A comprehensive, structured library covering attacks, protocols, cryptography, tools, defenses, labs, and resources for cybersecurity learning and practice.
- SQL Injection
- Cross-Site Scripting (XSS)
- Cross-Site Request Forgery (CSRF)
- Command Injection
- File Inclusion (LFI/RFI)
- Directory Traversal
- Server-Side Request Forgery (SSRF)
- Authentication Bypass
- Insecure Deserialization
- Clickjacking
- HTTP Header Injection
- XML External Entity (XXE)
- ARP Spoofing
- Man-in-the-Middle (MITM)
- DNS Spoofing
- Port Scanning & Recon
- Packet Sniffing
- IP Spoofing
- Denial of Service (DoS)
- Distributed Denial of Service (DDoS)
- Routing Attacks (BGP/OSPF)
- Wireless Network Attacks (WEP/WPA Cracking)
- Phishing
- Spear Phishing
- Vishing (Voice Phishing)
- Smishing (SMS Phishing)
- Pretexting
- Baiting
- Tailgating / Physical Access
- Wi-Fi Cracking
- Bluetooth Exploits
- Zigbee / IoT Protocol Attacks
- Rogue Access Points
- IoT Device Takeover
- Misconfigured Storage Buckets
- Privilege Escalation in VMs
- Container Escape
- API Abuse
- Identity & Access Misuse
- USB / Peripheral Exploits
- Hardware Keyloggers
- Side-Channel Attacks
- Cold Boot Attacks
- RFID / NFC Hacking
- Symmetric Encryption
- Asymmetric Encryption
- Hashing Algorithms
- Cryptanalysis & Attacks
- Digital Signatures
- PKI & Certificates
- SQL Injection Lab
- XSS Lab
- Network Sniffing Lab
- ARP Spoofing Lab
- Password Cracking Lab
- TLS/SSL Analysis Lab