ChrisCZ
SSTI Custom exploit
16:30
ChrisCZ
ssti sandbox enivornment
16:12
ChrisCZ
ssti info disclosure
9:34
ChrisCZ
ssti leverage code documentation
11:19
ChrisCZ
SSTI Code context
9:36
ChrisCZ
ssti basic
13:45
ChrisCZ
Polyglot File Upload
10:19
ChrisCZ
Web shell Upload via obfuscated file extension
10:26
ChrisCZ
web shell upload via path traversal
7:29
ChrisCZ
Web shell Upload Via extension blacklist bypass
14:07
ChrisCZ
file upload via content type bypass
13:11
ChrisCZ
File upload Webshell portswigger
9:01
ChrisCZ
Access control Request parameter
14:35
ChrisCZ
IDOR portswigger
7:30
ChrisCZ
Access control labs 5 and 6 portswigger
11:40
ChrisCZ
Access control Request parameter
14:35
ChrisCZ
AC lab 4 - user role modify user profile
7:09
ChrisCZ
Access control user role based
5:52
ChrisCZ
Unprotected Admin panel via unknown url
5:22
ChrisCZ
Access control Unprotected Admin panel
3:10
ChrisCZ
Path traversal final labs
10:29
ChrisCZ
path traversal 4 lab portswigger
6:08
ChrisCZ
path traversal lab: traversal sequences stripped non recursive
7:56
ChrisCZ
Path traversal lab bypass
9:42
ChrisCZ
Path traversal simple
6:15
ChrisCZ
SSRF Whitelist-Based input filter
10:43
ChrisCZ
SSRF open redirect
7:23
ChrisCZ
SSRF blacklist filter
10:18
ChrisCZ
SSRF BACKEND System
14:52
ChrisCZ
SSRF basic
7:27
ChrisCZ
stored xss href attribute
17:56
ChrisCZ
Reflected xss into attribute with angle brackets
12:44
ChrisCZ
DOM XSS hash exchange event
12:10
ChrisCZ
DOM XSS Jquery Anchor href attribute
6:35
ChrisCZ
Dom xxs in document.write
9:19
ChrisCZ
Dom xxs in location search
8:18
ChrisCZ
Stored XXS into HTML no encoding
7:49
ChrisCZ
Reflected XXS into HTML no encoding
5:19