title
large_stringlengths
5
121
author
large_stringlengths
3
31
date
large_stringdate
2015-09-24 00:00:00
2026-04-11 00:00:00
read_time_minutes
int64
0
27
claps
int64
0
1.4k
responses
int64
0
9
article_snippet
large_stringlengths
4
1.38k
How to use “Caido Workflows” to scan for anything
Mostafa Alrefai
2025-07-26
3
107
1
How to build Caido passive workflows to scan all HTTP requests & responses…
CTF — Writeup: De Reconnaissance a Root
Jonathan M.
2025-08-06
9
5
0
Target: Rain ☔ Dificuldade: Dificil 🐔 Plataforma: HackingClub Sistema Operacional: Linux Tempo de Exploração: 7–8 hrs (Esse foi o tempo que eu levei) Vulnerabilidades conhecidas: Git Exposed, SSRF, Local File Read, Redis, RCE, Path Hijacking Status: PWNED 🎯
Hacking APIs: Exploiting WebSockets Insecure Implementations
Israel Aráoz Severiche
2025-08-17
2
2
0
This article explores how insecure WebSocket implementations can expose APIs to attacks such as unauthorized data access, hidden action abuse, Cross-Site WebSocket Hijacking, and DoS. Includes real-world request/response examples, exploitation techniques, and practical defenses for securing real-time APIs.
The Top 20 Kali Linux Apps and Where to Find Them
Travis Ray Caverhill
2025-12-05
8
0
0
Let me start by asking you a question that might sting a little…
Breaking Past 403: A Deep Dive into Out-of-Band SQL Injection Discovery
RyuuKhagetsu
2025-12-07
6
35
2
Hi everyone! Hope you’re all doing well. It’s been a while since my last article — probably a few months. Work and university responsibilities have really taken up most of my time, to the point where it’s been hard to just sit down and write, even though there were so many things I wanted to share and document. This ti...
Server-Side Template Injection (SSTI): A Practical Testing Methodology
Israel Aráoz Severiche
2026-01-21
4
5
0
Server-Side Template Injection (SSTI) remains a critical vulnerability class with the potential for Remote Code Execution (RCE). Unlike simple data reflection, SSTI occurs when an attacker can inject template directives directly into a template engine, which are then executed server-side.
My First Month in Bug Bounty: Results, Numbers, and Lessons Learned
Ramazan
2026-02-09
4
2
0
My journey into Cybersecurity started from scratch. I had no prior IT background — no system administration experience, no coding skills, nothing. I simply followed a systematic path of learning and earning certifications. Over the course of three years, I built a solid “paper” foundation: OSCP, HTB CWES, CRTP, PNPT, P...
Bypassing a 403 Using Path Manipulation in Calendly Assets
24BkDoor
2026-04-11
4
2
0
According to their page a few points to note:
Admin Portal Hijacking — Bug Bounty Writeup
Mostafa Alrefai
2026-04-02
3
14
0
How I was able to hijack an admin portal without any username or password…
Thinking about Requests in Pentesting
Ender Phan
2021-06-27
6
12
0
The reason I want to wrap up this topic is just to keep all of my logic and comprehension of requests in pen testing, hacking. Why it’s important? Rather than knowing the best practices, security cheat sheets that need to follow in order to protect your applications from the attacks, which also could be done by automat...
A learners guide to penetration testing.
Olal James
2021-10-12
2
122
1
Penetration testing (also known as pen testing) , is the practice of testing a computer system , network or web application to find vulnerabilities that an attacker could exploit.
How to Install DVWA In 2023 On Windows Environment
Handhika Yanuar Pratama
2023-01-10
7
196
4
Damn Vulnerable Web App (DVWA) is a fundamental tool when learning about hacking, especially in pen testing. I will only write this article once one of my friends asks what the most straightforward tutorial is on installing DVWA. Since I like to make step-by-step when setup/installing something. I would be happy to hel...
Best Penetration Testing Institute in Delhi
EINITIAL24
2023-04-16
3
0
0
Penetration testing, also known as pen testing, is the process of testing a computer system, network, or web application to find vulnerabilities and assess the level of security. It is an important part of ensuring the safety of digital assets and protecting against cyber attacks. Penetration testing is a highly specia...
Cloud Architect Review (#5, Oct. 27, 2024)
Chris St. John
2024-10-27
13
96
0
Thanks for joining me to review the past week’s hot topics and interesting articles.
Do Hacking with Simple Python Script and gather information
Daniel Webimprints
2019-01-02
5
0
0
Pentesting is all about showing and reporting problems in web/mobile applications. This is the most popular part of cyber security which every researcher/security enthusiast want to do. Because it gives a brief knowledge how to penetrate any web application. Pentesting is done by information gathering. There are many t...
One click for victims, one huge leap for attackers
Hacktory
2020-11-26
4
0
0
CSRF (Cross-Site Request Forgery, aka one-click attack) is an attack that tricks a web browser into performing an unwanted action within an application, which a victim is logged into. If a victim visits a website created by an attacker, a request is sent secretly on behalf of a user to another server that performs a ma...
httpx on Gjthub: amazing web enumeration too for recon
DJ SUBSTANCE
2023-08-30
7
47
1
DJ Substance bringing you the relevant haxing info in the 2o23z :
Insecure Processing of Credit Card Data: The Most Simple Bug in Pentesting
Kanhaiya Panchal
2023-08-05
3
68
0
In this blog post, I will discuss how applications process credit card information and the simple bugs that you should look out for. I will also provide some tips on how to protect your users’ data.
Exploring XSS Attack: My Approaches, Techniques, and Mitigation for Identifying in Web Applications
Kanhaiya Panchal
2023-08-15
7
98
3
Hi Readers!
Web Application Security Assessment Write-up on Lazy Status
$[beard3nx]
2023-11-16
6
10
0
Hello everyone! 👋 I’m here to share insights from a recent web application security assessment on Lazy Status. In this assignment, I thoroughly examined the application to pinpoint vulnerabilities and evaluate its security standing.
Dorking-Pentesting: Create Your Own Automated Google Dorking Based Pentesting Tools
ElNiak
2024-02-20
12
100
0
Hey there, fellow cybersecurity enthusiasts and aspiring hackers! 🕵️‍♂️💻
CC:Pentesting — SQLMAP On Vulnerable Web App
Kyle
2022-04-12
0
0
0
(55) CC:Pentesting — SQLMAP On Vulnerable Web App — YouTube
Pentesting isn’t Everything
abdeldayemnour
2024-02-21
4
3
0
I work in a cybersecurity consultancy company, and I recently shifted from the Red Team, where I was doing web and mobile app pentesting, to the Blue Team, where I’m working on more general security consulting — everything from Governance, Risk and Compliance (GRC) to configuration reviews and infrastructure design.
오늘의 취약점 분석 — Week 3 Day 5
wonder
2025-01-09
1
0
0
used Claude rather than ChatGPT for python automation script for blind pentesting — portscan and web connection check for each open port and screenshot. → SSH connection, SMB connection check (smbclient, etc)
LLM-powered Agent for Automated Google Dorking
yee-yore
2025-04-30
4
113
0
Hello! I’m yee-yore, conducting research in the field of LLM-based web bug hunting and pentesting. Today, I’d like to introduce DorkAgent, the first project of my research.
🔗 HTMLI → XSS → SSTI → RCE — Laboratorio práctico paso a paso
Gorka
2025-09-30
3
2
0
💞 Mi canal de Youtube: Bug Bounty & Pentesting y Hacking Web https://www.youtube.com/@0xGorka
💰 $35,000 por un fallo en GitLab — Análisis completo de un reporte real
Gorka
2025-10-15
2
0
0
💞 Mi canal de Youtube: Bug Bounty & Pentesting y Hacking Web https://www.youtube.com/@0xGorka
Throwing the kitchen sink at web application vulnerabilities
Jacob Lummus
2024-04-01
5
9
0
I started chasing a goal of mine to find an XSS vulnerability in the wild by putting together a Python notebook that could maybe assist me on the journey. You can read a little about it here:
When “Forgot Password” Becomes “Forgot Security”: A Tale of Vulnerable Design
Krishna Chaitanya Chaganti
2024-09-19
2
8
0
Hello security enthusiasts and curious readers! Let’s understand this digital oopsie that’s more common than you might think. Imagine locking yourself out of your house, only to find that the spare key is hidden under the welcome mat — predictable and not very secure, right? Well, I stumbled upon the digital equivalent...
Unmasking XSS: Understanding Cross-Site Scripting Attacks
Abhishek M L
2024-10-05
5
1
0
Hope this blog helps you understand XSS vulnerability
Unlocking Web Intelligence: A Deep Dive into WhatWeb
Andrey Pautov
2024-11-10
5
1
0
In the vast and ever-evolving landscape of web technologies, understanding the underlying components that power a website is crucial for a variety of professionals — from cybersecurity experts to market analysts. Enter WhatWeb, a robust command-line tool that excels in identifying the technologies used on websites. Wit...
OWASP Amass Project guide
Andrey Pautov
2024-11-06
7
59
0
The OWASP Amass Project is a prominent open-source initiative under the Open Web Application Security Project (OWASP), designed to help with in-depth reconnaissance, network mapping, and identifying assets associated with a target domain. It’s particularly valuable in the reconnaissance phase of penetration testing and...
Web Applications Penetretion Testing. Stage 1: Reconnaissance
Andrey Pautov
2024-11-10
6
8
0
In the intricate world of web application penetration testing, the reconnaissance stage serves as the cornerstone upon which all subsequent security efforts are built. Often overlooked in favor of more direct attack techniques, this initial phase is where the foundation of a successful penetration test is laid. By gath...
How Hidden 3xXSS got revealed
0xbugatti
2024-11-20
0
95
1
During VAPT sprint I started Exploring the Application as normal
Mastering SQLMap: A Comprehensive Guide to Exploiting SQL Injection Vulnerabilities
Tareshsharma
2024-12-08
3
1
0
Introduction SQLMap is a powerful, open-source tool that automates the process of detecting and exploiting SQL injection (SQLi) vulnerabilities. It provides penetration testers and security professionals with advanced features for testing, troubleshooting, and exploiting databases through HTTP requests. In this detaile...
Cyberproof probably disapproves of its own web security
0trust0day
2025-07-17
5
0
0
The irony of a cybersecurity company falling short of modern digital security expectations is not just striking — it’s dangerous. In a time when users are increasingly reliant on experts to safeguard their personal data, reputations, and online activity, security vendors have a responsibility to lead by example. Yet, m...
From Chaos to Clarity: How I Conduct Web Application Pentests with Clients
echosso
2025-07-20
4
2
0
Let me take you through how I usually approach a professional web application penetration test with clients. Not just as a checklist of tasks, but as a methodical journey where every step is part of a narrative.
Top 3 tools for Bug Bounty/Pentesting (2025)
Appsec.pt
2025-07-11
3
63
0
There are lots of web app security tools. Some of them are very well known, like BurpSuite, Nmap, Nuclei, ffuf, etc, whilst others, even though they are very good, have flown under the radar, or are not being used to the fullest of their potential by most hackers.
🔍 Pentester’s Quiz: 10 Realistic API & Web Scenarios You Must Solve
Narendar Battula (nArEn)
2025-08-19
3
0
0
Pentesting isn’t about tools — it’s about recognizing subtle mistakes. Below are 10 intermediate challenges. Each one mirrors real-world situations you’ll face in API/Web pentests.
PHP for Pentesting — Day 1
Bazil Brohi
2025-11-11
10
0
0
Today is the beginning of a journey where we will learn PHP, the language of server side logic of web applications, to build secure functions, understand insecure functions, and develop a deeper understanding of how the web application interacts with its server side to make decisions for the front end client.
🛡️ OWASP Top 10: 2025 — The Evolved Battlefield of Web Application Security
Aditya Bhatt
2025-11-08
6
6
0
The OWASP Top 10: 2025 shifts web security from a vulnerability-fix mindset to a root-cause prevention approach. It introduces new categories like Software Supply Chain Failures and Mishandling of Exceptional Conditions, while reinforcing Access Control, Misconfigurations, and Cryptographic Failures as core threats. Th...
2. Master the Basics, Break the Web: HTTP Fundamentals
Abinesh M
2025-11-30
7
16
0
HTTP methods define the type of action the client wants to perform on a resource. Each method has a specific purpose and is interpreted differently by servers, APIs, and security controls. Understanding them helps pentesters identify how data is handled and where manipulation is possible.
Windows Web Shell
S12 - 0x12Dark Development
2025-11-13
11
13
0
Welcome to my new Medium post. In this article I’ll walk you through a simple Windows web shell built with Python. The server accepts commands via HTTP and posts them to a command queue. The client polls the server for pending commands, executes any it finds, and returns the command output back to the server. I’ll expl...
6. Master the Basics, Break the Web: Input & Output Basics
Abinesh M
2025-12-04
4
4
0
Client-side validation happens in the browser using JavaScript or HTML rules before sending data to the server. Server-side validation occurs on the backend after the request arrives, ensuring the data is safe, correct, and authorized. Client-side checks improve user experience, but server-side validation is the real s...
9. Master the Basics, Break the Web: Server & Deployment Basics — Final
Abinesh M
2025-12-07
3
0
0
A web server is software that receives HTTP/HTTPS requests from clients and responds with web content like HTML, JSON, or files. It handles routing, static file delivery, connection management, and passes dynamic requests to backend applications. The two most common web servers are Nginx and Apache, each widely used in...
TryHackMe — Web App PenTest: NoSQL Injection
Huy Phu
2025-07-27
5
0
0
NoSQL is non-relational database that stores data in an ordered way.
SSTI pentestgarage web ADcCD labs walkthrough
Muhammad Ashraf Ali
2025-07-14
4
50
0
The challenge, titled SSTI, presents a simple web page featuring a login form with a username field and a login button. Upon entering a username and clicking the login button, the application renders a template that displays a greeting message in the format: “Hi, <entered username>”. basic recon it was identified as a...
Local File Inclusion in WebClient OpenRead Method
Milos Markovic
2025-08-01
3
45
0
Hi Everyone! Recently I came across very interesting behavior that I wanted to share here in OpenRead Method from the WebClient Class — https://learn.microsoft.com/en-us/dotnet/api/system.net.webclient.openread?view=net-9.0. If we take a look at this article we can see that WebClient is obsolete and that it shouldn’t b...
Prototype Pollution in Pentesting — (Part 1)
Indigo Shadow
2025-09-19
4
0
0
Read Part 2 here.
Prototype Pollution in Pentesting — (Part 2)
Indigo Shadow
2025-09-21
4
0
0
Read Part 1 here.
OWASP Faction 1.7 — Major Updates for Enterprise Security Teams
Faction Security
2025-10-27
6
0
0
For enterprise penetration testing teams and security consulting firms managing multiple assessments, staying organized is essential. OWASP Faction 1.7 includes new management and reporting features designed to help teams handle complexity at scale… And its fully Open Source!
PHP for Pentesters — Day 4
Bazil Brohi
2025-11-24
3
0
0
In this day, we move forward from “File Upload Checks” to implementing checks to validate and Sanitize HTTP Parameter values often used in HTTP POST behind the layers on the server-side. We’ll also look upon a crucial keynote to keep in mind later on.
PHP for Pentesting — Day 2
Bazil Brohi
2025-11-12
8
0
0
In this Day 2 of PHP for Pentesters, we would learn how to create Polyglot Files and How to Defend against them, How to<html> <head> <meta charset=”utf-8"> <title>The Stargazer Restaurant</title> <style> body{ background-color: #66545e; } .body{ border: 5px solid black; background-color: #0F4C81; } ol{ c...
Road TryHackMe Room
Dharmendrakumar
2025-12-20
6
0
0
Hii all!
Privilege Escalation Allows Low-Privilege Users to View Sensitive Role Data
HBlack Ghost
2025-12-03
3
174
1
اللهم لك الحمد والشكر كما ينبغي لجلال وجهك وعظيم سلطانك. اللهم لك الحمد حتى ترضى، ولك الحمد إذا رضيت، ولك الحمد بعد الرضى. اللهم لك الحمد عدد خلقك ورضا نفسك وزنة عرشك ومداد كلماتك
Web Server Penetration Testing Checklist
GBHackers On Security
2017-03-17
1
0
0
Web server pen testing performing under 3 major category which is identity , Analyse , Report Vulnerabilities such as authentication weakness , configuration errors, protocol Relation vulnerabilities .
Web Application Penetration Testing Checklist — A Detailed Cheat Sheet
GBHackers On Security
2017-04-30
1
31
1
Web Application Pen testing is a method of identifying, analyzing and Report the vulnerabilities which is existing in the Web application including buffer overflow, input validation, code Execution, Bypass Authentication, SQL Injection, CSRF, Cross sight scripting in the target web Application which is given for Penetr...
Natas 1,2,3 — simple web mistakes hacking
Miguel Sampaio da Veiga
2019-05-21
3
0
0
OWASP ZAP is a tool design for web app pentesting. Like Burp Suite, ZAP acts like a proxy between the browser and the server catching all incoming and outgoing traffic, allowing us to view, review and tamper with the requests. But unlike Burp Suite, ZAP is free and Open Source. In this series I’ll demonstrate how to us...
Natas 10,11,12 — more common web apps exploits
Miguel Sampaio da Veiga
2019-06-04
5
0
0
OWASP ZAP is a capturing proxy for pentesting web apps. It’s a very powerful tool and in this series we’ll get the time to understand its main functions while capturing flags from a wargame.
Getting Started with Burp Suite on Ubuntu
Andrew Long
2020-04-07
6
168
2
I get asked a lot about what tooling I’m using these days for web app pentesting, and why I’m not using Kali for everything. Seriously, stop telling me to use Kali. I like it, it’s just fine, but I’m not ever going to use it as my daily driver, and sometimes I just want to be able to look at some API calls intelligentl...
flAWS 2 — Attacker Path
ARZ101
2022-09-09
4
14
0
flAWS 2 is the continuation of fLAWS CTF which is focused for teaching about AWS (Amazon Web Services) pentesting, which introduces issues in Lambda and ECR and to exploit them, it’s hosted on http://flaws2.cloud/ so we don't need to setup anything for AWS. I'll be focusing on doing the Attacker path and this path incl...
flAWS
ARZ101
2022-09-03
10
18
0
flAWS is a CTF focused for teaching about AWS (Amazon Web Services) pentesting, which introduces issues in AWS and to abuse them. In AWS pentest we won’t find any CVE or do actual exploitation, we’ll mostly find mis configuration like un-authroized access to S3 buckets, finding AWS access keys, using any AWS access key...
Burp Suite: The Basics | Tryhackme Walkthrough
Rahul Kumar
2023-11-17
21
3
0
Introduction
Burp Suite for Geeks
iamTony
2024-08-14
2
2
0
What is the main thing used for pentesting web applications?
Burp Suite: The Basics . TryHackMe Walkthrough
RosanaFSS
2024-10-09
23
33
1
Web Fundamentals Learning Path > Burp Suite > & Jr. Penetration Tester Learning Path > Burp Suite> An introduction to using Burp Suite for web application pentesting.
SSRF, Server Side Request Forgery . TryHackMe Walkthrough
RosanaFSS
2024-11-21
18
4
1
Web Application Pentesting learning path > Advanced Server-Side Attacks > SRRF: Discover the inner workings of SSRF and explore multiple exploitation techniques.
Insecure Deserialisation . TryHackMe Walkthrough
RosanaFSS
2024-11-21
27
88
4
Web Application Pentesting learning path > Advanced Server-Side Attacks > Insecure Deserialisation: Get in-depth knowledge of the deserialisation process and how it poses a vulnerability in a web app.
File Inclusion, Path Traversal . TryHackMe Walkthrough
RosanaFSS
2024-11-22
15
32
1
Web Application Pentesting learning path > Advanced Server-Side Attacks > File Inclusion, Path Traversal: Exploit File Inclusion and Path Traversal vulnerabilities.
HackTheBox Academy | Introduction to Web Applications | WriteUp
Axoloth
2026-03-29
2
50
0
Disclaimer: This writeup is based on a Capture The Flag (CTF) challenge hosted on HackTheBox and it is intended for educational purposes only.
Unknown
Suraj Singh
2025-07-21
4
5
0
Web Application Pen-testing — Enumeration & Brute Force
JSON Web Token Pentesting
Netscylla Cyber Security
2018-04-29
4
73
0
JSON Web Token (JWT) is a standard for creating tokens that assert some number of claims. The ‘claims’ are signed by the server’s key, so the server is able to verify that the token is legitimate.
Want to get into Web application Pentesting in a black-box style?
Edwin Karlos Luciano Jr
2021-03-28
5
4
0
The WAPTv3/eWPT experience
Web Application Pentesting: A Versatile Skill
Pentester Academy
2021-04-06
5
48
1
To help you master specific topics, we offer both bootcamp recordings and learning paths (curated sets of labs). In this post, we outline our WebApp Security on-demand bootcamp and learning path, which will help you build a solid foundation in WebApp pentesting.
Web App Pentesting: SQL injection 101
Gorigorisensei
2021-07-11
4
5
0
For the last few days, I have been studying about different web app attacks through the PWK course. Some of them were refreshers for me as I learned them in the MS program. However, for some of them, I just read about them and never actually tried attacking vulnerable machines with the methodologies.
Securing Apache2 Server (Ubuntu)
Ayush Pandey
2022-10-14
4
0
0
The following is the command to install an Apache2 server on an Ubuntu machine.
Kindergarten of Offensive Web Application Security — Black-box Testing
Matty K.
2023-02-20
13
0
0
The following is a foundational introduction to the linguistic and “telescopic” mapping of the vastness of Information Technology narrowing towards web application security and within it, offensive black-box testing. This is essential for fine-tuning the formation of increasingly precise questions in this specializaito...
All you want to know about ffuf
0xUN7H1NK4BLE
2023-03-13
5
102
1
The term fuzzing refers to a testing technique that sends various types of user input to a certain interface to study how it would react and ffuf is a powerful command-line tool for web application fuzzing and vulnerability testing. It allows users to send multiple requests with custom inputs and parameters, filter the...
Burp Suite Certified Practitioner Review
Jevon Davis
2023-06-30
7
86
7
After two years of on-and-off preparation for this exam, I finally did it!
Web App Pentest with Nuclei
0xLeeBai
2023-07-23
3
40
0
Nuclei is a free and powerful vulnerability scanner, it can perform automatic vulnerability scan for web app, cloud, etc. It uses templates that defines the steps required to detect a vulnerability, anyone can contribute to the templates and published it to the security community to use. The templates can be found via ...
Riding the Waves of API Versioning: Unmasking a Stored XSS Vulnerability, CSP Bypass Using YouTube OEmbed
SMHTahsin33
2023-11-14
5
288
0
Hello, as some of you already know me, I’m Syed Mushfik Hasan Tahsin aka SMHTahsin33. And for those who doesn’t, I’m a 19 Y/O Cyber Security Enthusiast from Bangladesh with 3+ years of experience. And passionately doing Bug Bounties in my free time solely out of curiosity. I am an eWPTXv2 as well.
Metode Alternatif Pada Saat Melakukan Black Box Pentest #2
Rafshanzani Suhada
2023-12-16
3
72
0
Pada artikel ini, saya akan memberi contoh jika seorang pentester diberi tugas untuk melakukan pengujian pada web dengan sudut pandang Black Box. Baca artikel sebelumnya: Metode Alternatif Pada Saat Melakukan Black Box Pentest #1.
eWPTv2 Exam Review
Mike Smith
2023-12-04
8
81
1
Recently, I passed the new eWPT certification exam that was released in October 2023. I had previously spent the year studying on-and-off for version one of this exam before the content and certification was updated about a month before my subscription ended. I decided to write this review since there is not as much ou...
Taking your web application pentesting to another level
bob van der staak
2023-08-13
8
100
0
When doing a web application pentest Burp Suite is one of the go to tools.
WEB APPLICATION PENTESTING CHECKLIST
Manikanta Suru
2023-10-19
1
8
1
#🔥Exciting Discovery!🔥 Curious minds and cybersecurity enthusiasts know all too well the critical nature of thorough web application testing.
Beginner’s Guide to Web Application Pentesting
cham3leon
2024-04-09
6
182
2
Are you interested in understanding and finding vulnerabilities in web applications, and strengthening their security, but do not know where to start? You have come to the right place. This guide aims to provide newcomers with a roadmap to dive into the exciting world of web application testing.
PWPA: Start Your Journey Into the World of Web Application Pentesting
cham3leon
2024-11-08
4
98
1
This week I successfully passed the Practical Web Pentest Associate (PWPA) certification exam offered by TCM Security. I hope this write-up serves as a source of guidance and inspiration for anyone considering this path. By sharing my journey, I aim to offer a clearer picture of what it takes to succeed in the PWPA exa...
Web App Pentesting: Test cases on JWT
@ro0taddict
2025-02-09
3
1
0
JWT is commonly used in modern web applications. If the app is using JWT, below are the possible test cases we can perform during assessment:
Burp Suite 101: Understanding Its Role in Web Application Pentesting
Mr.PlanB
2025-02-21
3
1
0
When it comes to web application security, Burp Suite is a name that pops up a lot. And for good reason — it’s like the Swiss Army knife of web app pentesting. If you’re into ethical hacking or curious about how web applications can be vulnerable, learning Burp Suite is definitely worth your time. So, what makes this t...
🔐 4 vulnerabilidades reales en Google OAuth — análisis técnico paso a paso
Gorka
2025-10-14
2
0
0
💞 Mi canal de Youtube: Bug Bounty & Pentesting y Hacking Web https://www.youtube.com/@0xGorka
When Web Hacking Meets Docker Pentesting
Redfox Security
null
5
4
0
Modern applications rarely run on a single server anymore. Instead, they run inside containers, orchestrated environments, and microservices architectures. This evolution has changed how attackers and security professionals approach web security.
Web Services & API Pentesting-Part 1
Asfiya $ha!kh
2019-05-07
5
229
2
Hey Pentester, I am back with my series of blogs.
Pentesting for Web Applications
IPSpecialist
2024-12-03
5
55
0
In today’s connected world, web applications are integral to business operations and user engagement. However, their popularity also makes them prime targets for cyberattacks. With security breaches on the rise, it’s essential to identify and mitigate vulnerabilities before attackers can exploit them. This is where pen...
Portswigger File Upload — Lab 2
ARZ101
2021-12-03
2
3
1
In this lab we have to upload the php file to read contents from /home/carlos/secret but we can’t directly just upload the php file as it only allows jpeg and png image file , so we can bypass this by changing the Content-Type header.
Forwarding Burp Suite Traffic Through SOCKS Proxy
Alex Rodriguez
2021-12-29
4
74
0
Hello, 🌎! During an internal pentest for a client, you might be tasked with testing internal web apps. And you can’t perform a comprehensive test on a web app without having a web proxy tool like Burp Suite to capture HTTP/WS traffic. So in this blog, I’ll show you how to configure Burp to use SSH SOCKS proxy. Let’s s...
HackTheBox-Forge
ARZ101
2022-01-22
6
6
1
Hello everyone , in this post I will be sharing my walkthrough for HTB-Forge machine which was a medium linux box , starting off with the nmap scan we see that there are three ports ftp ,ssh and http, ftp is filtered meaning that we can’t connect to it so ignoring that and looking at web server there was a functionalit...
All About 403 Bypass
Pankaj
2022-06-05
2
340
5
Hello folks, This is my First writeup so forgive me if write something wrong. so without wasting any time let’s talk about our topic 403-Forbidden Bypass.
Web App Pentesting using Firefox Multi-Account Containers
watson0x90
2024-06-11
5
0
0
I recently took the Modern Webapp Pentesting II: Webapp Internals by BB King, and I wish I had known about Firefox Multi-Account Containers sooner.
Web Hacking & Pentesting Study Notes
Motasem Hamdan
2024-07-23
3
3
0
Page count: 200
AIO Web App Pentesting Checklist
Cristi Vlad
2024-10-26
11
128
1
I’m testing the capabilities of NotebookLM for extracting valuable information from sources and I believe it can often do a much better job than ChatGPT especially because it’s more grounded in truth by default. So, you don’t have to prompt it heavily to stay grounded. On top of that, it doesn’t stray from the subject ...
📌 WEB APPLICATION PENTESTING TOOLKIT
Vijay Kumar Gupta
2024-11-10
6
1
0
Introduction