Account Takeover Methodology
Application Level DoS
Authentication Bypass
Broken-Link Hijacking
Broken Auth And Session Management
Finding CVEs
Web Page Source Code Review
EXIF Geo Data Not Stripped
File Upload Bypass
Find Origin IP
HTTP Desync Attack
Host-Header Attack
Sign Up Functionality
Weak Password Policy
Some Tutorials and Things to Do while Hunting Particular Vulnerability.

GitBook Link :-

GitHub Repo Link :-

- Go to Above GitBook link if you want to read and To Contribute go to Github and and make a Pull Request !!.
Note: You can help me complete this list by making Pull Request and please do mention your twitter handler at the end of the file.
All the credits to all the contributors, without you all it could have never been possible
If you want to know what's added every week then follow me on twitter I post what's updated every weekends.

Contributors ✨

Thanks goes to these wonderful people :
This project follows the all-contributors specification. Contributions of any kind welcome!