Web Exploitation
XSS - Advanced Exploitation
Filter Bypass, CSP Evasion, Mutation XSS, Blind XSS, Prototype Pollution, DOM Clobbering, postMessage Exploitation, and Weaponised Payloads
$5Enroll
Exploitation, reverse engineering, and low-level internals. From userland to Ring -1.
Filter Bypass, CSP Evasion, Mutation XSS, Blind XSS, Prototype Pollution, DOM Clobbering, postMessage Exploitation, and Weaponised Payloads
HTML/JS Context, Reflected, Stored, and DOM-Based XSS, Browser Parsing, Cookie Theft, and Defense Mechanisms
In-Band, Blind, Out-of-Band, Error-Based, Time-Based, Union-Based, Second-Order, and WAF Bypass Techniques
Client-Server Architecture, DNS, Cookies, Sessions, Tokens, SOP, CORS, and the Browser Security Model
Understanding HTTP, Requests, Headers, and Mechanics of the Web