Bug-Bounty notes
Ctrlk
cipheropsInstagramLinkedinTwitterTelegram
  • 💛Welcome to the Future of Cybersecurity
  • Overview
    • 🗽Let's Start
    • 👣OSINT
    • 🦝Google Hacking using Dorks
  • ℹ️Recon Tips
  • 🕸️Web Application
    • 🏺Top 100 web vulnerabilities
    • 🥈Introducing 20 web-application hacking tools🔥🤩🌵
    • 🧪Comprehensive Web Application Testing Checklist
    • 👐Unveiling Open Ports with Advanced Techniques
    • 🦊The Art of XSS Exploitation
    • 📃Crucial WordPress Security Misconfiguration You Need to Know
    • 🤯Understanding SSRF Vulnerabilities and Their Impact
    • 🤖Mastering Subdomain Takeovers
    • ⚓Comprehensive Guide to Web Content Discovery: Tools, Techniques, and Tips
    • 🐝Exploring XPath Injection: Basics, Techniques, and Creative Exploitation
    • ☢️Understanding JSON API: A Comprehensive Guide
    • 👿De-serialization Attack
    • 🅰️Understanding Common API Vulnerabilities: A Deep Dive
    • Technology Identification
    • Link Extraction Tools
    • Parameter and Web Fuzzing Tools
    • Screenshots
    • File Inclusion,CSRF Injection,Directory Traversal
    • GraphQL Injection,Insecure Deserialization,Header Injection
    • Exploitation Tools Categorized by Vulnerability Type
    • Insecure Direct Object References, Open Redirect, Request Smuggling
    • Disclosed Reports 📝
    • Web Hack Tools
  • Network security
  • ✳️Mastering the Art of Writing Clear and Effective Vulnerabilities Report
  • 🐦Twitter
    • ✖️Thread by @ArchAngelDDay on Thread Reader App
  • 🌆Subdomain Enumeration
  • ☁️Cloud Pen-Testing Checklist
  • ⚒️Tools
    • 🔑Nmap's NSE Scripts for Ethical Password Testing
    • 🪓Axion-Scan
    • 🕶️DalFox Tool
  • Shodan Pentesting Guide
  • 🇬🇹Hacking Templates
  • 👻Cheat-sheet's
  • Medium and other articles links
  • ❗Exploitation
    • Exploitation notes
    • Post Exploitation
  • ❓Interview Question
  • Import
  • Import
Powered by GitBook
On this page

🕸️Web Application

🏺Top 100 web vulnerabilities🥈Introducing 20 web-application hacking tools🔥🤩🌵🧪Comprehensive Web Application Testing Checklist👐Unveiling Open Ports with Advanced Techniques🦊The Art of XSS Exploitation📃Crucial WordPress Security Misconfiguration You Need to Know🤯Understanding SSRF Vulnerabilities and Their Impact🤖Mastering Subdomain Takeovers⚓Comprehensive Guide to Web Content Discovery: Tools, Techniques, and Tips🐝Exploring XPath Injection: Basics, Techniques, and Creative Exploitation☢️Understanding JSON API: A Comprehensive Guide👿De-serialization Attack🅰️Understanding Common API Vulnerabilities: A Deep DiveTechnology IdentificationLink Extraction ToolsParameter and Web Fuzzing ToolsScreenshotsFile Inclusion,CSRF Injection,Directory TraversalGraphQL Injection,Insecure Deserialization,Header InjectionExploitation Tools Categorized by Vulnerability TypeInsecure Direct Object References, Open Redirect, Request SmugglingDisclosed Reports 📝Web Hack Tools
PreviousTool - 4 Subfinder: An Essential Guide for Domain ReconnaissanceNextTop 100 web vulnerabilities