Browse Skills

Exploiting Jwt Algorithm Confusion Attack

v1.0.0

>

mukul975
3

Exploiting Ipv6 Vulnerabilities

v1.0.0

>

mukul975
3

Exploiting Insecure Deserialization

v1.0.0

Identifying and exploiting insecure deserialization vulnerabilities in Java, PHP, Python, and .NET applications to achieve remote code execution during authorized penetration tests.

mukul975
3

Exploiting Insecure Data Storage In Mobile

v1.0.0

>

mukul975
3

Exploiting Idor Vulnerabilities

v1.0.0

Identifying and exploiting Insecure Direct Object Reference vulnerabilities to access unauthorized resources by manipulating object identifiers in API requests and URLs.

mukul975
2

Exploiting Http Request Smuggling

v1.0.0

Detecting and exploiting HTTP request smuggling vulnerabilities caused by Content-Length and Transfer-Encoding parsing discrepancies between front-end and back-end servers.

mukul975
3

Exploiting Excessive Data Exposure In Api

v1.0.0

>

mukul975
5

Exploiting Deeplink Vulnerabilities

v1.0.0

>

mukul975
3

Exploiting Constrained Delegation Abuse

v1.0.0

Exploit Kerberos Constrained Delegation misconfigurations in Active Directory to impersonate privileged users via S4U2self and S4U2proxy extensions for lateral movement and privilege escalation.

mukul975
5

Exploiting Broken Link Hijacking

v1.0.0

Discover and exploit broken link hijacking vulnerabilities by identifying references to expired domains, decommissioned cloud resources, and dead external services that can be claimed by an attacker.

mukul975
2

Exploiting Broken Function Level Authorization

v1.0.0

>

mukul975
3

Exploiting Bgp Hijacking Vulnerabilities

v1.0.0

>

mukul975
4