Injection Signatures, Malicious Inputs, XSS, HTTP Header Injection, XXE, RCE https://github.com/xsscx/Commodity-Injection-Signatures
XXE in uber.com https://httpsonly.blogspot.com.es/2017/01/0day-writeup-xxe-in-ubercom.html
Hunting in the Dark - Blind XXE https://blog.zsec.uk/blind-xxe-learning/amp/
Injection Signatures, Malicious Inputs, XSS, HTTP Header Injection, XXE, RCE https://github.com/xsscx/Commodity-Injection-Signatures
XXE from Script Kiddie to Jedi Master (Slides) https://www.slideshare.net/mobile/ssuserf09cba/xxe-how-to-become-a-jedi
XXE - Things Are Getting Out of Band https://blog.zsec.uk/out-of-band-xxe-2/
vulnerable_xxe A C# web handler that is vulnerable to XXE with PoC. This is to serve as an example of what vulnerable C# code looks like. https://github.com/brandonprry/vulnerable_xxe
Playing with Content-Type – XXE on JSON Endpoints https://blog.netspi.com/playing-content-type-xxe-json-endpoints/
XML External Entity Injection in Jive-n (CVE-2018-5758) https://rhinosecuritylabs.com/research/xml-external-entity-injection-xxe-cve-2018-5758/
XXE in Site Audit function exposing file and directory contents https://hackerone.com/reports/312543
CVE-2018-0878 | Windows Remote Assistance XXE vulnerability details released! https://krbtgt.pw/windows-remote-assistance-xxe-vulnerability/
A collection of scripts that run on my web server. Mainly for debugging SSRF, blind XSS, and XXE vulnerabilities. https://github.com/jobertabma/ground-control
Gaining Filesystem Access via Blind OOB XXE https://hawkinsecurity.com/2018/03/24/gaining-filesystem-access-via-blind-oob-xxe/
blind XXE in autodiscover parser https://hackerone.com/reports/315837
OWASP TOP 10: XXE https://blog.detectify.com/2018/04/17/owasp-top-10-xxe/
2018-07-23 | BEING A SECURITY EXPERT, LATEST SOCIAL ENGINEERING TRENDS, AND FISA DOCUMENTS RELEASED FOR FIRST TIME https://www.hackerone.com/zerodaily/2018-07-23
LFI and SSRF via XXE in emblem editor https://hackerone.com/reports/347139
SOAP- Based Unauthenticated Out-of-Band XML External Entity (OOB-XXE) in a Help Desk Software https://medium.com/@mrnikhilsri/soap-based-unauthenticated-out-of-band-xml-external-entity-oob-xxe-in-a-help-desk-software-c27a6abf182a
Understanding Xxe From Basic To Blind http://agrawalsmart7.com/2018/11/10/Understanding-XXE-from-Basic-to-Blind.html
OOB XXE in PrizmDoc (CVE-2018–15805) https://medium.com/@mrnikhilsri/oob-xxe-in-prizmdoc-cve-2018-15805-dfb1e474345c
An interesting XXE in SAP https://medium.com/@zain.sabahat/an-interesting-xxe-in-sap-8b35fec6ef33
XXE on ██████████ by bypassing WAF ████ https://hackerone.com/reports/433996
XSS to XXE in Prince v10 and below (CVE-2018-19858) https://www.corben.io/XSS-to-XXE-in-Prince/
2018-12-07 | HACKTIVITY HIGHLIGHTS, RED TEAMING MIND MAP, AND IN DEFENSE OF MIMIKATZ https://www.hackerone.com/zerodaily/2018-12-07
From blind XXE to root-level file read access https://www.honoki.net/2018/12/from-blind-xxe-to-root-level-file-read-access/
XXE Attacks— Part 1: XML Basics https://medium.com/@klose7/https-medium-com-klose7-xxe-attacks-part-1-xml-basics-6fa803da9f26
XXE on https://duckduckgo.com https://hackerone.com/reports/483774
XXE that can Bypass WAF Protection https://lab.wallarm.com/xxe-that-can-bypass-waf-protection-98f679452ce0
Bug Bytes #5 -Lazy Hackers, Stök’s blind XXE and Inception http://blog.intigriti.com/2019/02/12/bug-bytes-5-lazy-hackers-stoks-blind-xxe-and-inception/
XXE on pulse.mail.ru https://hackerone.com/reports/505947
Exploiting Apache Solr through OpenCMS https://www.shielder.it/blog/exploit-apache-solr-through-opencms/
XML external entity (XXE) injection https://portswigger.net/web-security/xxe
SSRF and XXE Vulnerabilities in PDFreactor https://securityboulevard.com/2019/05/ssrf-and-xxe-vulnerabilities-in-pdfreactor/
A Deep Dive into XXE Injection https://www.synack.com/blog/a-deep-dive-into-xxe-injection/
Bug Bytes #29 – Why do Penetration Testing Teams Hate You, SSL/TLS vulnerabilities & A Deep Dive into XXE Injection http://blog.intigriti.com/2019/07/30/bug-bytes-29-why-do-penetration-testing-team-hate-you-ssl-tls-vulnerabilities-a-deep-dive-into-xxe-injection/
Exfiltration through FTP using OOB XXE
Upload accepts .xlsx files --> Unzip sample .xlsx file -> add payload in workbook.xml/[Content_Types].xml after xml declaration --> DTD file send data via ftp://remote-ip/%data --> run ftp server using xxe-ftp-server.rb --> /etc/passwd
Via: https://twitter.com/_ayoubfathi_/status/1164536885244583941
Toolkit to detect and keep track on Blind XSS, XXE & SSRF https://github.com/SpiderMate/B-XSSRF
If you find powerful OXML XXE tool? it's "DOCEM" https://www.hahwul.com/2019/09/oxml-xxe-payload-inject-tool-docem.html
XXE at ecjobs.starbucks.com.cn/retail/hxpublic_v6/hxdynamicpage6.aspx https://hackerone.com/reports/500515
XML External Entity (XXE) Injection Payload List https://medium.com/@ismailtasdelen/xml-external-entity-xxe-injection-payload-list-937d33e5e116
SPILLING LOCAL FILES VIA XXE WHEN HTTP OOB FAILS https://www.noob.ninja/2019/12/spilling-local-files-via-xxe-when-http.html
Exploiting XML External Entity (XXE) Injections https://medium.com/@onehackman/exploiting-xml-external-entity-xxe-injections-b0e3eac388f9
Very cool XXE bug in a Web Service https://medium.com/@soyelmago/very-cool-xxe-bug-in-a-web-service-85bfaa5b035c
Blind XXE payload generator using postb.in https://github.com/discodamone/XXE-Generator
$5,005 worth vulnerability Duplicated, How I loose $5,005 in a day? Denial of Service - Billion LAUGH Attack (XXE) https://medium.com/@protector47/5-005-worth-vulnerability-duplicated-how-i-loose-5-005-in-a-day-831f5a064713
XXE-scape through the front door: circumventing the firewall with HTTP request smuggling https://honoki.net/2020/03/18/xxe-scape-through-the-front-door-circumventing-the-firewall-with-http-request-smuggling/
The road from sandboxed SSTI to SSRF and XXE
https://www.reddit.com/r/Slackers/comments/g6pt8t/the_road_from_sandboxed_ssti_to_ssrf_and_xxe/
h1{Error based XXE - bug bounty writeup}