Web Security
Contents_Index
- DIGESTS8
- FORUMS6
- XSS - CROSS-SITE SCRIPTING8
- PROTOTYPE POLLUTION3
- CSV INJECTION3
- SQL INJECTION5
- COMMAND INJECTION3
- ORM INJECTION4
- FTP INJECTION2
- XXE - XML EXTERNAL ENTITY5
- CSRF - CROSS-SITE REQUEST FORGERY2
- CLICKJACKING2
- SSRF - SERVER-SIDE REQUEST FORGERY2
- WEB CACHE POISONING2
- RELATIVE PATH OVERWRITE2
- OPEN REDIRECT3
- SECURITY ASSERTION MARKUP LANGUAGE (SAML)4
- UPLOAD2
- RAILS4
- ANGULARJS2
- REACTJS1
- SSL/TLS2
- WEBMAIL1
- NFS1
- AWS4
- AZURE2
- SUB DOMAIN ENUMERATION2
- CRYPTO2
- WEB SHELL2
- OSINT4
- DNS REBINDING2
- DESERIALIZATION5
- OAUTH2
- JWT1
- XXE1
- CSP7
- WAF4
- JSMVC1
- AUTHENTICATION1
- CSRF5
- CLICKJACKING1
- REMOTE CODE EXECUTION12
- XSS15
- SQL INJECTION6
- NOSQL INJECTION1
- FTP INJECTION2
- XXE10
- SSRF9
- WEB CACHE POISONING2
- HEADER INJECTION1
- URL4
- DESERIALIZATION1
- OAUTH1
- OTHERS4
- FRONTEND (LIKE SOP BYPASS, URL SPOOFING, AND SOMETHING LIKE THAT)13
- BACKEND (CORE OF BROWSER IMPLEMENTATION, AND OFTEN REFERS TO C OR C++ PART)10
- DATABASE6
- CHEETSHEETS2
- AUDITING3
- COMMAND INJECTION1
- OSINT - OPEN-SOURCE INTELLIGENCE20
- SUB DOMAIN ENUMERATION9
- CODE GENERATING1
- FUZZING8
- SCANNING4
- PENETRATION TESTING5
- XSS - CROSS-SITE SCRIPTING5
- SQL INJECTION1
- TEMPLATE INJECTION1
- XXE1
- CROSS SITE REQUEST FORGERY1
- SERVER-SIDE REQUEST FORGERY1
- LEAKING9
- DETECTING8
- PREVENTING4
- PROXY2
- WEBSHELL7
- DISASSEMBLER3
- DECOMPILER1
- DNS REBINDING4
- OTHERS5
- SOCIAL ENGINEERING DATABASE1
- BLOGS11
- TWITTER USERS9
- APPLICATION5
- AWS2
- XSS4
- MODSECURITY / OWASP MODSECURITY CORE RULE SET1
- COMMUNITY2
- MISCELLANEOUS35
Digests
8_ENTRIES- The Daily Swig - Web security digest
Written by PortSwigger.
- Infosec Newbie
Written by Mark Robinson.
- The Magic of Learning
Written by @bitvijays.
- CTF Field Guide
Written by Trail of Bits.
- PayloadsAllTheThings
Written by @swisskyrepo.
- tl;dr sec
Weekly summary of top security tools, blog posts, and security research.
Forums
6_ENTRIES- Phrack Magazine
Ezine written by and for hackers.
- The Hacker News
Security in a serious way.
- Security Weekly
The security podcast network.
- The Register
Biting the hand that feeds IT.
- Dark Reading
Connecting The Information Security Community.
- HackDig
Dig high-quality web security articles for hacker.
XSS - Cross-Site Scripting
8_ENTRIES- AwesomeXSS
Written by @s0md3v.
- XSS.png
Written by @jackmasa.
- C.XSS Guide
Written by @JakobKallin and Irene Lobo Valbuena.
- payloadbox/xss-payload-list
Written by @payloadbox.
- PayloadsAllTheThings - XSS Injection
Written by @swisskyrepo.
Prototype Pollution
3_ENTRIES- Real-world JS - 1
Written by @po6ix.
CSV Injection
3_ENTRIES- CSV Injection -> Meterpreter on Pornhub
Written by Andy.
- PayloadsAllTheThings - CSV Injection
Written by @swisskyrepo.
SQL Injection
5_ENTRIES- SQL Injection Cheat Sheet
Written by @netsparker.
- SQL Injection Wiki
Written by NETSPI.
- SQL Injection Pocket Reference
Written by @LightOS.
- payloadbox/sql-injection-payload-list
Written by @payloadbox.
- PayloadsAllTheThings - SQL Injection
Written by @swisskyrepo.
Command Injection
3_ENTRIES- Potential command injection in resolv.rb
Written by @drigg3r.
ORM Injection
4_ENTRIES- HQL for pentesters
Written by @h3xstream.
- ORM Injection
Written by Simone Onofri.
FTP Injection
2_ENTRIESXXE - XML eXternal Entity
5_ENTRIES- XXE
Written by @phonexicum.
- XML external entity (XXE) injection
Written by portswigger.
- XML Schema, DTD, and Entity Attacks
Written by Timothy D. Morgan and Omar Al Ibrahim.
- PayloadsAllTheThings - XXE Injection
Written by various contributors.
CSRF - Cross-Site Request Forgery
2_ENTRIES- Wiping Out CSRF
Written by @jrozner.
Clickjacking
2_ENTRIES- Clickjacking
Written by Imperva.
SSRF - Server-Side Request Forgery
2_ENTRIES- SSRF bible. Cheatsheet
Written by Wallarm.
Web Cache Poisoning
2_ENTRIES- Practical Web Cache Poisoning
Written by @albinowax.
Relative Path Overwrite
2_ENTRIESOpen Redirect
3_ENTRIES- Open Redirect Vulnerability
Written by s0cket7.
- payloadbox/open-redirect-payload-list
Written by @payloadbox.
- PayloadsAllTheThings - Open Redirect
Written by @swisskyrepo.
Security Assertion Markup Language (SAML)
4_ENTRIESUpload
2_ENTRIES- File Upload Restrictions Bypass
Written by Haboob Team.
Rails
4_ENTRIES- Rails Security - First part
Written by @qazbnm456.
- Zen Rails Security Checklist
Written by @brunofacca.
- Rails SQL Injection
Written by @presidentbeef.
- Official Rails Security Guide
Written by Rails team.
AngularJS
2_ENTRIESReactJS
1_ENTRIESSSL/TLS
2_ENTRIES- SSL & TLS Penetration Testing
Written by APTIVE.
- Practical introduction to SSL/TLS
Written by @Hakky54.
Webmail
1_ENTRIES- Why mail() is dangerous in PHP
Written by Robin Peraglie.
NFS
1_ENTRIESAWS
4_ENTRIES- PENETRATION TESTING AWS STORAGE: KICKING THE S3 BUCKET
Written by Dwight Hohnstein from Rhino Security Labs.
- Misadventures in AWS
Written by Christian Demko
Azure
2_ENTRIESSub Domain Enumeration
2_ENTRIES- The Art of Subdomain Enumeration
Written by Patrik Hudak.
Crypto
2_ENTRIES- What is a Side-Channel Attack ?
Written by J.M Porup.
Web Shell
2_ENTRIES- Hunting for Web Shells
Written by Jacob Baines.
- Hacking with JSP Shells
Written by @_nullbind.
OSINT
4_ENTRIESDNS Rebinding
2_ENTRIESDeserialization
5_ENTRIES- Attacking .NET deserialization
Written by @pwntester.
OAuth
2_ENTRIESJWT
1_ENTRIESXXE
1_ENTRIESCSP
7_ENTRIES- TWITTER XSS + CSP BYPASS
Written by Paulos Yibelo.
- Neatly bypassing CSP
Written by Wallarm.
- GitHub's CSP journey
Written by @ptoomey3.
- GitHub's post-CSP journey
Written by @ptoomey3.
WAF
4_ENTRIESJSMVC
1_ENTRIESAuthentication
1_ENTRIESCSRF
5_ENTRIES- Neat tricks to bypass CSRF-protection
Written by Twosecurity.
Clickjacking
1_ENTRIESRemote Code Execution
12_ENTRIES- CVE-2019-1306: ARE YOU MY INDEX?
Written by @yu5k3.
- WebLogic RCE (CVE-2019-2725) Debug Diary
Written by Badcode@Knownsec 404 Team.
- GitHub Enterprise Remote Code Execution
Written by @iblue.
- $36k Google App Engine RCE
Written by Ezequiel Pereira.
- Poor RichFaces
Written by CODE WHITE.
XSS
15_ENTRIES- Uber XSS via Cookie
Written by zhchbin.
- DOM XSS β auth.uber.com
Written by StamOne_.
- Stored XSS on Facebook
Written by Enguerran Gillier.
- is filtered ?
Written by @strukt93.
- $20000 Facebook DOM XSS
Written by @vinodsparrow.
SQL Injection
6_ENTRIES- GitHub Enterprise SQL Injection
Written by Orange.
- Red Team Tales 0x01: From MSSQL to RCE
Written by Tarlogic.
NoSQL Injection
1_ENTRIES- GraphQL NoSQL Injection Through JSON Types
Written by Pete.
FTP Injection
2_ENTRIES- XML Out-Of-Band Data Retrieval
Written by @a66at and Alexey Osipov.
- XXE OOB exploitation at Java 1.7+
Written by Ivan Novikov.
XXE
10_ENTRIES- Evil XML with two encodings
Written by Arseniy Sharoglazov.
- XML Out-Of-Band Data Retrieval
Written by Timur Yunusov and Alexey Osipov.
- XXE OOB exploitation at Java 1.7+ (2014)
Exfiltration using FTP protocol - Written by Ivan Novikov.
SSRF
9_ENTRIES- AWS takeover through SSRF in JavaScript
Written by Gwen.
- SSRF to ROOT Access
A $25k bounty for SSRF leading to ROOT Access in all instances by 0xacb.
- PHP SSRF Techniques
Written by @themiddleblue.
- SSRF in https://imgur.com/vidgif/url
Written by aesteral.
Web Cache Poisoning
2_ENTRIES- Cache poisoning and other dirty tricks
Written by Wallarm.
Header Injection
1_ENTRIESURL
4_ENTRIES- Some Problems Of URLs
Written by Chris Palmer.
- Phishing with Unicode Domains
Written by Xudong Zheng.
- [dev.twitter.com] XSS
Written by Sergey Bobrov.
Deserialization
1_ENTRIESOAuth
1_ENTRIESOthers
4_ENTRIES- Some Tricks From My Secret Group
Written by phithon.
Frontend (like SOP bypass, URL spoofing, and something like that)
13_ENTRIES- JSON hijacking for the modern web
Written by portswigger.
- IE11 Information disclosure - local file detection
Written by James Lee.
Backend (core of Browser implementation, and often refers to C or C++ part)
10_ENTRIES- Breaking UC Browser
Written by ΠΠΎΠΊΡΠΎΡ ΠΠ΅Π±.
- Three roads lead to Rome
Written by @holynop.
- Exploiting a V8 OOB write.
Written by @halbecaf.
- CLEANLY ESCAPING THE CHROME SANDBOX
Written by @tjbecker_.
Database
6_ENTRIES- js-vuln-db
Collection of JavaScript engine CVEs with PoCs by @tunz.
- awesome-cve-poc
Curated list of CVE PoCs by @qazbnm456.
- Some-PoC-oR-ExP
εη§ζΌζ΄pocγExpηζΆιζηΌε by @coffeehb.
- Exploit Database
ultimate archive of Exploits, Shellcode, and Security Papers by Offensive Security.
Cheetsheets
2_ENTRIES- XSS Cheat Sheet - 2018 Edition
Written by @brutelogic.
- Capture the Flag CheatSheet
Written by @uppusaikiran.
Auditing
3_ENTRIESCommand Injection
1_ENTRIES- commix
Automated All-in-One OS command injection and exploitation tool by @commixproject.
OSINT - Open-Source Intelligence
20_ENTRIES- Censys
Censys is a search engine that allows computer scientists to ask questions about the devices and networks that compose the Internet by University of Michigan.
- urlscan.io
Service which analyses websites and the resources they request by @heipei.
- ZoomEye
Cyberspace Search Engine by @zoomeye_team.
- NSFOCUS
THREAT INTELLIGENCE PORTAL by NSFOCUS GLOBAL.
- FOCA
FOCA (Fingerprinting Organizations with Collected Archives) is a tool used mainly to find metadata and hidden information in the documents its scans by ElevenPaths.
- SpiderFoot
Open source footprinting and intelligence-gathering tool by @binarypool.
- xray
XRay is a tool for recon, mapping and OSINT gathering from public networks by @evilsocket.
- gitrob
Reconnaissance tool for GitHub organizations by @michenriksen.
- Databases - start.me
Various databases which you can use for your OSINT research by @technisette.
- peoplefindThor
the easy way to find people on Facebook by [postkassen](mailto:postkassen@oejvind.dk?subject=peoplefindthor.dk comments).
- tinfoleak
The most complete open-source tool for Twitter intelligence analysis by @vaguileradiaz.
- Raccoon
High performance offensive security tool for reconnaissance and vulnerability scanning by @evyatarmeged.
- Social Mapper
Social Media Enumeration & Correlation Tool by Jacob Wilkin(Greenwolf) by @SpiderLabs.
- espi0n/Dockerfiles
Dockerfiles for various OSINT tools by @espi0n.
Sub Domain Enumeration
9_ENTRIES- EyeWitness
EyeWitness is designed to take screenshots of websites, provide some server header info, and identify default credentials if possible by @ChrisTruncer.
- subDomainsBrute
A simple and fast sub domain brute tool for pentesters by @lijiejie.
- AQUATONE
Tool for Domain Flyovers by @michenriksen.
- domain_analyzer
Analyze the security of any domain by finding all the information possible by @eldraco.
- VirusTotal domain information
Searching for domain information by VirusTotal.
- Certificate Transparency
Google's Certificate Transparency project fixes several structural flaws in the SSL certificate system by @google.
- Certificate Search
Enter an Identity (Domain Name, Organization Name, etc), a Certificate Fingerprint (SHA-1 or SHA-256) or a crt.sh ID to search certificate(s) by @crtsh.
Code Generating
1_ENTRIES- VWGen
Vulnerable Web applications Generator by @qazbnm456.
Fuzzing
8_ENTRIES- charsetinspect
Script that inspects multi-byte character sets looking for characters with specific user-defined properties by @hack-all-the-things.
- IPObfuscator
Simple tool to convert the IP to a DWORD IP by @OsandaMalith.
- FuzzDB
Dictionary of attack patterns and primitives for black-box application fault injection and resource discovery.
- ssltest
Online service that performs a deep analysis of the configuration of any SSL web server on the public internet. Provided by Qualys SSL Labs.
Scanning
4_ENTRIES- wpscan
WPScan is a black box WordPress vulnerability scanner by @wpscanteam.
- JoomlaScan
Free software to find the components installed in Joomla CMS, built out of the ashes of Joomscan by @drego85.
- Nuclei
Nuclei is a fast tool for configurable targeted scanning based on templates offering massive extensibility and ease of use by @projectdiscovery.
Penetration Testing
5_ENTRIES- Burp Suite
Burp Suite is an integrated platform for performing security testing of web applications by portswigger.
- TIDoS-Framework
A comprehensive web application audit framework to cover up everything from Reconnaissance and OSINT to Vulnerability Analysis by @_tID.
- Astra
Automated Security Testing For REST API's by @flipkart-incubator.
- grayhatwarfare
Public buckets by grayhatwarfare.
XSS - Cross-Site Scripting
5_ENTRIES- beef
The Browser Exploitation Framework Project by beefproject.
- csp evaluator
A tool for evaluating content-security-policies by Csper.
SQL Injection
1_ENTRIES- sqlmap
Automatic SQL injection and database takeover tool.
Template Injection
1_ENTRIESXXE
1_ENTRIES- dtd-finder
List DTDs and generate XXE payloads using those local DTDs by @GoSecure.
Cross Site Request Forgery
1_ENTRIES- XSRFProbe
The Prime CSRF Audit & Exploitation Toolkit by @0xInfection.
Server-Side Request Forgery
1_ENTRIES- Open redirect/SSRF payload generator
Open redirect/SSRF payload generator by intigriti.
Leaking
9_ENTRIES- dvcs-ripper
Rip web accessible (distributed) version control systems: SVN/GIT/HG... by @kost.
- DVCS-Pillage
Pillage web accessible GIT, HG and BZR repositories by @evilpacket.
- gitleaks
Searches full repo history for secrets and keys by @zricethezav.
- CSS-Keylogging
Chrome extension and Express server that exploits keylogging abilities of CSS by @maxchehab.
- pwngitmanager
Git manager for pentesters by @allyshka.
- snallygaster
Tool to scan for secret files on HTTP servers by @hannob.
- LinkFinder
Python script that finds endpoints in JavaScript files by @GerbenJavado.
Detecting
8_ENTRIES- malware-jail
Sandbox for semi-automatic Javascript malware analysis, deobfuscation and payload extraction by @HynekPetrak.
- repo-supervisor
Scan your code for security misconfiguration, search for passwords and secrets.
- bXSS
bXSS is a simple Blind XSS application adapted from cure53.de/m by @LewisArdern.
- OpenRASP
An open source RASP solution actively maintained by Baidu Inc. With context-aware detection algorithm the project achieved nearly no false positives. And less than 3% performance reduction is observed under heavy server load.
- GuardRails
A GitHub App that provides security feedback in Pull Requests.
Preventing
4_ENTRIES- js-xss
Sanitize untrusted HTML (to prevent XSS) with a configuration specified by a Whitelist by @leizongmin.
- Acra
Client-side encryption engine for SQL databases, with strong selective encryption, SQL injections prevention and intrusion detection by @cossacklabs.
Proxy
2_ENTRIES- Charles
HTTP proxy / HTTP monitor / Reverse Proxy that enables a developer to view all of the HTTP and SSL / HTTPS traffic between their machine and the Internet.
- mitmproxy
Interactive TLS-capable intercepting HTTP proxy for penetration testers and software developers by @mitmproxy.
Webshell
7_ENTRIES- Webshell-Sniper
Manage your website via terminal by @WangYihang.
- Reverse-Shell-Manager
Reverse Shell Manager via Terminal @WangYihang.
- reverse-shell
Reverse Shell as a Service by @lukechilds.
Disassembler
3_ENTRIES- plasma
Plasma is an interactive disassembler for x86/ARM/MIPS by @plasma-disassembler.
Decompiler
1_ENTRIES- CFR
Another java decompiler by @LeeAtBenf.
DNS Rebinding
4_ENTRIES- DNS Rebind Toolkit
DNS Rebind Toolkit is a frontend JavaScript framework for developing DNS Rebinding exploits against vulnerable hosts and services on a local area network (LAN) by @brannondorsey
- Singularity of Origin
It includes the necessary components to rebind the IP address of the attack server DNS name to the target machine's IP address and to serve attack payloads to exploit vulnerable software on the target machine by @nccgroup
- Whonow DNS Server
A malicious DNS server for executing DNS Rebinding attacks on the fly by @brannondorsey
Others
5_ENTRIES- ntlm_challenger
Parse NTLM over HTTP challenge messages by @b17zr.
Blogs
11_ENTRIES- Orange
Taiwan's talented web penetrator.
- leavesongs
China's talented web penetrator.
- James Kettle
Head of Research at PortSwigger Web Security.
- Broken Browser
Fun with Browser Vulnerabilities.
- Scrutiny
Internet Security through Web Browsers by Dhiraj Mishra.
- BRETT BUERHAUS
Vulnerability disclosures and rambles on application security.
- n0tr00t
~# n0tr00t Security Team.
- OpnSec
Open Mind Security!
- RIPS Technologies
Write-ups for PHP vulnerabilities.
- 0Day Labs
Awesome bug-bounty and challenges writeups.
- Blog of Osanda
Security Researching and Reverse Engineering.
Twitter Users
9_ENTRIES- @HackwithGitHub
Initiative to showcase open source hacking tools for hackers and pentesters
- @filedescriptor
Active penetrator often tweets and writes useful articles
- @cure53berlin
Cure53 is a German cybersecurity firm.
- @XssPayloads
The wonderland of JavaScript unexpected usages, and more.
- @kinugawamasato
Japanese web penetrator.
- @h3xstream
Security Researcher, interested in web security, crypto, pentest, static analysis but most of all, samy is my hero.
- @garethheyes
English web penetrator.
- @hasegawayosuke
Japanese javascript security researcher.
- @shhnjk
Web and Browsers Security Researcher.
Application
5_ENTRIES- OWASP Juice Shop
Probably the most modern and sophisticated insecure web application - Written by @bkimminich and the @owasp_juiceshop team.
- BadLibrary
Vulnerable web application for training - Written by @SecureSkyTechnology.
- Hackxor
Realistic web application hacking game - Written by @albinowax.
- SELinux Game
Learn SELinux by doing. Solve Puzzles, show skillz - Written by @selinuxgame.
- Portswigger Web Security Academy
Free trainings and labs - Written by PortSwigger.
AWS
2_ENTRIES- FLAWS
Amazon AWS CTF challenge - Written by @0xdabbad00.
- CloudGoat
Rhino Security Labs' "Vulnerable by Design" AWS infrastructure setup tool - Written by @RhinoSecurityLabs.
XSS
4_ENTRIES- XSS game
Google XSS Challenge - Written by Google.
- prompt(1) to win
Complex 16-Level XSS Challenge held in summer 2014 (+4 Hidden Levels) - Written by @cure53.
- alert(1) to win
Series of XSS challenges - Written by @steike.
- XSS Challenges
Series of XSS challenges - Written by yamagata21.
ModSecurity / OWASP ModSecurity Core Rule Set
1_ENTRIES- ModSecurity / OWASP ModSecurity Core Rule Set
Series of tutorials to install, configure and tune ModSecurity and the Core Rule Set - Written by @ChrFolini.
Community
2_ENTRIESMiscellaneous
35_ENTRIES- awesome-bug-bounty
Comprehensive curated list of available Bug Bounty & Disclosure Programs and write-ups by @djadmin.
- bug-bounty-reference
List of bug bounty write-up that is categorized by the bug nature by @ngalongc.
- Google VRP and Unicorns
Written by Daniel Stelter-Gliese.
- Pentest + Exploit dev Cheatsheet wallpaper
Penetration Testing and Exploit Dev CheatSheet.
- The Definitive Security Data Science and Machine Learning Guide
Written by JASON TROS.
- Infosec_Reference
Information Security Reference That Doesn't Suck by @rmusser01.
- Internet of Things Scanner
Check if your internet-connected devices at home are public on Shodan by BullGuard.
- The Bug Hunters Methodology v2.1
Written by @jhaddix.
- $7.5k Google services mix-up
Written by Ezequiel Pereira.
- An example why NAT is NOT security
Written by @0daywork.
- WEB APPLICATION PENETRATION TESTING NOTES
Written by Jayson.
- Hacking with a Heads Up Display
Written by David Scrobonia.
- The bug bounty program that changed my life
Written by Gwen.
- List of bug bounty writeups
Written by Mariem.
- WCTF2019: Gyotaku The Flag
Written by @t0nk42.
- DOS File Path Magic Tricks
Written by @clr2of8.
Social Engineering Database
1_ENTRIESCheck if you have an account that has been compromised in a data breach by Troy Hunt.