Learn how to find, exploit and defend against Access Control Vulnerabilities.
Learn how to find, exploit and defend against Authentication Vulnerabilities.
Learn how to find, exploit and defend against Business Logic Vulnerabilities.
Learn how to find, exploit and defend against CORS Vulnerabilities.
Learn how to find, exploit and defend against Clickjacking.
Learn how to find, exploit and defend against Command Injection vulnerabilities.
Learn how to find, exploit and defend against CSRF.
Learn how to find, exploit and defend against XSS Vulnerabilities.
Learn how to find, exploit and defend against DOM-Based Vulnerabilities.
Learn how to find, exploit and defend against Directory Traversal vulnerabilities.
Learn how to find, exploit and defend against File Upload Vulnerabilities.
Learn how to find, exploit and defend against Information Disclosure vulnerabilities.
Learn how to find, exploit and defend against JWT Vulnerabilities.
Learn how to find, exploit and defend against SQL Injection vulnerabilities.
Learn how to find, exploit and defend against SSRF vulnerabilities.
Learn how to hack web applications, automate your exploits in Python and defend web applications against real world attacks!
Learn how to find, exploit and defend against WebSocket Vulnerabilities.
Learn how to find, exploit and defend against XXE Injection vulnerabilities.