Browse Skills
Exploiting Jwt Algorithm Confusion Attack
v1.0.0>
Exploiting Ipv6 Vulnerabilities
v1.0.0>
Exploiting Insecure Deserialization
v1.0.0Identifying and exploiting insecure deserialization vulnerabilities in Java, PHP, Python, and .NET applications to achieve remote code execution during authorized penetration tests.
Exploiting Insecure Data Storage In Mobile
v1.0.0>
Exploiting Idor Vulnerabilities
v1.0.0Identifying and exploiting Insecure Direct Object Reference vulnerabilities to access unauthorized resources by manipulating object identifiers in API requests and URLs.
Exploiting Http Request Smuggling
v1.0.0Detecting and exploiting HTTP request smuggling vulnerabilities caused by Content-Length and Transfer-Encoding parsing discrepancies between front-end and back-end servers.
Exploiting Excessive Data Exposure In Api
v1.0.0>
Exploiting Deeplink Vulnerabilities
v1.0.0>
Exploiting Constrained Delegation Abuse
v1.0.0Exploit Kerberos Constrained Delegation misconfigurations in Active Directory to impersonate privileged users via S4U2self and S4U2proxy extensions for lateral movement and privilege escalation.
Exploiting Broken Link Hijacking
v1.0.0Discover and exploit broken link hijacking vulnerabilities by identifying references to expired domains, decommissioned cloud resources, and dead external services that can be claimed by an attacker.
Exploiting Broken Function Level Authorization
v1.0.0>
Exploiting Bgp Hijacking Vulnerabilities
v1.0.0>