Open navigation menu
Close suggestions
Search
Search
en
Change Language
Upload
Sign in
Sign in
Download free for days
0 ratings
0% found this document useful (0 votes)
12 views
Web security tools and methodologie
Uploaded by
thnhng105
Copyright
© © All Rights Reserved
Available Formats
Download as TXT, PDF, TXT or read online on Scribd
Download now
Download
Save Web security tools and methodologie For Later
Download
Save
Save Web security tools and methodologie For Later
0%
0% found this document useful, undefined
0%
, undefined
Embed
Share
Print
Report
0 ratings
0% found this document useful (0 votes)
12 views
Web security tools and methodologie
Uploaded by
thnhng105
Copyright
© © All Rights Reserved
Available Formats
Download as TXT, PDF, TXT or read online on Scribd
Download now
Download
Save Web security tools and methodologie For Later
Carousel Previous
Carousel Next
Save
Save Web security tools and methodologie For Later
0%
0% found this document useful, undefined
0%
, undefined
Embed
Share
Print
Report
Download now
Download
You are on page 1
/ 4
Search
Fullscreen
Web security tools and methodologies
Source code analysis
Persistent cross-site scripting
Session hijacking
.NET deserialization
Remote code execution
Blind SQL injections
Data exfiltration
Bypassing file upload restrictions and file extension filters
PHP type juggling with loose comparisons
PostgreSQL Extension and User Defined Functions
Bypassing REGEX restrictions
Magic hashes
Bypassing character restrictions
UDF reverse shells
PostgreSQL large objects
DOM-based cross site scripting (black box)
Server side template injection
Weak random token generation
XML External Entity Injection
RCE via database Functions
OS Command Injection via WebSockets (BlackBox)
Study Materials
timip-GitHub- Reference guide
noraj-GitHub - Reference guide
wetw0rk-Github - Reference guide
kajalNair-Github - Reference guide
s0j0hn-Github - Reference guide
deletehead-Github - Reference guide
z-r0crypt - Reference guide
rayhan0x01 - Reference guide
Nathan-Rague - Reference guide
Joas Content - Reference guide
Lawlez-Github - Reference guide
0xb120 - Reference Guide
Jaelkoh
Vulnerabilities
XXE Injection
CSRF
Cross-Site Scripting Exploitation
Cross-Site Scripting (XSS)
Unrestricted File Upload
Open Redirect
Remote File Inclusion (RFI)
HTML Injection
Path Traversal
Broken Authentication & Session Management
OS Command Injection
Multiple Ways to Banner Grabbing
Local File Inclusion (LFI)
Netcat for Pentester
WPScan:WordPress Pentesting Framework
WordPress Pentest Lab Setup in Multiple Ways
Multiple Ways to Crack WordPress login
Web Application Pentest Lab Setup on AWS
Web Application Lab Setup on Windows
Web Application Pentest Lab setup Using Docker
Web Shells Penetration Testing
SMTP Log Poisoning
HTTP Authentication
Understanding the HTTP Protocol
Broken Authentication & Session Management
Apache Log Poisoning through LFI
Beginner’s Guide to SQL Injection (Part 1)
Boolean Based
How to Bypass SQL Injection Filter
Form Based SQL Injection
Dumping Database using Outfile
IDOR
Reviews
OSWE Review - Portuguese Content
0xklaue
greenwolf security
Cristian R
21y4d - Exam Reviews
Marcin Szydlowski
Nathan Rague
Elias Dimopoulos
OSWE Review - Tips & Tricks - OSWE Review - Tips & Tricks
Alex-labs
niebardzo Github - Exam Review
Marcus Aurelius
yakuhito
donavan.sg
Alexei Kojenov
(OSWE)-Journey & Review - Offensive Security Web Expert (OSWE) - Journey & Review
Patryk Bogusz
svdwi GitHub - OSWE Labs POC
Werebug.com - OSWE and OSEP
jvesiluoma
ApexPredator
Thomas Peterson
NOH4TS
Alex
RCESecurity
Dhakal
Karol Mazurek
4PFSec
Cobalt.io
hakansonay
Jake Mayhew
Organic Security
Bitten Tech
Extra Content
OSWE labs - OSWE labs and exam's review/guide
HTB Machine
Deserialization
B1twis3
jangelesg GitHub
rootshooter
svdwi
OSEP
Content
Operating System and Programming Theory
Client Side Code Execution With Office
Client Side Code Execution With Jscript
Process Injection and Migration
Introduction to Antivirus Evasion
Advanced Antivirus Evasion
Application Whitelisting
Bypassing Network Filters
Linux Post-Exploitation
Kiosk Breakouts
Windows Credentials
Windows Lateral Movement
Linux Lateral Movement
Microsoft SQL Attacks
Active Directory Exploitation
Combining the Pieces
Trying Harder: The Labs
Study Materials
OSEP Code Snippets
Experienced Pentester OSEP
OSEP Pre
PEN 300 OSEP Prep
OSEP Thoughts
OSEP Code Snippets README
Osep
Google Drive File
Awesome Red Team Operations
OSEP Study Guide 2022 - João Paulo de Andrade Filho
OSEP PREP Useful Resources Payloads
OSEP in3x0rab13
Reviews
nullg0re
SpaceRaccoon Dev
HackSouth YouTube
Schellman
Cinzinga
YouTube iUPyiJbN4l4
BorderGate
Reddit OSEP Review
Reddit OSCP Review
Purpl3F0xSecur1ty
MakoSecBlog
YouTube iUPyiJbN4l4
YouTube 15sv5eZ0oCM
YouTube 0n3Li63PwnQ
YouTube BWNzB1wIEQ
SpaceRaccoon Dev
Cas van Cooten
BorderGate
MakoSecBlog
David Lebr1 GitBook
Offensive Security
João Paulo de Andrade Filho LinkedIn
YouTube R1apMwbVuDs
YouTube iUPyiJbN4l4
Cristian Cornea Medium
Security Boulevard
YouTube R1apMwbVuDs
Fluid Attacks
Heartburn.dev
YouTube FVZkVZKIyOA
RootJaxk
Dhruvagoyal
IT Security Labs
Benjamen Lim
Marmeus
Winslow
Jakob Bo Moller
swzhouu
Labs
SpaceRaccoon Dev - OSEP Review and Exam
Exploit-DB - Evasion Techniques Breaching Defenses
OSCP Exam Report Template Markdown
Offensive Security - OSEP Exam FAQ
CyberEagle - OSEP Review
PentestLab - Defense Evasion
PentestLab - Antivirus Evasion
PentestLaboratories - Process Herpaderping Windows Defender Evasion
YouTube - PentesterAcademyTV
YouTube - PacktVideo
YouTube - PentesterAcademyTV
GitHub - In3x0rabl3/OSEP
GitHub - timip/OSEP
OSED
Content
WinDbg tutorial
Stack buffer overflows
Exploiting SEH overflows
Intro to IDA Pro
Overcoming space restrictions: Egghunters
Shellcode from scratch
Reverse-engineering bugs
Stack overflows and DEP/ASLR bypass
Format string specifier attacks
Custom ROP chains and ROP payload decoders
You might also like
Bug Bounty Playbook V2 PDF
PDF
80% (10)
Bug Bounty Playbook V2 PDF
250 pages
CSRF Answers
PDF
No ratings yet
CSRF Answers
5 pages
Bug Bounty Playbook V2v
PDF
No ratings yet
Bug Bounty Playbook V2v
250 pages
Hitting Logs
PDF
83% (6)
Hitting Logs
3 pages
Oswe Notes Basic by Joas 1648716052
PDF
No ratings yet
Oswe Notes Basic by Joas 1648716052
233 pages
OSEP Notes Basic by Joas
PDF
No ratings yet
OSEP Notes Basic by Joas
368 pages
Advanced Web Attacks and Exploitation: Offensive Security
PDF
100% (1)
Advanced Web Attacks and Exploitation: Offensive Security
9 pages
PHP Microservices
From Everand
PHP Microservices
Carlos Pérez Sánchez
3/5 (1)
Application Security and Secure Programming
PDF
No ratings yet
Application Security and Secure Programming
81 pages
Syllabus WAPTX
PDF
No ratings yet
Syllabus WAPTX
14 pages
Chapter 9 - Cyber Security
PDF
100% (1)
Chapter 9 - Cyber Security
28 pages
Security Protocols: Helping Alice and Bob To Share Secrets (COMP - SEC.220) Coursework I
PDF
No ratings yet
Security Protocols: Helping Alice and Bob To Share Secrets (COMP - SEC.220) Coursework I
6 pages
2020-02-09 - Introduction To The OWASP Top Ten
PDF
No ratings yet
2020-02-09 - Introduction To The OWASP Top Ten
45 pages
Cyber Security
PDF
No ratings yet
Cyber Security
5 pages
Icc
PDF
No ratings yet
Icc
14 pages
web
PDF
No ratings yet
web
33 pages
Web Hacking: CEH Test Prep Video Series
PDF
No ratings yet
Web Hacking: CEH Test Prep Video Series
9 pages
Elements of Android Room
From Everand
Elements of Android Room
Mark Murphy
No ratings yet
Expert PHP 5 Tools
From Everand
Expert PHP 5 Tools
Dirk Merkel
4/5 (5)
Cybersecurity Roadmap (Offensive + Defensive)
PDF
No ratings yet
Cybersecurity Roadmap (Offensive + Defensive)
15 pages
Get GPEN GIAC Certified Penetration Tester All-in-One Exam Guide 1st Edition Raymond Nutting PDF Ebook With Full Chapters Now
PDF
100% (3)
Get GPEN GIAC Certified Penetration Tester All-in-One Exam Guide 1st Edition Raymond Nutting PDF Ebook With Full Chapters Now
62 pages
Step 1 Understanding The Basics: Pre-Work
PDF
No ratings yet
Step 1 Understanding The Basics: Pre-Work
3 pages
cYb3r SeCur1Ty
PDF
No ratings yet
cYb3r SeCur1Ty
4 pages
PEN-200 24 week learning plan
PDF
No ratings yet
PEN-200 24 week learning plan
22 pages
Evasion Techniques and Breaching Defenses: Offensive Security
PDF
No ratings yet
Evasion Techniques and Breaching Defenses: Offensive Security
11 pages
qooxdoo Beginner's Guide
From Everand
qooxdoo Beginner's Guide
Mohamed Raffi
No ratings yet
Customized syllabus of CPENT (1)
PDF
No ratings yet
Customized syllabus of CPENT (1)
4 pages
Course Noteh
PDF
No ratings yet
Course Noteh
22 pages
CSWAE Version2
PDF
No ratings yet
CSWAE Version2
9 pages
Mastering Modern Web Penetration Testing
From Everand
Mastering Modern Web Penetration Testing
Prakhar Prasad
No ratings yet
The Top Hacker Methodologies & Tools Notes
PDF
No ratings yet
The Top Hacker Methodologies & Tools Notes
23 pages
RokdeshwarJ(CS)
PDF
No ratings yet
RokdeshwarJ(CS)
1 page
Web Application Penetration Testing Roadmap
PDF
No ratings yet
Web Application Penetration Testing Roadmap
7 pages
Mastering Python Network Automation: Automating Container Orchestration, Configuration, and Networking with Terraform, Calico, HAProxy, and Istio
From Everand
Mastering Python Network Automation: Automating Container Orchestration, Configuration, and Networking with Terraform, Calico, HAProxy, and Istio
Tim Peters
No ratings yet
Web Security
PDF
No ratings yet
Web Security
3 pages
Introduction To Web Penetration Testing
PDF
No ratings yet
Introduction To Web Penetration Testing
60 pages
osce3 resources
PDF
No ratings yet
osce3 resources
3 pages
Cybersecurity Roadmap
PDF
No ratings yet
Cybersecurity Roadmap
4 pages
Hack2Secure Web Application Security Testing Workshop Reference Guide
PDF
No ratings yet
Hack2Secure Web Application Security Testing Workshop Reference Guide
9 pages
Web Penetration Testing Roadmap
PDF
No ratings yet
Web Penetration Testing Roadmap
7 pages
Professional Bug Hunting & Advanced Web Application Course
PDF
No ratings yet
Professional Bug Hunting & Advanced Web Application Course
17 pages
Vulnerable Web Application
PDF
No ratings yet
Vulnerable Web Application
32 pages
tzorW8BTyrnDxYri8Njg - Web Security Fundamentals Guide
PDF
No ratings yet
tzorW8BTyrnDxYri8Njg - Web Security Fundamentals Guide
12 pages
Kali Linux Revealed 1st Edition
PDF
No ratings yet
Kali Linux Revealed 1st Edition
8 pages
BCS453 Cyber Security
PDF
No ratings yet
BCS453 Cyber Security
2 pages
Web Penetration Testing Roadmap (1)
PDF
No ratings yet
Web Penetration Testing Roadmap (1)
11 pages
Advanced Penetration Testing for Highly-Secured Environments: The Ultimate Security Guide
From Everand
Advanced Penetration Testing for Highly-Secured Environments: The Ultimate Security Guide
Allen Lee
4.5/5 (6)
Mastering Swift
From Everand
Mastering Swift
Jon Hoffman
No ratings yet
Advanced Web Hacking PDF
PDF
100% (1)
Advanced Web Hacking PDF
21 pages
Lab Booklet
PDF
No ratings yet
Lab Booklet
111 pages
NoSQL Injection for Elasticsearch
From Everand
NoSQL Injection for Elasticsearch
Gary Drocella
No ratings yet
pt0-002-13
PDF
No ratings yet
pt0-002-13
35 pages
50 Recipes for Programming Node.js
From Everand
50 Recipes for Programming Node.js
Jamie Munro
3/5 (4)
Code Injection Vulnerabilities in Web Applications - Exemplified at Cross-Site Scripting
PDF
No ratings yet
Code Injection Vulnerabilities in Web Applications - Exemplified at Cross-Site Scripting
252 pages
Web Hacking Tehnicques 2023
PDF
No ratings yet
Web Hacking Tehnicques 2023
82 pages
Top10 Web Hack Tech 23
PDF
No ratings yet
Top10 Web Hack Tech 23
82 pages
Bug_Bounty_Hunting_Guide
PDF
No ratings yet
Bug_Bounty_Hunting_Guide
3 pages
B.Voc CS-3
PDF
No ratings yet
B.Voc CS-3
15 pages
Web Application Hacking Penetration Testing 5 Day Hands On Course Syllabus v2.0 New
PDF
No ratings yet
Web Application Hacking Penetration Testing 5 Day Hands On Course Syllabus v2.0 New
8 pages
Bug Bounty Bootcamp
PDF
No ratings yet
Bug Bounty Bootcamp
2 pages
Oracle GoldenGate 11g Implementer's guide
From Everand
Oracle GoldenGate 11g Implementer's guide
John P Jeffries
5/5 (1)
Web Application Penetration Testing - An Analysis of A Corporate Application According To OWASP Guidelines
PDF
No ratings yet
Web Application Penetration Testing - An Analysis of A Corporate Application According To OWASP Guidelines
146 pages
Security_Vulnerability_Questions-1
PDF
No ratings yet
Security_Vulnerability_Questions-1
2 pages
Offsec PEN200 12WeeksPlan
PDF
No ratings yet
Offsec PEN200 12WeeksPlan
18 pages
Forms Authentication and Authorization
PDF
No ratings yet
Forms Authentication and Authorization
9 pages
Corporate Hacking and Technology - Driven Crime Social Dynamics and Implications
PDF
No ratings yet
Corporate Hacking and Technology - Driven Crime Social Dynamics and Implications
317 pages
TO Cryptography: Chapter - 4
PDF
No ratings yet
TO Cryptography: Chapter - 4
27 pages
E-Tender FY 2022
PDF
No ratings yet
E-Tender FY 2022
62 pages
NSE1
PDF
No ratings yet
NSE1
6 pages
How Chrome Browser Know Which Client Certificate To Prompt For A Site
PDF
No ratings yet
How Chrome Browser Know Which Client Certificate To Prompt For A Site
2 pages
TestCase Rediffmail 100858
PDF
No ratings yet
TestCase Rediffmail 100858
15 pages
CSDF Endsem
PDF
100% (1)
CSDF Endsem
33 pages
Classification of Cyber Crimes
PDF
No ratings yet
Classification of Cyber Crimes
9 pages
Sources of Security Threats
PDF
No ratings yet
Sources of Security Threats
33 pages
A 20-Year-Old Entrepreneur'S Success Story
PDF
100% (1)
A 20-Year-Old Entrepreneur'S Success Story
4 pages
Cyber Security Diploma
PDF
No ratings yet
Cyber Security Diploma
2 pages
Lesson 2 Types of Cyberattacks and Emerging Cybersecurity Threats and Trends
PDF
No ratings yet
Lesson 2 Types of Cyberattacks and Emerging Cybersecurity Threats and Trends
1 page
Types of Spam Filters
PDF
No ratings yet
Types of Spam Filters
5 pages
Battle Card - HARMONY Endpoint
PDF
No ratings yet
Battle Card - HARMONY Endpoint
3 pages
Investigating The Level of Awareness On Identity Theft and Its Impact On Public Perception of Social Media Security in Midsayap
PDF
No ratings yet
Investigating The Level of Awareness On Identity Theft and Its Impact On Public Perception of Social Media Security in Midsayap
8 pages
Ecs Assignment 1
PDF
No ratings yet
Ecs Assignment 1
5 pages
Government Polytechnic, Washim: "Implement Modifier Caesar's Cipher With Shift of Any Key
PDF
No ratings yet
Government Polytechnic, Washim: "Implement Modifier Caesar's Cipher With Shift of Any Key
12 pages
2024 USA24 CRYP-T09 01 Homomorphic-Encryption 1713559044896001asqd
PDF
No ratings yet
2024 USA24 CRYP-T09 01 Homomorphic-Encryption 1713559044896001asqd
35 pages
NSCP 2015 7th Edition Vol 1
PDF
100% (1)
NSCP 2015 7th Edition Vol 1
1,025 pages
HMAC Structure
PDF
No ratings yet
HMAC Structure
5 pages
Our Ref.: B1/15C B9/29C: Cyber Security Risk Management
PDF
No ratings yet
Our Ref.: B1/15C B9/29C: Cyber Security Risk Management
7 pages
Sy0 601 03
PDF
No ratings yet
Sy0 601 03
40 pages
Class-6a HHW-1
PDF
No ratings yet
Class-6a HHW-1
9 pages
Tor Country Codes
PDF
No ratings yet
Tor Country Codes
6 pages
2121188059-Cyber Crimes
PDF
No ratings yet
2121188059-Cyber Crimes
21 pages
Documents
Computers
Internet & Web