hacking 26
- Authentication vulnerabilities
- THM - Jason room
- THM - RES room
- Windows Privilage Escalation
- Broken Access Control
- Web LLM attacks
- SQLi
- OS command injection
- File upload vulnerabilities
- XSS - Exploiting cross-site scripting
- Directory Path Traversal
- GraphQL
- Cross-site request forgery
- NIST Cybersecurity Framework
- Security Testing Types
- Web Sockets
- SIEM vs SOAR
- Server-Side Parameter Pollution
- Intrusion Detection Systems and Intrusion Prevention Systems
- Cyber Kill Chain vs Mitre ATT&CK vs Unified Kill Chain
- Script sketch for a hackerNote room
- LXD or PWNBOX
- THM Mr.Robot
- The most 'find' you will need
- ALL=(ALL:!root)
- THM Light room notes