Bug-Bounty notes
Ctrlk
cipheropsInstagramLinkedinTwitterTelegram
  • πŸ’›Welcome to the Future of Cybersecurity
  • Overview
    • πŸ—½Let's Start
    • πŸ‘£OSINT
    • 🦝Google Hacking using Dorks
  • ℹ️Recon Tips
  • πŸ•ΈοΈWeb Application
    • 🏺Top 100 web vulnerabilities
    • πŸ₯ˆIntroducing 20 web-application hacking toolsπŸ”₯🀩🌡
    • πŸ§ͺComprehensive Web Application Testing Checklist
    • πŸ‘Unveiling Open Ports with Advanced Techniques
    • 🦊The Art of XSS Exploitation
    • πŸ“ƒCrucial WordPress Security Misconfiguration You Need to Know
    • 🀯Understanding SSRF Vulnerabilities and Their Impact
    • πŸ€–Mastering Subdomain Takeovers
    • βš“Comprehensive Guide to Web Content Discovery: Tools, Techniques, and Tips
    • 🐝Exploring XPath Injection: Basics, Techniques, and Creative Exploitation
    • ☒️Understanding JSON API: A Comprehensive Guide
    • πŸ‘ΏDe-serialization Attack
    • πŸ…°οΈUnderstanding Common API Vulnerabilities: A Deep Dive
    • Technology Identification
    • Link Extraction Tools
    • Parameter and Web Fuzzing Tools
    • Screenshots
    • File Inclusion,CSRF Injection,Directory Traversal
    • GraphQL Injection,Insecure Deserialization,Header Injection
    • Exploitation Tools Categorized by Vulnerability Type
    • Insecure Direct Object References, Open Redirect, Request Smuggling
    • Disclosed Reports πŸ“
    • Web Hack Tools
  • Network security
  • ✳️Mastering the Art of Writing Clear and Effective Vulnerabilities Report
  • 🐦Twitter
    • βœ–οΈThread by @ArchAngelDDay on Thread Reader App
  • πŸŒ†Subdomain Enumeration
  • ☁️Cloud Pen-Testing Checklist
  • βš’οΈTools
    • πŸ”‘Nmap's NSE Scripts for Ethical Password Testing
    • πŸͺ“Axion-Scan
    • πŸ•ΆοΈDalFox Tool
  • Shodan Pentesting Guide
  • πŸ‡¬πŸ‡ΉHacking Templates
  • πŸ‘»Cheat-sheet's
  • Medium and other articles links
  • ❗Exploitation
    • Exploitation notes
    • Post Exploitation
  • ❓Interview Question
  • Import
  • Import
Powered by GitBook
On this page

πŸ•ΈοΈWeb Application

🏺Top 100 web vulnerabilitiesπŸ₯ˆIntroducing 20 web-application hacking toolsπŸ”₯🀩🌡πŸ§ͺComprehensive Web Application Testing ChecklistπŸ‘Unveiling Open Ports with Advanced Techniques🦊The Art of XSS ExploitationπŸ“ƒCrucial WordPress Security Misconfiguration You Need to Know🀯Understanding SSRF Vulnerabilities and Their ImpactπŸ€–Mastering Subdomain Takeoversβš“Comprehensive Guide to Web Content Discovery: Tools, Techniques, and Tips🐝Exploring XPath Injection: Basics, Techniques, and Creative Exploitation☒️Understanding JSON API: A Comprehensive GuideπŸ‘ΏDe-serialization AttackπŸ…°οΈUnderstanding Common API Vulnerabilities: A Deep DiveTechnology IdentificationLink Extraction ToolsParameter and Web Fuzzing ToolsScreenshotsFile Inclusion,CSRF Injection,Directory TraversalGraphQL Injection,Insecure Deserialization,Header InjectionExploitation Tools Categorized by Vulnerability TypeInsecure Direct Object References, Open Redirect, Request SmugglingDisclosed Reports πŸ“Web Hack Tools
PreviousTool - 4 Subfinder: An Essential Guide for Domain ReconnaissanceNextTop 100 web vulnerabilities