title
large_stringlengths
5
121
author
large_stringlengths
3
31
date
large_stringdate
2015-09-24 00:00:00
2026-04-11 00:00:00
read_time_minutes
int64
0
27
claps
int64
0
1.4k
responses
int64
0
9
article_snippet
large_stringlengths
4
1.38k
Mastering Web Application Pentesting Part — II
Mukilan Baskaran
2024-11-24
2
7
0
Hello fellow hackers and infosec guys, In this writeup you will see part 2 of “Mastering Web Application Pentesting”.
Mastering Web Application Pentesting with TryhackMe
Mukilan Baskaran
2024-11-21
2
63
1
Non member access: freelink
Demystifying Web Pentesting: Part -2 In-Depth Explanation of HTTP Requests and Responses
Blue_eye
2024-12-04
4
0
0
In the modern web, HTTP requests and responses form the backbone of communication between a client (browser, application, or script) and a server. Each piece of data in a request and response serves a specific purpose, ensuring functionality, security, and efficiency. Understanding why these elements exist and how they...
Demystifying Web Pentesting: Part -3 In-Depth Explanation of HTTP Requests and Responses
Blue_eye
2024-12-05
2
0
1
In the modern web, HTTP requests and responses form the backbone of communication between a client (browser, application, or script) and a server. Each piece of data in a request and response serves a specific purpose, ensuring functionality, security, and efficiency. Understanding why these elements exist and how they...
Demystifying Web Pentesting: Part -5 Understanding XML External Entity (XXE) Vulnerabilities
Blue_eye
2024-12-09
4
0
0
In the ever-evolving landscape of cybersecurity, vulnerabilities often arise from the misconfiguration of technologies designed to handle data. XML External Entity (XXE) is one such vulnerability that exploits how applications process XML. This blog dives deep into XXE vulnerabilities, explaining the core concepts of X...
Demystifying Web Pentesting: Part -4 CORS Checklist
Blue_eye
2024-12-09
8
3
0
Understanding how CORS (Cross-Origin Resource Sharing) works is key to identifying potential vulnerabilities. When a website uses Access-Control-Allow-Origin: *, it is designed to allow any origin to access the resource via cross-origin requests. However, whether this is a vulnerability depends on the context in which ...
Demystifying Web Pentesting: Part -6 Security Headers
Blue_eye
2025-03-16
5
0
0
Security headers are HTTP response headers that provide an additional layer of protection for web applications by instructing browsers on how to handle content, mitigate attacks, and enforce security policies. Misconfigurations or the absence of these headers can expose websites to risks like cross-site scripting (XSS)...
The Ultimate Guide to VulnHub Machines for Beginners: Master Network & Web Pentesting
Himanshu Bomble
2025-03-01
4
37
1
If you’re a beginner in Vulnerability Assessment and Penetration Testing (VAPT), you’ve probably asked: “Where do I start?”
Unknown
om kumar
2025-04-15
3
115
1
From Zero Bugs to Many: My Journey into Web Pentesting and Bug Bounties
The Unfiltered 2025 Guide to Web Pentesting & Bug Bounties: From Zero to Hired
Saumadip Mandal
2025-09-16
6
10
1
This guide merges the essential technical methodology with the cold, hard truths about building a career. We’ll cover what you need to learn, how to practice it, and — crucially — how to turn that knowledge into a job.
Five Findings I Often See During Web Pentesting
0xc4t
2025-11-28
2
61
1
Hello World!, Lately I’ve been handling quite a lot of web application projects, even though I’m getting paid monthly lol (said with the tone of wanting to be paid per manday). Because of that, I want to share some of the findings I often encounter when pentesting web applications, both internal and external.
Information Gathering in Web Pentesting — Solving INE “Information Gathering CTF 1”
Amitishacked
2026-03-10
4
0
1
Information gathering (reconnaissance) is the first and one of the most critical phases of penetration testing. During this phase, attackers and security professionals collect publicly available information about the target system to identify potential vulnerabilities.
OS Command Injection
HacktheBoxWalkthroughs
2018-12-18
1
2
0
No, probably not what your thinking. I’m talking about web app pen-testing. A lot of programming languages are vulnerable, to command injection via webpage. The user supplies OS commands that are escaped and executed. This is due to not properly sanitizing user input or elements aren’t hard coded allowing for exploitat...
Docker Images for Penetration Testing & Security
Shamsher khan
2021-04-14
2
17
0
By Shamsher khan , Web Application Pen Testing Practical lab
Web Enumeration Methodology
0xsanz
2021-04-04
10
51
2
This article will describe the basics of Web Enumerations and is aimed at Beginners. It starts with basics and then gradually build up to more advanced techniques.
Docker Images for Penetration Testing & Security
Vijay Kumar Gupta
2024-08-16
2
1
0
Web Application Pen Testing Practical lab
Using Gobuster to Find Hidden Web Content
A. Boukar
2021-04-20
4
3
0
Directories and Files enumeration is one of the first steps that an attacker performs during web application pentesting.
Pentesting Experience and How to Get It
Phillip Wylie: The Hacker Maker
2021-07-11
4
0
2
For several years even predating me starting my teaching career as an adjunct professor teaching ethical hacking and web app pentesting, I have been sharing resources on pentesting and advice on getting started. 2018 was a pivotal year for my efforts in helping others get started in pentesting. In January 2018, becomin...
Exploiting DVWA Using Reflected Cross-Site Scripting (XSS)
Anbu Hack Ops
2023-05-30
5
2
0
In this project on web app pentesting, I will be showcasing the exploitation of vulnerabilities in Damn Vulnerable Web Application (DVWA) through Reflected Cross-Site Scripting (XSS).
TryHackMe, Burp Suite (Part I)
Hammaad Mughal
2024-02-01
5
50
0
An introduction to using Burp Suite for Web Application pentesting…
Burp Suite: The Basics — TryHackMe Walkthrough
IritT
2024-09-19
23
3
0
An introduction to using Burp Suite for web application pentesting.
What is cross-site scripting (XSS)? Web App Pen-testing
Gokul
2023-01-22
2
1
0
Cross-site scripting (also known as XSS) is a web security vulnerability that allows an attacker to compromise the interactions that users have with a vulnerable application.
Bypass Web Access Block IP Block
S12 - 0x12Dark Development
2023-04-23
3
42
0
Welcome to my new article, today i will show you how you can bypass IP Block from Websites caused by access of web petitions, this is typically in bruteforce attacks because this IP Block it’s very used trying to block many web petitions from the same public IP.
Master Web Fuzzing: A Cheat‑Sheet to Finding Hidden Paths
PARADOX
2025-10-02
7
306
3
Hey there, back again with another post! 😄
Complete Guide to Penetration Testing Domains: Web, Network, Cloud, Mobile & More
Dhanush N
2025-12-07
18
48
0
Penetration testing isn’t a one-size-fits-all discipline. As someone who’s spent considerable time working in cybersecurity and experimenting across various domains, I’ve learned that the field is remarkably diverse. Each domain requires distinct skills, tools and methodologies. Whether you’re considering a career in p...
About my finding of most critical bug in Live Website
MALKIT SINGH
2019-07-26
2
7
1
So it starts with casual pen testing of the web application, where i got a login page. So i tried finding SQL injection, directory browsing, check request, response, etc. but no luck. So i started doing quick scan of view page source option and there also No luck :(
How to store a password
Samson Endale
2017-09-12
9
56
0
Recently I was pen-testing some boring web apps and I noticed how people REALLY don’t know how to store passwords in a database. I couldn’t judge them because no one thought them how they should store passwords securely in a database.
Building an AI-Powered Application Security Infrastructure: Claude Code + Multi-VM MCP Architecture
zilbon
2025-11-07
24
2
0
This isn’t about replacing pentesters. It’s about building a powerful AI assistant that:
What a Real AI Red Team Engagement Actually Looks Like From API Recon to RCE on a ML Pipeline
sn0xsharma
2026-03-20
11
269
1
Breakdown of why pentesting AI is nothing like pentesting a web app and what you actually find when you go deep
Why Opt for Web App Penetration Testing?
Pratik Mistry
2024-12-25
4
50
0
In these times, it seems like most organizations are facing cybersecurity issues, such as sensitive information leakage to the public and causing havoc in their daily operations. And faced with a rising number of these attacks, web application security has become a significant drawback. Also, based on an analysis of 7 ...
Access to page with default credentials that require authenticate $$$.
Adham sayed (doosec101)
2023-01-03
1
6
0
Hi guys! This is my second article about Bug Bounty Report writes up and I hope you will like it! I’m a bug hunter on hackerone and I think it’s cool to share what I have found.
Web Application Penetration Testing: Steps, Methods, and Tools
Cyril James
2021-04-13
7
466
0
Did you know, 88% of organisations worldwide experienced phishing attempts in 2019? Lately, web application security has become a major concern for businesses of all shapes and sizes.
Bug Bounty Web Checklist
127.0.0.1
2025-06-11
3
68
1
Reference: https://nemocyberworld.github.io/BugBountyCheckList/
Story of understanding Web vs Active Directory ( Domain, Realm, Kerberos )
Rudra Sarkar
2025-08-23
7
1
0
While I was learning AD, it kept bugging me how these thing works, as myself from a web pentesting background, it was really hard to understand ( I am not sure if everyone feels the same way ). After doing some learning, I came up with this; it might help me later, or maybe help you too.
PortSwigger Lab: 0.CL request smuggling
I See Thieves
2025-08-16
11
57
1
Lately i’ve been trying to improve my web pentesting skillset, and have been working through the PortSwigger Academy web hacking labs.
Building a secure code review agent
Hungrysoul
2025-08-16
9
18
0
So after my last adventure with automated web pentesting (which is still burning through my OpenAI credits BTW), I started thinking — why am I making this so hard? If Claude Code can review code and find bugs, why not build a dedicated security-focused agent that ONLY cares about finding vulnerabilities?
Pergunta do dia — Web Pentesting
Miguel Sampaio da Veiga
2020-05-19
1
0
0
Está a ler os logs de uma aplicação web e repara na existência de várias tentativas de ligação do seguinte tipo: ‘http://webapp-address.com/%2e%2e/%2e%2e/%2e%2e/%2e%2e/%2e%2e/%2e%2e/%2e%2e/windows/system32/cmd.exe’.
Hacking trivia — Web Pentesting
Miguel Sampaio da Veiga
2020-04-16
1
3
0
You’re checking a web application’s logs and come up with several connection attempts like this one: ‘http://webapp-address.com/%2e%2e/%2e%2e/%2e%2e/%2e%2e/%2e%2e/%2e%2e/%2e%2e/windows/system32/cmd.exe’
My 3 reasons why you should learn web pentesting
Gergely Révay
2019-10-09
3
62
1
I get this question a lot: how to get into pentesting?
How I was able to uniquely bypass authentication while web pentesting?
Ajay Gautam
2019-12-05
4
985
0
This article is based on a new finding which I was able to discover while doing pentest for a private company. Since I am not allowed to disclose information about the company, let’s assume it as redacted.com. Scroll below to find out how I was able to uniquely bypass authentication on the web for redacted.com.
Automating web pentesting with jaeles
Varppi
2022-06-10
3
85
1
Jaeles is an application designed to automate certain tasks in web application pentesting for example: fuzzing url parameters, checking for common php backdoors, testing out default credentials on a site protected by basic auth
XXE (RSS Validity Checker Root-Me)
Anas Ibrahim
2024-02-29
4
3
0
XML external entity injection (also known as XXE) is a web security vulnerability that allows an attacker to interfere with an application’s processing of XML data. It often allows an attacker to view files on the application server filesystem, and to interact with any back-end or external systems that the application ...
How I found server security misconfiguration leak data users
Sam
2024-03-07
3
131
1
Hello hackers, I’ll share an interesting bug in a private program in this write-up.
ASCWG CTF Qualifications 2024 (Web Exploitation)
Anas Ibrahim
2024-08-06
6
8
0
بِسْمِ اللَّهِ الرَّحْمَنِ الرَّحِيمِ
0dSSRF | Automate Finding SSRF & External Service Interactions & Open Redirects
Kariiem Gamal
2024-10-14
6
318
2
Welcome to this write-up, where I’ll walk you through how I reported multiple SSRF (Server-Side Request Forgery) vulnerabilities, external service interactions, and open redirects using my custom tool, 0dSSRF. This article covers the essential concepts behind SSRF and highlights the methodology and automation technique...
File Inclusion Vulnerabilities: Comprehensive Guide
Tareshsharma
2024-12-18
9
3
1
File Inclusion vulnerabilities, such as Local File Inclusion (LFI) and Remote File Inclusion (RFI), are critical security flaws allowing attackers to access sensitive files or execute malicious code on a server. This guide explores these vulnerabilities' concepts, techniques, and exploitation methods.
Mastering XSS: Types, Discovery Techniques, and Real-World Attacks
Tareshsharma
2024-12-08
4
0
0
Cross-Site Scripting (XSS) remains one of the most pervasive and dangerous vulnerabilities affecting modern web applications. By injecting malicious scripts into web pages viewed by users, attackers can execute unauthorized actions, compromise data, and perform a variety of attacks. This post explores the types of XSS,...
Web Application Vulnerabilities and Exploitability
appsecwarrior
2025-01-29
12
1
0
Follow us for Content https://www.linkedin.com/company/appsecwarrior/
This Tool Helped me to find ORIGIN IP(Automated way)
Canonminibeast
2025-03-28
3
60
0
Hey guys………….!
How I Hacked a Fake DMart Website and Took It Down!
Karthikeyan.V
2025-03-10
3
111
2
During a routine check, I came across a WhatsApp forward promoting a fake DMart giveaway. The link was hosted on servio.io, and at first glance, it looked legitimate.
PHP Wrappers
DuckWrites
2025-08-01
3
0
0
Local File Inclusion (without PHP wrappers) is not hard to understand. The concept is simple. A URL parameter used by the webpage is replaced with an arbitrary file path. The web server includes and displays the content of that file, potentially bypassing access restrictions.
Mastering Reflected Cross-Site Scripting & Bypassing Filters
Beri Contraster
2025-08-17
4
0
0
Welcome Reader. In today's article, we will master reflected XSS. Let’s start by learning what XSS is in general. We will be using OWASP Juice Shop to practice our XSS skills.
eJPT — 4.1 Web Application Penetration Testing
Dharmendrakumar
2025-10-27
10
0
0
Hii all!
Passing OffSec’s OSWA: A Review and Prep Tips
Cyd Tseng
2025-04-10
4
13
0
A writeup on how I approached the 24-hour web pen-testing assessment, what helped me prepare effectively and actionable tips that can increase your chances of passing too.
Some useful web pen-testing tools
Ahmet Göker
2022-02-27
3
98
1
Hey amazing hackers,
Recon For Web Pen-Testing!!
theUnixe
2023-04-30
7
453
4
Reconnaissance, or recon for short, is the process of gathering information about a target to identify vulnerabilities and potential attack vectors.
Recon For Web Pen-Testing!!
Aparna Rathore
2023-08-20
3
13
0
Performing reconnaissance (recon) is a crucial step in web penetration testing. It involves gathering information about the target web application, its infrastructure, and potential vulnerabilities before actually attempting to exploit them. Here’s a breakdown of the steps involved in reconnaissance for web penetration...