OffensiveWeb
Docs
OffensiveWeb
Getting started
Client-side
Server-side
Framework
HTTP
Twitter
GitHub
Get started
Get started
Search
Search
Cancel
Loading search index…
No recent searches
No results for "
Query here
"
Title here
Date here
Summary here
Getting started
Introduction
Learning
Vulnerability / CTF reports
Cheatsheets
Client-side
Service Worker
DOM Clobbering
HTML Tags
Window object
XSS - Cross-site Scripting
Browser Cache
CSP Bypass
JSONP
Same Origin Method Execution
XSLeaks
Framework
Apache
DOMPurify
Drupal
Express.js
HTMX
Nginx
Node.js
Nuxt
Spring Boot
VueJS
Werkzeug
Wordpress
HTTP
Content-Type
Cookie
Cross-Origin Read Blocking (CORB)
Cross-Origin Resource Policy (CORP)
Cross-Origin Resource Sharing (CORS)
X-Content-Type-Options (XCTO)
Others
Browser exploit
Burpsuite
Debugging
Open Redirect
Parsing
Prototype Pollution
Programming
Javascript
Javascript
Ruby
Strange behavior
PHP
Python
Python
Class Pollution
Format String
Server-side
GraphQL
Server-Side Caching
SQL Injection
SSRF - Server-side Request Forgery
SSTI
Django Template
EJS
Pug
Tera
WriteUp
SEKAI CTF 2023 - Golf Jail
On this page
Courses
Articles
Vulnerability Feeds
Challenges
Books
Learning
On this page
Courses
Articles
Vulnerability Feeds
Challenges
Books
Courses
#
OWASP - Cheat Sheet Series
Mozilla - MDN
HTML Standard
RFC 2616 - HTTP
PortSwigger - WebSecurity Academy
Articles
#
PortSwigger - Research
YesWeHack - Talent Development
Synacktiv - Publications
SonarSource - Security blog
Seebug - Web Security
Vulnerability Feeds
#
Github Advisory Database (GHSA)
HackerOne - Disclosed reports
Huntr - Hacktivity
CVE Half-Day Watcher
Challenges
#
PortSwigger - WebSecurity Academy
HackTheBox - Web challenges
Root-Me - Server/Client side
CTFTime - Upcomming CTFs
HeroCTF - Challenges & Write-ups of past editions
Flag4jobs - Challenges on real-world use cases
Books
#
JavaScript for hackers - Gareth Heyes
Prev
Introduction
Next
Vulnerability / CTF reports
Top