- [Application scanning]
SQL injection
XSS
CSRF
Clickjacking
DOM-based
CORS
XXE
SSRF
Request smuggling
Command injection
Server-side template injection
Insecure deserialization
Directory traversal
Access control
Authentication
OAuth authentication
Business logic vulnerabilities
Web cache poisoning
HTTP Host header attacks
WebSockets
Information disclosure
File upload vulnerabilities
- [Threat detections]
- [Threat analysis]
- [Vulnerability assessment]
- [Penetration testing]
- [Incident response]
- [Linux Forensics]
- [Digital Forensics]
- [Security Operation Center - services]