Exploiting file upload vulnerabilities to execute arbitrary code.
SQL Injection for MySQL databases.
Exploiting XML parsers.
Identifying web content to launch further attacks.
Injecting malicious code into web applications.
A review of the CBBH course and exam.
Exploiting LFI vulnerabilities in web applications.
Decoding Flask signed session cookies.
SSTI attacks against Python Flask applications.