File Upload Vulnerability Tricks and Checklist
Method Invocation in Go's builtin template modules lead to file read and RCE.
Hackerone x THM CTF Web Hacking Write-Up (Hacker Of The Hill)
How a person's name can be vital in a Social Engineering operation.
Exploiting an XSS for CSRF to SQLi (Helicopter Administrator 247CTF writeup).