OnlineLabs
OnlineLabs copied to clipboard
only labs for different type of vulnaribilites
OnlineLabs
XSS
http://prompt.ml/
https://portswigger.net/web-security/cross-site-scripting
CORS:
https://portswigger.net/web-security/cors
Clickjaking:
https://portswigger.net/web-security/clickjacking
WebSockets:
https://portswigger.net/web-security/websockets
https://ws.digi.ninja/
SQLi:
https://portswigger.net/web-security/sql-injection
CSRF:
https://portswigger.net/web-security/csrf
XXE:
https://portswigger.net/web-security/xxe https://gosecure.github.io/xxe-workshop/#0
Access Control:
https://portswigger.net/web-security/access-control
https://authlab.digi.ninja/
SSRF:
https://portswigger.net/web-security/ssrf
HTTP Request Smuggling:
https://portswigger.net/web-security/request-smuggling
https://blog.zeddyu.info/2019/12/08/HTTP-Smuggling-en/
OS Command injection:
https://portswigger.net/web-security/os-command-injection
Directory traversal:
https://portswigger.net/web-security/file-path-traversal
Zone transfer:
https://digi.ninja/projects/zonetransferme.php
LDAP:
https://vulndap.digi.ninja/
Web cache poisoning:
https://poison.digi.ninja/
WiFi:
http://linux-basics-bootcamp-pa-beta.ue.r.appspot.com/course/101
GraphQL
https://graphqlab.digi.ninja/