Loading...
This site is best viewed in a modern browser with JavaScript enabled.
Something went wrong while trying to load the full version of this site. Try hard-refreshing this page to fix the error.
Web Security
About Web Application Security & Penetration testing.
Understanding and Exploiting File Inclusion Vulnerability
Insecure Direct Object References (IDOR): Exploiting and Preventing
The $25,000 Blind Spot: How Missing Rate Limits Turned Brute-Force into a Bounty Goldmine
$4100 in Bug Bounties: Session Hacking Exploits Explained
⚠️ Crash, Cash, Repeat: The $10K File Upload Bug Hiding in Your Website
GraphQL Security: Understanding and Exploiting API Vulnerabilities
XML External Entities (XXE): Exploiting XML Parsers
Hands-On API Testing: Exploiting Endpoints and Mass Assignment Vulnerabilities
Server-Side Template Injection (SSTI): Exploiting Template Engines
Exploiting GraphQL Vulnerabilities: How Misconfigurations Can Lead to Data Leaks
$25,000 Bug Bounty for a GraphQL Security Flaw!
Cicada HTB Writeup
Server-Side Includes (SSI): A Lesser-Known Exploit Vector
Understanding Server-Side Request Forgery (SSRF)
How i got more than 100 vulnerabilities in just one site? (zseano-challenge)
How I Passed My EC-Council ICS-SCADA Exam Certification on My First Attempt [Preparation + Tips + Resources]
Finding and Exploiting XSS in Web Applications (Step-by-Step)
Command Injection: Leveraging OS Commands for Exploits
Automating SQL Injection with Tools: Beginner to Pro Techniques
Securing NASA For Certificate📜: P3 Vulnerability
« Previous Page
Next Page »