Skip to content

Latest commit

 

History

History
11 lines (7 loc) · 286 Bytes

File metadata and controls

11 lines (7 loc) · 286 Bytes

Common Vulnerabilities and Exploitations

The repository includes various vulnerbilities, their types, identification, exploitation and mitigations along with payloads.

Includes:

Cross-Site Scripting (XSS)
SQL Injection (SQLi)
Directory Traversal
Command Injection