Skip to content

adityaax/unique-bugs-chains-and-bypasses

Folders and files

NameName
Last commit message
Last commit date

Latest commit

ย 

History

46 Commits
ย 
ย 
ย 
ย 
ย 
ย 
ย 
ย 
ย 
ย 
ย 
ย 
ย 
ย 
ย 
ย 
ย 
ย 

Repository files navigation

Unique Bugs, Chains & Bypasses ๐Ÿ•ต๏ธโ€โ™‚๏ธ

A curated collection of rare vulnerabilities, bypasses, and attack chains published by security researchers.

โš ๏ธ All content here comes from public writeups/posts.
This repository summarizes and links to them โ€” full credit always goes to the original authors.

Unique Bugs Banner

๐ŸŒŸ Why This Repo Exists

Bug bounty research is scattered across blogs, Twitter, Medium, and conference slides.
This repository gathers unique bugs & creative bypasses in one place so researchers can:

  • Study attack chains step by step.
  • Understand how researchers escalate impact.
  • Get inspired for new security research.

๐Ÿ“„ Contributing

We welcome pull requests that include:

  • Submissions of unique bugs, bypasses, or chained attack scenarios.
  • Educational value for the community.

๐Ÿ“œ Disclaimer

This repository is for educational purposes only.
Always test ethically, respect scope, and honor the licenses of original authors.


About

A living archive of unique vulnerabilities, bypasses & chains reported by researchers.

Topics

Resources

License

Stars

Watchers

Forks