This Lab contain the sample codes which are vulnerable to Server-Side Request Forgery attack
-
Updated
Aug 21, 2023 - PHP
This Lab contain the sample codes which are vulnerable to Server-Side Request Forgery attack
CMS auto detect and exploit.
This repository is a dockerized PHP application containing some file upload vulnerability challenges (scenarios).
Advanced Web Browser Fingerprinting
All in one Pentest methodologies - Tools and commands | Where compiled all common materials for pentester
Exploit the vulnerability to install arbitrary applications in k61v1 without ROOT
Ferramenta para criação de payload HID para android sem nethunter e sem rubber ducky
PHPUtilities provides various utility scripts.
This repository offers an in-depth resource for foundational and advanced concepts in cybersecurity, including web exploitation, networking, system administration, and essential cyber defenses.
Web Penetration Testing : File Upload Vulnerability Dengan Metasploit.
The purpose of this program is to help beginner and intermediate users to hone their web exploitation and development skills by mirroring a vunerable e-commerce application.
This is a elborate CTF that involves WordPress explotations and uploading PHP Shell Scripts to gain access to the server!
This repository is designed for IDOR vulnerabilities in a web application.
Add a description, image, and links to the exploitation topic page so that developers can more easily learn about it.
To associate your repository with the exploitation topic, visit your repo's landing page and select "manage topics."