Web attacks
Methodology & AcademyOWASP Top 10Avoid Aggressive ScanningWeb EnumerationFuzzingBypass 403Registration FormEmail Verification BypassLogin Forms AttacksBypass Captcha2FA / OTPPassword ResetSQL InjectionNoSQL injectionLDAP InjectionXSSCSP BypassFile Inclusion LFI / RFIFile Upload AttacksCommand InjectionEmail injectionsHTTP Verb TamperingHTTP Header ExploitationHTTP Request SmugglingPrice Manipulation MethodsCookiesJWT TokenIDORXXESSTICSTISSRFCSRFCORSOpen RedirectionCSPTRelative Path Overwrite, RPOCRLF InjectionPrototype PollutionWeb Mass AssignmentWeb CacheWAF BypassCMSDjangoFlaskTomcat (8080)Tomcat CGINginxIISExchange / OWAGitLabJenkinsSplunkElasticsearchPRTG Network MonitorosTicketColdFusionNagiosWebminSlackMoodle