Security Resources
- Secure Code Explain
- SQL Injection
- Cross-origin resource sharing (CORS) Misconfiguration
- Application-level Denial of Service (DoS)
- Java Deserialization
- Unrestricted File Upload
- Host Header Injection
- Server-side template injection (SSTI)
- Insecure Password Storage
- Insecure Password Reset - Token Exposed in Response
- Reflected Cross-Site-Scripting (XSS)
- Stored Cross-Site-Scripting (XSS)
- DOM Cross-Site-Scripting (XSS)
- Open Redirection
- Secure Cookie not set
- HttpOnly Flag not set
- Session Fixation
- XXE Injection
- Server-Side Request Forgery (SSRF)
- Cross-Site Request Forgery (CSRF)
- Weak Password Policy
- Insufficient Account Lockout Policy
- Missing Content-Security-Policy Header
- HSTS not Implemented
- Clickjacking
- Local File Inclusion
- Remote File Inclusion (RFI)
- Remote Code Execution (RCE)
- Log Injection
- Hardcoded Credentials
- Insecure direct object references (IDOR)
- Security Resources
- Input Sanitization Techniques for Secure Coding
- Wordlists
- Out-of-Band Exfiltration Tools
- Browser Extensions
- HTTP Security Headers
- Search Engines for Hackers
- Vulnerability Explain
- Penetration Testing Tricks
- Subdomain Enumeration Tools
- Graphql [Inprogress]
- Captcha Bypass
- 2FA Bypass
- One-Liners for Bug Bounty
- Security Roadmap
- FREE - Security Courses/Resources