Categories

There are currently no items in your shopping cart.

User Panel

Forgot your password?.

Bug Bounty : Web Hacking

Video Introducing this tutorial

Let's Get Started :
Introduction
Github


Tools :
Vega
Setting up Atmosphere
Nikto
Sub Domain
Recon ng
knockpy
Nmap
Burp Suite Cont.
Spider
Scanner
Intruder
Repeater
Sequencer
Analyzing Sequencer Data
Decoder
Comparer
Save and Restore
Authorization
BWap
wapplayzer
Firebug
Hack bar
User agent Switcher
Sublist3r


WordPress Hacking :
WP Scan
WP Scan Codex
WP Scan Template Monster
WP Scan theme
WP Scan User
CMS Map


Cross-site scripting (XSS) :
XSS Demo
XSS Lenovo Yahoo
XSS Uber
XSS Paypal
XSS WhatsApp Facebook
Counter Measures for XSS


SQL Injection (SQLi) :
SQL Drupal
Facebook SQL Injection
Counter Measures for SQL
Template Injection
Template Injection similar Reports


Clickjacking :
Clickjacking
Clickjacking Report
Clickjacking Injection Similar Report
IFrame Demo


Open Redirect Vulnerability :
Open Redirect Report
Open Redirect Similar Report


Cross-Site Request Forgery (CSRF) :
CSRF (change password) Demo
CSRF Injection
CSRF Townwars
CRF Badoo
CRLF Injection Similar Report
Shellshock
SSRF
SSRF Similar Report


Full Path Disclosure :
Full Path Disclosure
Full Path Disclosure Report
Full Path Disclosure Similar Report
Insecure Cryptographic Storage
Insecure Direct object References


Broken Authentication and Session Management :
Autorize
Broken Auth - Insecure Login Forms Demo
Privilege
Privilege Bookfresh
Testing for Privilege Manipulation
Session Mgmt - Administrative Portals
Session Report
Application logic report
Application logic similar report


HTML Injection :
HTML Injection report
HTML Injection similar Report
HTML Injection Demo
XML External entity
XXE similar Reports


Sub domain take over :
Sub Domain Take over
Sub Domain Take over Report
Remote file Insulation


Remote code execution :
Remote Code Execution
Remote Code Execution Similar Reports
Cookies
crt.sh
Sensitive Data Exposure
Buffer overflow
Buffer overflow Similar Report
IDOR
IDOR Similar Report
DNS misconfiguration
DNS misconfiguration Similar Reports


Denail of service (DoS) :
Denial of service (DoS)
DOS report
DOS Similar report
Finding Report using Google
Searching similar Reports
HTTP Parameter Pollution
OSINT


Methodology :
Methodology
02 Analyze the Application
03 Test client-side Controls
04 Authentication Mechanism
05 Test Session
06 Test Access Control
07 Test for Input-based vulnerabilities
08 Test for fuction
09-Test for Logic Flaws
10-Test for Shared Hosting Vulnerabilities
11-Test for Application Server Vulnerabilities
12-Miscellaneous Checks
13-Follow Up Any Information Leakage
Reporting Vulnerability 1
Reporting Vulnerability 2