Skip to content

Security Cipher

Menu
  • Home
  • Blog
  • About Us
  • Resources
    • Penetration Testing Roadmap
    • Web Application Security Checklist
    • OWASP Top 10 for LLM Applications
    • LLM AI Security Checklist
    • Security Tools
    • Penetration Testing Tricks
    • Secure Code Explain
    • Vulnerability Explain
    • AWS Cloud Security Checklist
  • My Resume
Contact Us
  • Security Resources

    • Secure Code Explain
      • Insecure Password Reset - Token Exposed in Response
      • Insecure Password Storage
      • Server-side template injection (SSTI)
      • Host Header Injection
      • Unrestricted File Upload
      • Java Deserialization
      • Application-level Denial of Service (DoS)
      • Cross-origin resource sharing (CORS) Misconfiguration
      • Server-Side Request Forgery (SSRF)
      • Insufficient Account Lockout Policy
      • Local File Inclusion
      • Insecure direct object references (IDOR)
      • Remote Code Execution (RCE)
      • Remote File Inclusion (RFI)
      • Clickjacking
      • XXE Injection
      • DOM Cross-Site-Scripting (XSS)
      • Stored Cross-Site-Scripting (XSS)
      • Reflected Cross-Site-Scripting (XSS)
      • SQL Injection
      • Secure Cookie not set
      • HttpOnly Flag not set
      • Log Injection
      • Missing Content-Security-Policy Header
      • Weak Password Policy
      • Open Redirection
      • HSTS not Implemented
      • Hardcoded Credentials
      • Cross-Site Request Forgery (CSRF)
      • Session Fixation
    • Security Resources
      • Out-of-Band Exfiltration Tools
      • Wordlists
      • Browser Extensions
      • Search Engines for Hackers
      • Input Sanitization Techniques for Secure Coding
      • HTTP Security Headers
    • Vulnerability Explain
      • Server-Side Request Forgery (SSRF)
      • Cross-Site-Scripting (XSS)
      • SQL Injection
    • Penetration Testing Tricks
      • Graphql [Inprogress]
      • 2FA Bypass
      • Subdomain Enumeration Tools
      • Captcha Bypass
      • One-Liners for Bug Bounty
    • Security Roadmap
      • Bug Bounty Roadmap
      • Cloud Security Roadmap
    • FREE - Security Courses/Resources
      • CCSP
      • Real Ethical Hacking in 43 Hours Certificated CSEH+CEH 2024
      • FREE Bug Bounty Advanced Hunting Course

    View Details
Donate

Donate

Buy me a Coffee
Donate

Penetration Testing Services - Fiverr

Buy me a Coffee
Image Link

Penetration Testing Services

penetration Testing Services
Image Link

Web Application Security Quiz

Web Application Security Quiz
Image Link

Daily Bug Bounty Writeups - Twitter

Daily Bug Bounty Writeups
Image Link

Download our Latest Android Application

Guide for Penetration Testing
Image Link

Daily Bug Bounty Writeups - Telegram

Daily Bug Bounty Writeups

Author

Piyush
Senior Product Security Engineer

Ethical Hacker || Penetration Tester || Gamer || Blogger || Application Security Engineer

READ ARTICLE
Tweets by bountywriteups
Donate

Donate

Buy me a Coffee

Recent Posts

  • 🛠️ Reconnaissance and Vulnerability Scanning Script🛡️
    🛠️ Reconnaissance and Vulnerability Scanning Script🛡️
    August 14, 2024/
    1 Comment
  • LLM Agents can Autonomously Hack Websites ?
    LLM Agents can Autonomously Hack Websites ?
    February 22, 2024/
    0 Comments
  • $600 Simple MFA Bypass – Graphql
    $600 Simple MFA Bypass – Graphql
    February 19, 2024/
    0 Comments

Follow Us

  • Opens in a new tab
  • Opens in a new tab
  • Opens in a new tab
  • Opens in a new tab
  • Opens in a new tab
  • Opens in a new tab
  • Opens in a new tab
logo name

Learn penetration Testing …

Instagram Twitter Youtube Telegram Linkedin

Useful Links

Blogs
About
Contact

Recent Post

  • 🛠️ Reconnaissance and Vulnerability Scanning Script🛡️
  • LLM Agents can Autonomously Hack Websites ?
  • $600 Simple MFA Bypass - Graphql

Subscribe Now

Don’t miss our future updates! Get Subscribed Today!

Subscription Form

By entering your email, you agree to our terms & Conditions and Privacy policy.

©2023. Security Cipher. All Rights Reserved.

Privacy Policies
Terms & Conditions