- 👾 Hackzzz
- 📝 Writeups
- HackTheBox
- Portswigger
- 📂 File upload
- 💉 SQL Injection
- Apprentice
- Practioner
- SQL injection UNION attack, determining the number of columns returned by the query
- SQL injection UNION attack, finding a column containing text
- SQL injection UNION attack, retrieving data from other tables
- SQL injection UNION attack, retrieving multiple values in a single column
- SQL injection attack, querying the database type and version on Oracle
- SQL injection attack, querying the database type and version on MySQL and Microsoft
- SQL injection attack, listing the database contents on non-Oracle databases
- SQL injection attack, listing the database contents on Oracle
- Blind SQL injection with conditional responses
- Blind SQL injection with time delays
- Blind SQL injection with time delays and information retrieval
- 📑 Information Disclosure
- 🪜 Directory Traversal
- 🧑💻 OS Command Injection
- 🧃 Broken Authentication
- 🗃️ Access Control
- Apprentice
- Unprotected admin functionality
- Unprotected admin functionality with unpredictable URL
- User role controlled by request parameter
- User role can be modified in user profile
- User ID controlled by request parameter
- User ID controlled by request parameter, with unpredictable user IDs
- User ID controlled by request parameter with data leakage in redirect
- User ID controlled by request parameter with password disclosure
- Insecure Direct Object References (IDOR)
- Apprentice
- 📝 External Entity Injection
- TryHackme
- 🔮 Github
- 📺 YouTube Channel
- 🥷 Five stages of Ethical Hacking
- 🔍 OSINT
- 👁️ Network Pentesting
- 🪟 Windows and Active Directory
- Windows Basic Commands
- Active Directory
- Windows Privilege Escalation
- Active Directory Exploitation Cheat Sheet
- Active Directory Attacks (PayloadAllTheThings)
- 🧠 Social Engineering
- 🕸️ Web Pentesting
- 📡 Wireless Pentesting
- Wi-Fi Network Fundamentals
- De-authentication
- Disassociation Packets
- Beacon Flooding
- Authentication Denial-Of-Service
- SSID Probing and Bruteforcing
- EAPOL Start and Logoff Packet Injection
- Attacks for IEEE 802.11s mesh networks
- WIDS Confusion
- WEP
- WPA/WPA2 - PSK
- Evil Twin Attacks
- WI-FI Pentesting Guide
- 🔥 Binary Explotation
- 🏃♂️ Pivoting & Port-forwarding
- 📱 Mobile Application Pentesting
- 🦾 Arduino
- 🌐 External Pentesting