René's URL Explorer Experiment


Title: GitHub - xhackff/Web-Security-Learning: Web-Security-Learning

Open Graph Title: GitHub - xhackff/Web-Security-Learning: Web-Security-Learning

X Title: GitHub - xhackff/Web-Security-Learning: Web-Security-Learning

Description: Web-Security-Learning. Contribute to xhackff/Web-Security-Learning development by creating an account on GitHub.

Open Graph Description: Web-Security-Learning. Contribute to xhackff/Web-Security-Learning development by creating an account on GitHub.

X Description: Web-Security-Learning. Contribute to xhackff/Web-Security-Learning development by creating an account on GitHub.

Opengraph URL: https://github.com/xhackff/Web-Security-Learning

X: @github

direct link

Domain: patch-diff.githubusercontent.com

route-pattern/:user_id/:repository
route-controllerfiles
route-actiondisambiguate
fetch-noncev2:935c0032-6167-5fd1-afc9-95c294f7ee76
current-catalog-service-hashf3abb0cc802f3d7b95fc8762b94bdcb13bf39634c40c357301c4aa1d67a256fb
request-idC2D8:2595C:4C0346:6B650E:696F8394
html-safe-nonce04adb8fa1ce4c6f5bf5ecd9c4b7e63a8bc9840f47cbfab5681b68854a991433e
visitor-payloadeyJyZWZlcnJlciI6IiIsInJlcXVlc3RfaWQiOiJDMkQ4OjI1OTVDOjRDMDM0Njo2QjY1MEU6Njk2RjgzOTQiLCJ2aXNpdG9yX2lkIjoiODk1ODQ2NzYyNTU2MTU4ODYyOCIsInJlZ2lvbl9lZGdlIjoiaWFkIiwicmVnaW9uX3JlbmRlciI6ImlhZCJ9
visitor-hmac614ecba2828266b91707b061d03261de2236428a82e90c17cb195f3d0f0a1190
hovercard-subject-tagrepository:232958988
github-keyboard-shortcutsrepository,copilot
google-site-verificationApib7-x98H0j5cPqHWwSMm6dNU4GmODRoqxLiDzdx9I
octolytics-urlhttps://collector.github.com/github/collect
analytics-location//
fb:app_id1401488693436528
apple-itunes-appapp-id=1477376905, app-argument=https://github.com/xhackff/Web-Security-Learning
twitter:imagehttps://opengraph.githubassets.com/660f018877ee7fc51970f6dfa0dcfe9ab113b3d04a64dcd007e12fb253c98dd6/xhackff/Web-Security-Learning
twitter:cardsummary_large_image
og:imagehttps://opengraph.githubassets.com/660f018877ee7fc51970f6dfa0dcfe9ab113b3d04a64dcd007e12fb253c98dd6/xhackff/Web-Security-Learning
og:image:altWeb-Security-Learning. Contribute to xhackff/Web-Security-Learning development by creating an account on GitHub.
og:image:width1200
og:image:height600
og:site_nameGitHub
og:typeobject
hostnamegithub.com
expected-hostnamegithub.com
Nonec1b02b4e3a8edff2fe0bd71b0551654be66034591c7ab65aaaaf61a6096862d3
turbo-cache-controlno-preview
go-importgithub.com/xhackff/Web-Security-Learning git https://github.com/xhackff/Web-Security-Learning.git
octolytics-dimension-user_id52353165
octolytics-dimension-user_loginxhackff
octolytics-dimension-repository_id232958988
octolytics-dimension-repository_nwoxhackff/Web-Security-Learning
octolytics-dimension-repository_publictrue
octolytics-dimension-repository_is_forktrue
octolytics-dimension-repository_parent_id100763890
octolytics-dimension-repository_parent_nwoCHYbeta/Web-Security-Learning
octolytics-dimension-repository_network_root_id100763890
octolytics-dimension-repository_network_root_nwoCHYbeta/Web-Security-Learning
turbo-body-classeslogged-out env-production page-responsive
disable-turbofalse
browser-stats-urlhttps://api.github.com/_private/browser/stats
browser-errors-urlhttps://api.github.com/_private/browser/errors
release4a1073fcc34432ac33cec03885ff2d96920686de
ui-targetfull
theme-color#1e2327
color-schemelight dark

Links:

Skip to contenthttps://patch-diff.githubusercontent.com/xhackff/Web-Security-Learning#start-of-content
https://patch-diff.githubusercontent.com/
Sign in https://patch-diff.githubusercontent.com/login?return_to=https%3A%2F%2Fgithub.com%2Fxhackff%2FWeb-Security-Learning
GitHub CopilotWrite better code with AIhttps://github.com/features/copilot
GitHub SparkBuild and deploy intelligent appshttps://github.com/features/spark
GitHub ModelsManage and compare promptshttps://github.com/features/models
MCP RegistryNewIntegrate external toolshttps://github.com/mcp
ActionsAutomate any workflowhttps://github.com/features/actions
CodespacesInstant dev environmentshttps://github.com/features/codespaces
IssuesPlan and track workhttps://github.com/features/issues
Code ReviewManage code changeshttps://github.com/features/code-review
GitHub Advanced SecurityFind and fix vulnerabilitieshttps://github.com/security/advanced-security
Code securitySecure your code as you buildhttps://github.com/security/advanced-security/code-security
Secret protectionStop leaks before they starthttps://github.com/security/advanced-security/secret-protection
Why GitHubhttps://github.com/why-github
Documentationhttps://docs.github.com
Bloghttps://github.blog
Changeloghttps://github.blog/changelog
Marketplacehttps://github.com/marketplace
View all featureshttps://github.com/features
Enterpriseshttps://github.com/enterprise
Small and medium teamshttps://github.com/team
Startupshttps://github.com/enterprise/startups
Nonprofitshttps://github.com/solutions/industry/nonprofits
App Modernizationhttps://github.com/solutions/use-case/app-modernization
DevSecOpshttps://github.com/solutions/use-case/devsecops
DevOpshttps://github.com/solutions/use-case/devops
CI/CDhttps://github.com/solutions/use-case/ci-cd
View all use caseshttps://github.com/solutions/use-case
Healthcarehttps://github.com/solutions/industry/healthcare
Financial serviceshttps://github.com/solutions/industry/financial-services
Manufacturinghttps://github.com/solutions/industry/manufacturing
Governmenthttps://github.com/solutions/industry/government
View all industrieshttps://github.com/solutions/industry
View all solutionshttps://github.com/solutions
AIhttps://github.com/resources/articles?topic=ai
Software Developmenthttps://github.com/resources/articles?topic=software-development
DevOpshttps://github.com/resources/articles?topic=devops
Securityhttps://github.com/resources/articles?topic=security
View all topicshttps://github.com/resources/articles
Customer storieshttps://github.com/customer-stories
Events & webinarshttps://github.com/resources/events
Ebooks & reportshttps://github.com/resources/whitepapers
Business insightshttps://github.com/solutions/executive-insights
GitHub Skillshttps://skills.github.com
Documentationhttps://docs.github.com
Customer supporthttps://support.github.com
Community forumhttps://github.com/orgs/community/discussions
Trust centerhttps://github.com/trust-center
Partnershttps://github.com/partners
GitHub SponsorsFund open source developershttps://github.com/sponsors
Security Labhttps://securitylab.github.com
Maintainer Communityhttps://maintainers.github.com
Acceleratorhttps://github.com/accelerator
Archive Programhttps://archiveprogram.github.com
Topicshttps://github.com/topics
Trendinghttps://github.com/trending
Collectionshttps://github.com/collections
Enterprise platformAI-powered developer platformhttps://github.com/enterprise
GitHub Advanced SecurityEnterprise-grade security featureshttps://github.com/security/advanced-security
Copilot for BusinessEnterprise-grade AI featureshttps://github.com/features/copilot/copilot-business
Premium SupportEnterprise-grade 24/7 supporthttps://github.com/premium-support
Pricinghttps://github.com/pricing
Search syntax tipshttps://docs.github.com/search-github/github-code-search/understanding-github-code-search-syntax
documentationhttps://docs.github.com/search-github/github-code-search/understanding-github-code-search-syntax
Sign in https://patch-diff.githubusercontent.com/login?return_to=https%3A%2F%2Fgithub.com%2Fxhackff%2FWeb-Security-Learning
Sign up https://patch-diff.githubusercontent.com/signup?ref_cta=Sign+up&ref_loc=header+logged+out&ref_page=%2F%3Cuser-name%3E%2F%3Crepo-name%3E&source=header-repo&source_repo=xhackff%2FWeb-Security-Learning
Reloadhttps://patch-diff.githubusercontent.com/xhackff/Web-Security-Learning
Reloadhttps://patch-diff.githubusercontent.com/xhackff/Web-Security-Learning
Reloadhttps://patch-diff.githubusercontent.com/xhackff/Web-Security-Learning
xhackff https://patch-diff.githubusercontent.com/xhackff
Web-Security-Learninghttps://patch-diff.githubusercontent.com/xhackff/Web-Security-Learning
CHYbeta/Web-Security-Learninghttps://patch-diff.githubusercontent.com/CHYbeta/Web-Security-Learning
Notifications https://patch-diff.githubusercontent.com/login?return_to=%2Fxhackff%2FWeb-Security-Learning
Fork 1 https://patch-diff.githubusercontent.com/login?return_to=%2Fxhackff%2FWeb-Security-Learning
Star 1 https://patch-diff.githubusercontent.com/login?return_to=%2Fxhackff%2FWeb-Security-Learning
chybeta.github.io/2017/08/19/Web-Security-Learning/https://chybeta.github.io/2017/08/19/Web-Security-Learning/
1 star https://patch-diff.githubusercontent.com/xhackff/Web-Security-Learning/stargazers
1k forks https://patch-diff.githubusercontent.com/xhackff/Web-Security-Learning/forks
Branches https://patch-diff.githubusercontent.com/xhackff/Web-Security-Learning/branches
Tags https://patch-diff.githubusercontent.com/xhackff/Web-Security-Learning/tags
Activity https://patch-diff.githubusercontent.com/xhackff/Web-Security-Learning/activity
Star https://patch-diff.githubusercontent.com/login?return_to=%2Fxhackff%2FWeb-Security-Learning
Notifications https://patch-diff.githubusercontent.com/login?return_to=%2Fxhackff%2FWeb-Security-Learning
Code https://patch-diff.githubusercontent.com/xhackff/Web-Security-Learning
Pull requests 0 https://patch-diff.githubusercontent.com/xhackff/Web-Security-Learning/pulls
Actions https://patch-diff.githubusercontent.com/xhackff/Web-Security-Learning/actions
Projects 0 https://patch-diff.githubusercontent.com/xhackff/Web-Security-Learning/projects
Security Uh oh! There was an error while loading. Please reload this page. https://patch-diff.githubusercontent.com/xhackff/Web-Security-Learning/security
Please reload this pagehttps://patch-diff.githubusercontent.com/xhackff/Web-Security-Learning
Insights https://patch-diff.githubusercontent.com/xhackff/Web-Security-Learning/pulse
Code https://patch-diff.githubusercontent.com/xhackff/Web-Security-Learning
Pull requests https://patch-diff.githubusercontent.com/xhackff/Web-Security-Learning/pulls
Actions https://patch-diff.githubusercontent.com/xhackff/Web-Security-Learning/actions
Projects https://patch-diff.githubusercontent.com/xhackff/Web-Security-Learning/projects
Security https://patch-diff.githubusercontent.com/xhackff/Web-Security-Learning/security
Insights https://patch-diff.githubusercontent.com/xhackff/Web-Security-Learning/pulse
Brancheshttps://patch-diff.githubusercontent.com/xhackff/Web-Security-Learning/branches
Tagshttps://patch-diff.githubusercontent.com/xhackff/Web-Security-Learning/tags
https://patch-diff.githubusercontent.com/xhackff/Web-Security-Learning/branches
https://patch-diff.githubusercontent.com/xhackff/Web-Security-Learning/tags
59 Commitshttps://patch-diff.githubusercontent.com/xhackff/Web-Security-Learning/commits/master/
https://patch-diff.githubusercontent.com/xhackff/Web-Security-Learning/commits/master/
.gitattributeshttps://patch-diff.githubusercontent.com/xhackff/Web-Security-Learning/blob/master/.gitattributes
.gitattributeshttps://patch-diff.githubusercontent.com/xhackff/Web-Security-Learning/blob/master/.gitattributes
.gitignorehttps://patch-diff.githubusercontent.com/xhackff/Web-Security-Learning/blob/master/.gitignore
.gitignorehttps://patch-diff.githubusercontent.com/xhackff/Web-Security-Learning/blob/master/.gitignore
README.mdhttps://patch-diff.githubusercontent.com/xhackff/Web-Security-Learning/blob/master/README.md
README.mdhttps://patch-diff.githubusercontent.com/xhackff/Web-Security-Learning/blob/master/README.md
SUMMARY.mdhttps://patch-diff.githubusercontent.com/xhackff/Web-Security-Learning/blob/master/SUMMARY.md
SUMMARY.mdhttps://patch-diff.githubusercontent.com/xhackff/Web-Security-Learning/blob/master/SUMMARY.md
READMEhttps://patch-diff.githubusercontent.com/xhackff/Web-Security-Learning
Web-Security-Learninghttps://chybeta.github.io/2017/08/19/Web-Security-Learning/
https://patch-diff.githubusercontent.com/xhackff/Web-Security-Learning#web-security-learning
https://github.com/CHYbeta/Web-Security-Learninghttps://github.com/CHYbeta/Web-Security-Learning
chybeta: Web-Security-Learninghttps://chybeta.github.io/2017/08/19/Web-Security-Learning/
Web-Security-Learninghttps://patch-diff.githubusercontent.com/xhackff/Web-Security-Learning#web-security-learning
Web Securityhttps://patch-diff.githubusercontent.com/xhackff/Web-Security-Learning#web-security
sql注入https://patch-diff.githubusercontent.com/xhackff/Web-Security-Learning#sql%E6%B3%A8%E5%85%A5
MySqlhttps://patch-diff.githubusercontent.com/xhackff/Web-Security-Learning#mysql
MSSQLhttps://patch-diff.githubusercontent.com/xhackff/Web-Security-Learning#mssql
PostgreSQLhttps://patch-diff.githubusercontent.com/xhackff/Web-Security-Learning#postgresql
MongoDBhttps://patch-diff.githubusercontent.com/xhackff/Web-Security-Learning#mongodb
技巧https://patch-diff.githubusercontent.com/xhackff/Web-Security-Learning#%E6%8A%80%E5%B7%A7
工具https://patch-diff.githubusercontent.com/xhackff/Web-Security-Learning#%E5%B7%A5%E5%85%B7
XSShttps://patch-diff.githubusercontent.com/xhackff/Web-Security-Learning#xss
CSRFhttps://patch-diff.githubusercontent.com/xhackff/Web-Security-Learning#csrf
其他前端安全https://patch-diff.githubusercontent.com/xhackff/Web-Security-Learning#%E5%85%B6%E4%BB%96%E5%89%8D%E7%AB%AF%E5%AE%89%E5%85%A8
SSRFhttps://patch-diff.githubusercontent.com/xhackff/Web-Security-Learning#ssrf
XXEhttps://patch-diff.githubusercontent.com/xhackff/Web-Security-Learning#xxe
JSONP注入https://patch-diff.githubusercontent.com/xhackff/Web-Security-Learning#jsonp%E6%B3%A8%E5%85%A5
SSTIhttps://patch-diff.githubusercontent.com/xhackff/Web-Security-Learning#ssti
代码执行 / 命令执行https://patch-diff.githubusercontent.com/xhackff/Web-Security-Learning#%E4%BB%A3%E7%A0%81%E6%89%A7%E8%A1%8C--%E5%91%BD%E4%BB%A4%E6%89%A7%E8%A1%8C
文件包含https://patch-diff.githubusercontent.com/xhackff/Web-Security-Learning#%E6%96%87%E4%BB%B6%E5%8C%85%E5%90%AB
文件上传 / 解析漏洞https://patch-diff.githubusercontent.com/xhackff/Web-Security-Learning#%E6%96%87%E4%BB%B6%E4%B8%8A%E4%BC%A0--%E8%A7%A3%E6%9E%90%E6%BC%8F%E6%B4%9E
逻辑漏洞https://patch-diff.githubusercontent.com/xhackff/Web-Security-Learning#%E9%80%BB%E8%BE%91%E6%BC%8F%E6%B4%9E
其他漏洞https://patch-diff.githubusercontent.com/xhackff/Web-Security-Learning#%E5%85%B6%E4%BB%96%E6%BC%8F%E6%B4%9E
RPO(relative path overwrite)https://patch-diff.githubusercontent.com/xhackff/Web-Security-Learning#rporelative-path-overwrite
Web Cachehttps://patch-diff.githubusercontent.com/xhackff/Web-Security-Learning#web-cache
redishttps://patch-diff.githubusercontent.com/xhackff/Web-Security-Learning#redis
PHP相关https://patch-diff.githubusercontent.com/xhackff/Web-Security-Learning#php%E7%9B%B8%E5%85%B3
弱类型https://patch-diff.githubusercontent.com/xhackff/Web-Security-Learning#%E5%BC%B1%E7%B1%BB%E5%9E%8B
随机数问题https://patch-diff.githubusercontent.com/xhackff/Web-Security-Learning#%E9%9A%8F%E6%9C%BA%E6%95%B0%E9%97%AE%E9%A2%98
伪协议https://patch-diff.githubusercontent.com/xhackff/Web-Security-Learning#%E4%BC%AA%E5%8D%8F%E8%AE%AE
序列化https://patch-diff.githubusercontent.com/xhackff/Web-Security-Learning#%E5%BA%8F%E5%88%97%E5%8C%96
php mail header injectionhttps://patch-diff.githubusercontent.com/xhackff/Web-Security-Learning#php-mail-header-injection
其他https://patch-diff.githubusercontent.com/xhackff/Web-Security-Learning#%E5%85%B6%E4%BB%96
php代码审计https://patch-diff.githubusercontent.com/xhackff/Web-Security-Learning#php%E4%BB%A3%E7%A0%81%E5%AE%A1%E8%AE%A1
java-Webhttps://patch-diff.githubusercontent.com/xhackff/Web-Security-Learning#java-web
反序列https://patch-diff.githubusercontent.com/xhackff/Web-Security-Learning#%E5%8F%8D%E5%BA%8F%E5%88%97
Struct2https://patch-diff.githubusercontent.com/xhackff/Web-Security-Learning#struct2
java-Web代码审计https://patch-diff.githubusercontent.com/xhackff/Web-Security-Learning#java-web%E4%BB%A3%E7%A0%81%E5%AE%A1%E8%AE%A1
其他https://patch-diff.githubusercontent.com/xhackff/Web-Security-Learning#%E5%85%B6%E4%BB%96-1
python-Webhttps://patch-diff.githubusercontent.com/xhackff/Web-Security-Learning#python-web
Node-jshttps://patch-diff.githubusercontent.com/xhackff/Web-Security-Learning#node-js
WAF相关https://patch-diff.githubusercontent.com/xhackff/Web-Security-Learning#waf%E7%9B%B8%E5%85%B3
渗透测试https://patch-diff.githubusercontent.com/xhackff/Web-Security-Learning#%E6%B8%97%E9%80%8F%E6%B5%8B%E8%AF%95
Coursehttps://patch-diff.githubusercontent.com/xhackff/Web-Security-Learning#course
信息收集https://patch-diff.githubusercontent.com/xhackff/Web-Security-Learning#%E4%BF%A1%E6%81%AF%E6%94%B6%E9%9B%86
渗透https://patch-diff.githubusercontent.com/xhackff/Web-Security-Learning#%E6%B8%97%E9%80%8F
渗透实战https://patch-diff.githubusercontent.com/xhackff/Web-Security-Learning#%E6%B8%97%E9%80%8F%E5%AE%9E%E6%88%98
提权https://patch-diff.githubusercontent.com/xhackff/Web-Security-Learning#%E6%8F%90%E6%9D%83
渗透技巧https://patch-diff.githubusercontent.com/xhackff/Web-Security-Learning#%E6%B8%97%E9%80%8F%E6%8A%80%E5%B7%A7
运维https://patch-diff.githubusercontent.com/xhackff/Web-Security-Learning#%E8%BF%90%E7%BB%B4
DDOShttps://patch-diff.githubusercontent.com/xhackff/Web-Security-Learning#ddos
CTFhttps://patch-diff.githubusercontent.com/xhackff/Web-Security-Learning#ctf
技巧总结https://patch-diff.githubusercontent.com/xhackff/Web-Security-Learning#%E6%8A%80%E5%B7%A7%E6%80%BB%E7%BB%93
https://patch-diff.githubusercontent.com/xhackff/Web-Security-Learning#%E6%9D%82
https://patch-diff.githubusercontent.com/xhackff/Web-Security-Learning#web-security
https://patch-diff.githubusercontent.com/xhackff/Web-Security-Learning#sql注入
https://patch-diff.githubusercontent.com/xhackff/Web-Security-Learning#mysql
MySQL False 注入及技巧总结https://www.anquanke.com/post/id/86021
MySQL 注入攻击与防御https://www.anquanke.com/post/id/85936
sql注入学习总结 https://mp.weixin.qq.com/s?__biz=MzI5MDQ2NjExOQ==&mid=2247484372&idx=1&sn=ffcc51a88c9acf96c312421b75fc2a26&chksm=ec1e33fcdb69baea53838fd545a236c0deb8a42f3b341ee0879c9e4ac9427c2147fab95b6669#rd
SQL注入防御与绕过的几种姿势https://www.anquanke.com/post/id/86005
MySQL偏门技巧http://rcoil.me/2017/05/MySQL%E5%81%8F%E9%97%A8%E6%8A%80%E5%B7%A7/
mysql注入可报错时爆表名、字段名、库名http://www.wupco.cn/?p=4117
高级SQL注入:混淆和绕过http://www.cnblogs.com/croot/p/3450262.html
Mysql约束攻击https://ch1st.github.io/2017/10/19/Mysql%E7%BA%A6%E6%9D%9F%E6%94%BB%E5%87%BB/
Mysql数据库渗透及漏洞利用总结 https://xianzhi.aliyun.com/forum/topic/1491/
MySQL绕过WAF实战技巧 http://www.freebuf.com/articles/web/155570.html
NetSPI SQL Injection Wikihttps://sqlwiki.netspi.com/
SQL注入的“冷门姿势” http://www.freebuf.com/articles/web/155876.html
时间延迟盲注的三种加速注入方式mysqlhttps://www.ch1st.cn/?p=44
基于时间的高效的SQL盲注-使用MySQL的位运算符https://xz.aliyun.com/t/3054
Mysql UDF BackDoorhttps://xz.aliyun.com/t/2365
mysql小括号被过滤后的盲注https://www.th1s.cn/index.php/2018/02/26/213.html
SSRF To RCE in MySQLhttp://docs.ioin.in/writeup/mp.weixin.qq.com/49ca504e-3b31-40ac-8591-f833086cb588/index.html
MySQL-盲注浅析http://rcoil.me/2017/11/MySQL-%E7%9B%B2%E6%B3%A8%E6%B5%85%E6%9E%90/
Mysql字符编码利用技巧https://www.leavesongs.com/PENETRATION/mysql-charset-trick.html
MySQL Injection in Update, Insert and Deletehttps://osandamalith.com/2017/02/08/mysql-injection-in-update-insert-and-delete/
https://patch-diff.githubusercontent.com/xhackff/Web-Security-Learning#mssql
MSSQL DBA权限获取WEBSHELL的过程 http://fuping.site/2017/05/16/MSSQL-DBA-Permission-GET-WEBSHELL/
MSSQL 注入攻击与防御https://www.anquanke.com/post/id/86011
CLR在SQL Server中的利用技术分http://docs.ioin.in/writeup/cert.360.cn/_files_CLR_E5_9C_A8SQL_20Server_E4_B8_AD_E7_9A_84_E5_88_A9_E7_94_A8_E6_8A_80_E6_9C_AF_E5_88_86_E6_9E_90_pdf/index.pdf
MSSQL不使用xp_cmdshell执行命令并获取回显的两种方法https://zhuanlan.zhihu.com/p/33322584
https://patch-diff.githubusercontent.com/xhackff/Web-Security-Learning#postgresql
postgresql数据库利用方式 https://mp.weixin.qq.com/s?__biz=MzI5MDQ2NjExOQ==&mid=2247484788&idx=1&sn=8a53b1c64d864cd01bab095d97a17715&chksm=ec1e355cdb69bc4a2535bc1a053bfde3ec1838d03936ba8e44156818e91bbec9b5b04a744005#rd
PostgreSQL渗透测试指南https://www.anquanke.com/post/id/86468
渗透中利用postgresql getshell http://www.jianfensec.com/postgresql_getshell.html
https://patch-diff.githubusercontent.com/xhackff/Web-Security-Learning#mongodb
十分钟看懂MongoDB攻防实战http://www.freebuf.com/articles/database/148823.html
MongoDB安全 – PHP注入检测http://www.mottoin.com/94341.html
技术分享:如何Hacking MongoDB?https://www.freebuf.com/articles/network/101494.html
MongoDB安全,php中的注入攻击https://www.anquanke.com/post/id/84009
一个MongoDB注入攻击案例分析https://www.freebuf.com/articles/web/106085.html
https://patch-diff.githubusercontent.com/xhackff/Web-Security-Learning#技巧
我的WafBypass之道(SQL注入篇)https://xz.aliyun.com/t/368
Bypass 360主机卫士SQL注入防御http://www.cnblogs.com/xiaozi/p/7275134.html
SQL注入之骚姿势小记https://mp.weixin.qq.com/s/ORsciwsBGQJhFdKqceprSw
CTF比赛中SQL注入的一些经验总结 http://www.freebuf.com/articles/web/137094.html
如何绕过WAF/NGWAF的libinjection实现SQL注入http://bobao.360.cn/learning/detail/3855.html
HackMe-SQL-Injection-Challengeshttps://github.com/breakthenet/HackMe-SQL-Injection-Challenges
绕过WAF注入https://bbs.ichunqiu.com/thread-25397-1-1.html?from=sec
bypassGET和POST的注入防御思路分享https://bbs.ichunqiu.com/thread-16134-1-1.html?from=sec
SQL注入的常规思路及奇葩技巧 https://mp.weixin.qq.com/s/hBkJ1M6LRgssNyQyati1ng
Beyond SQLi: Obfuscate and Bypasshttps://www.exploit-db.com/papers/17934/
Dnslog在SQL注入中的实战https://www.anquanke.com/post/id/98096
SQL注入:如何通过Python CGIHTTPServer绕过CSRF tokenshttps://www.anquanke.com/post/id/87022
BypassD盾IIS防火墙SQL注入防御(多姿势)https://xz.aliyun.com/t/40
https://patch-diff.githubusercontent.com/xhackff/Web-Security-Learning#工具
sqlmap自带的tamper你了解多少? https://mp.weixin.qq.com/s/vEEoMacmETUA4yZODY8xMQ
sqlmap的使用 ---- 自带绕过脚本tamperhttps://xz.aliyun.com/t/2746
使用burp macros和sqlmap绕过csrf防护进行sql注入http://bobao.360.cn/learning/detail/3557.html
sqlmap 使用总结 http://www.zerokeeper.com/web-security/sqlmap-usage-summary.html
SQLmap tamper脚本注释http://www.lengbaikai.net/?p=110
通过Burp以及自定义的Sqlmap Tamper进行二次SQL注入http://www.4hou.com/system/6945.html
SQLMAP JSON格式检测https://xz.aliyun.com/t/1091
记一份SQLmap使用手册小结(一)https://xz.aliyun.com/t/3010
记一份SQLmap使用手册小结(二)https://xz.aliyun.com/t/3011
https://patch-diff.githubusercontent.com/xhackff/Web-Security-Learning#xss
漫谈同源策略攻防https://www.anquanke.com/post/id/86078
再谈同源策略 https://lightless.me/archives/review-SOP.html
跨域方法总结https://xz.aliyun.com/t/224
前端安全系列(一):如何防止XSS攻击?https://segmentfault.com/a/1190000016551188
浅谈跨站脚本攻击与防御 http://thief.one/2017/05/31/1/
跨站的艺术-XSS入门与介绍http://www.fooying.com/the-art-of-xss-1-introduction/
DOMXSS Wikihttps://github.com/wisec/domxsswiki/wiki
XSS Bypass Cookbookhttps://xz.aliyun.com/t/311
Content Security Policy 入门教程https://jaq.alibaba.com/community/art/show?spm=a313e.7916646.24000001.49.ZP8rXN&articleid=518
从瑞士军刀到变形金刚--XSS攻击面拓展https://xz.aliyun.com/t/96
前端防御从入门到弃坑--CSP变迁https://paper.seebug.org/423/
严格 CSP 下的几种有趣的思路(34c3 CTF)http://www.melodia.pw/?p=935
Bypassing CSP using polyglot JPEGs http://blog.portswigger.net/2016/12/bypassing-csp-using-polyglot-jpegs.html
Bypass unsafe-inline mode CSPhttp://paper.seebug.org/91/
Chrome XSS Auditor – SVG Bypasshttps://brutelogic.com.br/blog/chrome-xss-auditor-svg-bypass/
Cross site scripting payload for fuzzinghttps://xianzhi.aliyun.com/forum/read/1704.html
XSS Without Dotshttps://markitzeroday.com/character-restrictions/xss/2017/07/26/xss-without-dots.html
Alternative to Javascript Pseudo-Protocolhttp://brutelogic.com.br/blog/alternative-javascript-pseudo-protocol/
不常见的xss利用探索http://docs.ioin.in/writeup/wps2015.org/_2016_06_27__E4_B8_8D_E5_B8_B8_E8_A7_81_E7_9A_84xss_E5_88_A9_E7_94_A8_E6_8E_A2_E7_B4_A2_/index.html
XSS攻击另类玩法https://bbs.ichunqiu.com/thread-25578-1-1.html?from=sec
XSS易容术---bypass之编码混淆篇+辅助脚本编写https://bbs.ichunqiu.com/thread-17500-1-1.html?from=sec
Xssing Web With Unicodeshttp://blog.rakeshmane.com/2017/08/xssing-web-part-2.html
Electron hack —— 跨平台 XSS https://mp.weixin.qq.com/s?__biz=MzU2NjE2NjIxNg==&mid=2247483756&idx=1&sn=96ae19e53426d5088718b6d37996e700&source=41#wechat_redirect
XSS without HTML: Client-Side Template Injection with AngularJS http://blog.portswigger.net/2016/01/xss-without-html-client-side-template.html
Modern Alchemy: Turning XSS into RCEhttps://blog.doyensec.com/2017/08/03/electron-framework-security.html
先知XSS挑战赛 - L3m0n Writeuphttps://xz.aliyun.com/t/83
SheepSec: 7 Reflected Cross-site Scripting (XSS) Exampleshttp://sheepsec.com/blog/7-reflected-xss.html
Browser's XSS Filter Bypass Cheat Sheethttps://github.com/masatokinugawa/filterbypass/wiki/Browser's-XSS-Filter-Bypass-Cheat-Sheet
妙用JavaScript绕过XSS过滤https://www.anquanke.com/post/id/86849
https://patch-diff.githubusercontent.com/xhackff/Web-Security-Learning#csrf
Wiping Out CSRFhttps://medium.com/@jrozner/wiping-out-csrf-ded97ae7e83f
CSRF攻击与防御https://www.cnblogs.com/phpstudy2015-6/p/6771239.html
用代码来细说Csrf漏洞危害以及防御https://bbs.ichunqiu.com/thread-24127-1-1.html?from=sec
Cookie-Form型CSRF防御机制的不足与反思https://www.leavesongs.com/PENETRATION/think-about-cookie-form-csrf-protected.html
关于JSON CSRF的一些思考https://mp.weixin.qq.com/s?__biz=MzIzMTc1MjExOQ==&mid=2247484126&idx=1&sn=f437882b19bed8d99d0a00938accc0c8&chksm=e89e2a06dfe9a310506419467ada63bee80f10c32267d0b11ea7d1f5491c5afdb344c5dac74e&mpshare=1&scene=23&srcid=0614BOCQBHPjaS2IOtADI3PP#rd
Exploiting JSON Cross Site Request Forgery (CSRF) using Flashhttp://www.geekboy.ninja/blog/exploiting-json-cross-site-request-forgery-csrf-using-flash/
浅谈Session机制及CSRF攻防 https://mp.weixin.qq.com/s/aID_N9bgq91EM26qVSVBXw
CSRF 花式绕过Referer技巧https://www.ohlinge.cn/web/csrf_referer.html
各大SRC中的CSRF技巧http://www.freebuf.com/column/151816.html
白帽子挖洞—跨站请求伪造(CSRF)篇 http://www.freebuf.com/column/153543.html
读取型CSRF-需要交互的内容劫持https://bbs.ichunqiu.com/thread-36314-1-1.html
https://patch-diff.githubusercontent.com/xhackff/Web-Security-Learning#其他前端安全
HTML中,闭合优先的神奇标签 https://mp.weixin.qq.com/s?__biz=MzA4MDA1NDE3Mw==&mid=2647715481&idx=1&sn=a4d930d5a944a5a6c0361a3c6c57d3d5
JavaScript Dangerous Functions (Part 1) - HTML Manipulation http://blog.blueclosure.com/2017/09/javascript-dangerous-functions-part-1.html
safari本地文件读取漏洞之扩展攻击面http://www.wupco.cn/?p=4134
利用脚本注入漏洞攻击ReactJS应用程序http://www.freebuf.com/articles/web/144988.html
当代 Web 的 JSON 劫持技巧http://paper.seebug.org/130/?from=timeline&isappinstalled=0
从微信小程序看前端代码安全https://share.whuboy.com/weapp.html
https://patch-diff.githubusercontent.com/xhackff/Web-Security-Learning#ssrf
SSRF:CVE-2017-9993 FFmpeg + AVI + HLShttps://hackmd.io/p/H1B9zOg_W
SSRF(服务器端请求伪造)测试资源https://paper.seebug.org/393/
Build Your SSRF Exploit Framework SSRFhttp://docs.ioin.in/writeup/fuzz.wuyun.org/_src_build_your_ssrf_exp_autowork_pdf/index.pdf
SSRF攻击实例解析http://www.freebuf.com/articles/web/20407.html
SSRF漏洞分析与利用http://www.4o4notfound.org/index.php/archives/33/
SSRF漏洞的挖掘经验https://www.secpulse.com/archives/4747.html
SSRF漏洞的利用与学习http://uknowsec.cn/posts/notes/SSRF%E6%BC%8F%E6%B4%9E%E7%9A%84%E5%88%A9%E7%94%A8%E4%B8%8E%E5%AD%A6%E4%B9%A0.html
SSRF漏洞中绕过IP限制的几种方法总结http://www.freebuf.com/articles/web/135342.html
利用ssrf漏洞获取google内部的dns信息http://bobao.360.cn/learning/detail/3566.html
What is Server Side Request Forgery (SSRF)?https://www.acunetix.com/blog/articles/server-side-request-forgery-vulnerability/
Use DNS Rebinding to Bypass SSRF in Javahttps://mp.weixin.qq.com/s?__biz=MzIzOTQ5NjUzOQ==&mid=2247483742&idx=1&sn=e7265d5351a6d9ed30d90be1c17be041
SSRF in JAVAhttps://xianzhi.aliyun.com/forum/topic/1712/
DNS Rebinding技术绕过SSRF/代理IP限制http://www.mottoin.com/95734.html
Discuz ssrf漏洞利用的几个python脚本https://phpinfo.me/2017/02/23/1438.html
Discuz X系列门户文章功能SSRF漏洞挖掘与分析http://bobao.360.cn/learning/detail/2889.html
SSRF to GET SHELLhttp://blog.feei.cn/ssrf/
SSRF Tipshttp://blog.safebuff.com/2016/07/03/SSRF-Tips/
https://patch-diff.githubusercontent.com/xhackff/Web-Security-Learning#xxe
浅谈XXE漏洞攻击与防御http://thief.one/2017/06/20/1/
XXE漏洞分析http://www.4o4notfound.org/index.php/archives/29/
XML实体注入漏洞攻与防http://www.hackersb.cn/hacker/211.html
XML实体注入漏洞的利用与学习http://uknowsec.cn/posts/notes/XML%E5%AE%9E%E4%BD%93%E6%B3%A8%E5%85%A5%E6%BC%8F%E6%B4%9E%E7%9A%84%E5%88%A9%E7%94%A8%E4%B8%8E%E5%AD%A6%E4%B9%A0.html
XXE注入:攻击与防御 - XXE Injection: Attack and Preventhttp://le4f.net/post/xxe-injection-attack_and_prevent
XXE (XML External Entity Injection) 漏洞实践http://www.mottoin.com/101806.html
黑夜的猎杀-盲打XXEhttps://xianzhi.aliyun.com/forum/read/1837.html
Hunting in the Dark - Blind XXEhttps://blog.zsec.uk/blind-xxe-learning/
XMLExternal Entity漏洞培训模块https://www.sans.org/freading-room/whitepapers/application/hands-on-xml-external-entity-vulnerability-training-module-34397
如何挖掘Uber网站的XXE注入漏洞http://www.mottoin.com/86853.html
XXE被提起时我们会想到什么http://www.mottoin.com/88085.html
XXE漏洞的简单理解和测试http://www.mottoin.com/92794.html
XXE漏洞攻防之我见http://bobao.360.cn/learning/detail/3841.html
XXE漏洞利用的一些技巧http://www.91ri.org/17052.html
神奇的Content-Type——在JSON中玩转XXE攻击http://bobao.360.cn/learning/detail/360.html
XXE-DTD Cheat Sheethttps://web-in-security.blogspot.jp/2016/03/xxe-cheat-sheet.html
XML? Be cautious!https://blog.pragmatists.com/xml-be-cautious-69a981fdc56a
XSLT Server Side Injection Attackshttps://www.contextis.com/blog/xslt-server-side-injection-attacks
Java XXE Vulnerabilityhttps://joychou.org/web/java-xxe-vulnerability.html
xml-attacks.mdhttps://gist.github.com/mgeeky/4f726d3b374f0a34267d4f19c9004870
https://patch-diff.githubusercontent.com/xhackff/Web-Security-Learning#jsonp注入
JSONP注入解析 http://www.freebuf.com/articles/web/126347.html
JSONP 安全攻防技术http://blog.knownsec.com/2015/03/jsonp_security_technic/
一次关于JSONP的小实验与总结http://www.cnblogs.com/vimsk/archive/2013/01/29/2877888.html
利用JSONP跨域获取信息https://xianzhi.aliyun.com/forum/read/1571.html
关于跨域和jsonp的一些理解(新手向)https://segmentfault.com/a/1190000009577990
水坑攻击之Jsonp hijacking-信息劫持http://www.mottoin.com/88237.html
https://patch-diff.githubusercontent.com/xhackff/Web-Security-Learning#ssti
Jinja2 template injection filter bypasseshttps://0day.work/jinja2-template-injection-filter-bypasses/
乱弹Flask注入http://www.freebuf.com/articles/web/88768.html
服务端模板注入攻击 (SSTI)之浅析 http://www.freebuf.com/vuls/83999.html
Exploring SSTI in Flask/Jinja2https://nvisium.com/blog/2016/03/09/exploring-ssti-in-flask-jinja2/
Flask Jinja2开发中遇到的的服务端注入问题研究http://www.freebuf.com/articles/web/136118.html
FlaskJinja2 开发中遇到的的服务端注入问题研究 IIhttp://www.freebuf.com/articles/web/136180.html
Exploring SSTI in Flask/Jinja2, Part IIhttps://nvisium.com/blog/2016/03/11/exploring-ssti-in-flask-jinja2-part-ii/
Injecting Flaskhttps://nvisium.com/blog/2015/12/07/injecting-flask/
Server-Side Template Injection: RCE for the modern webapphttps://www.blackhat.com/docs/us-15/materials/us-15-Kettle-Server-Side-Template-Injection-RCE-For-The-Modern-Web-App-wp.pdf
Exploiting Python Code Injection in Web Applicationshttps://sethsec.blogspot.jp/2016/11/exploiting-python-code-injection-in-web.html
利用 Python 特性在 Jinja2 模板中执行任意代码http://rickgray.me/2016/02/24/use-python-features-to-execute-arbitrary-codes-in-jinja2-templates.html
Python 模板字符串与模板注入https://virusdefender.net/index.php/archives/761/
Ruby ERB Template Injectionhttps://www.trustedsec.com/2017/09/rubyerb-template-injection/
服务端模板注入攻击https://zhuanlan.zhihu.com/p/28823933
https://patch-diff.githubusercontent.com/xhackff/Web-Security-Learning#代码执行--命令执行
从PHP源码与扩展开发谈PHP任意代码执行与防御https://blog.zsxsoft.com/post/30
Command Injection/Shell Injectionhttps://www.exploit-db.com/docs/42593.pdf
PHP Code Injection Analysishttp://www.polaris-lab.com/index.php/archives/254/
利用环境变量LD_PRELOAD来绕过php disable_function执行系统命令http://doc.ph0en1x.com/wooyun_drops/%E5%88%A9%E7%94%A8%E7%8E%AF%E5%A2%83%E5%8F%98%E9%87%8FLD_PRELOAD%E6%9D%A5%E7%BB%95%E8%BF%87php%20disable_function%E6%89%A7%E8%A1%8C%E7%B3%BB%E7%BB%9F%E5%91%BD%E4%BB%A4.html
Hack PHP mail additional_parametershttp://blog.nsfocus.net/hack-php-mail-additional_parameters/
详细解析PHP mail()函数漏洞利用技巧http://bobao.360.cn/learning/detail/3818.html
在PHP应用程序开发中不正当使用mail()函数引发的血案http://bobao.360.cn/learning/detail/3809.html
BigTree CMS - Bypass CSRF filter and execute code with PHPMailerhttps://www.cdxy.me/?p=765
基于时间反馈的RCEhttp://www.mottoin.com/97678.html
正则表达式使用不当引发的系统命令执行漏洞http://bobao.360.cn/learning/detail/3609.html
命令注入突破长度限制 http://www.freebuf.com/articles/web/154453.html
https://patch-diff.githubusercontent.com/xhackff/Web-Security-Learning#文件包含
php文件包含漏洞 https://chybeta.github.io/2017/10/08/php%E6%96%87%E4%BB%B6%E5%8C%85%E5%90%AB%E6%BC%8F%E6%B4%9E/
Turning LFI into RFIhttps://l.avala.mp/?p=241
PHP文件包含漏洞总结http://wooyun.jozxing.cc/static/drops/tips-3827.html
常见文件包含发生场景与防御http://bobao.360.cn/learning/detail/3873.html
基于云端的本地文件包含漏洞http://bobao.360.cn/learning/detail/3871.html
zip或phar协议包含文件https://bl4ck.in/tricks/2015/06/10/zip%E6%88%96phar%E5%8D%8F%E8%AE%AE%E5%8C%85%E5%90%AB%E6%96%87%E4%BB%B6.html
文件包含漏洞 一http://drops.blbana.cc/2016/08/12/e6-96-87-e4-bb-b6-e5-8c-85-e5-90-ab-e6-bc-8f-e6-b4-9e/
文件包含漏洞 二http://drops.blbana.cc/2016/12/03/e6-96-87-e4-bb-b6-e5-8c-85-e5-90-ab-e6-bc-8f-e6-b4-9e-ef-bc-88-e4-ba-8c-ef-bc-89/
https://patch-diff.githubusercontent.com/xhackff/Web-Security-Learning#文件上传--解析漏洞
文件上传和WAF的攻与防https://www.secfree.com/article-585.html
我的WafBypass之道(upload篇)https://xianzhi.aliyun.com/forum/read/458.html
文件上传漏洞(绕过姿势) http://thief.one/2016/09/22/%E4%B8%8A%E4%BC%A0%E6%9C%A8%E9%A9%AC%E5%A7%BF%E5%8A%BF%E6%B1%87%E6%80%BB-%E6%AC%A2%E8%BF%8E%E8%A1%A5%E5%85%85/
服务器解析漏洞 http://thief.one/2016/09/21/%E6%9C%8D%E5%8A%A1%E5%99%A8%E8%A7%A3%E6%9E%90%E6%BC%8F%E6%B4%9E/
文件上传总结 https://masterxsec.github.io/2017/04/26/%E6%96%87%E4%BB%B6%E4%B8%8A%E4%BC%A0%E6%80%BB%E7%BB%93/
文件上传绕过姿势总结http://www.cnnetarmy.com/%E6%96%87%E4%BB%B6%E4%B8%8A%E4%BC%A0%E7%BB%95%E8%BF%87%E5%A7%BF%E5%8A%BF%E6%80%BB%E7%BB%93/
尽最大可能分析上传源码及漏洞利用方式https://www.hackfun.org/pentest/make-the-most-possible-analysis-of-the-source-code-and-exploit-the-vulnerability.html
从XSSer的角度测试上传文件功能https://xianzhi.aliyun.com/forum/read/224.html
代码审计之逻辑上传漏洞挖掘http://wooyun.jozxing.cc/static/drops/papers-1957.html
渗透测试方法论之文件上传https://bbs.ichunqiu.com/thread-23193-1-1.html?from=sec
关于文件名解析的一些探索https://landgrey.me/filetype-parsing-attack/
Web安全 — 上传漏洞绕过 http://www.freebuf.com/column/161357.html
https://patch-diff.githubusercontent.com/xhackff/Web-Security-Learning#逻辑漏洞
A couple more common OAuth 2.0 vulnerabilities https://blog.avuln.com/article/4
代码审计之逻辑上传漏洞挖掘http://wooyun.jozxing.cc/static/drops/papers-1957.html
逻辑至上——内含各种酷炫姿势http://bobao.360.cn/learning/detail/3769.html
Web安全测试中常见逻辑漏洞解析(实战篇)http://www.freebuf.com/vuls/112339.html
逻辑漏洞之密码重置 https://mp.weixin.qq.com/s/Lynmqd_ieEoNJ3mmyv9eQQ
逻辑漏洞之支付漏洞https://mp.weixin.qq.com/s/w22omfxO8vU6XzixXWmBxg
逻辑漏洞之越权访问https://mp.weixin.qq.com/s/ChiXtcrEyQeLkGOkm4PTog
密码找回逻辑漏洞总结http://wooyun.jozxing.cc/static/drops/web-5048.html
一些常见的重置密码漏洞分析整理http://wooyun.jozxing.cc/static/drops/papers-2035.html
密码逻辑漏洞小总结http://docs.ioin.in/writeup/blog.heysec.org/_archives_643/index.html
漏洞挖掘之逻辑漏洞挖掘https://bbs.ichunqiu.com/thread-21161-1-1.html
tom0li: 逻辑漏洞小结https://tom0li.github.io/2017/07/17/%E9%80%BB%E8%BE%91%E6%BC%8F%E6%B4%9E%E5%B0%8F%E7%BB%93/
https://patch-diff.githubusercontent.com/xhackff/Web-Security-Learning#其他漏洞
未授权访问漏洞总结https://www.secpulse.com/archives/61101.html
未授权访问漏洞的检测与利用 https://thief.one/2017/12/08/1/
Web之困笔记http://www.au1ge.xyz/2017/08/09/web%E4%B9%8B%E5%9B%B0%E7%AC%94%E8%AE%B0/
常见Web源码泄露总结http://www.mottoin.com/95749.html
Github信息泄露升级版案例http://www.ms509.com/?p=718
Hacking iSCSIhttps://ricterz.me/posts/Hacking%20iSCSI
技术详解:基于Web的LDAP注入漏洞http://www.4hou.com/technology/9090.html
https://patch-diff.githubusercontent.com/xhackff/Web-Security-Learning#rporelative-path-overwrite
初探 Relative Path Overwritehttps://xianzhi.aliyun.com/forum/read/1527.html?fpage=2
Detecting and exploiting path-relative stylesheet import (PRSSI) vulnerabilitieshttp://blog.portswigger.net/2015/02/prssi.html
RPOhttp://www.thespanner.co.uk/2014/03/21/rpo/
A few RPO exploitation techniqueshttp://www.mbsd.jp/Whitepaper/rpo.pdf
https://patch-diff.githubusercontent.com/xhackff/Web-Security-Learning#web-cache
浅析 Web Cache 欺骗攻击http://bobao.360.cn/learning/detail/3828.html
https://patch-diff.githubusercontent.com/xhackff/Web-Security-Learning#redis
利用redis写webshellhttps://www.leavesongs.com/PENETRATION/write-webshell-via-redis-server.html
Redis 未授权访问配合 SSH key 文件利用分析http://blog.knownsec.com/2015/11/analysis-of-redis-unauthorized-of-expolit/
redis未授权访问漏洞利用总结https://xianzhi.aliyun.com/forum/read/750.html
【应急响应】redis未授权访问致远程植入挖矿脚本(防御篇) https://mp.weixin.qq.com/s/eUTZsGUGSO0AeBUaxq4Q2w
https://patch-diff.githubusercontent.com/xhackff/Web-Security-Learning#php相关
https://patch-diff.githubusercontent.com/xhackff/Web-Security-Learning#弱类型
从弱类型利用以及对象注入到SQL注入http://bobao.360.cn/learning/detail/3486.html
PHP中“==”运算符的安全问题http://bobao.360.cn/learning/detail/2924.html
PHP弱类型安全问题总结 http://blog.spoock.com/2016/06/25/weakly-typed-security/
浅谈PHP弱类型安全http://wooyun.jozxing.cc/static/drops/tips-4483.html
php比较操作符的安全问题http://wooyun.jozxing.cc/static/drops/tips-7679.html
https://patch-diff.githubusercontent.com/xhackff/Web-Security-Learning#随机数问题
PHP mt_rand()随机数安全 https://mp.weixin.qq.com/s/3TgBKXHw3MC61qIYELanJg
Cracking PHP rand()http://www.sjoerdlangkemper.nl/2016/02/11/cracking-php-rand/
php里的随机数http://5alt.me/2017/06/php%E9%87%8C%E7%9A%84%E9%9A%8F%E6%9C%BA%E6%95%B0/
php_mt_seed - PHP mt_rand() seed crackerhttp://www.openwall.com/php_mt_seed/
The GLIBC random number generatorhttp://www.mscs.dal.ca/~selinger/random/
一道伪随机数的CTF题https://github.com/wonderkun/CTF_web/blob/master/web500-2/writeup.pdf
https://patch-diff.githubusercontent.com/xhackff/Web-Security-Learning#伪协议
谈一谈php://filter的妙用https://patch-diff.githubusercontent.com/xhackff/Web-Security-Learning/blob/master/www.leavesongs.com/PENETRATION/php-filter-magic.html
php 伪协议http://lorexxar.cn/2016/09/14/php-wei/
利用 Gopher 协议拓展攻击面https://blog.chaitin.cn/gopher-attack-surfaces/
PHP伪协议之 Phar 协议(绕过包含)https://www.bodkin.ren/?p=902
PHP伪协议分析与应用http://www.4o4notfound.org/index.php/archives/31/
LFI、RFI、PHP封装协议安全问题学习http://www.cnblogs.com/LittleHann/p/3665062.html
https://patch-diff.githubusercontent.com/xhackff/Web-Security-Learning#序列化
PHP反序列化漏洞http://bobao.360.cn/learning/detail/4122.html
浅谈php反序列化漏洞 https://chybeta.github.io/2017/06/17/%E6%B5%85%E8%B0%88php%E5%8F%8D%E5%BA%8F%E5%88%97%E5%8C%96%E6%BC%8F%E6%B4%9E/
PHP反序列化漏洞成因及漏洞挖掘技巧与案例http://bobao.360.cn/learning/detail/3193.html
https://patch-diff.githubusercontent.com/xhackff/Web-Security-Learning#php-mail-header-injection
What is Email Header Injection?https://www.acunetix.com/blog/articles/email-header-injection/
PHP Email Injection Examplehttp://resources.infosecinstitute.com/email-injection/
https://patch-diff.githubusercontent.com/xhackff/Web-Security-Learning#其他
对于Php Shell Bypass思路总结https://www.inksec.cn/2017/11/06/bypass_shell_4/
Decrypt PHP's eval based encryption with debugger https://mp.weixin.qq.com/s?__biz=MzIxNjU3ODMyOQ==&mid=2247483693&idx=1&sn=ed49fc13d8e09f12d87675adff18919f
Upgrade from LFI to RCE via PHP Sessionshttps://www.rcesecurity.com/2017/08/from-lfi-to-rce-via-php-sessions/
Xdebug: A Tiny Attack Surfacehttps://ricterz.me/posts/Xdebug%3A%20A%20Tiny%20Attack%20Surface
Exploitable PHP functionshttps://stackoverflow.com/questions/3115559/exploitable-php-functions
从WordPress SQLi谈PHP格式化字符串问题https://paper.seebug.org/386/
php & apache2 &操作系统之间的一些黑魔法http://wonderkun.cc/index.html/?p=626
php内存破坏漏洞exp编写和禁用函数绕过http://blog.th3s3v3n.xyz/2016/05/01/bin/2016-5-1-php%E5%86%85%E5%AD%98%E7%A0%B4%E5%9D%8F%E6%BC%8F%E6%B4%9Eexp%E7%BC%96%E5%86%99%E5%92%8C%E7%A6%81%E7%94%A8%E5%87%BD%E6%95%B0%E7%BB%95%E8%BF%87/
挖掘PHP禁用函数绕过利用姿势http://blog.th3s3v3n.xyz/2016/11/20/web/%E6%8C%96%E6%8E%98PHP%E7%A6%81%E7%94%A8%E5%87%BD%E6%95%B0%E7%BB%95%E8%BF%87%E5%88%A9%E7%94%A8%E5%A7%BF%E5%8A%BF/
.user.ini文件构成的PHP后门http://wooyun.jozxing.cc/static/drops/tips-3424.html
https://patch-diff.githubusercontent.com/xhackff/Web-Security-Learning#php代码审计
PHP漏洞挖掘——进阶篇http://blog.nsfocus.net/php-vulnerability-mining/
论PHP常见的漏洞http://wooyun.jozxing.cc/static/drops/papers-4544.html
浅谈代码审计入门实战:某博客系统最新版审计之旅 http://www.freebuf.com/articles/rookie/143554.html
ctf中的php代码审计技巧http://www.am0s.com/ctf/200.html
PHP代码审计tipshttp://docs.ioin.in/writeup/www.91ri.org/_15074_html/index.html
代码审计之文件越权和文件上传搜索技巧http://docs.ioin.in/writeup/blog.heysec.org/_archives_170/index.html
PHP代码审计入门集合http://wiki.ioin.in/post/group/6Rb
PHP代码审计学习http://phantom0301.cc/2017/06/06/codeaudit/
PHP漏洞挖掘思路+实例http://wooyun.jozxing.cc/static/drops/tips-838.html
PHP漏洞挖掘思路+实例 第二章http://wooyun.jozxing.cc/static/drops/tips-858.html
浅谈代码审计入门实战:某博客系统最新版审计之旅 http://www.freebuf.com/articles/rookie/143554.html
PHP 代码审计小结 (一) https://www.chery666.cn/blog/2017/12/11/Code-audit.html
2018 PHP 应用程序安全设计指北 https://laravel-china.org/articles/7235/2018-php-application-security-design
https://patch-diff.githubusercontent.com/xhackff/Web-Security-Learning#java-web
https://patch-diff.githubusercontent.com/xhackff/Web-Security-Learning#反序列
Java_JSON反序列化之殇_看雪安全开发者峰会https://github.com/shengqi158/fastjson-remote-code-execute-poc/blob/master/Java_JSON%E5%8F%8D%E5%BA%8F%E5%88%97%E5%8C%96%E4%B9%8B%E6%AE%87_%E7%9C%8B%E9%9B%AA%E5%AE%89%E5%85%A8%E5%BC%80%E5%8F%91%E8%80%85%E5%B3%B0%E4%BC%9A.pdf
从反射链的构造看Java反序列漏洞http://www.freebuf.com/news/150872.html
Java反序列化漏洞从理解到实践http://bobao.360.cn/learning/detail/4474.html
Java 序列化与反序列化安全分析 http://mp.weixin.qq.com/s?__biz=MzI5ODE0ODA5MQ==&mid=2652278247&idx=1&sn=044893b732e4ffa267b00ffe1d9e4727&chksm=f7486473c03fed6525f0a869cbc4ddc03051cda92bb946377c4d831054954159542350768cf3&mpshare=1&scene=23&srcid=0919MUXFBglgDUEtLOha0wbo#rd
Java-Deserialization-Cheat-Sheethttps://github.com/GrrrDog/Java-Deserialization-Cheat-Sheet
如何攻击Java反序列化过程http://bobao.360.cn/learning/detail/4267.html
深入理解JAVA反序列化漏洞https://www.vulbox.com/knowledge/detail/?id=11
Attacking Java Deserializationhttps://nickbloor.co.uk/2017/08/13/attacking-java-deserialization/
jackson反序列化详细分析http://bobao.360.cn/learning/detail/4118.html
Java安全之反序列化漏洞分析 https://mp.weixin.qq.com/s?__biz=MzIzMzgxOTQ5NA==&mid=2247484200&idx=1&sn=8f3201f44e6374d65589d00d91f7148e
fastjson 反序列化漏洞 POC 分析 https://mp.weixin.qq.com/s/0a5krhX-V_yCkz-zDN5kGg
Apache Commons Collections反序列化漏洞学习http://pirogue.org/2017/12/22/javaSerialKiller/
https://patch-diff.githubusercontent.com/xhackff/Web-Security-Learning#struct2
Struts2 命令执行系列回顾http://www.zerokeeper.com/vul-analysis/struts2-command-execution-series-review.html
https://patch-diff.githubusercontent.com/xhackff/Web-Security-Learning#java-web代码审计
JAVA代码审计的一些Tips(附脚本)https://xianzhi.aliyun.com/forum/topic/1633/
Java代码审计连载之—SQL注入https://bbs.ichunqiu.com/forum.php?mod=viewthread&tid=22170&highlight=Java%E4%BB%A3%E7%A0%81%E5%AE%A1%E8%AE%A1%E8%BF%9E%E8%BD%BD
Java代码审计连载之—任意文件下载https://bbs.ichunqiu.com/forum.php?mod=viewthread&tid=23587&highlight=Java%E4%BB%A3%E7%A0%81%E5%AE%A1%E8%AE%A1%E8%BF%9E%E8%BD%BD
Java代码审计连载之—XSShttps://bbs.ichunqiu.com/forum.php?mod=viewthread&tid=22875&highlight=Java%E4%BB%A3%E7%A0%81%E5%AE%A1%E8%AE%A1%E8%BF%9E%E8%BD%BD
Java代码审计连载之—添油加醋https://bbs.ichunqiu.com/forum.php?mod=viewthread&tid=25475&highlight=Java%E4%BB%A3%E7%A0%81%E5%AE%A1%E8%AE%A1%E8%BF%9E%E8%BD%BD
JAVA安全编码与代码审计.mdhttps://github.com/Cryin/JavaID/blob/master/JAVA%E5%AE%89%E5%85%A8%E7%BC%96%E7%A0%81%E4%B8%8E%E4%BB%A3%E7%A0%81%E5%AE%A1%E8%AE%A1.md
Java代码审计PPT https://xianzhi.aliyun.com/forum/read/1904.html
https://patch-diff.githubusercontent.com/xhackff/Web-Security-Learning#其他-1
关于 JNDI 注入http://bobao.360.cn/learning/detail/4564.html
层层放大java审计的攻击面 https://mp.weixin.qq.com/s/WT1EXEryUGGqHQpSi959xw
以Java的视角来聊聊SQL注入 https://mp.weixin.qq.com/s?__biz=MzIzMzgxOTQ5NA==&mid=2247483954&idx=1&sn=418b7e55b16c717ee5140af990298e22&chksm=e8fe9e3bdf89172d0670690060944bf2434cc2d2e8fba4477711299a0775cf3735a2022c0778#rd
站在Java的视角,深度分析防不胜防的小偷——“XSS” http://mp.weixin.qq.com/s?__biz=MzIzMzgxOTQ5NA==&mid=100000340&idx=1&sn=6ca4ec15ef6338daf1d4a907351d7c08&chksm=68fe9e5d5f89174b44fd0cae2e3d5c0018859d3d1dc6d60a2e16dcde34499ba224d6ea17a982#rd
你的 Java web 配置安全吗? https://mp.weixin.qq.com/s?__biz=MzIzMzgxOTQ5NA==&mid=100000318&idx=1&sn=9011af3e3968e0d87499605ef1a68291&chksm=68fe9e375f8917213297855bd9e1ab1203ae4c9b0b5ca351de7b2c0f7a7799bd1f4843cd13f4#rd
spring任意文件读取https://github.com/ilmila/springcss-cve-2014-3625/tree/master/src
在 Runtime.getRuntime().exec(String cmd) 中执行任意shell命令的几种方法https://mp.weixin.qq.com/s/zCe_O37rdRqgN-Yvlq1FDg
https://patch-diff.githubusercontent.com/xhackff/Web-Security-Learning#python-web
python web 安全总结http://bobao.360.cn/learning/detail/4522.html
Defencely Clarifies Python Object Injection Exploitationhttp://defencely.com/blog/defencely-clarifies-python-object-injection-exploitation/
Exploiting Python Deserialization Vulnerabilitieshttps://crowdshield.com/blog.php?name=exploiting-python-deserialization-vulnerabilities
Explaining and exploiting deserialization vulnerability with Python(EN)https://dan.lousqui.fr/explaining-and-exploiting-deserialization-vulnerability-with-python-en.html
Python PyYAML反序列化漏洞实验和Payload构造http://www.polaris-lab.com/index.php/archives/375/
Python 格式化字符串漏洞(Django为例)https://www.leavesongs.com/PENETRATION/python-string-format-vulnerability.html
format注入http://www.venenof.com/index.php/archives/360/
Be Careful with Python's New-Style String Formathttp://lucumr.pocoo.org/2016/12/29/careful-with-str-format/
Python urllib HTTP头注入漏洞http://www.tuicool.com/articles/2iIj2eR
Hack Redis via Python urllib HTTP Header Injectionhttps://security.tencent.com/index.php/blog/msg/106
Python Waf黑名单过滤下的一些Bypass思路http://www.0aa.me/index.php/archives/123/
Python沙箱逃逸的n种姿势https://mp.weixin.qq.com/s/PLI-yjqmA3gwk5w3KHzOyA
利用内存破坏实现Python沙盒逃逸 https://mp.weixin.qq.com/s/s9fAskmp4Bb42OYsiQJFaw
Python Sandbox Bypasshttps://mp.weixin.qq.com/s?__biz=MzIzOTQ5NjUzOQ==&mid=2247483665&idx=1&sn=4b18de09738fdc5291634db1ca2dd55a
pyt: 针对 Python 应用程序的源码静态分析工具https://github.com/python-security/pyt
Exploiting Python PIL Module Command Execution Vulnerabilityhttp://docs.ioin.in/writeup/github.com/_neargle_PIL_RCE_By_GhostButt/index.html
文件解压之过 Python中的代码执行http://bobao.360.cn/learning/detail/4503.html
https://patch-diff.githubusercontent.com/xhackff/Web-Security-Learning#node-js
浅谈Node.js Web的安全问题http://www.freebuf.com/articles/web/152891.html
node.js + postgres 从注入到Getshellhttps://www.leavesongs.com/PENETRATION/node-postgres-code-execution-vulnerability.html
Pentesting Node.js Application : Nodejs Application Security(需翻墙)http://www.websecgeeks.com/2017/04/pentesting-nodejs-application-nodejs.html
从零开始学习渗透Node.js应用程序 https://bbs.ichunqiu.com/thread-21810-1-1.html?from=sec
Node.js 中遇到含空格 URL 的神奇“Bug”——小范围深入 HTTP 协议https://segmentfault.com/a/1190000012407268
https://patch-diff.githubusercontent.com/xhackff/Web-Security-Learning#waf相关
详谈WAF与静态统计分析http://bobao.360.cn/learning/detail/4670.html
牛逼牛逼的payload和bypass总结https://github.com/swisskyrepo/PayloadsAllTheThings
WAF绕过参考资料http://www.mottoin.com/100887.html
浅谈WAF绕过技巧http://www.freebuf.com/articles/web/136723.html
addslashes防注入的绕过案例https://xianzhi.aliyun.com/forum/read/753.html?fpage=6
浅谈json参数解析对waf绕过的影响https://xianzhi.aliyun.com/forum/read/553.html?fpage=8
WAF攻防研究之四个层次Bypass WAFhttp://weibo.com/ttarticle/p/show?id=2309404007261092631700
使用HTTP头去绕过WAF http://www.sohu.com/a/110066439_468673
会找漏洞的时光机: Pinpointing Vulnerabilitieshttps://www.inforsec.org/wp/?p=1993
https://patch-diff.githubusercontent.com/xhackff/Web-Security-Learning#渗透测试
https://patch-diff.githubusercontent.com/xhackff/Web-Security-Learning#course
Web Service 渗透测试从入门到精通http://bobao.360.cn/learning/detail/3741.html
渗透标准https://www.processon.com/view/583e8834e4b08e31357bb727
Penetration Testing Tools Cheat Sheethttps://highon.coffee/blog/penetration-testing-tools-cheat-sheet/
https://patch-diff.githubusercontent.com/xhackff/Web-Security-Learning#信息收集
看我如何收集全网IP的whois信息 https://mp.weixin.qq.com/s/qz0b42DKhgo1sfitcUKhtQ
浅谈Web渗透测试中的信息收集 http://www.freebuf.com/articles/web/142767.html
渗透测试教程:如何侦查目标以及收集信息?http://www.4hou.com/penetration/6850.html
本屌的web漏洞扫描器思路 技巧总结(域名信息收集篇)https://patch-diff.githubusercontent.com/xhackff/Web-Security-Learning/blob/master/weibo.com/ttarticle/p/show?id=2309404088584863883789
子域名的艺术http://www.91ri.org/17001.html
渗透测试向导之子域名枚举技术http://www.freebuf.com/articles/network/161046.html
实例演示如何科学的进行子域名收集http://bobao.360.cn/learning/detail/4119.html
【渗透神器系列】搜索引擎 http://thief.one/2017/05/19/1/
域渗透基础简单信息收集(基础篇)https://xianzhi.aliyun.com/forum/read/805.html
内网渗透定位技术总结http://docs.ioin.in/writeup/www.mottoin.com/_92978_html/index.html
后渗透攻防的信息收集https://www.secpulse.com/archives/51527.html
安全攻城师系列文章-敏感信息收集http://www.mottoin.com/99951.html
子域名枚举的艺术http://www.mottoin.com/101362.html
论二级域名收集的各种姿势https://mp.weixin.qq.com/s/ardCYdZzaSjvSIZiFraWGA
我眼中的渗透测试信息搜集https://xianzhi.aliyun.com/forum/read/451.html?fpage=2
大型目标渗透-01入侵信息搜集https://xianzhi.aliyun.com/forum/read/1675.html
乙方渗透测试之信息收集http://www.cnnetarmy.com/%E4%B9%99%E6%96%B9%E6%B8%97%E9%80%8F%E6%B5%8B%E8%AF%95%E4%B9%8B%E4%BF%A1%E6%81%AF%E6%94%B6%E9%9B%86/
挖洞技巧:信息泄露之总结https://www.anquanke.com/post/id/94787
https://patch-diff.githubusercontent.com/xhackff/Web-Security-Learning#渗透
【玩转Linux系统】Linux内网渗透 https://mp.weixin.qq.com/s/VJBnXq3--0HBD7eVeifOKA
渗透测试指南之域用户组的范围http://www.4hou.com/penetration/7016.html
内网主机发现技巧补充http://mp.weixin.qq.com/s/l-Avt72ajCIo5GdMEwVx7A
Linux 端口转发特征总结 https://mp.weixin.qq.com/s?__biz=MzA3Mzk1MDk1NA==&mid=2651903919&idx=1&sn=686cc53137aa9e8ec323dda1e54a2c23
内网渗透(持续更新) http://rcoil.me/2017/06/%E5%86%85%E7%BD%91%E6%B8%97%E9%80%8F/
实战 SSH 端口转发https://www.ibm.com/developerworks/cn/linux/l-cn-sshforward/index.html
多重转发渗透隐藏内网http://bobao.360.cn/learning/detail/3545.html
内网转发姿势http://www.03sec.com/3141.shtml
内网转发的工具https://mp.weixin.qq.com/s/EWL9-AUB_bTf7pU4S4A2zg
Linux 下多种反弹 shell 方法http://www.03sec.com/3140.shtml
linux各种一句话反弹shell总结http://bobao.360.cn/learning/detail/4551.html
php 反弹shellhttp://wolvez.club/?p=458
利用ew轻松穿透多级目标内网https://klionsec.github.io/2017/08/05/ew-tunnel/
windows内网渗透杂谈https://bl4ck.in/penetration/2017/03/20/windows%E5%86%85%E7%BD%91%E6%B8%97%E9%80%8F%E6%9D%82%E8%B0%88.html
Windows域横向渗透http://docs.ioin.in/writeup/www.mottoin.com/_89413_html/index.html
内网渗透中转发工具总结http://blog.neargle.com/SecNewsBak/drops/%E5%86%85%E7%BD%91%E6%B8%97%E9%80%8F%E4%B8%AD%E8%BD%AC%E5%8F%91%E5%B7%A5%E5%85%B7%E6%80%BB%E7%BB%93.html
内网渗透思路整理与工具使用http://bobao.360.cn/learning/detail/3683.html
Cobalt strike在内网渗透中的使用 http://www.freebuf.com/sectool/125237.html
反向socks5代理(windows版)http://x95.org/archives/reverse-socks5-proxy.html
Windows渗透基础http://www.mottoin.com/89355.html
通过双重跳板漫游隔离内网https://xianzhi.aliyun.com/forum/read/768.html
A Red Teamer's guide to pivotinghttps://artkond.com/2017/03/23/pivoting-guide/
穿越边界的姿势 https://mp.weixin.qq.com/s/l-0sWU4ijMOQWqRgsWcNFA
内网端口转发及穿透https://xianzhi.aliyun.com/forum/read/1715.html
秘密渗透内网——利用 DNS 建立 VPN 传输隧道http://www.4hou.com/technology/3143.html
Reverse Shell Cheat Sheethttp://pentestmonkey.net/cheat-sheet/shells/reverse-shell-cheat-sheet
我所了解的内网渗透——内网渗透知识大总结https://www.anquanke.com/post/id/92646
https://patch-diff.githubusercontent.com/xhackff/Web-Security-Learning#渗透实战
挖洞经验 | 看我如何综合利用4个漏洞实现GitHub Enterprise远程代码执行 http://www.freebuf.com/news/142680.html
Splash SSRF到获取内网服务器ROOT权限http://bobao.360.cn/learning/detail/4113.html
Pivoting from blind SSRF to RCE with HashiCorp Consulhttp://www.kernelpicnic.net/2017/05/29/Pivoting-from-blind-SSRF-to-RCE-with-Hashicorp-Consul.html
我是如何通过命令执行到最终获取内网Root权限的 http://www.freebuf.com/articles/web/141579.html
信息收集之SVN源代码社工获取及渗透实战https://xianzhi.aliyun.com/forum/read/1629.html
SQL注入+XXE+文件遍历漏洞组合拳渗透Deutsche Telekomhttp://paper.seebug.org/256/
渗透 Hacking Teamhttp://blog.neargle.com/SecNewsBak/drops/%E6%B8%97%E9%80%8FHacking%20Team%E8%BF%87%E7%A8%8B.html
由视频系统SQL注入到服务器权限https://bbs.ichunqiu.com/thread-25827-1-1.html?from=sec
From Serialized to Shell :: Exploiting Google Web Toolkit with EL Injectionhttp://srcincite.io/blog/2017/05/22/from-serialized-to-shell-auditing-google-web-toolkit-with-el-injection.html
浅谈渗透测试实战http://docs.ioin.in/writeup/avfisher.win/_archives_381/index.html
渗透测试学习笔记之案例一http://avfisher.win/archives/741
渗透测试学习笔记之案例二http://avfisher.win/archives/756
渗透测试学习笔记之案例四http://avfisher.win/archives/784
记一次内网渗透http://killbit.me/2017/09/11/%E8%AE%B0%E4%B8%80%E6%AC%A1%E5%86%85%E7%BD%91%E6%B8%97%E9%80%8F/
https://patch-diff.githubusercontent.com/xhackff/Web-Security-Learning#提权
提权技巧http://www.secbox.cn/skill/5583.html
linux-kernel-exploits Linux平台提权漏洞集合https://github.com/SecWiki/linux-kernel-exploits
windows-kernel-exploits Windows平台提权漏洞集合 https://github.com/SecWiki/windows-kernel-exploits
Linux MySQL Udf 提权http://www.91ri.org/16540.html
windows提权系列上篇http://mp.weixin.qq.com/s/uOArxXIfcI4fjqnF9BDJGA
Windows提权系列中篇https://mp.weixin.qq.com/s/ERXOLhWo0-lJbMV143I8hA
获取SYSTEM权限的多种姿势http://bobao.360.cn/learning/detail/4740.html
https://patch-diff.githubusercontent.com/xhackff/Web-Security-Learning#渗透技巧
乙方渗透测试之Fuzz爆破http://www.cnnetarmy.com/%E4%B9%99%E6%96%B9%E6%B8%97%E9%80%8F%E6%B5%8B%E8%AF%95%E4%B9%8BFuzz%E7%88%86%E7%A0%B4/
域渗透神器Empire安装和简单使用 https://mp.weixin.qq.com/s/VqrUTW9z-yi3LqNNy-lE-Q
如何将简单的Shell转换成为完全交互式的TTY http://www.freebuf.com/news/142195.html
60字节 - 无文件渗透测试实验https://www.n0tr00t.com/2017/03/09/penetration-test-without-file.html
内网渗透思路探索之新思路的探索与验证http://www.tuicool.com/articles/fMFB3mY
Web端口复用正向后门研究实现与防御 http://www.freebuf.com/articles/web/142628.html
谈谈端口探测的经验与原理http://www.freebuf.com/articles/network/146087.html
端口渗透总结http://docs.ioin.in/writeup/blog.heysec.org/_archives_577/index.html
端口扫描那些事https://mp.weixin.qq.com/s?__biz=MzI5MDQ2NjExOQ==&mid=2247484812&idx=1&sn=7d894b50b3947142fbfa3a4016f748d5&chksm=ec1e35a4db69bcb2acfe7ecb3b0cd1d366c54bfa1feaafc62c4290b3fd2eddab9aa95a98f041#rd
渗透技巧——通过cmd上传文件的N种方法 http://blog.neargle.com/SecNewsBak/drops/%E6%B8%97%E9%80%8F%E6%8A%80%E5%B7%A7%E2%80%94%E2%80%94%E9%80%9A%E8%BF%87cmd%E4%B8%8A%E4%BC%A0%E6%96%87%E4%BB%B6%E7%9A%84N%E7%A7%8D%E6%96%B9%E6%B3%95.html
域渗透TIPS:获取LAPS管理员密码 http://www.freebuf.com/articles/web/142659.html
域渗透——Security Support Providerhttp://blog.neargle.com/SecNewsBak/drops/%E5%9F%9F%E6%B8%97%E9%80%8F%E2%80%94%E2%80%94Security%20Support%20Provider.html
内网渗透随想http://docs.ioin.in/writeup/www.91ri.org/_14390_html/index.html
域渗透之流量劫持http://bobao.360.cn/learning/detail/3266.html
渗透技巧——快捷方式文件的参数隐藏技巧https://3gstudent.github.io/3gstudent.github.io/%E6%B8%97%E9%80%8F%E6%8A%80%E5%B7%A7-%E5%BF%AB%E6%8D%B7%E6%96%B9%E5%BC%8F%E6%96%87%E4%BB%B6%E7%9A%84%E5%8F%82%E6%95%B0%E9%9A%90%E8%97%8F%E6%8A%80%E5%B7%A7/
后门整理https://bbs.ichunqiu.com/thread-25119-1-1.html?from=sec
Linux后门整理合集(脉搏推荐)https://www.secpulse.com/archives/59674.html
https://patch-diff.githubusercontent.com/xhackff/Web-Security-Learning#运维
安全运维那些洞 https://mp.weixin.qq.com/s/5TfAF5-HR8iDA_qSIJkQ0Q
美团外卖自动化业务运维系统建设https://tech.meituan.com/digger_share.html
饿了么运维基础设施进化史 https://mp.weixin.qq.com/s?__biz=MzA4Nzg5Nzc5OA==&mid=2651668800&idx=1&sn=615af5f120d1298475aaf4825009cb30&chksm=8bcb82e9bcbc0bff6309d9bbaf69cfc591624206b846e00d5004a68182c934dab921b7c25794&scene=38#wechat_redirect
nginx配置一篇足矣http://www.xuxiaobo.com/?p=3869
Docker Remote API的安全配置 http://p0sec.net/index.php/archives/115/
Apache服务器安全配置 http://foreversong.cn/archives/789
IIS服务器安全配置http://foreversong.cn/archives/803
Tomcat服务器安全配置http://foreversong.cn/archives/816
互联网企业安全之端口监控 https://mp.weixin.qq.com/s/SJKeXegWG3OQo4r0nBs7xQ
Linux应急响应姿势浅谈http://bobao.360.cn/learning/detail/4481.html
黑客入侵应急分析手工排查https://xianzhi.aliyun.com/forum/read/1655.html
企业常见服务漏洞检测&修复整理http://www.mottoin.com/92742.html
Linux基线加固https://mp.weixin.qq.com/s/0nxiZw1NUoQTjxcd3zl6Zg
Apache server security: 10 tips to secure installationhttps://www.acunetix.com/blog/articles/10-tips-secure-apache-installation/
Oracle数据库运维中的攻防实战(全) https://mp.weixin.qq.com/s/dpvBo6Bat5u4t8kSFRcv9w
Linux服务器上监控网络带宽的18个常用命令http://www.xuxiaobo.com/?p=3950
https://patch-diff.githubusercontent.com/xhackff/Web-Security-Learning#ddos
DDoS攻防补遗 https://yq.aliyun.com/articles/1795
反射DDOS攻击防御的一点小想法 http://www.freebuf.com/column/138163.html
DDOS攻击方式总结https://www.secpulse.com/archives/64088.html
DDoS防御和DDoS防护方法 你帮忙看看这7个说法靠不靠谱http://toutiao.secjia.com/ddos-7tips
DDoS防御和DDoS防护 来看个人站长、果壳网和安全公司怎么说 http://toutiao.secjia.com/ddos-prevention-protection
DDoS防御之大流量DDoS防护方案 还有计算器估算损失http://toutiao.secjia.com/ddos-prevention-protection-2
freeBuf专栏 http://www.freebuf.com/author/%e9%bb%91%e6%88%88%e7%88%be
遭受CC攻击的处理http://www.xuxiaobo.com/?p=3923
https://patch-diff.githubusercontent.com/xhackff/Web-Security-Learning#ctf
https://patch-diff.githubusercontent.com/xhackff/Web-Security-Learning#技巧总结
CTF线下防御战 — 让你的靶机变成“铜墙铁壁”http://bobao.360.cn/ctf/detail/210.html
ctf-wikihttps://ctf-wiki.github.io/ctf-wiki/#/introduction
CTF中那些脑洞大开的编码和加密https://www.hackfun.org/CTF/coding-and-encryption-of-those-brain-holes-in-CTF.html
CTF加密与解密 http://thief.one/2017/06/13/1/
CTF中图片隐藏文件分离方法总结https://www.hackfun.org/CTF/summary-of-image-hiding-files-in-CTF.html
Md5扩展攻击的原理和应用http://www.freebuf.com/articles/database/137129.html
CTF比赛中关于zip的总结http://bobao.360.cn/ctf/detail/203.html
十五个Web狗的CTF出题套路http://weibo.com/ttarticle/p/show?id=2309403980950244591011
CTF备忘录https://827977014.docs.qq.com/Bt2v7IZWnYo?type=1&_wv=1&_bid=2517
rcoil:CTF线下攻防赛总结http://rcoil.me/2017/06/CTF%E7%BA%BF%E4%B8%8B%E8%B5%9B%E6%80%BB%E7%BB%93/
CTF内存取证入坑指南!稳!http://www.freebuf.com/column/152545.html
https://patch-diff.githubusercontent.com/xhackff/Web-Security-Learning#杂
细致分析Padding Oracle渗透测试全解析 http://www.freebuf.com/articles/database/150606.html
Exploring Compilation from TypeScript to WebAssemblyhttps://medium.com/web-on-the-edge/exploring-compilation-from-typescript-to-webassembly-f846d6befc12
High-Level Approaches for Finding Vulnerabilitieshttp://jackson.thuraisamy.me/finding-vulnerabilities.html
谈谈HTML5本地存储——WebStoragehttp://syean.cn/2017/08/15/%E8%B0%88%E8%B0%88HTML5%E6%9C%AC%E5%9C%B0%E5%AD%98%E5%82%A8%E2%80%94%E2%80%94WebStorage/
Linux下容易被忽视的那些命令用法https://segmentfault.com/p/1210000010668099/read
各种脚本语言不同版本一句话开启 HTTP 服务器的总结http://www.mottoin.com/94895.html
WebAssembly入门:将字节码带入Web世界http://bobao.360.cn/learning/detail/3757.html
phpwind 利用哈希长度扩展攻击进行getshellhttps://www.leavesongs.com/PENETRATION/phpwind-hash-length-extension-attack.html
深入理解hash长度扩展攻击(sha1为例) http://www.freebuf.com/articles/web/69264.html
Joomla 框架的程序执行流程及目录结构分析http://bobao.360.cn/learning/detail/3909.html
如何通过恶意插件在Atom中植入后门http://bobao.360.cn/learning/detail/4268.html
CRLF Injection and Bypass Tencent WAF https://zhchbin.github.io/2016/01/31/CRLF-Injection-and-Bypass-WAF/
chybeta.github.io/2017/08/19/Web-Security-Learning/https://chybeta.github.io/2017/08/19/Web-Security-Learning/
Readme https://patch-diff.githubusercontent.com/xhackff/Web-Security-Learning#readme-ov-file
Please reload this pagehttps://patch-diff.githubusercontent.com/xhackff/Web-Security-Learning
Activityhttps://patch-diff.githubusercontent.com/xhackff/Web-Security-Learning/activity
1 starhttps://patch-diff.githubusercontent.com/xhackff/Web-Security-Learning/stargazers
0 watchinghttps://patch-diff.githubusercontent.com/xhackff/Web-Security-Learning/watchers
1 forkhttps://patch-diff.githubusercontent.com/xhackff/Web-Security-Learning/forks
Report repository https://patch-diff.githubusercontent.com/contact/report-content?content_url=https%3A%2F%2Fgithub.com%2Fxhackff%2FWeb-Security-Learning&report=xhackff+%28user%29
Releaseshttps://patch-diff.githubusercontent.com/xhackff/Web-Security-Learning/releases
Packages 0https://patch-diff.githubusercontent.com/users/xhackff/packages?repo_name=Web-Security-Learning
https://github.com
Termshttps://docs.github.com/site-policy/github-terms/github-terms-of-service
Privacyhttps://docs.github.com/site-policy/privacy-policies/github-privacy-statement
Securityhttps://github.com/security
Statushttps://www.githubstatus.com/
Communityhttps://github.community/
Docshttps://docs.github.com/
Contacthttps://support.github.com?tags=dotcom-footer

Viewport: width=device-width


URLs of crawlers that visited me.