Skip to main content
Advanced Search
Search Terms
Content Type

Exact Matches
Tag Searches
Date Options
Updated after
Updated before
Created after
Created before

Search Results

10 total results found

Security 🔐

Web-security, best practices and pentest

List of best practices and pentest tools to prevent/attack common and complex vulnerability on web component (API, Oauth, JWT, ...). 

Security
Public

Prevent CSRF, XSS and XSF attacks

Web-security, best practices and pentest

Best practices to audit and configure web app again CSRF, XSS and XSF attacks

How to safely use JWT

Web-security, best practices and pentest

Best practices to audit and use JWT

Pentest tools

Web-security, best practices and pentest

List of useful pentest tools

Introduction

Web-security, best practices and pentest Prevent CSRF, XSS and XSF attacks

Useful links : XSS attacks What is cross-site scripting (XSS) and how to prevent it? | Web Security Academy CSRF attacks What is CSRF (Cross-site request forgery)? Tutorial & Examples | Web Security Academy XSF attacks Framing Attacks and Cross-frame scr...

CSRF attacks

Web-security, best practices and pentest Prevent CSRF, XSS and XSF attacks

Definition SRF (Cross-Site Request Forgery) attacks involve tricking authenticated users into unknowingly performing actions on a web application. The attacker exploits the trust between the victim's browser and the application to execute unauthorized actions...

XSS attacks

Web-security, best practices and pentest Prevent CSRF, XSS and XSF attacks

Definition XSS (Cross-Site Scripting) attacks are security vulnerabilities in web applications where an attacker injects malicious scripts into trusted websites, allowing them to execute arbitrary code in the victim's browser. This can lead to unauthorized ac...

JWT security

Web-security, best practices and pentest How to safely use JWT

JWT is safe. JWT misconfiguration is widespread and involves huge security breaches Ressources Debug and decode JWT token (mirror) Stop using JWT for web sessions When to use symmetric signing Exploit on JWT token Re-signing attack Introduction ...

Web pentest tools

Web-security, best practices and pentest Pentest tools

List of tools used to pentest web app Safety Python dependencies check CorsTest Simple CORS misconfiguration tester OWASP Zap Scanner, indexer, vuln discovery, interactive HUD, proxy, ...