wgpsec/aboutsecurity

216 skills1.8K total installsGithubGithubGitHub

crypto-web-attack

13

ctf-crypto

13

ctf-forensics

13

ctf-reverse

13

ctf-misc

13

java-deserialization-methodology

12

csrf-methodology

12

xss-methodology

12

ctf-solve

12

ctf-malware

12

ad-domain-attack

12

mobile-backend

12

ctf-pwn

12

deserialization-methodology

11

red-team-assessment

11

jwt-attack-methodology

11

multi-layer-network

11

ctf-flag-verification

11

ctf-web-methodology

11

web-vuln-scan

11

cloud-metadata

11

ctf-osint

11

ctf-flag-hunting

11

ctf-source-audit

11

ctf-web-recon

11

report-generate

11

ssti-methodology

11

cloud-iam-audit

11

api-fuzz

11

command-injection-methodology

10

cache-poisoning-smuggling

10

information-disclosure-methodology

10

sql-injection-methodology

10

shellcode-loader-generate

10

lfi-rfi-methodology

10

c2-evasion-methodology

10

cors-misconfiguration

10

file-upload-methodology

10

privilege-escalation-web

10

post-exploit-linux

10

social-engineering

10

supply-chain-audit

10

graphql-methodology

10

post-exploit-windows

10

401-403-bypass

10

lateral-movement

10

persist-maintain

10

websocket-attack

10

oauth-sso-attack

10

local-resources

10

internal-recon

10

subdomain-deep

10

cred-spray

10

idor-methodology

10

evasion-research

10

target-profiling

10

recon-full

10

passive-recon

10

evasion-technique-integrate

9

waf-bypass-methodology

9

judge-ctf

9

judge-pentest

9

efficiency-rules

8

ad-acl-abuse

8

ctf-ai-ml

8

js-api-extract

8

python-prototype-pollution

7

prototype-pollution-exploit

7

malware-analysis-methodology

7

sandbox-evasion-implement

7

ad-delegation-attack

7

java-frontend-audit

7

memory-forensics-evasion

7

java-injection-audit

7

java-serialization-audit

7

java-exploit-chain

7

android-app-pentesting

7

business-logic-attack

7

java-auth-config-audit

7

c2-beacon-analysis

7

ai-identity-security

7

java-audit-pipeline

7

ai-infrastructure-attack

7

adcs-certipy-attack

7

java-framework-audit

7

python-web-debug

7

prompt-jailbreak

7

prompt-leak

7

prompt-injection

7

ios-exploiting

7

ai-data-security

7

msf-oneshot

7

impacket-toolkit

7

cookie-analysis

7

apt-emulation

7

iox-proxy

7

agent-security

7

hashcat-crack

7

katana-crawl

7

java-file-audit

7

adinfo-enum

7

ioc-analysis

7

k8spider

7

cross-domain-attack-chain

6

binary-exploitation-methodology

6

binary-exploitation-tools

6

expression-language-injection

6

browser-xterm-interaction

6

webshell-management

6

k8s-network-recon

6

githacker-git-leak

6

k8s-storage-exploit

6

http-smuggling-advanced

6

cloud-aksk-exploit

6

cve-exploit-methodology

6

php-serialization-audit

6

race-condition-exploit

6

php-framework-audit

6

php-type-juggling

6

k8s-container-escape

6

oss-bucket-exploit

6

subdomain-takeover

6

ntlm-relay-attack

6

database-lateral-pivot

6

aws-iam-policy-analysis

6

http-host-header-attacks

6

kerberoast-attack

6

k8s-webhook-abuse

6

disk-forensics-evasion

6

ccupp-password-profiler

6

php-injection-audit

6

php-auth-config-audit

6

k8s-ingress-nightmare

6

php-audit-pipeline

6

k8s-sidecar-attack

6

supply-chain-attack

6

php-exploit-chain

6

php-frontend-audit

6

serverless-attack

6

threat-hunting-evasion

6

webshell-deploy

6

docker-escape

6

fscan-scan

6

argocd-tactics

6

ffuf-fuzz

6

bloodhound-enum

6

exchange-attack

6

mcp-security

6

responder-poison

6

aws-iam-privesc

6

gcp-exploit

6

k8s-istio-bypass

6

oa-system-attack

6

php-file-audit

6

zombie-brute

6

spray-dir-brute

6

ot-ics-attack

6

ldap-injection

6

php-bypass

6

ssrf-methodology

6

ad-trust-attack

6

naabu-portscan

6

gogo-scan

6

nuclei-scan

6

xray-scan

6

aws-pentesting

6

ad-persistence

6

httpx-probe

6

tool-delivery

6

xslt-injection

6

azure-ad-attack

6

cdk-escape

6

aws-post-exploit

6

cot-injection

6

nosql-injection

6

sqlmap-advanced

6

log-evasion

6

nxc-cme

6

xxe-injection-methodology

5

azure-hybrid-lateral

5

default-cred-sweep

5

gcp-workspace-pivot

5

cicd-pipeline-attack

5

aliyun-pentesting

5

concourse-tactics

5

huawei-pentesting

5

tencent-pentesting

5

azure-pentesting

5

cobalt-strike

5

gcp-pentesting

5

race-condition-methodology

4

ssrf-xxe-methodology

4

privesc-check

4

middleware-exploit

2

kong-exploit

2

jenkins-exploit

2

langflow-exploit

2

ssti-detect

2

inetutils-telnetd-exploit

1

portainer-exploit

1

geoserver-exploit

1

api-semantic-fuzz

1

hugegraph-exploit

1

gradio-exploit

1

rocketmq-exploit

1

grafana-exploit

1

database-exploit

1

harbor-exploit

1

rabbitmq-exploit

1

ofbiz-exploit

1

comfyui-exploit

1

1panel-exploit

1

dify-exploit

1

gitlab-exploit

1

nacos-exploit

1

argocd-exploit

1