OnlineLabs icon indicating copy to clipboard operation
OnlineLabs copied to clipboard

only labs for different type of vulnaribilites

OnlineLabs

XSS

http://prompt.ml/

https://portswigger.net/web-security/cross-site-scripting

CORS:

https://portswigger.net/web-security/cors

Clickjaking:

https://portswigger.net/web-security/clickjacking

WebSockets:

https://portswigger.net/web-security/websockets

https://ws.digi.ninja/

SQLi:

https://portswigger.net/web-security/sql-injection

CSRF:

https://portswigger.net/web-security/csrf

XXE:

https://portswigger.net/web-security/xxe https://gosecure.github.io/xxe-workshop/#0

Access Control:

https://portswigger.net/web-security/access-control

https://authlab.digi.ninja/

SSRF:

https://portswigger.net/web-security/ssrf

HTTP Request Smuggling:

https://portswigger.net/web-security/request-smuggling

https://blog.zeddyu.info/2019/12/08/HTTP-Smuggling-en/

OS Command injection:

https://portswigger.net/web-security/os-command-injection

Directory traversal:

https://portswigger.net/web-security/file-path-traversal

Zone transfer:

https://digi.ninja/projects/zonetransferme.php

LDAP:

https://vulndap.digi.ninja/

Web cache poisoning:

https://poison.digi.ninja/

WiFi:

http://linux-basics-bootcamp-pa-beta.ue.r.appspot.com/course/101

GraphQL

https://graphqlab.digi.ninja/