Web Application Penetration Testing
API HackingAdvanced SQLiAuthentication Tokens BypassBrowser DesyncCMS AttacksCommand InjectionCross-Site Request Forgery (CSRF)Cross-Site Scripting (XSS)Database navigationDirectory Path TraversalExposed Github Repositories DumpingFastCGIGit HooksGraphQL PentestingHTTP/2 Request TunnelingHTTP AttacksHTTP Code 403 (Forbidden) BypassHTTP MisconfigurationsHTTP Request Smuggling through WebsocketInsecure DeserializationInsecure Direct Object Reference (IDOR)Jetty Web Server RCELDAP InjectionLaTeX Local File InclusionLocal File Inclusion (LFI)Log PoisoningNoSQL InjectionObject Relational Mapping (ORM) InjectionPDF Generation VulnerabilitiesPHP Assertions RCEPHP Filter Chain LFI to RCEType JugglingPHP VulnerabilitiesPadding Oracle AttackPrototype PollutionPython Werkzeug PIN ExploitRemote Code Execution (RCE)Remote File Inclusion (RFI)SQL Injection (SQLi)SSL-TLS AttacksSensitive FilesSerialization RCEServer Side Template Injection (SSTI)Server-Side Request Forgery (SSRF)Springboot Application PentestingSubdomain EnumerationSymfony PentestingUpload VulnerabilitiesXML External Entity (XXE) InjectionXPath InjectionTunneling requests via h2c smugglingAuthentication TokensBypass TechniquesPlaybooksScripts
Last updated