A curated collection of rare vulnerabilities, bypasses, and attack chains published by security researchers.
β οΈ All content here comes from public writeups/posts.
This repository summarizes and links to them β full credit always goes to the original authors.
Bug bounty research is scattered across blogs, Twitter, Medium, and conference slides.
This repository gathers unique bugs & creative bypasses in one place so researchers can:
- Study attack chains step by step.
- Understand how researchers escalate impact.
- Get inspired for new security research.
We welcome pull requests that include:
- Submissions of unique bugs, bypasses, or chained attack scenarios.
- Educational value for the community.
This repository is for educational purposes only.
Always test ethically, respect scope, and honor the licenses of original authors.