This Project Documentation contains detailed overview and steps to reproduce all kind of vulnerabilities.
- Authentication Bypass
- EXIF Vulnerability
- CSRF - Cross-Site Request Forgery
- IDOR - Insecure Direct Object Reference
- Two-Factor Authentication - Vulnerabilities
- SQL Injection
- Open File Upload
- SSRF - Server Side Request Forgery
- Web Cache Poisoning
Documentation is not done yet. It's Going On.