resources
search
⌘Ctrlk
resources
  • Arbitrary File Upload
  • CRLF Injection
  • Cross Site Request Forgery
  • XSS Cheat Sheet (Basic)
  • Denial of Service
  • Exposed Source Code
  • Host Header Injection
  • Insecure Direct Object Reference (IDOR)
  • Local File Inclusion
  • Mass Assignment Attack
  • NoSQL Injection
  • OAuth Misconfiguration
  • On-Site Request Forgery (OSRF)
  • Open Redirect
  • Remote Code Execution
  • All about bug bounty
  • Reflected File Download
  • Remote File Inclusion
  • SQL Injection
  • Server Side Include Injection (SSI Injection)
  • Server Side Request Forgery (SSRF)
  • Web Cache Deception
  • Web Cache Poisoning
  • Bypass
  • Checklist
  • Misc
    • Account Takeover
    • Broken Link Hijacking
    • Business Logic Errors
    • Default Credentials
    • Email Spoofing
    • Exposed API keys
    • JWT Vulnerabilities
    • Tabnabbing
  • Reconnaissance
  • Technologies
gitbookPowered by GitBook
block-quoteOn this pagechevron-down

Misc

Account Takeoverchevron-rightBroken Link Hijackingchevron-rightBusiness Logic Errorschevron-rightDefault Credentialschevron-rightEmail Spoofingchevron-rightExposed API keyschevron-rightJWT Vulnerabilitieschevron-rightTabnabbingchevron-right
PreviousOWASP Web Application Security Testing Checklistchevron-leftNextAccount Takeoverchevron-right

Last updated 2 years ago