Day 30 comes with two resources related to weak cryptography to open redirect and RCE examples for beginners!
Day 29 comes with examples for weak cryptography that achieves account takeover, and unrestricted file upload which leads RCE.
Day 28 comes with a good write up about rate limit and captcha bypass, also with deserialization attacks!
Day 27 comes with a pretty interesting attack called “Pixel that steals your data” and Vulnerability chaining such as Open Redirect and OAuth misconfiguratio...
Day 26 comes with different a pretty good resource to bypass 2FA and part 2 on S3 buckets misconfigurations!