
Cross Site Scripting (XSS) Vulnerabilities
This note covers Cross-Site Scripting (XSS) and its practical exploitation through PortSwigger labs. It explains the theory behind reflected, stored, and DOM-based XSS, details how browsers interpr...

This note covers Cross-Site Scripting (XSS) and its practical exploitation through PortSwigger labs. It explains the theory behind reflected, stored, and DOM-based XSS, details how browsers interpr...

This note covers Cross-Origin Resource Sharing (CORS) and practical misconfigurations from PortSwigger labs. It explains how CORS policies work (simple vs. preflight requests, Access-Control-Allow-...

Notes from PortSwigger Academy’s CSRF labs covering different bypass techniques — from basic CSRF with no defenses to advanced SameSite Lax/Strict bypasses using method override, token manipulation...

This note covers Server-Side Request Forgery (SSRF) with seven hands-on PortSwigger labs (basic local/internal SSRF, blind/OOB SSRF, blacklist/whitelist bypasses, open-redirect chaining, and an exp...

This note covers Broken Authentication in web applications — PortSwigger labs that demonstrate unprotected admin endpoints, predictable/unpredictable admin URLs, role tampering via request paramete...

A step‑by‑step, detailed guide for writing professional CPTS exam reports using Sysreptor. Covers structuring findings, evidence collection, reproducible walkthroughs, templated sections (exec summ...

A walkthrough of the HackTheBox 'Certificate' machine which is easy rated windows box. This write-up covers initial access, privilege escalation, and post-exploitation techniques.

A walkthrough of the HackTheBox 'Puppy' machine. This write-up covers initial access, privilege escalation, and post-exploitation techniques.

A walkthrough of the HackTheBox 'Fluffy' machine which is easy rated windows box. This write-up covers initial access, privilege escalation, and post-exploitation techniques.

This note covers race condition vulnerabilities in web applications, where multiple processes or requests are executed simultaneously, leading to unintended behavior. It includes labs on bypassing ...