Not The Hidden Wiki
- How to Bypass WAF - link
- API Penetration Testing - link
- Persisting XSS With IFrame Traps - link
- AppSec Tales - link
- Allow arbitrary URLs, expect arbitrary code execution - link
- OWASP ASVS - link
- AppSec Tales XXIV | Deserialization - link
- Crimson - AppSec firearm I - link
- AppSec Tales XXI | NoSQLI - link
- AppSec Tales XXII | LDAPI - link
- AppSec Tales XXIII | XPathI - link
- AppSec Tales XVIII | Open Redirect - link
- AppSec Tales XIX | CRLF - link
- AppSec Tales XXE - link
- Unexploitable SSTI, huh? - link
- AppSec Tales XIV | SSTI - link
- AppSec Tales XV | Path Traversal - link
- AppSec Tales XVI | File Inclusion - link
- AppSec Tales XVII | SSRF - link
- AppSec Tales XI | Input Validation - link
- AppSec Tales XII | XSS - link
- Automating Google 2FA with Burp - link
- AppSec Tales XIII | SQLI - link
- Not usual CSP bypass case - link
- AppSec Tales IX | OAuth - link
- AppSec Tales X | SAML - link
- Crimson — AppSec firearm II - link
- Crimson — AppSec firearm III - link
- Crimson — AppSec firearm IV - link
- AppSec Tales VIII | JWT - link
- AppSec Tales II | Sign-in - link
- AppSec Tales III | Password Recovery - link
- AppSec Tales IV | Email Change - link
- AppSec Tales V | Pass Change - link
- AppSec Tales VI | 2FA - link
- AppSec Tales VII | ACCESS - link
- AppSec Tales I | Sign-up - link
- Automation of the reconnaissance phase during Web Application Penetration Testing I - link
- Automation of the reconnaissance phase during Web Application Penetration Testing II - link
- Automation of the reconnaissance phase during Web Application Penetration Testing III - link
- Notes about attacking Jenkins servers - link
- The cheat sheet about Java Deserialization vulnerabilities - link
- All about bug bounty (bypasses, payloads, and etc) - link
- A GitHub repository providing an extensive cheat sheet for advanced SQL Injection techniques - link
- Awesome API Security - link
- Anatomy Of A File Upload Attack - link
- 1001 ways to PWN prod - link
- Setting Up an Environment for Web Hacking - link
- Five easy ways to hack GraphQL targets - link
- Use case for accont takeover - link