title large_stringlengths 5 121 | author large_stringlengths 3 31 | date large_stringdate 2015-09-24 00:00:00 2026-04-11 00:00:00 ⌀ | read_time_minutes int64 0 27 | claps int64 0 1.4k | responses int64 0 9 | article_snippet large_stringlengths 4 1.38k |
|---|---|---|---|---|---|---|
Mastering Web Application Pentesting Part — II | Mukilan Baskaran | 2024-11-24 | 2 | 7 | 0 | Hello fellow hackers and infosec guys, In this writeup you will see part 2 of “Mastering Web Application Pentesting”. |
Mastering Web Application Pentesting with TryhackMe | Mukilan Baskaran | 2024-11-21 | 2 | 63 | 1 | Non member access: freelink |
Demystifying Web Pentesting: Part -2 In-Depth Explanation of HTTP Requests and Responses | Blue_eye | 2024-12-04 | 4 | 0 | 0 | In the modern web, HTTP requests and responses form the backbone of communication between a client (browser, application, or script) and a server. Each piece of data in a request and response serves a specific purpose, ensuring functionality, security, and efficiency. Understanding why these elements exist and how they... |
Demystifying Web Pentesting: Part -3 In-Depth Explanation of HTTP Requests and Responses | Blue_eye | 2024-12-05 | 2 | 0 | 1 | In the modern web, HTTP requests and responses form the backbone of communication between a client (browser, application, or script) and a server. Each piece of data in a request and response serves a specific purpose, ensuring functionality, security, and efficiency. Understanding why these elements exist and how they... |
Demystifying Web Pentesting: Part -5 Understanding XML External Entity (XXE) Vulnerabilities | Blue_eye | 2024-12-09 | 4 | 0 | 0 | In the ever-evolving landscape of cybersecurity, vulnerabilities often arise from the misconfiguration of technologies designed to handle data. XML External Entity (XXE) is one such vulnerability that exploits how applications process XML. This blog dives deep into XXE vulnerabilities, explaining the core concepts of X... |
Demystifying Web Pentesting: Part -4 CORS Checklist | Blue_eye | 2024-12-09 | 8 | 3 | 0 | Understanding how CORS (Cross-Origin Resource Sharing) works is key to identifying potential vulnerabilities. When a website uses Access-Control-Allow-Origin: *, it is designed to allow any origin to access the resource via cross-origin requests. However, whether this is a vulnerability depends on the context in which ... |
Demystifying Web Pentesting: Part -6 Security Headers | Blue_eye | 2025-03-16 | 5 | 0 | 0 | Security headers are HTTP response headers that provide an additional layer of protection for web applications by instructing browsers on how to handle content, mitigate attacks, and enforce security policies. Misconfigurations or the absence of these headers can expose websites to risks like cross-site scripting (XSS)... |
The Ultimate Guide to VulnHub Machines for Beginners: Master Network & Web Pentesting | Himanshu Bomble | 2025-03-01 | 4 | 37 | 1 | If you’re a beginner in Vulnerability Assessment and Penetration Testing (VAPT), you’ve probably asked:
“Where do I start?” |
Unknown | om kumar | 2025-04-15 | 3 | 115 | 1 | From Zero Bugs to Many: My Journey into Web Pentesting and Bug Bounties |
The Unfiltered 2025 Guide to Web Pentesting & Bug Bounties: From Zero to Hired | Saumadip Mandal | 2025-09-16 | 6 | 10 | 1 | This guide merges the essential technical methodology with the cold, hard truths about building a career. We’ll cover what you need to learn, how to practice it, and — crucially — how to turn that knowledge into a job. |
Five Findings I Often See During Web Pentesting | 0xc4t | 2025-11-28 | 2 | 61 | 1 | Hello World!, Lately I’ve been handling quite a lot of web application projects, even though I’m getting paid monthly lol (said with the tone of wanting to be paid per manday). Because of that, I want to share some of the findings I often encounter when pentesting web applications, both internal and external. |
Information Gathering in Web Pentesting — Solving INE “Information Gathering CTF 1” | Amitishacked | 2026-03-10 | 4 | 0 | 1 | Information gathering (reconnaissance) is the first and one of the most critical phases of penetration testing. During this phase, attackers and security professionals collect publicly available information about the target system to identify potential vulnerabilities. |
OS Command Injection | HacktheBoxWalkthroughs | 2018-12-18 | 1 | 2 | 0 | No, probably not what your thinking. I’m talking about web app pen-testing. A lot of programming languages are vulnerable, to command injection via webpage. The user supplies OS commands that are escaped and executed. This is due to not properly sanitizing user input or elements aren’t hard coded allowing for exploitat... |
Docker Images for Penetration Testing & Security | Shamsher khan | 2021-04-14 | 2 | 17 | 0 | By Shamsher khan , Web Application Pen Testing Practical lab |
Web Enumeration Methodology | 0xsanz | 2021-04-04 | 10 | 51 | 2 | This article will describe the basics of Web Enumerations and is aimed at Beginners. It starts with basics and then gradually build up to more advanced techniques. |
Docker Images for Penetration Testing & Security | Vijay Kumar Gupta | 2024-08-16 | 2 | 1 | 0 | Web Application Pen Testing Practical lab |
Using Gobuster to Find Hidden Web Content | A. Boukar | 2021-04-20 | 4 | 3 | 0 | Directories and Files enumeration is one of the first steps that an attacker performs during web application pentesting. |
Pentesting Experience and How to Get It | Phillip Wylie: The Hacker Maker | 2021-07-11 | 4 | 0 | 2 | For several years even predating me starting my teaching career as an adjunct professor teaching ethical hacking and web app pentesting, I have been sharing resources on pentesting and advice on getting started. 2018 was a pivotal year for my efforts in helping others get started in pentesting. In January 2018, becomin... |
Exploiting DVWA Using Reflected Cross-Site Scripting (XSS) | Anbu Hack Ops | 2023-05-30 | 5 | 2 | 0 | In this project on web app pentesting, I will be showcasing the exploitation of vulnerabilities in Damn Vulnerable Web Application (DVWA) through Reflected Cross-Site Scripting (XSS). |
TryHackMe, Burp Suite (Part I) | Hammaad Mughal | 2024-02-01 | 5 | 50 | 0 | An introduction to using Burp Suite for Web Application pentesting… |
Burp Suite: The Basics — TryHackMe Walkthrough | IritT | 2024-09-19 | 23 | 3 | 0 | An introduction to using Burp Suite for web application pentesting. |
What is cross-site scripting (XSS)? Web App Pen-testing | Gokul | 2023-01-22 | 2 | 1 | 0 | Cross-site scripting (also known as XSS) is a web security vulnerability that allows an attacker to compromise the interactions that users have with a vulnerable application. |
Bypass Web Access Block IP Block | S12 - 0x12Dark Development | 2023-04-23 | 3 | 42 | 0 | Welcome to my new article, today i will show you how you can bypass IP Block from Websites caused by access of web petitions, this is typically in bruteforce attacks because this IP Block it’s very used trying to block many web petitions from the same public IP. |
Master Web Fuzzing: A Cheat‑Sheet to Finding Hidden Paths | PARADOX | 2025-10-02 | 7 | 306 | 3 | Hey there, back again with another post! 😄 |
Complete Guide to Penetration Testing Domains: Web, Network, Cloud, Mobile & More | Dhanush N | 2025-12-07 | 18 | 48 | 0 | Penetration testing isn’t a one-size-fits-all discipline. As someone who’s spent considerable time working in cybersecurity and experimenting across various domains, I’ve learned that the field is remarkably diverse. Each domain requires distinct skills, tools and methodologies. Whether you’re considering a career in p... |
About my finding of most critical bug in Live Website | MALKIT SINGH | 2019-07-26 | 2 | 7 | 1 | So it starts with casual pen testing of the web application, where i got a login page. So i tried finding SQL injection, directory browsing, check request, response, etc. but no luck. So i started doing quick scan of view page source option and there also No luck :( |
How to store a password | Samson Endale | 2017-09-12 | 9 | 56 | 0 | Recently I was pen-testing some boring web apps and I noticed how people REALLY don’t know how to store passwords in a database. I couldn’t judge them because no one thought them how they should store passwords securely in a database. |
Building an AI-Powered Application Security Infrastructure: Claude Code + Multi-VM MCP Architecture | zilbon | 2025-11-07 | 24 | 2 | 0 | This isn’t about replacing pentesters. It’s about building a powerful AI assistant that: |
What a Real AI Red Team Engagement Actually Looks Like From API Recon to RCE on a ML Pipeline | sn0xsharma | 2026-03-20 | 11 | 269 | 1 | Breakdown of why pentesting AI is nothing like pentesting a web app and what you actually find when you go deep |
Why Opt for Web App Penetration Testing? | Pratik Mistry | 2024-12-25 | 4 | 50 | 0 | In these times, it seems like most organizations are facing cybersecurity issues, such as sensitive information leakage to the public and causing havoc in their daily operations. And faced with a rising number of these attacks, web application security has become a significant drawback. Also, based on an analysis of 7 ... |
Access to page with default credentials that require authenticate $$$. | Adham sayed (doosec101) | 2023-01-03 | 1 | 6 | 0 | Hi guys! This is my second article about Bug Bounty Report writes up and I hope you will like it! I’m a bug hunter on hackerone and I think it’s cool to share what I have found. |
Web Application Penetration Testing: Steps, Methods, and Tools | Cyril James | 2021-04-13 | 7 | 466 | 0 | Did you know, 88% of organisations worldwide experienced phishing attempts in 2019? Lately, web application security has become a major concern for businesses of all shapes and sizes. |
Bug Bounty Web Checklist | 127.0.0.1 | 2025-06-11 | 3 | 68 | 1 | Reference: https://nemocyberworld.github.io/BugBountyCheckList/ |
Story of understanding Web vs Active Directory ( Domain, Realm, Kerberos ) | Rudra Sarkar | 2025-08-23 | 7 | 1 | 0 | While I was learning AD, it kept bugging me how these thing works, as myself from a web pentesting background, it was really hard to understand ( I am not sure if everyone feels the same way ). After doing some learning, I came up with this; it might help me later, or maybe help you too. |
PortSwigger Lab: 0.CL request smuggling | I See Thieves | 2025-08-16 | 11 | 57 | 1 | Lately i’ve been trying to improve my web pentesting skillset, and have been working through the PortSwigger Academy web hacking labs. |
Building a secure code review agent | Hungrysoul | 2025-08-16 | 9 | 18 | 0 | So after my last adventure with automated web pentesting (which is still burning through my OpenAI credits BTW), I started thinking — why am I making this so hard? If Claude Code can review code and find bugs, why not build a dedicated security-focused agent that ONLY cares about finding vulnerabilities? |
Pergunta do dia — Web Pentesting | Miguel Sampaio da Veiga | 2020-05-19 | 1 | 0 | 0 | Está a ler os logs de uma aplicação web e repara na existência de várias tentativas de ligação do seguinte tipo: ‘http://webapp-address.com/%2e%2e/%2e%2e/%2e%2e/%2e%2e/%2e%2e/%2e%2e/%2e%2e/windows/system32/cmd.exe’. |
Hacking trivia — Web Pentesting | Miguel Sampaio da Veiga | 2020-04-16 | 1 | 3 | 0 | You’re checking a web application’s logs and come up with several connection attempts like this one: ‘http://webapp-address.com/%2e%2e/%2e%2e/%2e%2e/%2e%2e/%2e%2e/%2e%2e/%2e%2e/windows/system32/cmd.exe’ |
My 3 reasons why you should learn web pentesting | Gergely Révay | 2019-10-09 | 3 | 62 | 1 | I get this question a lot: how to get into pentesting? |
How I was able to uniquely bypass authentication while web pentesting? | Ajay Gautam | 2019-12-05 | 4 | 985 | 0 | This article is based on a new finding which I was able to discover while doing pentest for a private company. Since I am not allowed to disclose information about the company, let’s assume it as redacted.com. Scroll below to find out how I was able to uniquely bypass authentication on the web for redacted.com. |
Automating web pentesting with jaeles | Varppi | 2022-06-10 | 3 | 85 | 1 | Jaeles is an application designed to automate certain tasks in web application pentesting for example: fuzzing url parameters, checking for common php backdoors, testing out default credentials on a site protected by basic auth |
XXE (RSS Validity Checker Root-Me) | Anas Ibrahim | 2024-02-29 | 4 | 3 | 0 | XML external entity injection (also known as XXE) is a web security vulnerability that allows an attacker to interfere with an application’s processing of XML data. It often allows an attacker to view files on the application server filesystem, and to interact with any back-end or external systems that the application ... |
How I found server security misconfiguration leak data users | Sam | 2024-03-07 | 3 | 131 | 1 | Hello hackers, I’ll share an interesting bug in a private program in this write-up. |
ASCWG CTF Qualifications 2024 (Web Exploitation) | Anas Ibrahim | 2024-08-06 | 6 | 8 | 0 | بِسْمِ اللَّهِ الرَّحْمَنِ الرَّحِيمِ |
0dSSRF | Automate Finding SSRF & External Service Interactions & Open Redirects | Kariiem Gamal | 2024-10-14 | 6 | 318 | 2 | Welcome to this write-up, where I’ll walk you through how I reported multiple SSRF (Server-Side Request Forgery) vulnerabilities, external service interactions, and open redirects using my custom tool, 0dSSRF. This article covers the essential concepts behind SSRF and highlights the methodology and automation technique... |
File Inclusion Vulnerabilities: Comprehensive Guide | Tareshsharma | 2024-12-18 | 9 | 3 | 1 | File Inclusion vulnerabilities, such as Local File Inclusion (LFI) and Remote File Inclusion (RFI), are critical security flaws allowing attackers to access sensitive files or execute malicious code on a server. This guide explores these vulnerabilities' concepts, techniques, and exploitation methods. |
Mastering XSS: Types, Discovery Techniques, and Real-World Attacks | Tareshsharma | 2024-12-08 | 4 | 0 | 0 | Cross-Site Scripting (XSS) remains one of the most pervasive and dangerous vulnerabilities affecting modern web applications. By injecting malicious scripts into web pages viewed by users, attackers can execute unauthorized actions, compromise data, and perform a variety of attacks. This post explores the types of XSS,... |
Web Application Vulnerabilities and Exploitability | appsecwarrior | 2025-01-29 | 12 | 1 | 0 | Follow us for Content https://www.linkedin.com/company/appsecwarrior/ |
This Tool Helped me to find ORIGIN IP(Automated way) | Canonminibeast | 2025-03-28 | 3 | 60 | 0 | Hey guys………….! |
How I Hacked a Fake DMart Website and Took It Down! | Karthikeyan.V | 2025-03-10 | 3 | 111 | 2 | During a routine check, I came across a WhatsApp forward promoting a fake DMart giveaway. The link was hosted on servio.io, and at first glance, it looked legitimate. |
PHP Wrappers | DuckWrites | 2025-08-01 | 3 | 0 | 0 | Local File Inclusion (without PHP wrappers) is not hard to understand. The concept is simple. A URL parameter used by the webpage is replaced with an arbitrary file path. The web server includes and displays the content of that file, potentially bypassing access restrictions. |
Mastering Reflected Cross-Site Scripting & Bypassing Filters | Beri Contraster | 2025-08-17 | 4 | 0 | 0 | Welcome Reader. In today's article, we will master reflected XSS. Let’s start by learning what XSS is in general. We will be using OWASP Juice Shop to practice our XSS skills. |
eJPT — 4.1 Web Application Penetration Testing | Dharmendrakumar | 2025-10-27 | 10 | 0 | 0 | Hii all! |
Passing OffSec’s OSWA: A Review and Prep Tips | Cyd Tseng | 2025-04-10 | 4 | 13 | 0 | A writeup on how I approached the 24-hour web pen-testing assessment, what helped me prepare effectively and actionable tips that can increase your chances of passing too. |
Some useful web pen-testing tools | Ahmet Göker | 2022-02-27 | 3 | 98 | 1 | Hey amazing hackers, |
Recon For Web Pen-Testing!! | theUnixe | 2023-04-30 | 7 | 453 | 4 | Reconnaissance, or recon for short, is the process of gathering information about a target to identify vulnerabilities and potential attack vectors. |
Recon For Web Pen-Testing!! | Aparna Rathore | 2023-08-20 | 3 | 13 | 0 | Performing reconnaissance (recon) is a crucial step in web penetration testing. It involves gathering information about the target web application, its infrastructure, and potential vulnerabilities before actually attempting to exploit them. Here’s a breakdown of the steps involved in reconnaissance for web penetration... |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.