wgpsec/aboutsecurity
Skill
Installs
crypto-web-attack
13
ctf-crypto
13
ctf-forensics
13
ctf-reverse
13
ctf-misc
13
java-deserialization-methodology
12
csrf-methodology
12
xss-methodology
12
ctf-solve
12
ctf-malware
12
ad-domain-attack
12
mobile-backend
12
ctf-pwn
12
deserialization-methodology
11
red-team-assessment
11
jwt-attack-methodology
11
multi-layer-network
11
ctf-flag-verification
11
ctf-web-methodology
11
web-vuln-scan
11
cloud-metadata
11
ctf-osint
11
ctf-flag-hunting
11
ctf-source-audit
11
ctf-web-recon
11
report-generate
11
ssti-methodology
11
cloud-iam-audit
11
api-fuzz
11
command-injection-methodology
10
cache-poisoning-smuggling
10
information-disclosure-methodology
10
sql-injection-methodology
10
shellcode-loader-generate
10
lfi-rfi-methodology
10
c2-evasion-methodology
10
cors-misconfiguration
10
file-upload-methodology
10
privilege-escalation-web
10
post-exploit-linux
10
social-engineering
10
supply-chain-audit
10
graphql-methodology
10
post-exploit-windows
10
401-403-bypass
10
lateral-movement
10
persist-maintain
10
websocket-attack
10
oauth-sso-attack
10
local-resources
10
internal-recon
10
subdomain-deep
10
cred-spray
10
idor-methodology
10
evasion-research
10
target-profiling
10
recon-full
10
passive-recon
10
evasion-technique-integrate
9
waf-bypass-methodology
9
judge-ctf
9
judge-pentest
9
efficiency-rules
8
ad-acl-abuse
8
ctf-ai-ml
8
js-api-extract
8
python-prototype-pollution
7
prototype-pollution-exploit
7
malware-analysis-methodology
7
sandbox-evasion-implement
7
ad-delegation-attack
7
java-frontend-audit
7
memory-forensics-evasion
7
java-injection-audit
7
java-serialization-audit
7
java-exploit-chain
7
android-app-pentesting
7
business-logic-attack
7
java-auth-config-audit
7
c2-beacon-analysis
7
ai-identity-security
7
java-audit-pipeline
7
ai-infrastructure-attack
7
adcs-certipy-attack
7
java-framework-audit
7
python-web-debug
7
prompt-jailbreak
7
prompt-leak
7
prompt-injection
7
ios-exploiting
7
ai-data-security
7
msf-oneshot
7
impacket-toolkit
7
cookie-analysis
7
apt-emulation
7
iox-proxy
7
agent-security
7
hashcat-crack
7
katana-crawl
7
java-file-audit
7
adinfo-enum
7
ioc-analysis
7
k8spider
7
cross-domain-attack-chain
6
binary-exploitation-methodology
6
binary-exploitation-tools
6
expression-language-injection
6
browser-xterm-interaction
6
webshell-management
6
k8s-network-recon
6
githacker-git-leak
6
k8s-storage-exploit
6
http-smuggling-advanced
6
cloud-aksk-exploit
6
cve-exploit-methodology
6
php-serialization-audit
6
race-condition-exploit
6
php-framework-audit
6
php-type-juggling
6
k8s-container-escape
6
oss-bucket-exploit
6
subdomain-takeover
6
ntlm-relay-attack
6
database-lateral-pivot
6
aws-iam-policy-analysis
6
http-host-header-attacks
6
kerberoast-attack
6
k8s-webhook-abuse
6
disk-forensics-evasion
6
ccupp-password-profiler
6
php-injection-audit
6
php-auth-config-audit
6
k8s-ingress-nightmare
6
php-audit-pipeline
6
k8s-sidecar-attack
6
supply-chain-attack
6
php-exploit-chain
6
php-frontend-audit
6
serverless-attack
6
threat-hunting-evasion
6
webshell-deploy
6
docker-escape
6
fscan-scan
6
argocd-tactics
6
ffuf-fuzz
6
bloodhound-enum
6
exchange-attack
6
mcp-security
6
responder-poison
6
aws-iam-privesc
6
gcp-exploit
6
k8s-istio-bypass
6
oa-system-attack
6
php-file-audit
6
zombie-brute
6
spray-dir-brute
6
ot-ics-attack
6
ldap-injection
6
php-bypass
6
ssrf-methodology
6
ad-trust-attack
6
naabu-portscan
6
gogo-scan
6
nuclei-scan
6
xray-scan
6
aws-pentesting
6
ad-persistence
6
httpx-probe
6
tool-delivery
6
xslt-injection
6
azure-ad-attack
6
cdk-escape
6
aws-post-exploit
6
cot-injection
6
nosql-injection
6
sqlmap-advanced
6
log-evasion
6
nxc-cme
6
xxe-injection-methodology
5
azure-hybrid-lateral
5
default-cred-sweep
5
gcp-workspace-pivot
5
cicd-pipeline-attack
5
aliyun-pentesting
5
concourse-tactics
5
huawei-pentesting
5
tencent-pentesting
5
azure-pentesting
5
cobalt-strike
5
gcp-pentesting
5
race-condition-methodology
4
ssrf-xxe-methodology
4
privesc-check
4
middleware-exploit
2
kong-exploit
2
jenkins-exploit
2
langflow-exploit
2
ssti-detect
2
inetutils-telnetd-exploit
1
portainer-exploit
1
geoserver-exploit
1
api-semantic-fuzz
1
hugegraph-exploit
1
gradio-exploit
1
rocketmq-exploit
1
grafana-exploit
1
database-exploit
1
harbor-exploit
1
rabbitmq-exploit
1
ofbiz-exploit
1
comfyui-exploit
1
1panel-exploit
1
dify-exploit
1
gitlab-exploit
1
nacos-exploit
1
argocd-exploit
1