API Testing
Account Takeover Methodology
Application Level DoS
Authentication Bypass
Broken-Link Hijacking
Broken Auth And Session Management
CMS
CORS
CSRF
Finding CVEs
CheckList
Web Page Source Code Review
EXIF Geo Data Not Stripped
File Upload Bypass
Find Origin IP
GraphQL
HTTP Desync Attack
Host-Header Attack
HTML-Injection
IDOR
JWT ATTACK
JIRA ATTACK
MFA Bypass
Misconfigurations
OAuth
Open Redirection
Parameter Pollution
Password Reset Functionality
Rate Limit
Race Condition
Recon
SQLi
SAML
SSRF
SSTI
Sign Up Functionality
Sensitive Info Leaks
Status Code Bypass
Subdomain Takeover
Tabnabbing
WAF Bypasses
Weak Password Policy
XSS
XXE