Table of contents
- π Cipherops
- π€© Embarking on Your Hacking Journey: A Guide for Beginners
- π Journeying Through the World of Ethical Hacking with Cipher-ops
- π½ Let's Start
Overview
- βΉ Recon Tips
- πΈ Web Application
- Web Application Testing Checklist
- PORT SCANNING
- Subdomain Takeover Resources
- Technology Identification
- Content Discovery Tools
- Link Extraction Tools
- Parameter and Web Fuzzing Tools
- Screenshots
- File Inclusion,CSRF Injection,Directory Traversal
- GraphQL Injection,Insecure Deserialization,Header Injection
- Exploitation Tools Categorized by Vulnerability Type
- Insecure Direct Object References, Open Redirect, Request Smuggling
- Introducing 20 web-application hacking toolsπ₯π€©π΅
- Disclosed Reports π