bug-bounty448
google355
microsoft313
facebook262
xss238
apple180
malware174
rce149
exploit124
bragging-post101
cve99
account-takeover93
phishing83
csrf79
privilege-escalation77
stored-xss65
supply-chain65
authentication-bypass63
dos60
reflected-xss57
browser57
react50
cloudflare49
reverse-engineering48
input-validation48
cross-site-scripting48
access-control47
smart-contract45
docker45
aws45
node44
ethereum43
web343
sql-injection43
web-security42
defi42
web-application41
ssrf38
burp-suite35
vulnerability-disclosure34
idor34
race-condition33
html-injection33
info-disclosure33
smart-contract-vulnerability32
writeup32
buffer-overflow32
cloud32
oauth32
information-disclosure30
0
8/10
Technical writeup demonstrating how to identify and exploit 55,000+ subdomain takeover vulnerabilities on Shopify by analyzing CNAME records pointing to Shopify's infrastructure, including two exploitation methods (application name mapping and DNS mapping) with step-by-step methodology and large-scale scanning techniques.
subdomain-takeover
dns-misconfiguration
cloud-security
shopify
bug-bounty
large-scale-vulnerability
cname-records
domain-hijacking
fdns-dataset
exploitation-technique
Shopify
buckhacker
FDNS Dataset
Project Sonar
HackerOne