labs.detectify.com
Resources curated from this publisher and indexed across appsec.fyi topic pages. Last item added: 2025-08-14.
| Date Added | Resource | Excerpt |
|---|---|---|
| 2025-08-14 2025 | 10 Types of Web Vulnerabilities that are Often Missed - Detectify LabsSSRFXSSXXE | Library of 10 web vulnerabilities often missed by security testers, including HTTP/2 Smuggling via request desyncs and XXE via Office Open XML parsers. It also details SSRF via XSS in PDF generators and XSS via SVG files, providing techniques and examples for exploitation and detection. |
| 2025-08-14 2025 | SSRF vulnerabilities and where to find themSSRF | Guide to Server-Side Request Forgery (SSRF) vulnerabilities, explaining how they occur when applications fetch user-supplied URLs. It details common locations such as webhook integrations and file imports, and highlights parameter names often targeted, referencing the HUNT Burp Suite extension. The guide also covers bypassing protections using techniques like DNS rebinding, HTTP redirects, and non-standard IP notations, and mentions the DEF CON talk on exploiting SSRF through PDF generators. |
| 2025-08-14 2025 | https://labs.detectify.com/2022/09/23/ssrf-vulns-and-where-to-find-them/SSRF | Guide to Server-Side Request Forgery (SSRF) vulnerabilities, detailing their nature, common discovery locations like webhook integrations and file imports, and effective bypass techniques. The guide highlights tools such as the HUNT Burp Suite extension and discusses exploitation methods including DNS rebinding, HTTP redirects, and non-standard IP notations, referencing work by Nahamsec and Cody Brocious concerning PDF generators. It differentiates between blind, partial-blind, and non-blind SSRF, and provides common parameter names to look for during testing. |
| 2024-10-17 2024 | 10 Types of Web Vulnerabilities that are Often Missed - Labs DetectifyBug BountySSRF | Survey of web vulnerabilities often missed, including HTTP/2 smuggling exploiting header desynchronization and XXE via Office Open XML parsers by crafting malicious OOXML files. It also covers SSRF through XSS in PDF generators, potentially leveraging headless browsers to access internal resources like AWS metadata, and XSS via SVG file uploads. |
| 2023-08-11 2023 | How To Hack Web Applications in 2022: Part 1Bug Bounty | Library for web application security testing that details techniques for identifying and exploiting vulnerabilities like SQL Injection, Code Injection, XSS, Defacement, Cookie poisoning, and Remote Code Execution. It outlines the setup process using Burp Suite and discusses common web application architectures, including Single Page Applications and Traditional Web Applications, referencing the OWASP Top 10 as a standard vulnerability guide. |
| 2021-12-06 2021 | Hakluke: Creating the Perfect Bug Bounty AutomationBug Bounty | Library for building bug bounty automation frameworks, detailing iterations from simple Bash scripts to a Django application utilizing PostgreSQL and RabbitMQ. This framework enables efficient data storage, modular vulnerability detection through custom management commands, and horizontal scaling with worker instances, inspired by the development of tools like Interlace for concurrent task execution. |
| 2021-10-26 2021 | How to set up Docker for Varnish HTTP/2 request smugglingAPI Sec | Walkthrough of setting up a Docker environment to test HTTP/2 request smuggling, focusing on CVE-2021-36740. This technique exploits how H2-compatible proxies rewrite HTTP/2 requests to HTTP/1.1, specifically when Varnish cache improperly handles the `Content-Length` header during this conversion, allowing malicious requests to be prepended to subsequent legitimate ones. The setup involves Varnish, Hitch for TLS termination, and origin servers. |
| 2021-10-04 2021 | 10 Types of Web Vulnerabilities that are Often MissedBug BountyIDORSQLiSSRFXSS | Library of web vulnerabilities often overlooked by security testers, including HTTP/2 smuggling, XXE via Office Open XML parsers, SSRF via XSS in PDF generators, and XSS via SVG files. This resource delves into obscure bug classes and less common approaches to traditional vulnerabilities, providing insights for bug bounty hunters and security professionals. It references techniques and tools like `http2smugl` and discussions from Defcon presentations. |
| 2021-08-30 2021 | Hakluke's huge list of resources for beginner hackersBug BountyRecon | Library: This catalog entry lists curated resources for beginner hackers, covering bug bounty hunting and penetration testing. It highlights platforms like Pentesterlab, Portswigger labs, Tryhackme, Hackthebox, Kontra, Hacker101.com, and Vulnhub for hands-on learning. The entry also recommends YouTube channels and Twitter accounts from established cybersecurity professionals, and lists blogs and write-up platforms such as Hackerone Hacktivity, Crowdstream, and Intigriti for exploring disclosed vulnerabilities and methodologies. |