Abhijeet kumawatDay 15 of 30 Days — 30 Vulnerabilities | ClickJackingDay 15: Mastering ClickJacking Vulnerability — Essential Tricks & Techniques Based on Personal Experience and Valuable POCs2d ago2d ago
Abhijeet kumawatDay 14 of 30 Days — 30 Vulnerabilities | HTTP Parameter Pollution (HPP) VulnerabilityDay 14: Mastering HTTP Parameter Pollution (HPP) Vulnerability — Essential Tricks & Techniques Based on Personal Experience and Valuable…4d ago4d ago
Abhijeet kumawatDay 13 of 30 Days — 30 Vulnerabilities | XML External Entity (XXE)Day 13: Mastering XML External Entity (XXE) Vulnerability — Essential Tricks & Techniques Based on Personal Experience and Valuable POCs5d ago5d ago
Abhijeet kumawatDay 12: Mastering Server Side Request Forgery Vulnerability — Essential Tricks & Techniques Based…[ In collaboration with Sunil Kumawat ( his LinkedIn | Twitter)]Aug 15Aug 15
Abhijeet kumawatDay 11 0f 30 Days — 30 Vulnerabilities | File Upload VulnerabilityDay 11: Mastering File Upload Vulnerability — Essential Tricks & Techniques Based on Personal Experience and Valuable POCsAug 13Aug 13
Abhijeet kumawatDay 10 of 30 Days — 30 Vulnerabilities | Cross Origin Resource Sharing (CORS) MisconfigurationDay 10: Cross Origin Resource Sharing (CORS) Misconfiguration — Essential Tricks & Techniques Based on Personal Experience and Valuable…Aug 12Aug 12
Abhijeet kumawatDay 9: Mastering Broken Authentication — Essential Tricks & Techniques Based on Personal…[ In collaboration with Sunil Kumawat ( his LinkedIn | Twitter)]Aug 11Aug 11
Abhijeet kumawatDay 8 of 30 Days — 30 Vulnerabilities | Security MisconfigurationDay 8: Mastering Security Misconfiguration — Essential Tricks & Techniques Based on Personal Experience and Valuable POCsAug 10Aug 10
Abhijeet kumawatDay 7 of 30 Days — 30 Vulnerability | IDOR (Insecure Direct Object Reference)Day 7: Mastering IDOR — Essential Tricks & Techniques Based on Personal Experience and Valuable POCsAug 9Aug 9
Abhijeet kumawatDay 6 of 30 Days — 30 Vulnerabilities | Sensitive Data ExposureDay 6: Mastering Sensitive Data Exposure — Essential Tricks & Techniques Based on Personal Experience and Valuable POCsAug 8Aug 8