🛠️ Hacker Resource Guide
Click any vulnerability to explore payloads, techniques, and examples.
SQL Injection
Inject malicious SQL queries to manipulate databases.
/sql-injectionXSS (Cross-Site Scripting)
Inject scripts into web pages viewed by others.
/xssCSRF (Cross-Site Request Forgery)
Forge requests on behalf of authenticated users.
/csrfRCE (Remote Code Execution)
Execute arbitrary code on a remote machine.
/rceLFI (Local File Inclusion)
Include arbitrary files from the local file system.
/file-inclusionIDOR (Insecure Direct Object Reference)
Access unauthorized resources by modifying object references.
/idorSSRF (Server-Side Request Forgery)
Trick server into making requests to internal resources.
/ssrfClickjacking
Trick users into clicking hidden UI elements.
/clickjackingOpen Redirect
Redirect users to untrusted locations using manipulated URLs.
/open-redirect