Content
Cybersec
04 Cryptography
05 Vulns Attacks
- Authentication Based Vulnerabilities
- Autherization Based Vulnerabilities
- Brute force attacks
- Business Logic Flaws
- Clickjacking & Cookie Manipulation Attacks
- CORS Vulnerabilities
- CSRF
- DHCP Attacks
- DNS Exploits
- DoS and DDoS Attacks
- File Upload Vulnerabilities
- FTP Exploits
- IDOR - Insecure direct object reference
- Injection Based vulnerabilities
- insecure Coding practises
- Kerberos and LDAP-Based Attacks
- LFD, LFI and RFI
- MITM or On-Path Attacks
- NAC bypass
- Network Attacks
- Open Redirects
- Pass-the-Hash Attacks
- Password Attacks
- Path Traversal
- Race conditions
- RCE
- SMB Vulnerabilities
- SMTP Exploits
- SNMP Exploits
- Social Engineering
- SQLi
- SSRF - Server-Side Request Forgery
- VLAN Hopping
- Wifi hacking
- Windows Name Resolution Attacks
- Wireless Vulnerabilities and Attacks
- WPA cracking
- XSS - Cross-Site Scripting
- XXE
09 Tools
- Aircrack-ng
- Browser Exploitation Framework (BeEF)
- Burpsuite
- Caido
- curl
- enum4linux
- ettercap
- ffuf
- Greenbone Vulnerability Management (GVM)
- Hashcat
- Hydra
- John the Ripper
- linpeas
- Metasploit
- Nessus
- Netcat
- Nikto
- Nmap
- OpenSSL
- PeStudio
- ProcMon
- pspy
- rainbowcrack
- recon-ng
- Regshot
- RITA
- scapy
- Social-Engineer Toolkit (SET)
- Splunk
- SQLmap
- Suricata
- tcpdump
- Veil
- Virustotal
- Wazuh
- Wireshark
- YARA
- CTF
- Resources
- Docker
- git
- Programming Languages
- Python
- Regex
- SQL
Feedback
If you have any problems, you can check Github Issues for community support.