Rce
1- RCE via Dependency Confusion
Writeup:-
https://systemweakness.com/rce-via-dependency-confusion-e0ed2a127013
https://chevonphillip.medium.com/rce-due-to-dependency-confusion-5000-bounty-fd1b294d645f
https://medium.com/@alex.birsan/dependency-confusion-4a5d60fec610
https://hackerone.com/reports/11046932- rce via file upload
Writeup:-
https://book.hacktricks.xyz/pentesting-web/file-upload
https://sidblog.medium.com/file-upload-to-rce-7c04b3b252de
https://hackerone.com/reports/6787273- rce via sql injection
https://www.oxeye.io/resources/rce-through-sql-injection-vulnerability-in-hashicorps-vault
https://systemweakness.com/sql-injection-to-remote-command-execution-rce-dd9a75292d1d4- rce via lfi
https://github.com/RoqueNight/LFI---RCE-Cheat-Sheet
https://himanshugurjar-10413.medium.com/rce-via-lfi-log-poisoning-3a33632caf4a
https://aditya-chauhan17.medium.com/local-file-inclusion-lfi-to-rce-7594e15870e15- rce via ssrf
https://www.youtube.com/watch?v=Vj6oY6IaJdU
https://infosecwriteups.com/exploiting-server-side-request-forgery-ssrf-vulnerability-faeb7ddf5d0e
https://aditya-chauhan17.medium.com/server-side-request-forgery-ssrf-to-rce-c0cb5fc88a946- rce via xxe
7- rce via command injection
8- rce via Insecure deserialization
9- rce via SSTI
8- rce via open redirect