Search
Methodology
Penetration Tests
Web Apps & APIs
Cloud
Mobile Apps
Desktop Apps
Wireless / Wifi
Social Engineering
Capture the Flag
Physical
Blue Team
Purple Team
Red Team
Evasion & Bypass
Cheat Sheets
All Cheat Sheets
Databases
Languages & Formats
Operating Systems
Ports & Protocols
Security Controls
Tools
Walk-Through
Cybereco
Hack the Box (HTB)
Hackfest & iHack
NorthSec
Metasploitable2
SANS Holiday Hack
Vulnhub
WebSecurity Academy
(Hackerone)
(Mossé)
(Root Me)
(TryHackMe)
Blog
About
GitHub
LinkedIn
Month:
February 2020
Exploit: XSS filename injection in Dropzone.js
call_google_search_api.py
cmd_loop.sh
Browser Storage (Local/Session/IndexedDB)
Web Messaging / Cross Document Messaging
Cross Site Flashing
Client-Side Resource Manipulation
JavaScript Execution
Application Mis-use
Circumvention of Work Flows
Number of Times a Function Can be Used Limits
Process Timing
Integrity Checks
Ability to Forge Requests
Business Logic Data Validation
Weak Encryption
Sensitive Information Sent via Unencrypted Channels
HTTP Incoming Requests
HTTP Response Splitting / Web Cache Poisoning
Incubated vulnerability
IMAP / SMTP Injection
Social Media Enumeration
ssh_bruteforce.sh
Search GitHub Repositories
Search Technical Information
Publicly Available Information
Privilege Escalation on Unix
Placeholder images for pentests
Vulnerable Targets
Exploit 47995: Sudo 1.8.25p – Buffer Overflow (CVE-2019-18634)
URL Encoded Attacks