Browse Skills
Detecting Sql Injection Via Waf Logs
v1.0.0>-
Exploiting Api Injection Vulnerabilities
v1.0.0>
Exploiting Excessive Data Exposure In Api
v1.0.0>
Exploiting Idor Vulnerabilities
v1.0.0Identifying and exploiting Insecure Direct Object Reference vulnerabilities to access unauthorized resources by manipulating object identifiers in API requests and URLs.
Exploiting Insecure Data Storage In Mobile
v1.0.0>
Exploiting Insecure Deserialization
v1.0.0Identifying and exploiting insecure deserialization vulnerabilities in Java, PHP, Python, and .NET applications to achieve remote code execution during authorized penetration tests.
Exploiting Mass Assignment In Rest Apis
v1.0.0Discover and exploit mass assignment vulnerabilities in REST APIs to escalate privileges, modify restricted fields, and bypass authorization controls by injecting unexpected parameters in API requests.
Exploiting Ms17 010 Eternalblue Vulnerability
v1.0.0MS17-010 (EternalBlue) is a critical vulnerability in Microsoft's SMBv1 implementation that allows remote code execution. Originally discovered by the NSA and leaked by the Shadow Brokers in 2017, it
Exploiting Sql Injection Vulnerabilities
v1.0.0>
Exploiting Sql Injection With Sqlmap
v1.0.0Detecting and exploiting SQL injection vulnerabilities using sqlmap to extract database contents during authorized penetration tests.
Exploiting Template Injection Vulnerabilities
v1.0.0Detecting and exploiting Server-Side Template Injection (SSTI) vulnerabilities across Jinja2, Twig, Freemarker, and other template engines to achieve remote code execution.
Analyzing Windows Prefetch With Python
v1.0.0Parse Windows Prefetch files using the windowsprefetch Python library to reconstruct application execution history, detect renamed or masquerading binaries, and identify suspicious program execution patterns.