-
OWASP TOP 10
10 Lessons-
StartWhat is OWASP and INJECTION
-
Start4_What_is_Broken_Authentication
-
Start5_What_is_Senstive_Data_Exposure
-
Start6_What_is_XML_External_Entities
-
Start7_What_is_Broken_Access_Control
-
Start8_What_is_Security_Misconfiguration
-
Start9_What_is_Cross_Site_Scripting_(XSS)
-
Start10_What_is_Insecure_Deserialization
-
Start11_What_is_Using_Components_with_Known_Vulnerabilities
-
Start12_What_is_Insufficient_Logging_and_Monitoring
-
-
Authentication Bypass
14 Lessons-
StartAuth bypass
-
Start14_Authentication_Bypass_Exploitation_Live_-1
-
Start15_Authentication_Bypass_Exploitation_Live_-2
-
Start16_Authentication_Bypass_Exploitation_Live_-3
-
Start17_Authentication_Bypass_Exploitation_Live_-4
-
Start18_Authentication_Bypass_Exploitation_Live_-5
-
Start19_Authentication_Bypass_Exploitation_Captcha
-
Start20_Authentication_Bypass_to_Account_Takeover_Live_-1
-
Start21_Authentication_Bypass_to_Account_Takeover_Live_-2
-
Start22_Authentication_Bypass_due_to_OTP_Exposure_Live_-1
-
Start23_Authentication_Bypass_due_to_OTP_Exposure_Live_-2
-
Start24_Authentication_Bypass_2FA_Bypass_Live
-
Start25_Authentication_Bypass_-_Email_Takeover_Live
-
Start26_Authentication_Bypass_Mitigations
-
-
No Rate Limit Attacks
15 Lessons-
Start28_No_Rate-Limit_leads_to_Account_Takeover_Live_Type-1
-
Start29_No_Rate-Limit_leads_to_Account_Takeover_Live_Type_-2
-
Start30_No_Rate-Limit_leads_to_Account_Takeover_Live_Type_-3
-
Start31_No_Rate-Limit_leads_to_Account_Takeover_Live_Type_-4
-
Start32_No_Rate-Limit_leads_to_Account_Takeover_Live_Type_-5
-
Start33_No_Rate-Limit_to_Account_Takeover_Live_-_Type_6
-
Start34_No_Rate-Limit_to_Account_Takeover_Live_-_Type_7
-
Start35_No_Rate-Limit_Instagram_Report_Breakdown
-
Start36_No_Rate-Limit_Instagram_Report_Breakdown_2
-
Start37_No_Rate_Limit_Bypass_Report_Breakdown
-
Start38_No_Rate_Limit_Bypass_Report_Breakdown_2
-
Start39_No_Rate-Limit_to_Tool_Fake_IP_Practical
-
Start40_No_Rate-Limit_test_on_CloudFare
-
Start41_No_Rate-Limit_Mitigations
-
Start42_No_Rate-Limit_All_Hackerone_Reports_Breakdown
-
-
Cross Site Scripting (XSS)
35 Lessons-
Start43_How_XSS_Works
-
Start44_Reflected_XSS_on_Live_1
-
Start45_Reflected_XSS_on_Live_2
-
Start47_Reflected_XSS_on_Live_3_Balanced
-
Start48_XSS_on_Limited_Inputs_Live_1
-
Start49_XSS_on_Limited_Inputs_Live_2
-
Start50_XSS_in_Request_Headers_-_Live
-
Start51_Reflected_XSS_Useragent_and_Caching
-
Start52_Reflected_XSS_Email_Validator_Live
-
Start53_Reflected_XSS_Protection_Bypass_Live_1_-_Base64
-
Start54_Reflected_XSS_Protection_Bypass_Live_-2
-
Start55_XSS_using_Spider
-
Start56_XSS_Bypass_Right_Click_Disabled
-
Start57_Blind_XSS_Exploitation
-
Start58_Stored_XSS_Exploitation_Live
-
Start59_DOM_XSS_Name
-
Start60_DOM_XSS_Redirect
-
Start61_DOM_XSS_Index
-
Start62_XSS_on_Live_by_Adding_Parameters
-
Start63_XSS_Mouse_on_Lab
-
Start64_XSS_Mouse_Live
-
Start65_XSS_Mouse_Events_All_Types
-
Start66_XSS_Polyglots_Live
-
Start67_XSS_Polyglots_Breakdown
-
Start68_XSS_Exploitation_-_URL_Redirection
-
Start69_XSS_Exploitation_-_Phishing
-
Start70_XSS_Exploitation_Cookie_Stealer_Lab
-
Start71_XSS_Exploitation_Cookie_Stealer_Live
-
Start72_XSS_Exploitation_File_Upload_Type_-2
-
Start73_XSS_Exploitation_File_Upload_Type_-3
-
Start74_XSS_Exploitation_File_Upload_Type-_1
-
Start75_XSS_Mitigations
-
Start76_XSS_Bonus_TIPS_and_TRICKS
-
Start77_XSS_Hackerone_ALL_Reports_Breakdown
-
Start78_XSS_Interview_Questions_and_Answers
-
-
Cross Site Request Forgery (CSRF)
17 Lessons-
Start79_How_CSRF_Works
-
StartCSRF_Alternative_Tools_Introduction
-
StartAlternative_to_Burp_Suite_for_CSRF
-
Start80_CSRF_on_LAB
-
Start81_CSRF_on_LAB_-_2
-
Start82_CSRF_on_Live_-1
-
Start83_CSRF_on_Live_-2
-
Start84_CSRF_Passoword_Change_Lab
-
Start85_CSRF_Funds_Transfer_Lab
-
Start86_CSRF_Request_Methods_Trick_-_Lab
-
Start87_CSRF_to_Account_Takeover_Live_-1
-
Start88_CSRF_to_Account_Takeover_Live_-2
-
Start89_Chaining_CSRF_with_XSS
-
Start90_CSRF_Mitigations
-
Start91_CSRF_BONUS_Tips_and_Tricks
-
Start92_CSRF_ALL_Hackerone_Reports_Breakdown
-
Start93_CSRF_Interview_Questions_and_Answers
-
-
Cross Origin Resource Sharing (CORS)
10 Lessons-
Start94_How_CORS_Works
-
Start95_CORS_3_Test_Cases_Fundamentals
-
Start96_CORS_Exploitation_Live_-2_Exfiltration_of_Account_Details
-
Start97_CORS_Exploitation_Live_-3_Exfiltration_of_Account_Details
-
Start98_CORS_Live_Exploitation_-4
-
Start99_CORS_Exploitation_Facebook_Live
-
Start100_CORS_Live_Prefix_Match
-
Start101_CORS_Live_Suffix_Match
-
Start102_CORS_Mitigations
-
Start103_CORS_Breakdown_of_ALL_Hackerone_Reports
-

