Rce

1- RCE via Dependency Confusion

Writeup:-
https://systemweakness.com/rce-via-dependency-confusion-e0ed2a127013
https://chevonphillip.medium.com/rce-due-to-dependency-confusion-5000-bounty-fd1b294d645f
https://medium.com/@alex.birsan/dependency-confusion-4a5d60fec610
https://hackerone.com/reports/1104693

2- rce via file upload

Writeup:-
https://book.hacktricks.xyz/pentesting-web/file-upload
https://sidblog.medium.com/file-upload-to-rce-7c04b3b252de
https://hackerone.com/reports/678727

3- rce via sql injection

https://www.oxeye.io/resources/rce-through-sql-injection-vulnerability-in-hashicorps-vault
https://systemweakness.com/sql-injection-to-remote-command-execution-rce-dd9a75292d1d

4- rce via lfi

https://github.com/RoqueNight/LFI---RCE-Cheat-Sheet
https://himanshugurjar-10413.medium.com/rce-via-lfi-log-poisoning-3a33632caf4a
https://aditya-chauhan17.medium.com/local-file-inclusion-lfi-to-rce-7594e15870e1

5- rce via ssrf

https://www.youtube.com/watch?v=Vj6oY6IaJdU
https://infosecwriteups.com/exploiting-server-side-request-forgery-ssrf-vulnerability-faeb7ddf5d0e
https://aditya-chauhan17.medium.com/server-side-request-forgery-ssrf-to-rce-c0cb5fc88a94

6- rce via xxe

7- rce via command injection

8- rce via Insecure deserialization

9- rce via SSTI

8- rce via open redirect