Security Cipher
Menu
Home
Blog
About Us
Resources
Penetration Testing Roadmap
Web Application Security Checklist
OWASP Top 10 for LLM Applications
LLM AI Security Checklist
Security Tools
Penetration Testing Tricks
Secure Code Explain
Vulnerability Explain
AWS Cloud Security Checklist
My Resume
Contact Us
Security Resources
Secure Code Explain
SQL Injection
Cross-origin resource sharing (CORS) Misconfiguration
Application-level Denial of Service (DoS)
Java Deserialization
Unrestricted File Upload
Host Header Injection
Server-side template injection (SSTI)
Insecure Password Storage
Insecure Password Reset - Token Exposed in Response
Reflected Cross-Site-Scripting (XSS)
Stored Cross-Site-Scripting (XSS)
DOM Cross-Site-Scripting (XSS)
Open Redirection
Secure Cookie not set
HttpOnly Flag not set
Session Fixation
XXE Injection
Server-Side Request Forgery (SSRF)
Cross-Site Request Forgery (CSRF)
Weak Password Policy
Insufficient Account Lockout Policy
Missing Content-Security-Policy Header
HSTS not Implemented
Clickjacking
Local File Inclusion
Remote File Inclusion (RFI)
Remote Code Execution (RCE)
Log Injection
Hardcoded Credentials
Insecure direct object references (IDOR)
Security Resources
Input Sanitization Techniques for Secure Coding
Wordlists
Out-of-Band Exfiltration Tools
Browser Extensions
HTTP Security Headers
Search Engines for Hackers
Vulnerability Explain
SQL Injection
Cross-Site-Scripting (XSS)
Server-Side Request Forgery (SSRF)
Penetration Testing Tricks
Subdomain Enumeration Tools
Graphql [Inprogress]
Captcha Bypass
2FA Bypass
One-Liners for Bug Bounty
Security Roadmap
Cloud Security Roadmap
Bug Bounty Roadmap
FREE - Security Courses/Resources
Real Ethical Hacking in 43 Hours Certificated CSEH+CEH 2024
CCSP
FREE Bug Bounty Advanced Hunting Course
View Details