Browse products

search
Product image for Access Control Vulnerabilities

Access Control Vulnerabilities

Learn how to find, exploit and defend against Access Control Vulnerabilities.

  • Course
  • By Rana Khalil
Product image for Authentication Vulnerabilities

Authentication Vulnerabilities

Learn how to find, exploit and defend against Authentication Vulnerabilities.

  • Course
  • By Rana Khalil
Product image for Business Logic Vulnerabilities

Business Logic Vulnerabilities

Learn how to find, exploit and defend against Business Logic Vulnerabilities.

  • Course
  • By Rana Khalil
Product image for CORS Vulnerabilities

CORS Vulnerabilities

Learn how to find, exploit and defend against CORS Vulnerabilities.

  • Course
  • By Rana Khalil
Product image for Clickjacking

Clickjacking

Learn how to find, exploit and defend against Clickjacking.

  • Course
  • By Rana Khalil
Product image for Command Injection

Command Injection

Learn how to find, exploit and defend against Command Injection vulnerabilities.

  • Course
  • By Rana Khalil
Product image for Cross-Site Request Forgery (CSRF)

Cross-Site Request Forgery (CSRF)

Learn how to find, exploit and defend against CSRF.

  • Course
  • By Rana Khalil
Product image for Cross-Site Scripting (XSS)

Cross-Site Scripting (XSS)

Learn how to find, exploit and defend against XSS Vulnerabilities.

  • Course
  • By Rana Khalil
Product image for DOM-Based Vulnerabilities

DOM-Based Vulnerabilities

Learn how to find, exploit and defend against DOM-Based Vulnerabilities.

  • Course
  • By Rana Khalil
Product image for Directory Traversal

Directory Traversal

Learn how to find, exploit and defend against Directory Traversal vulnerabilities.

  • Course
  • By Rana Khalil
Product image for File Upload Vulnerabilities

File Upload Vulnerabilities

Learn how to find, exploit and defend against File Upload Vulnerabilities.

  • Course
  • By Rana Khalil
Product image for Information Disclosure

Information Disclosure

Learn how to find, exploit and defend against Information Disclosure vulnerabilities.

  • Course
  • By Rana Khalil
Product image for JWT Attacks

JWT Attacks

Learn how to find, exploit and defend against JWT Vulnerabilities.

  • Course
  • By Rana Khalil
Product image for SQL Injection

SQL Injection

Learn how to find, exploit and defend against SQL Injection vulnerabilities.

  • Course
  • By Rana Khalil
Product image for Server-Side Request Forgery (SSRF)

Server-Side Request Forgery (SSRF)

Learn how to find, exploit and defend against SSRF vulnerabilities.

  • Course
  • By Rana Khalil
Product image for Web Security Academy Series Course

Web Security Academy Series Course

Learn how to hack web applications, automate your exploits in Python and defend web applications against real world attacks!

  • Course
  • By Rana Khalil
Product image for WebSocket Vulnerabilities

WebSocket Vulnerabilities

Learn how to find, exploit and defend against WebSocket Vulnerabilities.

  • Course
  • By Rana Khalil
Product image for XXE Injection

XXE Injection

Learn how to find, exploit and defend against XXE Injection vulnerabilities.

  • Course
  • By Rana Khalil