Web attacks
Methodology & AcademyOWASP Top 10Avoid Aggressive ScanningWeb EnumerationFuzzingBypass 403 / 401Registration FormEmail Verification BypassLogin Forms AttacksBypass Captcha2FA / OTPPassword ResetSQL InjectionNoSQL injectionLDAP InjectionXSSCSP BypassFile Inclusion LFI / RFIFile Upload AttacksCommand InjectionEmail injectionsPhone Number InjectionMarkdown injectionHTTP Verb TamperingHTTP Header ExploitationHTTP Request SmugglingPrice Manipulation MethodsTesting Credit CardsCookiesJWT TokenIDORXXESSTICSTISSRFCSRFCORSOpen RedirectionCSPTRelative Path Overwrite, RPOCRLF InjectionPrototype PollutionWeb Mass AssignmentWeb CacheWAF BypassCMSDjangoFlask / WerkzeugTomcat (8080)Tomcat CGINginxIISExchange / OWAGitLabJenkinsSplunkElasticsearchPRTG Network MonitorosTicketColdFusionNagiosWebminSlackMoodle