Security Workbook on Pentesting
Lets Connect
Search
⌃
K
Links
Security Workbook on Pentesting
About us
References
Bug Bounty
Resources
Web-App Pentest
Business logic Vulnerabilities
Clickjacking
Command Injection
CRLF Injection (%0d%0a)
Cross-Site Request Forgery (CSRF)
Cross-site scripting (XSS)
Directory Bruteforce
Encoding
File Inclusion
Git Recon
Hacks
HTTP Cheat Sheet
HTTP request smuggling
Insecure Deserialization
Insecure direct object references (IDOR)
Insecure HTTP Methods
JWT and it's bypass
Keyhacks
OAuth
PostMessage Vulnerabilities
Race Conditions
Redirects
Response manipulation
ReconNotes
SAML/SSO
Server-side request forgery (SSRF)
Server-Side Template Injection (SSTI)
Shodan
Subdomain Enumeration & Takeover
SQL Injection
Sensitive Information Disclosure
Template Injection
Unristricted file upload
VPS
Web Cache Deception
Web App Pentest Checklist
XML External Entities (XXE)
API Pentest
Android App Pentest
iOS App Pentest
Network Pentest
Source Code Review
Cloud Security
Thick Client Pentesting
Mindmaps
Tools Cheat Sheet
Burp Extensions For Bug Bounty & Pen-Testing
Tools Used For Android Testing
Bug Bounty & Pen-Test Templates
Technical Comics
CTF's
Hardware Security
Powered By
GitBook
Web-App Pentest
Web Application Pentesting MindMaps
Web App Pentest
MindMeister
Web Application Security
MindMeister
Some useful resources which updates regularly
GitHub - KathanP19/HowToHunt: Tutorials and Things to Do while Hunting Vulnerability.
GitHub
GitHub - swisskyrepo/PayloadsAllTheThings: A list of useful payloads and bypass for Web Application Security and Pentest/CTF
GitHub
Collection Of Bug Bounty Tip-Will Be updated daily
Medium
Previous
Resources
Next
Business logic Vulnerabilities
Last modified
1yr ago