Browse Skills

Detecting Sql Injection Via Waf Logs

v1.0.0

>-

mukul975
3

Exploiting Api Injection Vulnerabilities

v1.0.0

>

mukul975
3

Exploiting Excessive Data Exposure In Api

v1.0.0

>

mukul975
5

Exploiting Idor Vulnerabilities

v1.0.0

Identifying and exploiting Insecure Direct Object Reference vulnerabilities to access unauthorized resources by manipulating object identifiers in API requests and URLs.

mukul975
2

Exploiting Insecure Data Storage In Mobile

v1.0.0

>

mukul975
3

Exploiting Insecure Deserialization

v1.0.0

Identifying and exploiting insecure deserialization vulnerabilities in Java, PHP, Python, and .NET applications to achieve remote code execution during authorized penetration tests.

mukul975
3

Exploiting Mass Assignment In Rest Apis

v1.0.0

Discover and exploit mass assignment vulnerabilities in REST APIs to escalate privileges, modify restricted fields, and bypass authorization controls by injecting unexpected parameters in API requests.

mukul975
3

Exploiting Ms17 010 Eternalblue Vulnerability

v1.0.0

MS17-010 (EternalBlue) is a critical vulnerability in Microsoft's SMBv1 implementation that allows remote code execution. Originally discovered by the NSA and leaked by the Shadow Brokers in 2017, it

mukul975
3

Exploiting Sql Injection Vulnerabilities

v1.0.0

>

mukul975
3

Exploiting Sql Injection With Sqlmap

v1.0.0

Detecting and exploiting SQL injection vulnerabilities using sqlmap to extract database contents during authorized penetration tests.

mukul975
5

Exploiting Template Injection Vulnerabilities

v1.0.0

Detecting and exploiting Server-Side Template Injection (SSTI) vulnerabilities across Jinja2, Twig, Freemarker, and other template engines to achieve remote code execution.

mukul975
7

Analyzing Windows Prefetch With Python

v1.0.0

Parse Windows Prefetch files using the windowsprefetch Python library to reconstruct application execution history, detect renamed or masquerading binaries, and identify suspicious program execution patterns.

mukul975
3