1
0/25
Reconnaissance
2
0/13
Registration Vulnerabilities
3
0/34
Authentication Testing
4
0/19
Session Management
5
0/73
IDOR (Insecure Direct Object Reference)
6
0/66
Business Logic Vulnerabilities
7
0/40
CSRF Vulnerabilities
8
0/43
Remote Code Execution (RCE)
9
0/419
Cross-Site Scripting (XSS)
10
0/140
SQL Injection Testing
11
0/24
Bug Bounty Tools
12
0/92
Reconnaissance Tools
13
0/56
Cloud Security Testing
14
0/42
Kubernetes Security
15
0/54
Server-Side Request Forgery
16
0/59
Local File Inclusion (LFI)
17
0/52
Admin Panel Testing
18
0/57
Account Takeover
19
0/56
XML External Entity Attacks (XXE)
20
0/29
Deserialization
21
0/46
API Security
22
0/59
File Upload Vulnerabilities
23
0/86
Information Disclosure
24
0/57
403 and waf Bypass Techniques
25
0/71
Platform-Specific Vulnerabilities
26
0/42
Rate Limiting & DoS
27
0/38