SQL Injection:
[Link]
Payload : [Link]
[Link] -- For PoC (Optional)
XSS :
Reflected : [Link]
Stored : [Link]
DOM-based :
Payload : [Link]
blind xss : [Link]
Payload : [Link]
IDOR :
[Link]
LFI : [Link]
OTP Auth Bypass :
[Link]
[Link]
{
"request-id" : " 332143det4"
"code" : 404
Open redirect:
[Link]
[Link]
Single command : waybackurls [Link] | grep -a -i \=http | qsreplace
'[Link] | while read host do;do curl -s -L $host -I|grep "[Link]" &&
echo -e "$host \033[0;31mVulnerable\n" ;done
GitHub : [Link]