Security Cipher
Menu
Home
Blog
About Us
Resources
Penetration Testing Roadmap
Web Application Security Checklist
OWASP Top 10 for LLM Applications
LLM AI Security Checklist
Security Tools
Penetration Testing Tricks
Secure Code Explain
Vulnerability Explain
AWS Cloud Security Checklist
My Resume
Contact Us
Security Resources
Secure Code Explain
Insecure Password Reset - Token Exposed in Response
Insecure Password Storage
Server-side template injection (SSTI)
Host Header Injection
Unrestricted File Upload
Java Deserialization
Application-level Denial of Service (DoS)
Cross-origin resource sharing (CORS) Misconfiguration
Server-Side Request Forgery (SSRF)
Insufficient Account Lockout Policy
Local File Inclusion
Insecure direct object references (IDOR)
Remote Code Execution (RCE)
Remote File Inclusion (RFI)
Clickjacking
XXE Injection
DOM Cross-Site-Scripting (XSS)
Stored Cross-Site-Scripting (XSS)
Reflected Cross-Site-Scripting (XSS)
SQL Injection
Secure Cookie not set
HttpOnly Flag not set
Log Injection
Missing Content-Security-Policy Header
Weak Password Policy
Open Redirection
HSTS not Implemented
Hardcoded Credentials
Cross-Site Request Forgery (CSRF)
Session Fixation
Security Resources
Out-of-Band Exfiltration Tools
Wordlists
Browser Extensions
Search Engines for Hackers
Input Sanitization Techniques for Secure Coding
HTTP Security Headers
Vulnerability Explain
Server-Side Request Forgery (SSRF)
Cross-Site-Scripting (XSS)
SQL Injection
Penetration Testing Tricks
Graphql [Inprogress]
2FA Bypass
Subdomain Enumeration Tools
Captcha Bypass
One-Liners for Bug Bounty
Security Roadmap
Bug Bounty Roadmap
Cloud Security Roadmap
FREE - Security Courses/Resources
CCSP
Real Ethical Hacking in 43 Hours Certificated CSEH+CEH 2024
FREE Bug Bounty Advanced Hunting Course
View Details