├── .gitignore ├── API testing ├── Exploiting a mass assignment vulnerability │ ├── README.md │ └── main.py ├── Exploiting an API endpoint using documentation │ ├── README.md │ └── main.py ├── Exploiting server-side parameter pollution in a REST URL │ ├── README.md │ └── main.py ├── Exploiting server-side parameter pollution in a query string │ ├── README.md │ └── main.py ├── Finding and exploiting an unused API endpoint │ ├── README.md │ └── main.py └── README.md ├── Access control vulnerabilities ├── Insecure direct object references │ ├── README.md │ └── main.py ├── Method-based access control can be circumvented │ ├── README.md │ └── main.py ├── Multi-step process with no access control on one step │ ├── README.md │ └── main.py ├── README.md ├── Referer-based access control │ ├── README.md │ └── main.py ├── URL-based access control can be circumvented │ ├── README.md │ └── main.py ├── Unprotected admin functionality with unpredictable URL │ ├── README.md │ └── main.py ├── Unprotected admin functionality │ ├── README.md │ └── main.py ├── User ID controlled by request parameter with data leakage in redirect │ ├── README.md │ └── main.py ├── User ID controlled by request parameter with password disclosure │ ├── README.md │ └── main.py ├── User ID controlled by request parameter, with unpredictable user IDs │ ├── README.md │ └── main.py ├── User ID controlled by request parameter │ ├── README.md │ └── main.py ├── User role can be modified in user profile │ ├── README.md │ └── main.py └── User role controlled by request parameter │ ├── README.md │ └── main.py ├── Authentication ├── 2FA broken logic │ ├── README.md │ └── main.py ├── 2FA bypass using a brute-force attack │ ├── README.md │ └── main.py ├── 2FA simple bypass │ ├── README.md │ └── main.py ├── Broken brute-force protection, IP block │ ├── README.md │ └── main.py ├── Broken brute-force protection, multiple credentials per request │ ├── README.md │ └── main.py ├── Brute-forcing a stay-logged-in cookie │ ├── README.md │ └── main.py ├── Offline password cracking │ ├── README.md │ └── main.py ├── Password brute-force via password change │ ├── README.md │ └── main.py ├── Password reset broken logic │ ├── README.md │ └── main.py ├── Password reset poisoning via middleware │ ├── README.md │ └── main.py ├── README.md ├── Username enumeration via account lock │ ├── README.md │ └── main.py ├── Username enumeration via different responses │ ├── README.md │ └── main.py ├── Username enumeration via response timing │ ├── README.md │ └── main.py ├── Username enumeration via subtly different responses │ ├── README.md │ └── main.py ├── passwords.txt └── usernames.txt ├── Business logic vulnerabilities ├── Authentication bypass via encryption oracle │ ├── README.md │ └── main.py ├── Authentication bypass via flawed state machine │ ├── README.md │ └── main.py ├── Bypassing access controls using email address parsing discrepancies │ ├── README.md │ └── main.py ├── Excessive trust in client-side controls │ ├── README.md │ └── main.py ├── Flawed enforcement of business rules │ ├── README.md │ └── main.py ├── High-level logic vulnerability │ ├── README.md │ └── main.py ├── Inconsistent handling of exceptional input │ ├── README.md │ └── main.py ├── Inconsistent security controls │ ├── README.md │ └── main.py ├── Infinite money logic flaw │ ├── README.md │ └── main.py ├── Insufficient workflow validation │ ├── README.md │ └── main.py ├── README.md └── Weak isolation on dual-use endpoint │ ├── README.md │ └── main.py ├── Clickjacking ├── Basic clickjacking with CSRF token protection │ ├── README.md │ └── main.py ├── Clickjacking with a frame buster script │ ├── README.md │ └── main.py ├── Clickjacking with form input data prefilled from a URL parameter │ ├── README.md │ └── main.py ├── Exploiting clickjacking vulnerability to trigger DOM-based XSS │ ├── README.md │ └── main.py ├── Multistep clickjacking │ ├── README.md │ └── main.py └── README.md ├── Cross-origin resource sharing (CORS) ├── CORS vulnerability with basic origin reflection │ ├── README.md │ └── main.py ├── CORS vulnerability with trusted insecure protocols │ ├── README.md │ └── main.py ├── CORS vulnerability with trusted null origin │ ├── README.md │ └── main.py └── README.md ├── Cross-site request forgery (CSRF) ├── CSRF vulnerability with no defenses │ ├── README.md │ └── main.py ├── CSRF where Referer validation depends on header being present │ ├── README.md │ └── main.py ├── CSRF where token is duplicated in cookie │ ├── README.md │ └── main.py ├── CSRF where token is not tied to user session │ ├── README.md │ └── main.py ├── CSRF where token is tied to non-session cookie │ ├── README.md │ └── main.py ├── CSRF where token validation depends on request method │ ├── README.md │ └── main.py ├── CSRF where token validation depends on token being present │ ├── README.md │ └── main.py ├── CSRF with broken Referer validation │ ├── README.md │ └── main.py ├── README.md ├── SameSite Lax bypass via cookie refresh │ ├── README.md │ └── main.py ├── SameSite Lax bypass via method override │ ├── README.md │ └── main.py └── SameSite Strict bypass via client-side redirect │ ├── README.md │ └── main.py ├── Cross-site scripting (XSS) ├── DOM XSS in AngularJS expression with angle brackets and double quotes HTML-encoded │ ├── README.md │ └── main.py ├── DOM XSS in document.write sink using source location.search inside a select element │ ├── README.md │ └── main.py ├── DOM XSS in document.write sink using source location.search │ ├── README.md │ └── main.py ├── DOM XSS in innerHTML sink using source location.search │ ├── README.md │ └── main.py ├── DOM XSS in jQuery anchor href attribute sink using location.search source │ ├── README.md │ └── main.py ├── DOM XSS in jQuery selector sink using a hashchange event │ ├── README.md │ └── main.py ├── Exploiting XSS to perform CSRF │ ├── README.md │ └── main.py ├── Exploiting cross-site scripting to capture passwords │ ├── README.md │ └── main.py ├── Exploiting cross-site scripting to steal cookies │ ├── README.md │ └── main.py ├── README.md ├── Reflected DOM XSS │ ├── README.md │ └── main.py ├── Reflected XSS in canonical link tag │ ├── README.md │ └── main.py ├── Reflected XSS into HTML context with all tags blocked except custom ones │ ├── README.md │ └── main.py ├── Reflected XSS into HTML context with most tags and attributes blocked │ ├── README.md │ └── main.py ├── Reflected XSS into HTML context with nothing encoded │ ├── README.md │ └── main.py ├── Reflected XSS into a JavaScript string with angle brackets HTML encoded │ ├── README.md │ └── main.py ├── Reflected XSS into a JavaScript string with angle brackets and double quotes HTML-encoded and single quotes escaped │ ├── README.md │ └── main.py ├── Reflected XSS into a JavaScript string with single quote and backslash escaped │ ├── README.md │ └── main.py ├── Reflected XSS into a template literal with angle brackets, single, double quotes, backslash and backticks Unicode-escaped │ ├── README.md │ └── main.py ├── Reflected XSS into attribute with angle brackets HTML-encoded │ ├── README.md │ └── main.py ├── Reflected XSS with some SVG markup allowed │ ├── README.md │ └── main.py ├── Stored DOM XSS │ ├── README.md │ └── main.py ├── Stored XSS into HTML context with nothing encoded │ ├── README.md │ └── main.py ├── Stored XSS into anchor href attribute with double quotes HTML-encoded │ ├── README.md │ └── main.py └── Stored XSS into onclick event with angle brackets and double quotes HTML-encoded and single quotes and backslash escaped │ ├── README.md │ └── main.py ├── DOM-based vulnerabilities ├── DOM XSS using web messages and JSON.parse │ ├── README.md │ └── main.py ├── DOM XSS using web messages and a JavaScript URL │ ├── README.md │ └── main.py ├── DOM XSS using web messages │ ├── README.md │ └── main.py ├── DOM-based cookie manipulation │ ├── README.md │ └── main.py ├── DOM-based open redirection │ ├── README.md │ └── main.py └── README.md ├── File upload vulnerabilities ├── README.md ├── Remote code execution via polyglot web shell upload │ ├── README.md │ ├── main.py │ └── white.jpg ├── Remote code execution via web shell upload │ ├── README.md │ └── main.py ├── Web shell upload via Content-Type restriction bypass │ ├── README.md │ └── main.py ├── Web shell upload via extension blacklist bypass │ ├── README.md │ └── main.py ├── Web shell upload via obfuscated file extension │ ├── README.md │ └── main.py ├── Web shell upload via path traversal │ ├── README.md │ └── main.py └── Web shell upload via race condition │ ├── README.md │ └── main.py ├── GraphQL API vulnerabilities ├── Accessing private GraphQL posts │ ├── README.md │ └── main.py ├── Accidental exposure of private GraphQL fields │ ├── README.md │ └── main.py ├── Bypassing GraphQL brute force protections │ ├── README.md │ └── main.py ├── Finding a hidden GraphQL endpoint │ ├── README.md │ └── main.py ├── Performing CSRF exploits over GraphQL │ ├── README.md │ └── main.py ├── README.md └── passwords.txt ├── Information disclosure ├── Authentication bypass via information disclosure │ ├── README.md │ └── main.py ├── Information disclosure in error messages │ ├── README.md │ └── main.py ├── Information disclosure in version control history │ ├── README.md │ └── main.py ├── Information disclosure on debug page │ ├── README.md │ └── main.py ├── README.md └── Source code disclosure via backup files │ ├── README.md │ └── main.py ├── Insecure deserialization ├── Arbitrary object injection in PHP │ ├── README.md │ └── main.py ├── Exploiting Java deserialization with Apache Commons │ ├── README.md │ └── main.py ├── Exploiting PHP deserialization with a pre-built gadget chain │ ├── README.md │ └── main.py ├── Exploiting Ruby deserialization using a documented gadget chain │ ├── README.md │ └── main.py ├── Modifying serialized data types │ ├── README.md │ └── main.py ├── Modifying serialized objects │ ├── README.md │ └── main.py ├── README.md └── Using application functionality to exploit insecure deserialization │ ├── README.md │ └── main.py ├── LICENSE ├── NoSQL injection ├── Detecting NoSQL injection │ ├── README.md │ └── main.py ├── Exploiting NoSQL injection to extract data │ ├── README.md │ └── main.py ├── Exploiting NoSQL operator injection to bypass authentication │ ├── README.md │ └── main.py ├── Exploiting NoSQL operator injection to extract unknown fields │ ├── README.md │ └── main.py └── README.md ├── OS command injection ├── Blind OS command injection with out-of-band data exfiltration │ ├── README.md │ └── main.py ├── Blind OS command injection with out-of-band interaction │ ├── README.md │ └── main.py ├── Blind OS command injection with output redirection │ ├── README.md │ └── main.py ├── Blind OS command injection with time delays │ ├── README.md │ └── main.py ├── OS command injection, simple case │ ├── README.md │ └── main.py └── README.md ├── Path traversal ├── File path traversal, simple case │ ├── README.md │ └── main.py ├── File path traversal, traversal sequences blocked with absolute path bypass │ ├── README.md │ └── main.py ├── File path traversal, traversal sequences stripped non-recursively │ ├── README.md │ └── main.py ├── File path traversal, traversal sequences stripped with superfluous URL-decode │ ├── README.md │ └── main.py ├── File path traversal, validation of file extension with null byte bypass │ ├── README.md │ └── main.py ├── File path traversal, validation of start of path │ ├── README.md │ └── main.py └── README.md ├── README.md ├── SQL injection ├── Blind SQL injection with conditional errors │ ├── README.md │ └── main.py ├── Blind SQL injection with conditional responses │ ├── README.md │ └── main.py ├── Blind SQL injection with out-of-band data exfiltration │ ├── README.md │ └── main.py ├── Blind SQL injection with out-of-band interaction │ ├── README.md │ └── main.py ├── Blind SQL injection with time delays and information retrieval │ ├── README.md │ └── main.py ├── Blind SQL injection with time delays │ ├── README.md │ └── main.py ├── README.md ├── SQL injection UNION attack, determining the number of columns returned by the query │ ├── README.md │ └── main.py ├── SQL injection UNION attack, finding a column containing text │ ├── README.md │ └── main.py ├── SQL injection UNION attack, retrieving data from other tables │ ├── README.md │ └── main.py ├── SQL injection UNION attack, retrieving multiple values in a single column │ ├── README.md │ └── main.py ├── SQL injection attack, listing the database contents on Oracle │ ├── README.md │ └── main.py ├── SQL injection attack, listing the database contents on non-Oracle databases │ ├── README.md │ └── main.py ├── SQL injection attack, querying the database type and version on MySQL and Microsoft │ ├── README.md │ └── main.py ├── SQL injection attack, querying the database type and version on Oracle │ ├── README.md │ └── main.py ├── SQL injection vulnerability allowing login bypass │ ├── README.md │ └── main.py ├── SQL injection vulnerability in WHERE clause allowing retrieval of hidden data │ ├── README.md │ └── main.py ├── SQL injection with filter bypass via XML encoding │ ├── README.md │ └── main.py └── Visible error-based SQL injection │ ├── README.md │ └── main.py ├── Server-side request forgery (SSRF) ├── Basic SSRF against another back-end system │ ├── README.md │ └── main.py ├── Basic SSRF against the local server │ ├── README.md │ └── main.py ├── Blind SSRF with Shellshock exploitation │ ├── README.md │ └── main.py ├── Blind SSRF with out-of-band detection │ ├── README.md │ └── main.py ├── README.md ├── SSRF with blacklist-based filter │ ├── README.md │ └── main.py ├── SSRF with filter bypass via open redirection vulnerability │ ├── README.md │ └── main.py └── SSRF with whitelist-based input filter │ ├── README.md │ └── main.py ├── Server-side template injection (SSTI) ├── Basic server-side template injection (code context) │ ├── README.md │ └── main.py ├── Basic server-side template injection │ ├── README.md │ └── main.py ├── README.md ├── Server-side template injection in an unknown language with a documented exploit │ ├── README.md │ └── main.py ├── Server-side template injection using documentation │ ├── README.md │ └── main.py └── Server-side template injection with information disclosure via user-supplied objects │ ├── README.md │ └── main.py ├── Web cache deception ├── Exploiting cache server normalization for web cache deception │ ├── README.md │ └── main.py ├── Exploiting exact-match cache rules for web cache deception copy │ ├── README.md │ └── main.py ├── Exploiting origin server normalization for web cache deception │ ├── README.md │ └── main.py ├── Exploiting path delimiters for web cache deception │ ├── README.md │ └── main.py ├── Exploiting path mapping for web cache deception │ ├── README.md │ └── main.py └── README.md ├── Web cache poisoning ├── Parameter cloaking │ ├── README.md │ └── main.py ├── README.md ├── Targeted web cache poisoning using an unknown header │ ├── README.md │ └── main.py ├── URL normalization │ ├── README.md │ └── main.py ├── Web cache poisoning via a fat GET request │ ├── README.md │ └── main.py ├── Web cache poisoning via an unkeyed query parameter │ ├── README.md │ └── main.py ├── Web cache poisoning via an unkeyed query string │ ├── README.md │ └── main.py ├── Web cache poisoning with an unkeyed cookie │ ├── README.md │ └── main.py ├── Web cache poisoning with an unkeyed header │ ├── README.md │ └── main.py └── Web cache poisoning with multiple headers │ ├── README.md │ └── main.py ├── XML external entity (XXE) injection ├── Blind XXE with out-of-band interaction via XML parameter entities │ ├── README.md │ └── main.py ├── Blind XXE with out-of-band interaction │ ├── README.md │ └── main.py ├── Exploiting XInclude to retrieve files │ ├── README.md │ └── main.py ├── Exploiting XXE to perform SSRF attacks │ ├── README.md │ └── main.py ├── Exploiting XXE to retrieve data by repurposing a local DTD │ ├── README.md │ └── main.py ├── Exploiting XXE using external entities to retrieve files │ ├── README.md │ └── main.py ├── Exploiting XXE via image file upload │ ├── README.md │ └── main.py ├── Exploiting blind XXE to exfiltrate data using a malicious external DTD │ ├── README.md │ └── main.py ├── Exploiting blind XXE to retrieve data via error messages │ ├── README.md │ └── main.py └── README.md └── web-security-python.png /.gitignore: -------------------------------------------------------------------------------- 1 | .vscode/ -------------------------------------------------------------------------------- /API testing/Exploiting a mass assignment vulnerability/README.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/elqalaawi/WebSecurity-Academy-with-Python/HEAD/API testing/Exploiting a mass assignment vulnerability/README.md -------------------------------------------------------------------------------- /API testing/Exploiting a mass assignment vulnerability/main.py: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/elqalaawi/WebSecurity-Academy-with-Python/HEAD/API testing/Exploiting a mass assignment vulnerability/main.py -------------------------------------------------------------------------------- /API testing/Exploiting an API endpoint using documentation/README.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/elqalaawi/WebSecurity-Academy-with-Python/HEAD/API testing/Exploiting an API endpoint using documentation/README.md -------------------------------------------------------------------------------- /API testing/Exploiting an API endpoint using documentation/main.py: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/elqalaawi/WebSecurity-Academy-with-Python/HEAD/API testing/Exploiting an API endpoint using documentation/main.py -------------------------------------------------------------------------------- /API testing/Exploiting server-side parameter pollution in a REST URL/README.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/elqalaawi/WebSecurity-Academy-with-Python/HEAD/API testing/Exploiting server-side parameter pollution in a REST URL/README.md -------------------------------------------------------------------------------- /API testing/Exploiting server-side parameter pollution in a REST URL/main.py: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/elqalaawi/WebSecurity-Academy-with-Python/HEAD/API testing/Exploiting server-side parameter pollution in a REST URL/main.py -------------------------------------------------------------------------------- /API testing/Exploiting server-side parameter pollution in a query string/README.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/elqalaawi/WebSecurity-Academy-with-Python/HEAD/API testing/Exploiting server-side parameter pollution in a query string/README.md -------------------------------------------------------------------------------- /API testing/Exploiting server-side parameter pollution in a query string/main.py: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/elqalaawi/WebSecurity-Academy-with-Python/HEAD/API testing/Exploiting server-side parameter pollution in a query string/main.py -------------------------------------------------------------------------------- /API testing/Finding and exploiting an unused API endpoint/README.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/elqalaawi/WebSecurity-Academy-with-Python/HEAD/API testing/Finding and exploiting an unused API endpoint/README.md -------------------------------------------------------------------------------- /API testing/Finding and exploiting an unused API endpoint/main.py: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/elqalaawi/WebSecurity-Academy-with-Python/HEAD/API testing/Finding and exploiting an unused API endpoint/main.py -------------------------------------------------------------------------------- /API testing/README.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/elqalaawi/WebSecurity-Academy-with-Python/HEAD/API testing/README.md -------------------------------------------------------------------------------- /Access control vulnerabilities/Insecure direct object references/README.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/elqalaawi/WebSecurity-Academy-with-Python/HEAD/Access control vulnerabilities/Insecure direct object references/README.md -------------------------------------------------------------------------------- /Access control vulnerabilities/Insecure direct object references/main.py: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/elqalaawi/WebSecurity-Academy-with-Python/HEAD/Access control vulnerabilities/Insecure direct object references/main.py -------------------------------------------------------------------------------- /Access control vulnerabilities/Method-based access control can be circumvented/README.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/elqalaawi/WebSecurity-Academy-with-Python/HEAD/Access control vulnerabilities/Method-based access control can be circumvented/README.md -------------------------------------------------------------------------------- /Access control vulnerabilities/Method-based access control can be circumvented/main.py: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/elqalaawi/WebSecurity-Academy-with-Python/HEAD/Access control vulnerabilities/Method-based access control can be circumvented/main.py -------------------------------------------------------------------------------- /Access control vulnerabilities/Multi-step process with no access control on one step/README.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/elqalaawi/WebSecurity-Academy-with-Python/HEAD/Access control vulnerabilities/Multi-step process with no access control on one step/README.md -------------------------------------------------------------------------------- /Access control vulnerabilities/Multi-step process with no access control on one step/main.py: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/elqalaawi/WebSecurity-Academy-with-Python/HEAD/Access control vulnerabilities/Multi-step process with no access control on one step/main.py -------------------------------------------------------------------------------- /Access control vulnerabilities/README.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/elqalaawi/WebSecurity-Academy-with-Python/HEAD/Access control vulnerabilities/README.md -------------------------------------------------------------------------------- /Access control vulnerabilities/Referer-based access control/README.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/elqalaawi/WebSecurity-Academy-with-Python/HEAD/Access control vulnerabilities/Referer-based access control/README.md -------------------------------------------------------------------------------- /Access control vulnerabilities/Referer-based access control/main.py: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/elqalaawi/WebSecurity-Academy-with-Python/HEAD/Access control vulnerabilities/Referer-based access control/main.py -------------------------------------------------------------------------------- /Access control vulnerabilities/URL-based access control can be circumvented/README.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/elqalaawi/WebSecurity-Academy-with-Python/HEAD/Access control vulnerabilities/URL-based access control can be circumvented/README.md -------------------------------------------------------------------------------- /Access control vulnerabilities/URL-based access control can be circumvented/main.py: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/elqalaawi/WebSecurity-Academy-with-Python/HEAD/Access control vulnerabilities/URL-based access control can be circumvented/main.py -------------------------------------------------------------------------------- /Access control vulnerabilities/Unprotected admin functionality with unpredictable URL/README.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/elqalaawi/WebSecurity-Academy-with-Python/HEAD/Access control vulnerabilities/Unprotected admin functionality with unpredictable URL/README.md -------------------------------------------------------------------------------- /Access control vulnerabilities/Unprotected admin functionality with unpredictable URL/main.py: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/elqalaawi/WebSecurity-Academy-with-Python/HEAD/Access control vulnerabilities/Unprotected admin functionality with unpredictable URL/main.py -------------------------------------------------------------------------------- /Access control vulnerabilities/Unprotected admin functionality/README.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/elqalaawi/WebSecurity-Academy-with-Python/HEAD/Access control vulnerabilities/Unprotected admin functionality/README.md -------------------------------------------------------------------------------- /Access control vulnerabilities/Unprotected admin functionality/main.py: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/elqalaawi/WebSecurity-Academy-with-Python/HEAD/Access control vulnerabilities/Unprotected admin functionality/main.py -------------------------------------------------------------------------------- /Access control vulnerabilities/User ID controlled by request parameter with data leakage in redirect/README.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/elqalaawi/WebSecurity-Academy-with-Python/HEAD/Access control vulnerabilities/User ID controlled by request parameter with data leakage in redirect/README.md -------------------------------------------------------------------------------- /Access control vulnerabilities/User ID controlled by request parameter with data leakage in redirect/main.py: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/elqalaawi/WebSecurity-Academy-with-Python/HEAD/Access control vulnerabilities/User ID controlled by request parameter with data leakage in redirect/main.py -------------------------------------------------------------------------------- /Access control vulnerabilities/User ID controlled by request parameter with password disclosure/README.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/elqalaawi/WebSecurity-Academy-with-Python/HEAD/Access control vulnerabilities/User ID controlled by request parameter with password disclosure/README.md -------------------------------------------------------------------------------- /Access control vulnerabilities/User ID controlled by request parameter with password disclosure/main.py: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/elqalaawi/WebSecurity-Academy-with-Python/HEAD/Access control vulnerabilities/User ID controlled by request parameter with password disclosure/main.py -------------------------------------------------------------------------------- /Access control vulnerabilities/User ID controlled by request parameter, with unpredictable user IDs/README.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/elqalaawi/WebSecurity-Academy-with-Python/HEAD/Access control vulnerabilities/User ID controlled by request parameter, with unpredictable user IDs/README.md -------------------------------------------------------------------------------- /Access control vulnerabilities/User ID controlled by request parameter, with unpredictable user IDs/main.py: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/elqalaawi/WebSecurity-Academy-with-Python/HEAD/Access control vulnerabilities/User ID controlled by request parameter, with unpredictable user IDs/main.py -------------------------------------------------------------------------------- /Access control vulnerabilities/User ID controlled by request parameter/README.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/elqalaawi/WebSecurity-Academy-with-Python/HEAD/Access control vulnerabilities/User ID controlled by request parameter/README.md -------------------------------------------------------------------------------- /Access control vulnerabilities/User ID controlled by request parameter/main.py: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/elqalaawi/WebSecurity-Academy-with-Python/HEAD/Access control vulnerabilities/User ID controlled by request parameter/main.py -------------------------------------------------------------------------------- /Access control vulnerabilities/User role can be modified in user profile/README.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/elqalaawi/WebSecurity-Academy-with-Python/HEAD/Access control vulnerabilities/User role can be modified in user profile/README.md -------------------------------------------------------------------------------- /Access control vulnerabilities/User role can be modified in user profile/main.py: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/elqalaawi/WebSecurity-Academy-with-Python/HEAD/Access control vulnerabilities/User role can be modified in user profile/main.py -------------------------------------------------------------------------------- /Access control vulnerabilities/User role controlled by request parameter/README.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/elqalaawi/WebSecurity-Academy-with-Python/HEAD/Access control vulnerabilities/User role controlled by request parameter/README.md -------------------------------------------------------------------------------- /Access control vulnerabilities/User role controlled by request parameter/main.py: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/elqalaawi/WebSecurity-Academy-with-Python/HEAD/Access control vulnerabilities/User role controlled by request parameter/main.py -------------------------------------------------------------------------------- /Authentication/2FA broken logic/README.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/elqalaawi/WebSecurity-Academy-with-Python/HEAD/Authentication/2FA broken logic/README.md -------------------------------------------------------------------------------- /Authentication/2FA broken logic/main.py: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/elqalaawi/WebSecurity-Academy-with-Python/HEAD/Authentication/2FA broken logic/main.py -------------------------------------------------------------------------------- /Authentication/2FA bypass using a brute-force attack/README.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/elqalaawi/WebSecurity-Academy-with-Python/HEAD/Authentication/2FA bypass using a brute-force attack/README.md -------------------------------------------------------------------------------- /Authentication/2FA bypass using a brute-force attack/main.py: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/elqalaawi/WebSecurity-Academy-with-Python/HEAD/Authentication/2FA bypass using a brute-force attack/main.py -------------------------------------------------------------------------------- /Authentication/2FA simple bypass/README.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/elqalaawi/WebSecurity-Academy-with-Python/HEAD/Authentication/2FA simple bypass/README.md -------------------------------------------------------------------------------- /Authentication/2FA simple bypass/main.py: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/elqalaawi/WebSecurity-Academy-with-Python/HEAD/Authentication/2FA simple bypass/main.py -------------------------------------------------------------------------------- /Authentication/Broken brute-force protection, IP block/README.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/elqalaawi/WebSecurity-Academy-with-Python/HEAD/Authentication/Broken brute-force protection, IP block/README.md -------------------------------------------------------------------------------- /Authentication/Broken brute-force protection, IP block/main.py: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/elqalaawi/WebSecurity-Academy-with-Python/HEAD/Authentication/Broken brute-force protection, IP block/main.py -------------------------------------------------------------------------------- /Authentication/Broken brute-force protection, multiple credentials per request/README.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/elqalaawi/WebSecurity-Academy-with-Python/HEAD/Authentication/Broken brute-force protection, multiple credentials per request/README.md -------------------------------------------------------------------------------- /Authentication/Broken brute-force protection, multiple credentials per request/main.py: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/elqalaawi/WebSecurity-Academy-with-Python/HEAD/Authentication/Broken brute-force protection, multiple credentials per request/main.py -------------------------------------------------------------------------------- /Authentication/Brute-forcing a stay-logged-in cookie/README.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/elqalaawi/WebSecurity-Academy-with-Python/HEAD/Authentication/Brute-forcing a stay-logged-in cookie/README.md -------------------------------------------------------------------------------- /Authentication/Brute-forcing a stay-logged-in cookie/main.py: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/elqalaawi/WebSecurity-Academy-with-Python/HEAD/Authentication/Brute-forcing a stay-logged-in cookie/main.py -------------------------------------------------------------------------------- /Authentication/Offline password cracking/README.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/elqalaawi/WebSecurity-Academy-with-Python/HEAD/Authentication/Offline password cracking/README.md -------------------------------------------------------------------------------- /Authentication/Offline password cracking/main.py: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/elqalaawi/WebSecurity-Academy-with-Python/HEAD/Authentication/Offline password cracking/main.py -------------------------------------------------------------------------------- /Authentication/Password brute-force via password change/README.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/elqalaawi/WebSecurity-Academy-with-Python/HEAD/Authentication/Password brute-force via password change/README.md -------------------------------------------------------------------------------- /Authentication/Password brute-force via password change/main.py: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/elqalaawi/WebSecurity-Academy-with-Python/HEAD/Authentication/Password brute-force via password change/main.py -------------------------------------------------------------------------------- /Authentication/Password reset broken logic/README.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/elqalaawi/WebSecurity-Academy-with-Python/HEAD/Authentication/Password reset broken logic/README.md -------------------------------------------------------------------------------- /Authentication/Password reset broken logic/main.py: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/elqalaawi/WebSecurity-Academy-with-Python/HEAD/Authentication/Password reset broken logic/main.py -------------------------------------------------------------------------------- /Authentication/Password reset poisoning via middleware/README.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/elqalaawi/WebSecurity-Academy-with-Python/HEAD/Authentication/Password reset poisoning via middleware/README.md -------------------------------------------------------------------------------- /Authentication/Password reset poisoning via middleware/main.py: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/elqalaawi/WebSecurity-Academy-with-Python/HEAD/Authentication/Password reset poisoning via middleware/main.py -------------------------------------------------------------------------------- /Authentication/README.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/elqalaawi/WebSecurity-Academy-with-Python/HEAD/Authentication/README.md -------------------------------------------------------------------------------- /Authentication/Username enumeration via account lock/README.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/elqalaawi/WebSecurity-Academy-with-Python/HEAD/Authentication/Username enumeration via account lock/README.md -------------------------------------------------------------------------------- /Authentication/Username enumeration via account lock/main.py: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/elqalaawi/WebSecurity-Academy-with-Python/HEAD/Authentication/Username enumeration via account lock/main.py -------------------------------------------------------------------------------- /Authentication/Username enumeration via different responses/README.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/elqalaawi/WebSecurity-Academy-with-Python/HEAD/Authentication/Username enumeration via different responses/README.md -------------------------------------------------------------------------------- /Authentication/Username enumeration via different responses/main.py: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/elqalaawi/WebSecurity-Academy-with-Python/HEAD/Authentication/Username enumeration via different responses/main.py -------------------------------------------------------------------------------- /Authentication/Username enumeration via response timing/README.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/elqalaawi/WebSecurity-Academy-with-Python/HEAD/Authentication/Username enumeration via response timing/README.md -------------------------------------------------------------------------------- /Authentication/Username enumeration via response timing/main.py: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/elqalaawi/WebSecurity-Academy-with-Python/HEAD/Authentication/Username enumeration via response timing/main.py -------------------------------------------------------------------------------- /Authentication/Username enumeration via subtly different responses/README.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/elqalaawi/WebSecurity-Academy-with-Python/HEAD/Authentication/Username enumeration via subtly different responses/README.md -------------------------------------------------------------------------------- /Authentication/Username enumeration via subtly different responses/main.py: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/elqalaawi/WebSecurity-Academy-with-Python/HEAD/Authentication/Username enumeration via subtly different responses/main.py -------------------------------------------------------------------------------- /Authentication/passwords.txt: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/elqalaawi/WebSecurity-Academy-with-Python/HEAD/Authentication/passwords.txt -------------------------------------------------------------------------------- /Authentication/usernames.txt: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/elqalaawi/WebSecurity-Academy-with-Python/HEAD/Authentication/usernames.txt -------------------------------------------------------------------------------- /Business logic vulnerabilities/Authentication bypass via encryption oracle/README.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/elqalaawi/WebSecurity-Academy-with-Python/HEAD/Business logic vulnerabilities/Authentication bypass via encryption oracle/README.md -------------------------------------------------------------------------------- /Business logic vulnerabilities/Authentication bypass via encryption oracle/main.py: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/elqalaawi/WebSecurity-Academy-with-Python/HEAD/Business logic vulnerabilities/Authentication bypass via encryption oracle/main.py -------------------------------------------------------------------------------- /Business logic vulnerabilities/Authentication bypass via flawed state machine/README.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/elqalaawi/WebSecurity-Academy-with-Python/HEAD/Business logic vulnerabilities/Authentication bypass via flawed state machine/README.md -------------------------------------------------------------------------------- /Business logic vulnerabilities/Authentication bypass via flawed state machine/main.py: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/elqalaawi/WebSecurity-Academy-with-Python/HEAD/Business logic vulnerabilities/Authentication bypass via flawed state machine/main.py -------------------------------------------------------------------------------- /Business logic vulnerabilities/Bypassing access controls using email address parsing discrepancies/README.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/elqalaawi/WebSecurity-Academy-with-Python/HEAD/Business logic vulnerabilities/Bypassing access controls using email address parsing discrepancies/README.md -------------------------------------------------------------------------------- /Business logic vulnerabilities/Bypassing access controls using email address parsing discrepancies/main.py: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/elqalaawi/WebSecurity-Academy-with-Python/HEAD/Business logic vulnerabilities/Bypassing access controls using email address parsing discrepancies/main.py -------------------------------------------------------------------------------- /Business logic vulnerabilities/Excessive trust in client-side controls/README.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/elqalaawi/WebSecurity-Academy-with-Python/HEAD/Business logic vulnerabilities/Excessive trust in client-side controls/README.md -------------------------------------------------------------------------------- /Business logic vulnerabilities/Excessive trust in client-side controls/main.py: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/elqalaawi/WebSecurity-Academy-with-Python/HEAD/Business logic vulnerabilities/Excessive trust in client-side controls/main.py -------------------------------------------------------------------------------- /Business logic vulnerabilities/Flawed enforcement of business rules/README.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/elqalaawi/WebSecurity-Academy-with-Python/HEAD/Business logic vulnerabilities/Flawed enforcement of business rules/README.md -------------------------------------------------------------------------------- /Business logic vulnerabilities/Flawed enforcement of business rules/main.py: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/elqalaawi/WebSecurity-Academy-with-Python/HEAD/Business logic vulnerabilities/Flawed enforcement of business rules/main.py -------------------------------------------------------------------------------- /Business logic vulnerabilities/High-level logic vulnerability/README.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/elqalaawi/WebSecurity-Academy-with-Python/HEAD/Business logic vulnerabilities/High-level logic vulnerability/README.md -------------------------------------------------------------------------------- /Business logic vulnerabilities/High-level logic vulnerability/main.py: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/elqalaawi/WebSecurity-Academy-with-Python/HEAD/Business logic vulnerabilities/High-level logic vulnerability/main.py -------------------------------------------------------------------------------- /Business logic vulnerabilities/Inconsistent handling of exceptional input/README.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/elqalaawi/WebSecurity-Academy-with-Python/HEAD/Business logic vulnerabilities/Inconsistent handling of exceptional input/README.md -------------------------------------------------------------------------------- /Business logic vulnerabilities/Inconsistent handling of exceptional input/main.py: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/elqalaawi/WebSecurity-Academy-with-Python/HEAD/Business logic vulnerabilities/Inconsistent handling of exceptional input/main.py -------------------------------------------------------------------------------- /Business logic vulnerabilities/Inconsistent security controls/README.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/elqalaawi/WebSecurity-Academy-with-Python/HEAD/Business logic vulnerabilities/Inconsistent security controls/README.md -------------------------------------------------------------------------------- /Business logic vulnerabilities/Inconsistent security controls/main.py: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/elqalaawi/WebSecurity-Academy-with-Python/HEAD/Business logic vulnerabilities/Inconsistent security controls/main.py -------------------------------------------------------------------------------- /Business logic vulnerabilities/Infinite money logic flaw/README.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/elqalaawi/WebSecurity-Academy-with-Python/HEAD/Business logic vulnerabilities/Infinite money logic flaw/README.md -------------------------------------------------------------------------------- /Business logic vulnerabilities/Infinite money logic flaw/main.py: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/elqalaawi/WebSecurity-Academy-with-Python/HEAD/Business logic vulnerabilities/Infinite money logic flaw/main.py -------------------------------------------------------------------------------- /Business logic vulnerabilities/Insufficient workflow validation/README.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/elqalaawi/WebSecurity-Academy-with-Python/HEAD/Business logic vulnerabilities/Insufficient workflow validation/README.md -------------------------------------------------------------------------------- /Business logic vulnerabilities/Insufficient workflow validation/main.py: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/elqalaawi/WebSecurity-Academy-with-Python/HEAD/Business logic vulnerabilities/Insufficient workflow validation/main.py -------------------------------------------------------------------------------- /Business logic vulnerabilities/README.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/elqalaawi/WebSecurity-Academy-with-Python/HEAD/Business logic vulnerabilities/README.md -------------------------------------------------------------------------------- /Business logic vulnerabilities/Weak isolation on dual-use endpoint/README.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/elqalaawi/WebSecurity-Academy-with-Python/HEAD/Business logic vulnerabilities/Weak isolation on dual-use endpoint/README.md -------------------------------------------------------------------------------- /Business logic vulnerabilities/Weak isolation on dual-use endpoint/main.py: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/elqalaawi/WebSecurity-Academy-with-Python/HEAD/Business logic vulnerabilities/Weak isolation on dual-use endpoint/main.py -------------------------------------------------------------------------------- /Clickjacking/Basic clickjacking with CSRF token protection/README.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/elqalaawi/WebSecurity-Academy-with-Python/HEAD/Clickjacking/Basic clickjacking with CSRF token protection/README.md -------------------------------------------------------------------------------- /Clickjacking/Basic clickjacking with CSRF token protection/main.py: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/elqalaawi/WebSecurity-Academy-with-Python/HEAD/Clickjacking/Basic clickjacking with CSRF token protection/main.py -------------------------------------------------------------------------------- /Clickjacking/Clickjacking with a frame buster script/README.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/elqalaawi/WebSecurity-Academy-with-Python/HEAD/Clickjacking/Clickjacking with a frame buster script/README.md -------------------------------------------------------------------------------- /Clickjacking/Clickjacking with a frame buster script/main.py: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/elqalaawi/WebSecurity-Academy-with-Python/HEAD/Clickjacking/Clickjacking with a frame buster script/main.py -------------------------------------------------------------------------------- /Clickjacking/Clickjacking with form input data prefilled from a URL parameter/README.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/elqalaawi/WebSecurity-Academy-with-Python/HEAD/Clickjacking/Clickjacking with form input data prefilled from a URL parameter/README.md -------------------------------------------------------------------------------- /Clickjacking/Clickjacking with form input data prefilled from a URL parameter/main.py: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/elqalaawi/WebSecurity-Academy-with-Python/HEAD/Clickjacking/Clickjacking with form input data prefilled from a URL parameter/main.py -------------------------------------------------------------------------------- /Clickjacking/Exploiting clickjacking vulnerability to trigger DOM-based XSS/README.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/elqalaawi/WebSecurity-Academy-with-Python/HEAD/Clickjacking/Exploiting clickjacking vulnerability to trigger DOM-based XSS/README.md -------------------------------------------------------------------------------- /Clickjacking/Exploiting clickjacking vulnerability to trigger DOM-based XSS/main.py: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/elqalaawi/WebSecurity-Academy-with-Python/HEAD/Clickjacking/Exploiting clickjacking vulnerability to trigger DOM-based XSS/main.py -------------------------------------------------------------------------------- /Clickjacking/Multistep clickjacking/README.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/elqalaawi/WebSecurity-Academy-with-Python/HEAD/Clickjacking/Multistep clickjacking/README.md -------------------------------------------------------------------------------- /Clickjacking/Multistep clickjacking/main.py: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/elqalaawi/WebSecurity-Academy-with-Python/HEAD/Clickjacking/Multistep clickjacking/main.py -------------------------------------------------------------------------------- /Clickjacking/README.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/elqalaawi/WebSecurity-Academy-with-Python/HEAD/Clickjacking/README.md -------------------------------------------------------------------------------- /Cross-origin resource sharing (CORS)/CORS vulnerability with basic origin reflection/README.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/elqalaawi/WebSecurity-Academy-with-Python/HEAD/Cross-origin resource sharing (CORS)/CORS vulnerability with basic origin reflection/README.md -------------------------------------------------------------------------------- /Cross-origin resource sharing (CORS)/CORS vulnerability with basic origin reflection/main.py: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/elqalaawi/WebSecurity-Academy-with-Python/HEAD/Cross-origin resource sharing (CORS)/CORS vulnerability with basic origin reflection/main.py -------------------------------------------------------------------------------- /Cross-origin resource sharing (CORS)/CORS vulnerability with trusted insecure protocols/README.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/elqalaawi/WebSecurity-Academy-with-Python/HEAD/Cross-origin resource sharing (CORS)/CORS vulnerability with trusted insecure protocols/README.md -------------------------------------------------------------------------------- /Cross-origin resource sharing (CORS)/CORS vulnerability with trusted insecure protocols/main.py: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/elqalaawi/WebSecurity-Academy-with-Python/HEAD/Cross-origin resource sharing (CORS)/CORS vulnerability with trusted insecure protocols/main.py -------------------------------------------------------------------------------- /Cross-origin resource sharing (CORS)/CORS vulnerability with trusted null origin/README.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/elqalaawi/WebSecurity-Academy-with-Python/HEAD/Cross-origin resource sharing (CORS)/CORS vulnerability with trusted null origin/README.md -------------------------------------------------------------------------------- /Cross-origin resource sharing (CORS)/CORS vulnerability with trusted null origin/main.py: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/elqalaawi/WebSecurity-Academy-with-Python/HEAD/Cross-origin resource sharing (CORS)/CORS vulnerability with trusted null origin/main.py -------------------------------------------------------------------------------- /Cross-origin resource sharing (CORS)/README.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/elqalaawi/WebSecurity-Academy-with-Python/HEAD/Cross-origin resource sharing (CORS)/README.md -------------------------------------------------------------------------------- /Cross-site request forgery (CSRF)/CSRF vulnerability with no defenses/README.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/elqalaawi/WebSecurity-Academy-with-Python/HEAD/Cross-site request forgery (CSRF)/CSRF vulnerability with no defenses/README.md -------------------------------------------------------------------------------- /Cross-site request forgery (CSRF)/CSRF vulnerability with no defenses/main.py: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/elqalaawi/WebSecurity-Academy-with-Python/HEAD/Cross-site request forgery (CSRF)/CSRF vulnerability with no defenses/main.py -------------------------------------------------------------------------------- /Cross-site request forgery (CSRF)/CSRF where Referer validation depends on header being present/README.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/elqalaawi/WebSecurity-Academy-with-Python/HEAD/Cross-site request forgery (CSRF)/CSRF where Referer validation depends on header being present/README.md -------------------------------------------------------------------------------- /Cross-site request forgery (CSRF)/CSRF where Referer validation depends on header being present/main.py: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/elqalaawi/WebSecurity-Academy-with-Python/HEAD/Cross-site request forgery (CSRF)/CSRF where Referer validation depends on header being present/main.py -------------------------------------------------------------------------------- /Cross-site request forgery (CSRF)/CSRF where token is duplicated in cookie/README.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/elqalaawi/WebSecurity-Academy-with-Python/HEAD/Cross-site request forgery (CSRF)/CSRF where token is duplicated in cookie/README.md -------------------------------------------------------------------------------- /Cross-site request forgery (CSRF)/CSRF where token is duplicated in cookie/main.py: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/elqalaawi/WebSecurity-Academy-with-Python/HEAD/Cross-site request forgery (CSRF)/CSRF where token is duplicated in cookie/main.py -------------------------------------------------------------------------------- /Cross-site request forgery (CSRF)/CSRF where token is not tied to user session/README.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/elqalaawi/WebSecurity-Academy-with-Python/HEAD/Cross-site request forgery (CSRF)/CSRF where token is not tied to user session/README.md -------------------------------------------------------------------------------- /Cross-site request forgery (CSRF)/CSRF where token is not tied to user session/main.py: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/elqalaawi/WebSecurity-Academy-with-Python/HEAD/Cross-site request forgery (CSRF)/CSRF where token is not tied to user session/main.py -------------------------------------------------------------------------------- /Cross-site request forgery (CSRF)/CSRF where token is tied to non-session cookie/README.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/elqalaawi/WebSecurity-Academy-with-Python/HEAD/Cross-site request forgery (CSRF)/CSRF where token is tied to non-session cookie/README.md -------------------------------------------------------------------------------- /Cross-site request forgery (CSRF)/CSRF where token is tied to non-session cookie/main.py: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/elqalaawi/WebSecurity-Academy-with-Python/HEAD/Cross-site request forgery (CSRF)/CSRF where token is tied to non-session cookie/main.py -------------------------------------------------------------------------------- /Cross-site request forgery (CSRF)/CSRF where token validation depends on request method/README.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/elqalaawi/WebSecurity-Academy-with-Python/HEAD/Cross-site request forgery (CSRF)/CSRF where token validation depends on request method/README.md -------------------------------------------------------------------------------- /Cross-site request forgery (CSRF)/CSRF where token validation depends on request method/main.py: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/elqalaawi/WebSecurity-Academy-with-Python/HEAD/Cross-site request forgery (CSRF)/CSRF where token validation depends on request method/main.py -------------------------------------------------------------------------------- /Cross-site request forgery (CSRF)/CSRF where token validation depends on token being present/README.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/elqalaawi/WebSecurity-Academy-with-Python/HEAD/Cross-site request forgery (CSRF)/CSRF where token validation depends on token being present/README.md -------------------------------------------------------------------------------- /Cross-site request forgery (CSRF)/CSRF where token validation depends on token being present/main.py: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/elqalaawi/WebSecurity-Academy-with-Python/HEAD/Cross-site request forgery (CSRF)/CSRF where token validation depends on token being present/main.py -------------------------------------------------------------------------------- /Cross-site request forgery (CSRF)/CSRF with broken Referer validation/README.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/elqalaawi/WebSecurity-Academy-with-Python/HEAD/Cross-site request forgery (CSRF)/CSRF with broken Referer validation/README.md -------------------------------------------------------------------------------- /Cross-site request forgery (CSRF)/CSRF with broken Referer validation/main.py: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/elqalaawi/WebSecurity-Academy-with-Python/HEAD/Cross-site request forgery (CSRF)/CSRF with broken Referer validation/main.py -------------------------------------------------------------------------------- /Cross-site request forgery (CSRF)/README.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/elqalaawi/WebSecurity-Academy-with-Python/HEAD/Cross-site request forgery (CSRF)/README.md -------------------------------------------------------------------------------- /Cross-site request forgery (CSRF)/SameSite Lax bypass via cookie refresh/README.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/elqalaawi/WebSecurity-Academy-with-Python/HEAD/Cross-site request forgery (CSRF)/SameSite Lax bypass via cookie refresh/README.md -------------------------------------------------------------------------------- /Cross-site request forgery (CSRF)/SameSite Lax bypass via cookie refresh/main.py: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/elqalaawi/WebSecurity-Academy-with-Python/HEAD/Cross-site request forgery (CSRF)/SameSite Lax bypass via cookie refresh/main.py -------------------------------------------------------------------------------- /Cross-site request forgery (CSRF)/SameSite Lax bypass via method override/README.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/elqalaawi/WebSecurity-Academy-with-Python/HEAD/Cross-site request forgery (CSRF)/SameSite Lax bypass via method override/README.md -------------------------------------------------------------------------------- /Cross-site request forgery (CSRF)/SameSite Lax bypass via method override/main.py: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/elqalaawi/WebSecurity-Academy-with-Python/HEAD/Cross-site request forgery (CSRF)/SameSite Lax bypass via method override/main.py -------------------------------------------------------------------------------- /Cross-site request forgery (CSRF)/SameSite Strict bypass via client-side redirect/README.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/elqalaawi/WebSecurity-Academy-with-Python/HEAD/Cross-site request forgery (CSRF)/SameSite Strict bypass via client-side redirect/README.md -------------------------------------------------------------------------------- /Cross-site request forgery (CSRF)/SameSite Strict bypass via client-side redirect/main.py: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/elqalaawi/WebSecurity-Academy-with-Python/HEAD/Cross-site request forgery (CSRF)/SameSite Strict bypass via client-side redirect/main.py -------------------------------------------------------------------------------- /Cross-site scripting (XSS)/DOM XSS in AngularJS expression with angle brackets and double quotes HTML-encoded/README.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/elqalaawi/WebSecurity-Academy-with-Python/HEAD/Cross-site scripting (XSS)/DOM XSS in AngularJS expression with angle brackets and double quotes HTML-encoded/README.md -------------------------------------------------------------------------------- /Cross-site scripting (XSS)/DOM XSS in AngularJS expression with angle brackets and double quotes HTML-encoded/main.py: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/elqalaawi/WebSecurity-Academy-with-Python/HEAD/Cross-site scripting (XSS)/DOM XSS in AngularJS expression with angle brackets and double quotes HTML-encoded/main.py -------------------------------------------------------------------------------- /Cross-site scripting (XSS)/DOM XSS in document.write sink using source location.search inside a select element/README.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/elqalaawi/WebSecurity-Academy-with-Python/HEAD/Cross-site scripting (XSS)/DOM XSS in document.write sink using source location.search inside a select element/README.md -------------------------------------------------------------------------------- /Cross-site scripting (XSS)/DOM XSS in document.write sink using source location.search inside a select element/main.py: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/elqalaawi/WebSecurity-Academy-with-Python/HEAD/Cross-site scripting (XSS)/DOM XSS in document.write sink using source location.search inside a select element/main.py -------------------------------------------------------------------------------- /Cross-site scripting (XSS)/DOM XSS in document.write sink using source location.search/README.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/elqalaawi/WebSecurity-Academy-with-Python/HEAD/Cross-site scripting (XSS)/DOM XSS in document.write sink using source location.search/README.md -------------------------------------------------------------------------------- /Cross-site scripting (XSS)/DOM XSS in document.write sink using source location.search/main.py: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/elqalaawi/WebSecurity-Academy-with-Python/HEAD/Cross-site scripting (XSS)/DOM XSS in document.write sink using source location.search/main.py -------------------------------------------------------------------------------- /Cross-site scripting (XSS)/DOM XSS in innerHTML sink using source location.search/README.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/elqalaawi/WebSecurity-Academy-with-Python/HEAD/Cross-site scripting (XSS)/DOM XSS in innerHTML sink using source location.search/README.md -------------------------------------------------------------------------------- /Cross-site scripting (XSS)/DOM XSS in innerHTML sink using source location.search/main.py: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/elqalaawi/WebSecurity-Academy-with-Python/HEAD/Cross-site scripting (XSS)/DOM XSS in innerHTML sink using source location.search/main.py -------------------------------------------------------------------------------- /Cross-site scripting (XSS)/DOM XSS in jQuery anchor href attribute sink using location.search source/README.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/elqalaawi/WebSecurity-Academy-with-Python/HEAD/Cross-site scripting (XSS)/DOM XSS in jQuery anchor href attribute sink using location.search source/README.md -------------------------------------------------------------------------------- /Cross-site scripting (XSS)/DOM XSS in jQuery anchor href attribute sink using location.search source/main.py: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/elqalaawi/WebSecurity-Academy-with-Python/HEAD/Cross-site scripting (XSS)/DOM XSS in jQuery anchor href attribute sink using location.search source/main.py -------------------------------------------------------------------------------- /Cross-site scripting (XSS)/DOM XSS in jQuery selector sink using a hashchange event/README.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/elqalaawi/WebSecurity-Academy-with-Python/HEAD/Cross-site scripting (XSS)/DOM XSS in jQuery selector sink using a hashchange event/README.md -------------------------------------------------------------------------------- /Cross-site scripting (XSS)/DOM XSS in jQuery selector sink using a hashchange event/main.py: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/elqalaawi/WebSecurity-Academy-with-Python/HEAD/Cross-site scripting (XSS)/DOM XSS in jQuery selector sink using a hashchange event/main.py -------------------------------------------------------------------------------- /Cross-site scripting (XSS)/Exploiting XSS to perform CSRF/README.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/elqalaawi/WebSecurity-Academy-with-Python/HEAD/Cross-site scripting (XSS)/Exploiting XSS to perform CSRF/README.md -------------------------------------------------------------------------------- /Cross-site scripting (XSS)/Exploiting XSS to perform CSRF/main.py: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/elqalaawi/WebSecurity-Academy-with-Python/HEAD/Cross-site scripting (XSS)/Exploiting XSS to perform CSRF/main.py -------------------------------------------------------------------------------- /Cross-site scripting (XSS)/Exploiting cross-site scripting to capture passwords/README.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/elqalaawi/WebSecurity-Academy-with-Python/HEAD/Cross-site scripting (XSS)/Exploiting cross-site scripting to capture passwords/README.md -------------------------------------------------------------------------------- /Cross-site scripting (XSS)/Exploiting cross-site scripting to capture passwords/main.py: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/elqalaawi/WebSecurity-Academy-with-Python/HEAD/Cross-site scripting (XSS)/Exploiting cross-site scripting to capture passwords/main.py -------------------------------------------------------------------------------- /Cross-site scripting (XSS)/Exploiting cross-site scripting to steal cookies/README.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/elqalaawi/WebSecurity-Academy-with-Python/HEAD/Cross-site scripting (XSS)/Exploiting cross-site scripting to steal cookies/README.md -------------------------------------------------------------------------------- /Cross-site scripting (XSS)/Exploiting cross-site scripting to steal cookies/main.py: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/elqalaawi/WebSecurity-Academy-with-Python/HEAD/Cross-site scripting (XSS)/Exploiting cross-site scripting to steal cookies/main.py -------------------------------------------------------------------------------- /Cross-site scripting (XSS)/README.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/elqalaawi/WebSecurity-Academy-with-Python/HEAD/Cross-site scripting (XSS)/README.md -------------------------------------------------------------------------------- /Cross-site scripting (XSS)/Reflected DOM XSS/README.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/elqalaawi/WebSecurity-Academy-with-Python/HEAD/Cross-site scripting (XSS)/Reflected DOM XSS/README.md -------------------------------------------------------------------------------- /Cross-site scripting (XSS)/Reflected DOM XSS/main.py: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/elqalaawi/WebSecurity-Academy-with-Python/HEAD/Cross-site scripting (XSS)/Reflected DOM XSS/main.py -------------------------------------------------------------------------------- /Cross-site scripting (XSS)/Reflected XSS in canonical link tag/README.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/elqalaawi/WebSecurity-Academy-with-Python/HEAD/Cross-site scripting (XSS)/Reflected XSS in canonical link tag/README.md -------------------------------------------------------------------------------- /Cross-site scripting (XSS)/Reflected XSS in canonical link tag/main.py: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/elqalaawi/WebSecurity-Academy-with-Python/HEAD/Cross-site scripting (XSS)/Reflected XSS in canonical link tag/main.py -------------------------------------------------------------------------------- /Cross-site scripting (XSS)/Reflected XSS into HTML context with all tags blocked except custom ones/README.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/elqalaawi/WebSecurity-Academy-with-Python/HEAD/Cross-site scripting (XSS)/Reflected XSS into HTML context with all tags blocked except custom ones/README.md -------------------------------------------------------------------------------- /Cross-site scripting (XSS)/Reflected XSS into HTML context with all tags blocked except custom ones/main.py: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/elqalaawi/WebSecurity-Academy-with-Python/HEAD/Cross-site scripting (XSS)/Reflected XSS into HTML context with all tags blocked except custom ones/main.py -------------------------------------------------------------------------------- /Cross-site scripting (XSS)/Reflected XSS into HTML context with most tags and attributes blocked/README.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/elqalaawi/WebSecurity-Academy-with-Python/HEAD/Cross-site scripting (XSS)/Reflected XSS into HTML context with most tags and attributes blocked/README.md -------------------------------------------------------------------------------- /Cross-site scripting (XSS)/Reflected XSS into HTML context with most tags and attributes blocked/main.py: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/elqalaawi/WebSecurity-Academy-with-Python/HEAD/Cross-site scripting (XSS)/Reflected XSS into HTML context with most tags and attributes blocked/main.py -------------------------------------------------------------------------------- /Cross-site scripting (XSS)/Reflected XSS into HTML context with nothing encoded/README.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/elqalaawi/WebSecurity-Academy-with-Python/HEAD/Cross-site scripting (XSS)/Reflected XSS into HTML context with nothing encoded/README.md -------------------------------------------------------------------------------- /Cross-site scripting (XSS)/Reflected XSS into HTML context with nothing encoded/main.py: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/elqalaawi/WebSecurity-Academy-with-Python/HEAD/Cross-site scripting (XSS)/Reflected XSS into HTML context with nothing encoded/main.py -------------------------------------------------------------------------------- /Cross-site scripting (XSS)/Reflected XSS into a JavaScript string with angle brackets HTML encoded/README.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/elqalaawi/WebSecurity-Academy-with-Python/HEAD/Cross-site scripting (XSS)/Reflected XSS into a JavaScript string with angle brackets HTML encoded/README.md -------------------------------------------------------------------------------- /Cross-site scripting (XSS)/Reflected XSS into a JavaScript string with angle brackets HTML encoded/main.py: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/elqalaawi/WebSecurity-Academy-with-Python/HEAD/Cross-site scripting (XSS)/Reflected XSS into a JavaScript string with angle brackets HTML encoded/main.py -------------------------------------------------------------------------------- /Cross-site scripting (XSS)/Reflected XSS into a JavaScript string with angle brackets and double quotes HTML-encoded and single quotes escaped/README.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/elqalaawi/WebSecurity-Academy-with-Python/HEAD/Cross-site scripting (XSS)/Reflected XSS into a JavaScript string with angle brackets and double quotes HTML-encoded and single quotes escaped/README.md -------------------------------------------------------------------------------- /Cross-site scripting (XSS)/Reflected XSS into a JavaScript string with angle brackets and double quotes HTML-encoded and single quotes escaped/main.py: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/elqalaawi/WebSecurity-Academy-with-Python/HEAD/Cross-site scripting (XSS)/Reflected XSS into a JavaScript string with angle brackets and double quotes HTML-encoded and single quotes escaped/main.py -------------------------------------------------------------------------------- /Cross-site scripting (XSS)/Reflected XSS into a JavaScript string with single quote and backslash escaped/README.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/elqalaawi/WebSecurity-Academy-with-Python/HEAD/Cross-site scripting (XSS)/Reflected XSS into a JavaScript string with single quote and backslash escaped/README.md -------------------------------------------------------------------------------- /Cross-site scripting (XSS)/Reflected XSS into a JavaScript string with single quote and backslash escaped/main.py: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/elqalaawi/WebSecurity-Academy-with-Python/HEAD/Cross-site scripting (XSS)/Reflected XSS into a JavaScript string with single quote and backslash escaped/main.py -------------------------------------------------------------------------------- /Cross-site scripting (XSS)/Reflected XSS into a template literal with angle brackets, single, double quotes, backslash and backticks Unicode-escaped/README.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/elqalaawi/WebSecurity-Academy-with-Python/HEAD/Cross-site scripting (XSS)/Reflected XSS into a template literal with angle brackets, single, double quotes, backslash and backticks Unicode-escaped/README.md -------------------------------------------------------------------------------- /Cross-site scripting (XSS)/Reflected XSS into a template literal with angle brackets, single, double quotes, backslash and backticks Unicode-escaped/main.py: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/elqalaawi/WebSecurity-Academy-with-Python/HEAD/Cross-site scripting (XSS)/Reflected XSS into a template literal with angle brackets, single, double quotes, backslash and backticks Unicode-escaped/main.py -------------------------------------------------------------------------------- /Cross-site scripting (XSS)/Reflected XSS into attribute with angle brackets HTML-encoded/README.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/elqalaawi/WebSecurity-Academy-with-Python/HEAD/Cross-site scripting (XSS)/Reflected XSS into attribute with angle brackets HTML-encoded/README.md -------------------------------------------------------------------------------- /Cross-site scripting (XSS)/Reflected XSS into attribute with angle brackets HTML-encoded/main.py: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/elqalaawi/WebSecurity-Academy-with-Python/HEAD/Cross-site scripting (XSS)/Reflected XSS into attribute with angle brackets HTML-encoded/main.py -------------------------------------------------------------------------------- /Cross-site scripting (XSS)/Reflected XSS with some SVG markup allowed/README.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/elqalaawi/WebSecurity-Academy-with-Python/HEAD/Cross-site scripting (XSS)/Reflected XSS with some SVG markup allowed/README.md -------------------------------------------------------------------------------- /Cross-site scripting (XSS)/Reflected XSS with some SVG markup allowed/main.py: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/elqalaawi/WebSecurity-Academy-with-Python/HEAD/Cross-site scripting (XSS)/Reflected XSS with some SVG markup allowed/main.py -------------------------------------------------------------------------------- /Cross-site scripting (XSS)/Stored DOM XSS/README.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/elqalaawi/WebSecurity-Academy-with-Python/HEAD/Cross-site scripting (XSS)/Stored DOM XSS/README.md -------------------------------------------------------------------------------- /Cross-site scripting (XSS)/Stored DOM XSS/main.py: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/elqalaawi/WebSecurity-Academy-with-Python/HEAD/Cross-site scripting (XSS)/Stored DOM XSS/main.py -------------------------------------------------------------------------------- /Cross-site scripting (XSS)/Stored XSS into HTML context with nothing encoded/README.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/elqalaawi/WebSecurity-Academy-with-Python/HEAD/Cross-site scripting (XSS)/Stored XSS into HTML context with nothing encoded/README.md -------------------------------------------------------------------------------- /Cross-site scripting (XSS)/Stored XSS into HTML context with nothing encoded/main.py: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/elqalaawi/WebSecurity-Academy-with-Python/HEAD/Cross-site scripting (XSS)/Stored XSS into HTML context with nothing encoded/main.py -------------------------------------------------------------------------------- /Cross-site scripting (XSS)/Stored XSS into anchor href attribute with double quotes HTML-encoded/README.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/elqalaawi/WebSecurity-Academy-with-Python/HEAD/Cross-site scripting (XSS)/Stored XSS into anchor href attribute with double quotes HTML-encoded/README.md -------------------------------------------------------------------------------- /Cross-site scripting (XSS)/Stored XSS into anchor href attribute with double quotes HTML-encoded/main.py: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/elqalaawi/WebSecurity-Academy-with-Python/HEAD/Cross-site scripting (XSS)/Stored XSS into anchor href attribute with double quotes HTML-encoded/main.py -------------------------------------------------------------------------------- /Cross-site scripting (XSS)/Stored XSS into onclick event with angle brackets and double quotes HTML-encoded and single quotes and backslash escaped/README.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/elqalaawi/WebSecurity-Academy-with-Python/HEAD/Cross-site scripting (XSS)/Stored XSS into onclick event with angle brackets and double quotes HTML-encoded and single quotes and backslash escaped/README.md -------------------------------------------------------------------------------- /Cross-site scripting (XSS)/Stored XSS into onclick event with angle brackets and double quotes HTML-encoded and single quotes and backslash escaped/main.py: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/elqalaawi/WebSecurity-Academy-with-Python/HEAD/Cross-site scripting (XSS)/Stored XSS into onclick event with angle brackets and double quotes HTML-encoded and single quotes and backslash escaped/main.py -------------------------------------------------------------------------------- /DOM-based vulnerabilities/DOM XSS using web messages and JSON.parse/README.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/elqalaawi/WebSecurity-Academy-with-Python/HEAD/DOM-based vulnerabilities/DOM XSS using web messages and JSON.parse/README.md -------------------------------------------------------------------------------- /DOM-based vulnerabilities/DOM XSS using web messages and JSON.parse/main.py: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/elqalaawi/WebSecurity-Academy-with-Python/HEAD/DOM-based vulnerabilities/DOM XSS using web messages and JSON.parse/main.py -------------------------------------------------------------------------------- /DOM-based vulnerabilities/DOM XSS using web messages and a JavaScript URL/README.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/elqalaawi/WebSecurity-Academy-with-Python/HEAD/DOM-based vulnerabilities/DOM XSS using web messages and a JavaScript URL/README.md -------------------------------------------------------------------------------- /DOM-based vulnerabilities/DOM XSS using web messages and a JavaScript URL/main.py: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/elqalaawi/WebSecurity-Academy-with-Python/HEAD/DOM-based vulnerabilities/DOM XSS using web messages and a JavaScript URL/main.py -------------------------------------------------------------------------------- /DOM-based vulnerabilities/DOM XSS using web messages/README.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/elqalaawi/WebSecurity-Academy-with-Python/HEAD/DOM-based vulnerabilities/DOM XSS using web messages/README.md -------------------------------------------------------------------------------- /DOM-based vulnerabilities/DOM XSS using web messages/main.py: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/elqalaawi/WebSecurity-Academy-with-Python/HEAD/DOM-based vulnerabilities/DOM XSS using web messages/main.py -------------------------------------------------------------------------------- /DOM-based vulnerabilities/DOM-based cookie manipulation/README.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/elqalaawi/WebSecurity-Academy-with-Python/HEAD/DOM-based vulnerabilities/DOM-based cookie manipulation/README.md -------------------------------------------------------------------------------- /DOM-based vulnerabilities/DOM-based cookie manipulation/main.py: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/elqalaawi/WebSecurity-Academy-with-Python/HEAD/DOM-based vulnerabilities/DOM-based cookie manipulation/main.py -------------------------------------------------------------------------------- /DOM-based vulnerabilities/DOM-based open redirection/README.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/elqalaawi/WebSecurity-Academy-with-Python/HEAD/DOM-based vulnerabilities/DOM-based open redirection/README.md -------------------------------------------------------------------------------- /DOM-based vulnerabilities/DOM-based open redirection/main.py: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/elqalaawi/WebSecurity-Academy-with-Python/HEAD/DOM-based vulnerabilities/DOM-based open redirection/main.py -------------------------------------------------------------------------------- /DOM-based vulnerabilities/README.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/elqalaawi/WebSecurity-Academy-with-Python/HEAD/DOM-based vulnerabilities/README.md -------------------------------------------------------------------------------- /File upload vulnerabilities/README.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/elqalaawi/WebSecurity-Academy-with-Python/HEAD/File upload vulnerabilities/README.md -------------------------------------------------------------------------------- /File upload vulnerabilities/Remote code execution via polyglot web shell upload/README.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/elqalaawi/WebSecurity-Academy-with-Python/HEAD/File upload vulnerabilities/Remote code execution via polyglot web shell upload/README.md -------------------------------------------------------------------------------- /File upload vulnerabilities/Remote code execution via polyglot web shell upload/main.py: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/elqalaawi/WebSecurity-Academy-with-Python/HEAD/File upload vulnerabilities/Remote code execution via polyglot web shell upload/main.py -------------------------------------------------------------------------------- /File upload vulnerabilities/Remote code execution via polyglot web shell upload/white.jpg: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/elqalaawi/WebSecurity-Academy-with-Python/HEAD/File upload vulnerabilities/Remote code execution via polyglot web shell upload/white.jpg -------------------------------------------------------------------------------- /File upload vulnerabilities/Remote code execution via web shell upload/README.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/elqalaawi/WebSecurity-Academy-with-Python/HEAD/File upload vulnerabilities/Remote code execution via web shell upload/README.md -------------------------------------------------------------------------------- /File upload vulnerabilities/Remote code execution via web shell upload/main.py: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/elqalaawi/WebSecurity-Academy-with-Python/HEAD/File upload vulnerabilities/Remote code execution via web shell upload/main.py -------------------------------------------------------------------------------- /File upload vulnerabilities/Web shell upload via Content-Type restriction bypass/README.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/elqalaawi/WebSecurity-Academy-with-Python/HEAD/File upload vulnerabilities/Web shell upload via Content-Type restriction bypass/README.md -------------------------------------------------------------------------------- /File upload vulnerabilities/Web shell upload via Content-Type restriction bypass/main.py: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/elqalaawi/WebSecurity-Academy-with-Python/HEAD/File upload vulnerabilities/Web shell upload via Content-Type restriction bypass/main.py -------------------------------------------------------------------------------- /File upload vulnerabilities/Web shell upload via extension blacklist bypass/README.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/elqalaawi/WebSecurity-Academy-with-Python/HEAD/File upload vulnerabilities/Web shell upload via extension blacklist bypass/README.md -------------------------------------------------------------------------------- /File upload vulnerabilities/Web shell upload via extension blacklist bypass/main.py: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/elqalaawi/WebSecurity-Academy-with-Python/HEAD/File upload vulnerabilities/Web shell upload via extension blacklist bypass/main.py -------------------------------------------------------------------------------- /File upload vulnerabilities/Web shell upload via obfuscated file extension/README.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/elqalaawi/WebSecurity-Academy-with-Python/HEAD/File upload vulnerabilities/Web shell upload via obfuscated file extension/README.md -------------------------------------------------------------------------------- /File upload vulnerabilities/Web shell upload via obfuscated file extension/main.py: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/elqalaawi/WebSecurity-Academy-with-Python/HEAD/File upload vulnerabilities/Web shell upload via obfuscated file extension/main.py -------------------------------------------------------------------------------- /File upload vulnerabilities/Web shell upload via path traversal/README.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/elqalaawi/WebSecurity-Academy-with-Python/HEAD/File upload vulnerabilities/Web shell upload via path traversal/README.md -------------------------------------------------------------------------------- /File upload vulnerabilities/Web shell upload via path traversal/main.py: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/elqalaawi/WebSecurity-Academy-with-Python/HEAD/File upload vulnerabilities/Web shell upload via path traversal/main.py -------------------------------------------------------------------------------- /File upload vulnerabilities/Web shell upload via race condition/README.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/elqalaawi/WebSecurity-Academy-with-Python/HEAD/File upload vulnerabilities/Web shell upload via race condition/README.md -------------------------------------------------------------------------------- /File upload vulnerabilities/Web shell upload via race condition/main.py: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/elqalaawi/WebSecurity-Academy-with-Python/HEAD/File upload vulnerabilities/Web shell upload via race condition/main.py -------------------------------------------------------------------------------- /GraphQL API vulnerabilities/Accessing private GraphQL posts/README.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/elqalaawi/WebSecurity-Academy-with-Python/HEAD/GraphQL API vulnerabilities/Accessing private GraphQL posts/README.md -------------------------------------------------------------------------------- /GraphQL API vulnerabilities/Accessing private GraphQL posts/main.py: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/elqalaawi/WebSecurity-Academy-with-Python/HEAD/GraphQL API vulnerabilities/Accessing private GraphQL posts/main.py -------------------------------------------------------------------------------- /GraphQL API vulnerabilities/Accidental exposure of private GraphQL fields/README.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/elqalaawi/WebSecurity-Academy-with-Python/HEAD/GraphQL API vulnerabilities/Accidental exposure of private GraphQL fields/README.md -------------------------------------------------------------------------------- /GraphQL API vulnerabilities/Accidental exposure of private GraphQL fields/main.py: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/elqalaawi/WebSecurity-Academy-with-Python/HEAD/GraphQL API vulnerabilities/Accidental exposure of private GraphQL fields/main.py -------------------------------------------------------------------------------- /GraphQL API vulnerabilities/Bypassing GraphQL brute force protections/README.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/elqalaawi/WebSecurity-Academy-with-Python/HEAD/GraphQL API vulnerabilities/Bypassing GraphQL brute force protections/README.md -------------------------------------------------------------------------------- /GraphQL API vulnerabilities/Bypassing GraphQL brute force protections/main.py: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/elqalaawi/WebSecurity-Academy-with-Python/HEAD/GraphQL API vulnerabilities/Bypassing GraphQL brute force protections/main.py -------------------------------------------------------------------------------- /GraphQL API vulnerabilities/Finding a hidden GraphQL endpoint/README.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/elqalaawi/WebSecurity-Academy-with-Python/HEAD/GraphQL API vulnerabilities/Finding a hidden GraphQL endpoint/README.md -------------------------------------------------------------------------------- /GraphQL API vulnerabilities/Finding a hidden GraphQL endpoint/main.py: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/elqalaawi/WebSecurity-Academy-with-Python/HEAD/GraphQL API vulnerabilities/Finding a hidden GraphQL endpoint/main.py -------------------------------------------------------------------------------- /GraphQL API vulnerabilities/Performing CSRF exploits over GraphQL/README.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/elqalaawi/WebSecurity-Academy-with-Python/HEAD/GraphQL API vulnerabilities/Performing CSRF exploits over GraphQL/README.md -------------------------------------------------------------------------------- /GraphQL API vulnerabilities/Performing CSRF exploits over GraphQL/main.py: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/elqalaawi/WebSecurity-Academy-with-Python/HEAD/GraphQL API vulnerabilities/Performing CSRF exploits over GraphQL/main.py -------------------------------------------------------------------------------- /GraphQL API vulnerabilities/README.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/elqalaawi/WebSecurity-Academy-with-Python/HEAD/GraphQL API vulnerabilities/README.md -------------------------------------------------------------------------------- /GraphQL API vulnerabilities/passwords.txt: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/elqalaawi/WebSecurity-Academy-with-Python/HEAD/GraphQL API vulnerabilities/passwords.txt -------------------------------------------------------------------------------- /Information disclosure/Authentication bypass via information disclosure/README.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/elqalaawi/WebSecurity-Academy-with-Python/HEAD/Information disclosure/Authentication bypass via information disclosure/README.md -------------------------------------------------------------------------------- /Information disclosure/Authentication bypass via information disclosure/main.py: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/elqalaawi/WebSecurity-Academy-with-Python/HEAD/Information disclosure/Authentication bypass via information disclosure/main.py -------------------------------------------------------------------------------- /Information disclosure/Information disclosure in error messages/README.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/elqalaawi/WebSecurity-Academy-with-Python/HEAD/Information disclosure/Information disclosure in error messages/README.md -------------------------------------------------------------------------------- /Information disclosure/Information disclosure in error messages/main.py: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/elqalaawi/WebSecurity-Academy-with-Python/HEAD/Information disclosure/Information disclosure in error messages/main.py -------------------------------------------------------------------------------- /Information disclosure/Information disclosure in version control history/README.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/elqalaawi/WebSecurity-Academy-with-Python/HEAD/Information disclosure/Information disclosure in version control history/README.md -------------------------------------------------------------------------------- /Information disclosure/Information disclosure in version control history/main.py: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/elqalaawi/WebSecurity-Academy-with-Python/HEAD/Information disclosure/Information disclosure in version control history/main.py -------------------------------------------------------------------------------- /Information disclosure/Information disclosure on debug page/README.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/elqalaawi/WebSecurity-Academy-with-Python/HEAD/Information disclosure/Information disclosure on debug page/README.md -------------------------------------------------------------------------------- /Information disclosure/Information disclosure on debug page/main.py: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/elqalaawi/WebSecurity-Academy-with-Python/HEAD/Information disclosure/Information disclosure on debug page/main.py -------------------------------------------------------------------------------- /Information disclosure/README.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/elqalaawi/WebSecurity-Academy-with-Python/HEAD/Information disclosure/README.md -------------------------------------------------------------------------------- /Information disclosure/Source code disclosure via backup files/README.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/elqalaawi/WebSecurity-Academy-with-Python/HEAD/Information disclosure/Source code disclosure via backup files/README.md -------------------------------------------------------------------------------- /Information disclosure/Source code disclosure via backup files/main.py: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/elqalaawi/WebSecurity-Academy-with-Python/HEAD/Information disclosure/Source code disclosure via backup files/main.py -------------------------------------------------------------------------------- /Insecure deserialization/Arbitrary object injection in PHP/README.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/elqalaawi/WebSecurity-Academy-with-Python/HEAD/Insecure deserialization/Arbitrary object injection in PHP/README.md -------------------------------------------------------------------------------- /Insecure deserialization/Arbitrary object injection in PHP/main.py: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/elqalaawi/WebSecurity-Academy-with-Python/HEAD/Insecure deserialization/Arbitrary object injection in PHP/main.py -------------------------------------------------------------------------------- /Insecure deserialization/Exploiting Java deserialization with Apache Commons/README.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/elqalaawi/WebSecurity-Academy-with-Python/HEAD/Insecure deserialization/Exploiting Java deserialization with Apache Commons/README.md -------------------------------------------------------------------------------- /Insecure deserialization/Exploiting Java deserialization with Apache Commons/main.py: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/elqalaawi/WebSecurity-Academy-with-Python/HEAD/Insecure deserialization/Exploiting Java deserialization with Apache Commons/main.py -------------------------------------------------------------------------------- /Insecure deserialization/Exploiting PHP deserialization with a pre-built gadget chain/README.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/elqalaawi/WebSecurity-Academy-with-Python/HEAD/Insecure deserialization/Exploiting PHP deserialization with a pre-built gadget chain/README.md -------------------------------------------------------------------------------- /Insecure deserialization/Exploiting PHP deserialization with a pre-built gadget chain/main.py: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/elqalaawi/WebSecurity-Academy-with-Python/HEAD/Insecure deserialization/Exploiting PHP deserialization with a pre-built gadget chain/main.py -------------------------------------------------------------------------------- /Insecure deserialization/Exploiting Ruby deserialization using a documented gadget chain/README.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/elqalaawi/WebSecurity-Academy-with-Python/HEAD/Insecure deserialization/Exploiting Ruby deserialization using a documented gadget chain/README.md -------------------------------------------------------------------------------- /Insecure deserialization/Exploiting Ruby deserialization using a documented gadget chain/main.py: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/elqalaawi/WebSecurity-Academy-with-Python/HEAD/Insecure deserialization/Exploiting Ruby deserialization using a documented gadget chain/main.py -------------------------------------------------------------------------------- /Insecure deserialization/Modifying serialized data types/README.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/elqalaawi/WebSecurity-Academy-with-Python/HEAD/Insecure deserialization/Modifying serialized data types/README.md -------------------------------------------------------------------------------- /Insecure deserialization/Modifying serialized data types/main.py: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/elqalaawi/WebSecurity-Academy-with-Python/HEAD/Insecure deserialization/Modifying serialized data types/main.py -------------------------------------------------------------------------------- /Insecure deserialization/Modifying serialized objects/README.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/elqalaawi/WebSecurity-Academy-with-Python/HEAD/Insecure deserialization/Modifying serialized objects/README.md -------------------------------------------------------------------------------- /Insecure deserialization/Modifying serialized objects/main.py: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/elqalaawi/WebSecurity-Academy-with-Python/HEAD/Insecure deserialization/Modifying serialized objects/main.py -------------------------------------------------------------------------------- /Insecure deserialization/README.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/elqalaawi/WebSecurity-Academy-with-Python/HEAD/Insecure deserialization/README.md -------------------------------------------------------------------------------- /Insecure deserialization/Using application functionality to exploit insecure deserialization/README.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/elqalaawi/WebSecurity-Academy-with-Python/HEAD/Insecure deserialization/Using application functionality to exploit insecure deserialization/README.md -------------------------------------------------------------------------------- /Insecure deserialization/Using application functionality to exploit insecure deserialization/main.py: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/elqalaawi/WebSecurity-Academy-with-Python/HEAD/Insecure deserialization/Using application functionality to exploit insecure deserialization/main.py -------------------------------------------------------------------------------- /LICENSE: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/elqalaawi/WebSecurity-Academy-with-Python/HEAD/LICENSE -------------------------------------------------------------------------------- /NoSQL injection/Detecting NoSQL injection/README.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/elqalaawi/WebSecurity-Academy-with-Python/HEAD/NoSQL injection/Detecting NoSQL injection/README.md -------------------------------------------------------------------------------- /NoSQL injection/Detecting NoSQL injection/main.py: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/elqalaawi/WebSecurity-Academy-with-Python/HEAD/NoSQL injection/Detecting NoSQL injection/main.py -------------------------------------------------------------------------------- /NoSQL injection/Exploiting NoSQL injection to extract data/README.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/elqalaawi/WebSecurity-Academy-with-Python/HEAD/NoSQL injection/Exploiting NoSQL injection to extract data/README.md -------------------------------------------------------------------------------- /NoSQL injection/Exploiting NoSQL injection to extract data/main.py: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/elqalaawi/WebSecurity-Academy-with-Python/HEAD/NoSQL injection/Exploiting NoSQL injection to extract data/main.py -------------------------------------------------------------------------------- /NoSQL injection/Exploiting NoSQL operator injection to bypass authentication/README.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/elqalaawi/WebSecurity-Academy-with-Python/HEAD/NoSQL injection/Exploiting NoSQL operator injection to bypass authentication/README.md -------------------------------------------------------------------------------- /NoSQL injection/Exploiting NoSQL operator injection to bypass authentication/main.py: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/elqalaawi/WebSecurity-Academy-with-Python/HEAD/NoSQL injection/Exploiting NoSQL operator injection to bypass authentication/main.py -------------------------------------------------------------------------------- /NoSQL injection/Exploiting NoSQL operator injection to extract unknown fields/README.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/elqalaawi/WebSecurity-Academy-with-Python/HEAD/NoSQL injection/Exploiting NoSQL operator injection to extract unknown fields/README.md -------------------------------------------------------------------------------- /NoSQL injection/Exploiting NoSQL operator injection to extract unknown fields/main.py: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/elqalaawi/WebSecurity-Academy-with-Python/HEAD/NoSQL injection/Exploiting NoSQL operator injection to extract unknown fields/main.py -------------------------------------------------------------------------------- /NoSQL injection/README.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/elqalaawi/WebSecurity-Academy-with-Python/HEAD/NoSQL injection/README.md -------------------------------------------------------------------------------- /OS command injection/Blind OS command injection with out-of-band data exfiltration/README.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/elqalaawi/WebSecurity-Academy-with-Python/HEAD/OS command injection/Blind OS command injection with out-of-band data exfiltration/README.md -------------------------------------------------------------------------------- /OS command injection/Blind OS command injection with out-of-band data exfiltration/main.py: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/elqalaawi/WebSecurity-Academy-with-Python/HEAD/OS command injection/Blind OS command injection with out-of-band data exfiltration/main.py -------------------------------------------------------------------------------- /OS command injection/Blind OS command injection with out-of-band interaction/README.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/elqalaawi/WebSecurity-Academy-with-Python/HEAD/OS command injection/Blind OS command injection with out-of-band interaction/README.md -------------------------------------------------------------------------------- /OS command injection/Blind OS command injection with out-of-band interaction/main.py: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/elqalaawi/WebSecurity-Academy-with-Python/HEAD/OS command injection/Blind OS command injection with out-of-band interaction/main.py -------------------------------------------------------------------------------- /OS command injection/Blind OS command injection with output redirection/README.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/elqalaawi/WebSecurity-Academy-with-Python/HEAD/OS command injection/Blind OS command injection with output redirection/README.md -------------------------------------------------------------------------------- /OS command injection/Blind OS command injection with output redirection/main.py: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/elqalaawi/WebSecurity-Academy-with-Python/HEAD/OS command injection/Blind OS command injection with output redirection/main.py -------------------------------------------------------------------------------- /OS command injection/Blind OS command injection with time delays/README.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/elqalaawi/WebSecurity-Academy-with-Python/HEAD/OS command injection/Blind OS command injection with time delays/README.md -------------------------------------------------------------------------------- /OS command injection/Blind OS command injection with time delays/main.py: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/elqalaawi/WebSecurity-Academy-with-Python/HEAD/OS command injection/Blind OS command injection with time delays/main.py -------------------------------------------------------------------------------- /OS command injection/OS command injection, simple case/README.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/elqalaawi/WebSecurity-Academy-with-Python/HEAD/OS command injection/OS command injection, simple case/README.md -------------------------------------------------------------------------------- /OS command injection/OS command injection, simple case/main.py: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/elqalaawi/WebSecurity-Academy-with-Python/HEAD/OS command injection/OS command injection, simple case/main.py -------------------------------------------------------------------------------- /OS command injection/README.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/elqalaawi/WebSecurity-Academy-with-Python/HEAD/OS command injection/README.md -------------------------------------------------------------------------------- /Path traversal/File path traversal, simple case/README.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/elqalaawi/WebSecurity-Academy-with-Python/HEAD/Path traversal/File path traversal, simple case/README.md -------------------------------------------------------------------------------- /Path traversal/File path traversal, simple case/main.py: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/elqalaawi/WebSecurity-Academy-with-Python/HEAD/Path traversal/File path traversal, simple case/main.py -------------------------------------------------------------------------------- /Path traversal/File path traversal, traversal sequences blocked with absolute path bypass/README.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/elqalaawi/WebSecurity-Academy-with-Python/HEAD/Path traversal/File path traversal, traversal sequences blocked with absolute path bypass/README.md -------------------------------------------------------------------------------- /Path traversal/File path traversal, traversal sequences blocked with absolute path bypass/main.py: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/elqalaawi/WebSecurity-Academy-with-Python/HEAD/Path traversal/File path traversal, traversal sequences blocked with absolute path bypass/main.py -------------------------------------------------------------------------------- /Path traversal/File path traversal, traversal sequences stripped non-recursively/README.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/elqalaawi/WebSecurity-Academy-with-Python/HEAD/Path traversal/File path traversal, traversal sequences stripped non-recursively/README.md -------------------------------------------------------------------------------- /Path traversal/File path traversal, traversal sequences stripped non-recursively/main.py: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/elqalaawi/WebSecurity-Academy-with-Python/HEAD/Path traversal/File path traversal, traversal sequences stripped non-recursively/main.py -------------------------------------------------------------------------------- /Path traversal/File path traversal, traversal sequences stripped with superfluous URL-decode/README.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/elqalaawi/WebSecurity-Academy-with-Python/HEAD/Path traversal/File path traversal, traversal sequences stripped with superfluous URL-decode/README.md -------------------------------------------------------------------------------- /Path traversal/File path traversal, traversal sequences stripped with superfluous URL-decode/main.py: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/elqalaawi/WebSecurity-Academy-with-Python/HEAD/Path traversal/File path traversal, traversal sequences stripped with superfluous URL-decode/main.py -------------------------------------------------------------------------------- /Path traversal/File path traversal, validation of file extension with null byte bypass/README.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/elqalaawi/WebSecurity-Academy-with-Python/HEAD/Path traversal/File path traversal, validation of file extension with null byte bypass/README.md -------------------------------------------------------------------------------- /Path traversal/File path traversal, validation of file extension with null byte bypass/main.py: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/elqalaawi/WebSecurity-Academy-with-Python/HEAD/Path traversal/File path traversal, validation of file extension with null byte bypass/main.py -------------------------------------------------------------------------------- /Path traversal/File path traversal, validation of start of path/README.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/elqalaawi/WebSecurity-Academy-with-Python/HEAD/Path traversal/File path traversal, validation of start of path/README.md -------------------------------------------------------------------------------- /Path traversal/File path traversal, validation of start of path/main.py: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/elqalaawi/WebSecurity-Academy-with-Python/HEAD/Path traversal/File path traversal, validation of start of path/main.py -------------------------------------------------------------------------------- /Path traversal/README.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/elqalaawi/WebSecurity-Academy-with-Python/HEAD/Path traversal/README.md -------------------------------------------------------------------------------- /README.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/elqalaawi/WebSecurity-Academy-with-Python/HEAD/README.md -------------------------------------------------------------------------------- /SQL injection/Blind SQL injection with conditional errors/README.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/elqalaawi/WebSecurity-Academy-with-Python/HEAD/SQL injection/Blind SQL injection with conditional errors/README.md -------------------------------------------------------------------------------- /SQL injection/Blind SQL injection with conditional errors/main.py: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/elqalaawi/WebSecurity-Academy-with-Python/HEAD/SQL injection/Blind SQL injection with conditional errors/main.py -------------------------------------------------------------------------------- /SQL injection/Blind SQL injection with conditional responses/README.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/elqalaawi/WebSecurity-Academy-with-Python/HEAD/SQL injection/Blind SQL injection with conditional responses/README.md -------------------------------------------------------------------------------- /SQL injection/Blind SQL injection with conditional responses/main.py: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/elqalaawi/WebSecurity-Academy-with-Python/HEAD/SQL injection/Blind SQL injection with conditional responses/main.py -------------------------------------------------------------------------------- /SQL injection/Blind SQL injection with out-of-band data exfiltration/README.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/elqalaawi/WebSecurity-Academy-with-Python/HEAD/SQL injection/Blind SQL injection with out-of-band data exfiltration/README.md -------------------------------------------------------------------------------- /SQL injection/Blind SQL injection with out-of-band data exfiltration/main.py: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/elqalaawi/WebSecurity-Academy-with-Python/HEAD/SQL injection/Blind SQL injection with out-of-band data exfiltration/main.py -------------------------------------------------------------------------------- /SQL injection/Blind SQL injection with out-of-band interaction/README.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/elqalaawi/WebSecurity-Academy-with-Python/HEAD/SQL injection/Blind SQL injection with out-of-band interaction/README.md -------------------------------------------------------------------------------- /SQL injection/Blind SQL injection with out-of-band interaction/main.py: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/elqalaawi/WebSecurity-Academy-with-Python/HEAD/SQL injection/Blind SQL injection with out-of-band interaction/main.py -------------------------------------------------------------------------------- /SQL injection/Blind SQL injection with time delays and information retrieval/README.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/elqalaawi/WebSecurity-Academy-with-Python/HEAD/SQL injection/Blind SQL injection with time delays and information retrieval/README.md -------------------------------------------------------------------------------- /SQL injection/Blind SQL injection with time delays and information retrieval/main.py: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/elqalaawi/WebSecurity-Academy-with-Python/HEAD/SQL injection/Blind SQL injection with time delays and information retrieval/main.py -------------------------------------------------------------------------------- /SQL injection/Blind SQL injection with time delays/README.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/elqalaawi/WebSecurity-Academy-with-Python/HEAD/SQL injection/Blind SQL injection with time delays/README.md -------------------------------------------------------------------------------- /SQL injection/Blind SQL injection with time delays/main.py: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/elqalaawi/WebSecurity-Academy-with-Python/HEAD/SQL injection/Blind SQL injection with time delays/main.py -------------------------------------------------------------------------------- /SQL injection/README.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/elqalaawi/WebSecurity-Academy-with-Python/HEAD/SQL injection/README.md -------------------------------------------------------------------------------- /SQL injection/SQL injection UNION attack, determining the number of columns returned by the query/README.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/elqalaawi/WebSecurity-Academy-with-Python/HEAD/SQL injection/SQL injection UNION attack, determining the number of columns returned by the query/README.md -------------------------------------------------------------------------------- /SQL injection/SQL injection UNION attack, determining the number of columns returned by the query/main.py: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/elqalaawi/WebSecurity-Academy-with-Python/HEAD/SQL injection/SQL injection UNION attack, determining the number of columns returned by the query/main.py -------------------------------------------------------------------------------- /SQL injection/SQL injection UNION attack, finding a column containing text/README.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/elqalaawi/WebSecurity-Academy-with-Python/HEAD/SQL injection/SQL injection UNION attack, finding a column containing text/README.md -------------------------------------------------------------------------------- /SQL injection/SQL injection UNION attack, finding a column containing text/main.py: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/elqalaawi/WebSecurity-Academy-with-Python/HEAD/SQL injection/SQL injection UNION attack, finding a column containing text/main.py -------------------------------------------------------------------------------- /SQL injection/SQL injection UNION attack, retrieving data from other tables/README.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/elqalaawi/WebSecurity-Academy-with-Python/HEAD/SQL injection/SQL injection UNION attack, retrieving data from other tables/README.md -------------------------------------------------------------------------------- /SQL injection/SQL injection UNION attack, retrieving data from other tables/main.py: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/elqalaawi/WebSecurity-Academy-with-Python/HEAD/SQL injection/SQL injection UNION attack, retrieving data from other tables/main.py -------------------------------------------------------------------------------- /SQL injection/SQL injection UNION attack, retrieving multiple values in a single column/README.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/elqalaawi/WebSecurity-Academy-with-Python/HEAD/SQL injection/SQL injection UNION attack, retrieving multiple values in a single column/README.md -------------------------------------------------------------------------------- /SQL injection/SQL injection UNION attack, retrieving multiple values in a single column/main.py: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/elqalaawi/WebSecurity-Academy-with-Python/HEAD/SQL injection/SQL injection UNION attack, retrieving multiple values in a single column/main.py -------------------------------------------------------------------------------- /SQL injection/SQL injection attack, listing the database contents on Oracle/README.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/elqalaawi/WebSecurity-Academy-with-Python/HEAD/SQL injection/SQL injection attack, listing the database contents on Oracle/README.md -------------------------------------------------------------------------------- /SQL injection/SQL injection attack, listing the database contents on Oracle/main.py: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/elqalaawi/WebSecurity-Academy-with-Python/HEAD/SQL injection/SQL injection attack, listing the database contents on Oracle/main.py -------------------------------------------------------------------------------- /SQL injection/SQL injection attack, listing the database contents on non-Oracle databases/README.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/elqalaawi/WebSecurity-Academy-with-Python/HEAD/SQL injection/SQL injection attack, listing the database contents on non-Oracle databases/README.md -------------------------------------------------------------------------------- /SQL injection/SQL injection attack, listing the database contents on non-Oracle databases/main.py: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/elqalaawi/WebSecurity-Academy-with-Python/HEAD/SQL injection/SQL injection attack, listing the database contents on non-Oracle databases/main.py -------------------------------------------------------------------------------- /SQL injection/SQL injection attack, querying the database type and version on MySQL and Microsoft/README.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/elqalaawi/WebSecurity-Academy-with-Python/HEAD/SQL injection/SQL injection attack, querying the database type and version on MySQL and Microsoft/README.md -------------------------------------------------------------------------------- /SQL injection/SQL injection attack, querying the database type and version on MySQL and Microsoft/main.py: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/elqalaawi/WebSecurity-Academy-with-Python/HEAD/SQL injection/SQL injection attack, querying the database type and version on MySQL and Microsoft/main.py -------------------------------------------------------------------------------- /SQL injection/SQL injection attack, querying the database type and version on Oracle/README.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/elqalaawi/WebSecurity-Academy-with-Python/HEAD/SQL injection/SQL injection attack, querying the database type and version on Oracle/README.md -------------------------------------------------------------------------------- /SQL injection/SQL injection attack, querying the database type and version on Oracle/main.py: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/elqalaawi/WebSecurity-Academy-with-Python/HEAD/SQL injection/SQL injection attack, querying the database type and version on Oracle/main.py -------------------------------------------------------------------------------- /SQL injection/SQL injection vulnerability allowing login bypass/README.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/elqalaawi/WebSecurity-Academy-with-Python/HEAD/SQL injection/SQL injection vulnerability allowing login bypass/README.md -------------------------------------------------------------------------------- /SQL injection/SQL injection vulnerability allowing login bypass/main.py: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/elqalaawi/WebSecurity-Academy-with-Python/HEAD/SQL injection/SQL injection vulnerability allowing login bypass/main.py -------------------------------------------------------------------------------- /SQL injection/SQL injection vulnerability in WHERE clause allowing retrieval of hidden data/README.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/elqalaawi/WebSecurity-Academy-with-Python/HEAD/SQL injection/SQL injection vulnerability in WHERE clause allowing retrieval of hidden data/README.md -------------------------------------------------------------------------------- /SQL injection/SQL injection vulnerability in WHERE clause allowing retrieval of hidden data/main.py: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/elqalaawi/WebSecurity-Academy-with-Python/HEAD/SQL injection/SQL injection vulnerability in WHERE clause allowing retrieval of hidden data/main.py -------------------------------------------------------------------------------- /SQL injection/SQL injection with filter bypass via XML encoding/README.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/elqalaawi/WebSecurity-Academy-with-Python/HEAD/SQL injection/SQL injection with filter bypass via XML encoding/README.md -------------------------------------------------------------------------------- /SQL injection/SQL injection with filter bypass via XML encoding/main.py: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/elqalaawi/WebSecurity-Academy-with-Python/HEAD/SQL injection/SQL injection with filter bypass via XML encoding/main.py -------------------------------------------------------------------------------- /SQL injection/Visible error-based SQL injection/README.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/elqalaawi/WebSecurity-Academy-with-Python/HEAD/SQL injection/Visible error-based SQL injection/README.md -------------------------------------------------------------------------------- /SQL injection/Visible error-based SQL injection/main.py: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/elqalaawi/WebSecurity-Academy-with-Python/HEAD/SQL injection/Visible error-based SQL injection/main.py -------------------------------------------------------------------------------- /Server-side request forgery (SSRF)/Basic SSRF against another back-end system/README.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/elqalaawi/WebSecurity-Academy-with-Python/HEAD/Server-side request forgery (SSRF)/Basic SSRF against another back-end system/README.md -------------------------------------------------------------------------------- /Server-side request forgery (SSRF)/Basic SSRF against another back-end system/main.py: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/elqalaawi/WebSecurity-Academy-with-Python/HEAD/Server-side request forgery (SSRF)/Basic SSRF against another back-end system/main.py -------------------------------------------------------------------------------- /Server-side request forgery (SSRF)/Basic SSRF against the local server/README.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/elqalaawi/WebSecurity-Academy-with-Python/HEAD/Server-side request forgery (SSRF)/Basic SSRF against the local server/README.md -------------------------------------------------------------------------------- /Server-side request forgery (SSRF)/Basic SSRF against the local server/main.py: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/elqalaawi/WebSecurity-Academy-with-Python/HEAD/Server-side request forgery (SSRF)/Basic SSRF against the local server/main.py -------------------------------------------------------------------------------- /Server-side request forgery (SSRF)/Blind SSRF with Shellshock exploitation/README.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/elqalaawi/WebSecurity-Academy-with-Python/HEAD/Server-side request forgery (SSRF)/Blind SSRF with Shellshock exploitation/README.md -------------------------------------------------------------------------------- /Server-side request forgery (SSRF)/Blind SSRF with Shellshock exploitation/main.py: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/elqalaawi/WebSecurity-Academy-with-Python/HEAD/Server-side request forgery (SSRF)/Blind SSRF with Shellshock exploitation/main.py -------------------------------------------------------------------------------- /Server-side request forgery (SSRF)/Blind SSRF with out-of-band detection/README.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/elqalaawi/WebSecurity-Academy-with-Python/HEAD/Server-side request forgery (SSRF)/Blind SSRF with out-of-band detection/README.md -------------------------------------------------------------------------------- /Server-side request forgery (SSRF)/Blind SSRF with out-of-band detection/main.py: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/elqalaawi/WebSecurity-Academy-with-Python/HEAD/Server-side request forgery (SSRF)/Blind SSRF with out-of-band detection/main.py -------------------------------------------------------------------------------- /Server-side request forgery (SSRF)/README.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/elqalaawi/WebSecurity-Academy-with-Python/HEAD/Server-side request forgery (SSRF)/README.md -------------------------------------------------------------------------------- /Server-side request forgery (SSRF)/SSRF with blacklist-based filter/README.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/elqalaawi/WebSecurity-Academy-with-Python/HEAD/Server-side request forgery (SSRF)/SSRF with blacklist-based filter/README.md -------------------------------------------------------------------------------- /Server-side request forgery (SSRF)/SSRF with blacklist-based filter/main.py: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/elqalaawi/WebSecurity-Academy-with-Python/HEAD/Server-side request forgery (SSRF)/SSRF with blacklist-based filter/main.py -------------------------------------------------------------------------------- /Server-side request forgery (SSRF)/SSRF with filter bypass via open redirection vulnerability/README.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/elqalaawi/WebSecurity-Academy-with-Python/HEAD/Server-side request forgery (SSRF)/SSRF with filter bypass via open redirection vulnerability/README.md -------------------------------------------------------------------------------- /Server-side request forgery (SSRF)/SSRF with filter bypass via open redirection vulnerability/main.py: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/elqalaawi/WebSecurity-Academy-with-Python/HEAD/Server-side request forgery (SSRF)/SSRF with filter bypass via open redirection vulnerability/main.py -------------------------------------------------------------------------------- /Server-side request forgery (SSRF)/SSRF with whitelist-based input filter/README.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/elqalaawi/WebSecurity-Academy-with-Python/HEAD/Server-side request forgery (SSRF)/SSRF with whitelist-based input filter/README.md -------------------------------------------------------------------------------- /Server-side request forgery (SSRF)/SSRF with whitelist-based input filter/main.py: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/elqalaawi/WebSecurity-Academy-with-Python/HEAD/Server-side request forgery (SSRF)/SSRF with whitelist-based input filter/main.py -------------------------------------------------------------------------------- /Server-side template injection (SSTI)/Basic server-side template injection (code context)/README.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/elqalaawi/WebSecurity-Academy-with-Python/HEAD/Server-side template injection (SSTI)/Basic server-side template injection (code context)/README.md -------------------------------------------------------------------------------- /Server-side template injection (SSTI)/Basic server-side template injection (code context)/main.py: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/elqalaawi/WebSecurity-Academy-with-Python/HEAD/Server-side template injection (SSTI)/Basic server-side template injection (code context)/main.py -------------------------------------------------------------------------------- /Server-side template injection (SSTI)/Basic server-side template injection/README.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/elqalaawi/WebSecurity-Academy-with-Python/HEAD/Server-side template injection (SSTI)/Basic server-side template injection/README.md -------------------------------------------------------------------------------- /Server-side template injection (SSTI)/Basic server-side template injection/main.py: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/elqalaawi/WebSecurity-Academy-with-Python/HEAD/Server-side template injection (SSTI)/Basic server-side template injection/main.py -------------------------------------------------------------------------------- /Server-side template injection (SSTI)/README.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/elqalaawi/WebSecurity-Academy-with-Python/HEAD/Server-side template injection (SSTI)/README.md -------------------------------------------------------------------------------- /Server-side template injection (SSTI)/Server-side template injection in an unknown language with a documented exploit/README.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/elqalaawi/WebSecurity-Academy-with-Python/HEAD/Server-side template injection (SSTI)/Server-side template injection in an unknown language with a documented exploit/README.md -------------------------------------------------------------------------------- /Server-side template injection (SSTI)/Server-side template injection in an unknown language with a documented exploit/main.py: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/elqalaawi/WebSecurity-Academy-with-Python/HEAD/Server-side template injection (SSTI)/Server-side template injection in an unknown language with a documented exploit/main.py -------------------------------------------------------------------------------- /Server-side template injection (SSTI)/Server-side template injection using documentation/README.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/elqalaawi/WebSecurity-Academy-with-Python/HEAD/Server-side template injection (SSTI)/Server-side template injection using documentation/README.md -------------------------------------------------------------------------------- /Server-side template injection (SSTI)/Server-side template injection using documentation/main.py: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/elqalaawi/WebSecurity-Academy-with-Python/HEAD/Server-side template injection (SSTI)/Server-side template injection using documentation/main.py -------------------------------------------------------------------------------- /Server-side template injection (SSTI)/Server-side template injection with information disclosure via user-supplied objects/README.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/elqalaawi/WebSecurity-Academy-with-Python/HEAD/Server-side template injection (SSTI)/Server-side template injection with information disclosure via user-supplied objects/README.md -------------------------------------------------------------------------------- /Server-side template injection (SSTI)/Server-side template injection with information disclosure via user-supplied objects/main.py: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/elqalaawi/WebSecurity-Academy-with-Python/HEAD/Server-side template injection (SSTI)/Server-side template injection with information disclosure via user-supplied objects/main.py -------------------------------------------------------------------------------- /Web cache deception/Exploiting cache server normalization for web cache deception/README.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/elqalaawi/WebSecurity-Academy-with-Python/HEAD/Web cache deception/Exploiting cache server normalization for web cache deception/README.md -------------------------------------------------------------------------------- /Web cache deception/Exploiting cache server normalization for web cache deception/main.py: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/elqalaawi/WebSecurity-Academy-with-Python/HEAD/Web cache deception/Exploiting cache server normalization for web cache deception/main.py -------------------------------------------------------------------------------- /Web cache deception/Exploiting exact-match cache rules for web cache deception copy/README.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/elqalaawi/WebSecurity-Academy-with-Python/HEAD/Web cache deception/Exploiting exact-match cache rules for web cache deception copy/README.md -------------------------------------------------------------------------------- /Web cache deception/Exploiting exact-match cache rules for web cache deception copy/main.py: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/elqalaawi/WebSecurity-Academy-with-Python/HEAD/Web cache deception/Exploiting exact-match cache rules for web cache deception copy/main.py -------------------------------------------------------------------------------- /Web cache deception/Exploiting origin server normalization for web cache deception/README.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/elqalaawi/WebSecurity-Academy-with-Python/HEAD/Web cache deception/Exploiting origin server normalization for web cache deception/README.md -------------------------------------------------------------------------------- /Web cache deception/Exploiting origin server normalization for web cache deception/main.py: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/elqalaawi/WebSecurity-Academy-with-Python/HEAD/Web cache deception/Exploiting origin server normalization for web cache deception/main.py -------------------------------------------------------------------------------- /Web cache deception/Exploiting path delimiters for web cache deception/README.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/elqalaawi/WebSecurity-Academy-with-Python/HEAD/Web cache deception/Exploiting path delimiters for web cache deception/README.md -------------------------------------------------------------------------------- /Web cache deception/Exploiting path delimiters for web cache deception/main.py: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/elqalaawi/WebSecurity-Academy-with-Python/HEAD/Web cache deception/Exploiting path delimiters for web cache deception/main.py -------------------------------------------------------------------------------- /Web cache deception/Exploiting path mapping for web cache deception/README.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/elqalaawi/WebSecurity-Academy-with-Python/HEAD/Web cache deception/Exploiting path mapping for web cache deception/README.md -------------------------------------------------------------------------------- /Web cache deception/Exploiting path mapping for web cache deception/main.py: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/elqalaawi/WebSecurity-Academy-with-Python/HEAD/Web cache deception/Exploiting path mapping for web cache deception/main.py -------------------------------------------------------------------------------- /Web cache deception/README.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/elqalaawi/WebSecurity-Academy-with-Python/HEAD/Web cache deception/README.md -------------------------------------------------------------------------------- /Web cache poisoning/Parameter cloaking/README.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/elqalaawi/WebSecurity-Academy-with-Python/HEAD/Web cache poisoning/Parameter cloaking/README.md -------------------------------------------------------------------------------- /Web cache poisoning/Parameter cloaking/main.py: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/elqalaawi/WebSecurity-Academy-with-Python/HEAD/Web cache poisoning/Parameter cloaking/main.py -------------------------------------------------------------------------------- /Web cache poisoning/README.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/elqalaawi/WebSecurity-Academy-with-Python/HEAD/Web cache poisoning/README.md -------------------------------------------------------------------------------- /Web cache poisoning/Targeted web cache poisoning using an unknown header/README.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/elqalaawi/WebSecurity-Academy-with-Python/HEAD/Web cache poisoning/Targeted web cache poisoning using an unknown header/README.md -------------------------------------------------------------------------------- /Web cache poisoning/Targeted web cache poisoning using an unknown header/main.py: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/elqalaawi/WebSecurity-Academy-with-Python/HEAD/Web cache poisoning/Targeted web cache poisoning using an unknown header/main.py -------------------------------------------------------------------------------- /Web cache poisoning/URL normalization/README.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/elqalaawi/WebSecurity-Academy-with-Python/HEAD/Web cache poisoning/URL normalization/README.md -------------------------------------------------------------------------------- /Web cache poisoning/URL normalization/main.py: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/elqalaawi/WebSecurity-Academy-with-Python/HEAD/Web cache poisoning/URL normalization/main.py -------------------------------------------------------------------------------- /Web cache poisoning/Web cache poisoning via a fat GET request/README.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/elqalaawi/WebSecurity-Academy-with-Python/HEAD/Web cache poisoning/Web cache poisoning via a fat GET request/README.md -------------------------------------------------------------------------------- /Web cache poisoning/Web cache poisoning via a fat GET request/main.py: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/elqalaawi/WebSecurity-Academy-with-Python/HEAD/Web cache poisoning/Web cache poisoning via a fat GET request/main.py -------------------------------------------------------------------------------- /Web cache poisoning/Web cache poisoning via an unkeyed query parameter/README.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/elqalaawi/WebSecurity-Academy-with-Python/HEAD/Web cache poisoning/Web cache poisoning via an unkeyed query parameter/README.md -------------------------------------------------------------------------------- /Web cache poisoning/Web cache poisoning via an unkeyed query parameter/main.py: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/elqalaawi/WebSecurity-Academy-with-Python/HEAD/Web cache poisoning/Web cache poisoning via an unkeyed query parameter/main.py -------------------------------------------------------------------------------- /Web cache poisoning/Web cache poisoning via an unkeyed query string/README.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/elqalaawi/WebSecurity-Academy-with-Python/HEAD/Web cache poisoning/Web cache poisoning via an unkeyed query string/README.md -------------------------------------------------------------------------------- /Web cache poisoning/Web cache poisoning via an unkeyed query string/main.py: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/elqalaawi/WebSecurity-Academy-with-Python/HEAD/Web cache poisoning/Web cache poisoning via an unkeyed query string/main.py -------------------------------------------------------------------------------- /Web cache poisoning/Web cache poisoning with an unkeyed cookie/README.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/elqalaawi/WebSecurity-Academy-with-Python/HEAD/Web cache poisoning/Web cache poisoning with an unkeyed cookie/README.md -------------------------------------------------------------------------------- /Web cache poisoning/Web cache poisoning with an unkeyed cookie/main.py: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/elqalaawi/WebSecurity-Academy-with-Python/HEAD/Web cache poisoning/Web cache poisoning with an unkeyed cookie/main.py -------------------------------------------------------------------------------- /Web cache poisoning/Web cache poisoning with an unkeyed header/README.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/elqalaawi/WebSecurity-Academy-with-Python/HEAD/Web cache poisoning/Web cache poisoning with an unkeyed header/README.md -------------------------------------------------------------------------------- /Web cache poisoning/Web cache poisoning with an unkeyed header/main.py: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/elqalaawi/WebSecurity-Academy-with-Python/HEAD/Web cache poisoning/Web cache poisoning with an unkeyed header/main.py -------------------------------------------------------------------------------- /Web cache poisoning/Web cache poisoning with multiple headers/README.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/elqalaawi/WebSecurity-Academy-with-Python/HEAD/Web cache poisoning/Web cache poisoning with multiple headers/README.md -------------------------------------------------------------------------------- /Web cache poisoning/Web cache poisoning with multiple headers/main.py: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/elqalaawi/WebSecurity-Academy-with-Python/HEAD/Web cache poisoning/Web cache poisoning with multiple headers/main.py -------------------------------------------------------------------------------- /XML external entity (XXE) injection/Blind XXE with out-of-band interaction via XML parameter entities/README.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/elqalaawi/WebSecurity-Academy-with-Python/HEAD/XML external entity (XXE) injection/Blind XXE with out-of-band interaction via XML parameter entities/README.md -------------------------------------------------------------------------------- /XML external entity (XXE) injection/Blind XXE with out-of-band interaction via XML parameter entities/main.py: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/elqalaawi/WebSecurity-Academy-with-Python/HEAD/XML external entity (XXE) injection/Blind XXE with out-of-band interaction via XML parameter entities/main.py -------------------------------------------------------------------------------- /XML external entity (XXE) injection/Blind XXE with out-of-band interaction/README.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/elqalaawi/WebSecurity-Academy-with-Python/HEAD/XML external entity (XXE) injection/Blind XXE with out-of-band interaction/README.md -------------------------------------------------------------------------------- /XML external entity (XXE) injection/Blind XXE with out-of-band interaction/main.py: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/elqalaawi/WebSecurity-Academy-with-Python/HEAD/XML external entity (XXE) injection/Blind XXE with out-of-band interaction/main.py -------------------------------------------------------------------------------- /XML external entity (XXE) injection/Exploiting XInclude to retrieve files/README.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/elqalaawi/WebSecurity-Academy-with-Python/HEAD/XML external entity (XXE) injection/Exploiting XInclude to retrieve files/README.md -------------------------------------------------------------------------------- /XML external entity (XXE) injection/Exploiting XInclude to retrieve files/main.py: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/elqalaawi/WebSecurity-Academy-with-Python/HEAD/XML external entity (XXE) injection/Exploiting XInclude to retrieve files/main.py -------------------------------------------------------------------------------- /XML external entity (XXE) injection/Exploiting XXE to perform SSRF attacks/README.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/elqalaawi/WebSecurity-Academy-with-Python/HEAD/XML external entity (XXE) injection/Exploiting XXE to perform SSRF attacks/README.md -------------------------------------------------------------------------------- /XML external entity (XXE) injection/Exploiting XXE to perform SSRF attacks/main.py: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/elqalaawi/WebSecurity-Academy-with-Python/HEAD/XML external entity (XXE) injection/Exploiting XXE to perform SSRF attacks/main.py -------------------------------------------------------------------------------- /XML external entity (XXE) injection/Exploiting XXE to retrieve data by repurposing a local DTD/README.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/elqalaawi/WebSecurity-Academy-with-Python/HEAD/XML external entity (XXE) injection/Exploiting XXE to retrieve data by repurposing a local DTD/README.md -------------------------------------------------------------------------------- /XML external entity (XXE) injection/Exploiting XXE to retrieve data by repurposing a local DTD/main.py: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/elqalaawi/WebSecurity-Academy-with-Python/HEAD/XML external entity (XXE) injection/Exploiting XXE to retrieve data by repurposing a local DTD/main.py -------------------------------------------------------------------------------- /XML external entity (XXE) injection/Exploiting XXE using external entities to retrieve files/README.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/elqalaawi/WebSecurity-Academy-with-Python/HEAD/XML external entity (XXE) injection/Exploiting XXE using external entities to retrieve files/README.md -------------------------------------------------------------------------------- /XML external entity (XXE) injection/Exploiting XXE using external entities to retrieve files/main.py: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/elqalaawi/WebSecurity-Academy-with-Python/HEAD/XML external entity (XXE) injection/Exploiting XXE using external entities to retrieve files/main.py -------------------------------------------------------------------------------- /XML external entity (XXE) injection/Exploiting XXE via image file upload/README.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/elqalaawi/WebSecurity-Academy-with-Python/HEAD/XML external entity (XXE) injection/Exploiting XXE via image file upload/README.md -------------------------------------------------------------------------------- /XML external entity (XXE) injection/Exploiting XXE via image file upload/main.py: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/elqalaawi/WebSecurity-Academy-with-Python/HEAD/XML external entity (XXE) injection/Exploiting XXE via image file upload/main.py -------------------------------------------------------------------------------- /XML external entity (XXE) injection/Exploiting blind XXE to exfiltrate data using a malicious external DTD/README.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/elqalaawi/WebSecurity-Academy-with-Python/HEAD/XML external entity (XXE) injection/Exploiting blind XXE to exfiltrate data using a malicious external DTD/README.md -------------------------------------------------------------------------------- /XML external entity (XXE) injection/Exploiting blind XXE to exfiltrate data using a malicious external DTD/main.py: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/elqalaawi/WebSecurity-Academy-with-Python/HEAD/XML external entity (XXE) injection/Exploiting blind XXE to exfiltrate data using a malicious external DTD/main.py -------------------------------------------------------------------------------- /XML external entity (XXE) injection/Exploiting blind XXE to retrieve data via error messages/README.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/elqalaawi/WebSecurity-Academy-with-Python/HEAD/XML external entity (XXE) injection/Exploiting blind XXE to retrieve data via error messages/README.md -------------------------------------------------------------------------------- /XML external entity (XXE) injection/Exploiting blind XXE to retrieve data via error messages/main.py: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/elqalaawi/WebSecurity-Academy-with-Python/HEAD/XML external entity (XXE) injection/Exploiting blind XXE to retrieve data via error messages/main.py -------------------------------------------------------------------------------- /XML external entity (XXE) injection/README.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/elqalaawi/WebSecurity-Academy-with-Python/HEAD/XML external entity (XXE) injection/README.md -------------------------------------------------------------------------------- /web-security-python.png: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/elqalaawi/WebSecurity-Academy-with-Python/HEAD/web-security-python.png --------------------------------------------------------------------------------