elhacker.INFO Downloads
Name Size
Parent Directory -
1. Introduction/ -
2. Recon for Bug Bounty Hunting/ -
3. Advance SQL Injection/ -
4. NO RATE LIMITING/ -
5. Long Password Dos Attack/ -
6. Buffer Overflow/ -
7. Android App Vulnerability Hunting/ -
8. Hostile Subdomain Takeover/ -
9. Insecure Direct Object Refernce/ -
10. Wordpress/ -
11. Joomla/ -
12. Drupal/ -
13. CMS Vulnerability Hunting/ -
14. Cross Site Request Forgery/ -
15. HSTS/ -
16. Session Fixation/ -
17. Account Lockout/ -
18. Server Side Request Forgery/ -
19. Mobile App static code Analysis/ -
20. Password Reset Poisoning/ -
21. Android App Dynamic Analysis/ -
22. Blind XSS/ -
23. Identity Management Testing/ -
24. DIGGING INTO DIGITAL IMAGES EXIF Geolocation Data Not Stripped From Uploaded Im/ -
25. Application Server Vulnerabilities/ -
26. Cryptography Vulnerabilities Bug Hunting/ -
27. Testing for Session Management/ -
28. Exposed Source Code Control Systems/ -
29. Apache Struts RCE Hunting and Exploitation/ -
30. Comprehensive Command Injection/ -
31. Web cache deception/ -
32. Server Side Includes Injection/ -
33. Ticket Trick Bug Bounty/ -
34. Evil way to Account Takeover/ -
35. Multifactor Authentication/ -
36. HTTPOXY Attack/ -
37. Shellshock bash RCE/ -
38. Apache http server byte range dos/ -
39. Webmin unauthenticated RCE/ -
40. Appweb authentication bypass/ -
41. Nginx/ -
42. Adobe Coldfusion Vulnerabilities/ -
43. Docker RCE/ -
44. Postgres RCE/ -
45. Apache Spark RCE/ -
46. PHPMyadmin RCE/ -
47. Mysql Authentication Bypass/ -
48. DNS ZONE Transfer/ -
49. Flask (Jinja2) SSTI to RCE/ -
50. Hadoop Vulnerabilities/ -
51. GIT Shell RCE/ -
52. REDIS RCE/ -
53. Scrapyd RCE/ -
54. Advance File Uploads/ -
55. CSRF Same Site Bypass/ -
56. Session Puzzling/ -
57. JWT Token Attack/ -
58. Email Bounce Issues/ -
59. IVR Call Request Crash/ -
60. Obscure Email Vulnerability/ -
61. AWS Pentesting/ -