Browse products
Access Control Vulnerabilities
Learn how to find, exploit and defend against Access Control Vulnerabilities.
- Course
- By Rana Khalil
Authentication Vulnerabilities
Learn how to find, exploit and defend against Authentication Vulnerabilities.
- Course
- By Rana Khalil
Business Logic Vulnerabilities
Learn how to find, exploit and defend against Business Logic Vulnerabilities.
- Course
- By Rana Khalil
CORS Vulnerabilities
Learn how to find, exploit and defend against CORS Vulnerabilities.
- Course
- By Rana Khalil
Clickjacking
Learn how to find, exploit and defend against Clickjacking.
- Course
- By Rana Khalil
Command Injection
Learn how to find, exploit and defend against Command Injection vulnerabilities.
- Course
- By Rana Khalil
Cross-Site Request Forgery (CSRF)
Learn how to find, exploit and defend against CSRF.
- Course
- By Rana Khalil
Cross-Site Scripting (XSS)
Learn how to find, exploit and defend against XSS Vulnerabilities.
- Course
- By Rana Khalil
DOM-Based Vulnerabilities
Learn how to find, exploit and defend against DOM-Based Vulnerabilities.
- Course
- By Rana Khalil
Directory Traversal
Learn how to find, exploit and defend against Directory Traversal vulnerabilities.
- Course
- By Rana Khalil
File Upload Vulnerabilities
Learn how to find, exploit and defend against File Upload Vulnerabilities.
- Course
- By Rana Khalil
Information Disclosure
Learn how to find, exploit and defend against Information Disclosure vulnerabilities.
- Course
- By Rana Khalil
JWT Attacks
Learn how to find, exploit and defend against JWT Vulnerabilities.
- Course
- By Rana Khalil
SQL Injection
Learn how to find, exploit and defend against SQL Injection vulnerabilities.
- Course
- By Rana Khalil
Server-Side Request Forgery (SSRF)
Learn how to find, exploit and defend against SSRF vulnerabilities.
- Course
- By Rana Khalil
Web Security Academy Series Course
Learn how to hack web applications, automate your exploits in Python and defend web applications against real world attacks!
- Course
- By Rana Khalil
WebSocket Vulnerabilities
Learn how to find, exploit and defend against WebSocket Vulnerabilities.
- Course
- By Rana Khalil
XXE Injection
Learn how to find, exploit and defend against XXE Injection vulnerabilities.
- Course
- By Rana Khalil