Browse products

Browse products

Product filters:
search
Product image for Access Control Vulnerabilities

Access Control Vulnerabilities

Learn how to find, exploit and defend against Access Control Vulnerabilities.

CourseBy Rana Khalil

Product image for Authentication Vulnerabilities

Authentication Vulnerabilities

Learn how to find, exploit and defend against Authentication Vulnerabilities.

CourseBy Rana Khalil

Product image for Business Logic Vulnerabilities

Business Logic Vulnerabilities

Learn how to find, exploit and defend against Business Logic Vulnerabilities.

CourseBy Rana Khalil

Product image for CORS Vulnerabilities

CORS Vulnerabilities

Learn how to find, exploit and defend against CORS Vulnerabilities.

CourseBy Rana Khalil

Product image for Clickjacking

Clickjacking

Learn how to find, exploit and defend against Clickjacking.

CourseBy Rana Khalil

Product image for Command Injection

Command Injection

Learn how to find, exploit and defend against Command Injection vulnerabilities.

CourseBy Rana Khalil

Product image for Cross-Site Request Forgery (CSRF)

Cross-Site Request Forgery (CSRF)

Learn how to find, exploit and defend against CSRF.

CourseBy Rana Khalil

Product image for Cross-Site Scripting (XSS)

Cross-Site Scripting (XSS)

Learn how to find, exploit and defend against XSS Vulnerabilities.

CourseBy Rana Khalil

Product image for DOM-Based Vulnerabilities

DOM-Based Vulnerabilities

Learn how to find, exploit and defend against DOM-Based Vulnerabilities.

CourseBy Rana Khalil

Product image for Directory Traversal

Directory Traversal

Learn how to find, exploit and defend against Directory Traversal vulnerabilities.

CourseBy Rana Khalil

Product image for File Upload Vulnerabilities

File Upload Vulnerabilities

Learn how to find, exploit and defend against File Upload Vulnerabilities.

CourseBy Rana Khalil

Product image for HTTP Host Header Attacks

HTTP Host Header Attacks

Learn how to find, exploit and defend against HTTP Host header vulnerabilities.

CourseBy Rana Khalil

Product image for Information Disclosure

Information Disclosure

Learn how to find, exploit and defend against Information Disclosure vulnerabilities.

CourseBy Rana Khalil

Product image for JWT Attacks

JWT Attacks

Learn how to find, exploit and defend against JWT Vulnerabilities.

CourseBy Rana Khalil

Product image for OAuth 2.0 Vulnerabilities

OAuth 2.0 Vulnerabilities

Learn how to find, exploit and defend against OAuth 2.0 vulnerabilities.

CourseBy Rana Khalil

Product image for SQL Injection

SQL Injection

Learn how to find, exploit and defend against SQL Injection vulnerabilities.

CourseBy Rana Khalil

Product image for Server-Side Request Forgery (SSRF)

Server-Side Request Forgery (SSRF)

Learn how to find, exploit and defend against SSRF vulnerabilities.

CourseBy Rana Khalil

Product image for Web Security Academy Series Course

Web Security Academy Series Course

Learn how to hack web applications, automate your exploits in Python and defend web applications against real world attacks!

CourseBy Rana Khalil

Product image for WebSocket Vulnerabilities

WebSocket Vulnerabilities

Learn how to find, exploit and defend against WebSocket Vulnerabilities.

CourseBy Rana Khalil

Product image for XXE Injection

XXE Injection

Learn how to find, exploit and defend against XXE Injection vulnerabilities.

CourseBy Rana Khalil