Bug Hunter Handbook
Ctrlk
  • Introduction
  • Getting Started in InfoSec and Bug Bounties.
  • Presentations
  • Checklists / Guides
  • Useful Twitter Threads
  • List of Vulnerabilities
  • Approach
  • API Security
  • Mobile Security
  • Fuzzing / Wordlists
  • BugBounty Short Write-ups
  • Burp Suite Tips and Tricks
  • HackerOne Reports
  • Response Manipulation
  • Client Vs Server Side Vulnerabilities
  • DevSecOps
  • Containers
  • AWS
  • Azure
  • Others
    • Code Review
    • Web Sockets
    • Web Cache
    • HTTP Desync Attacks
    • Zone Transfer
    • CSP Bypass
    • Payment Bypasses
    • Http Parameter Pollution
    • Postmessage
    • Others
    • GraphQL
    • Unix / Linux
    • Email Related
    • Dependency confusion
    • Nginx Misconfigs
    • JIRA
    • OAUTH
  • Chaining of Bugs
  • Bug Bounty Automation
  • Mindmaps
  • Oneliner Collections
  • Red Teaming
  • Blue Teamining
  • Recon One Liners
  • Misc
  • Wordpress
  • Fuzzing / FuFF
  • OWASP ZAP
  • Bug List
  • Setting up burp collaborator
  • Admin Panel PwN
  • Credential Stuffing / Dump / HaveibeenPwned?
  • Tools Required
  • Nuclei Template
  • Other BugBounty Repos / Tips
  • Interview
  • Threat Modelling
  • AppSec
Powered by GitBook
On this page

Was this helpful?

  1. Others

GraphQL

  • https://carvesystems.com/news/the-5-most-common-graphql-security-vulnerabilities/?mkt_tok=eyJpIjoiTWpnMU5EWXdZekk0TnpneSIsInQiOiJHVlR6R2NFcEM5ZzgwNWtrajZzQzBQaTR0UmplRXhLSHZFcDhwNGRcL1JHYnJHaTQ0YlNQODNOSjFpNmNlSjB0bHF2T1JzRWkzSit6TktKSks2dld1VjNIS0lXNHJqUG1NanM3UVowWjVrWFhmYVJQTGQ2a3dWYmgyKzFzeGtjSlIifQ%3D%3D

  • https://medium.com/@localh0t/discovering-graphql-endpoints-and-sqli-vulnerabilities-5d39f26cea2e

PreviousOthersNextUnix / Linux

Last updated 4 years ago

Was this helpful?