. Zip Slip Command Execution (<a href="https://github.com/snyk/zip-slip-vulnerability" target="_blank" rel="noopener" class="mycode_url">https://github.com/snyk/zip-slip-vulnerability</a>)]]></content:encoded>
		</item>
		<item>
			<title><![CDATA[Salat Stealer - Malware Analysis]]></title>
			<link>https://ired.dev/showthread.php?tid=24</link>
			<pubDate>Thu, 19 Jun 2025 16:30:51 +0000</pubDate>
			<dc:creator><![CDATA[<a href="https://ired.dev/member.php?action=profile&uid=2">Unix_Root</a>]]></dc:creator>
			<guid isPermaLink="false">https://ired.dev/showthread.php?tid=24</guid>
			<description><![CDATA[Summary This report analyzes a UPX-packed Windows executable file identified as a Salat Stealer. The malware collects the victim's keystrokes, system information, browser-stored credentials, cryptocurrency wallet data, and messaging applications data. It can also access the victim's webcam and microphone. It compresses the collected data and then exfiltrates it to the command-and-control (C2) server over the Quick UDP Internet Connections (QUIC) protocol.<br />
Link:<br />
<a href="https://blog.pwndesal.xyz/salat-malware-analysis/salat-stealer-malware-analysis" target="_blank" rel="noopener" class="mycode_url">https://blog.pwndesal.xyz/salat-malware-...e-analysis</a>]]></description>
			<content:encoded><![CDATA[Summary This report analyzes a UPX-packed Windows executable file identified as a Salat Stealer. The malware collects the victim's keystrokes, system information, browser-stored credentials, cryptocurrency wallet data, and messaging applications data. It can also access the victim's webcam and microphone. It compresses the collected data and then exfiltrates it to the command-and-control (C2) server over the Quick UDP Internet Connections (QUIC) protocol.<br />
Link:<br />
<a href="https://blog.pwndesal.xyz/salat-malware-analysis/salat-stealer-malware-analysis" target="_blank" rel="noopener" class="mycode_url">https://blog.pwndesal.xyz/salat-malware-...e-analysis</a>]]></content:encoded>
		</item>
	</channel>
</rss>