Cheatsheets
Quick reference guides for web security, bug bounty hunting, and CTFs.
Web Security
Attack techniques and exploitation payloads
SQL Injection
UNION, blind, error-based, OOB, WAF bypass
XSS
Context payloads, filter bypass, polyglots
SSRF
Localhost bypass, cloud metadata, protocols
CSRF
Token bypass, SameSite, JSON CSRF
XXE
OOB extraction, blind XXE, file upload
SSTI
Jinja2, Twig, FreeMarker, ERB payloads
IDOR
Access control bypass, ID manipulation
JWT Attacks
Algorithm confusion, signature bypass, claim manipulation
GraphQL
Introspection, injection, auth bypass, DoS
OAuth/OIDC
Redirect URI, state bypass, token attacks
CORS
Origin reflection, null bypass, credential theft
Request Smuggling
CL.TE, TE.CL, HTTP/2 downgrade
Race Conditions
TOCTOU, parallel requests, limit bypass
Deserialization
Java, PHP, Python, .NET gadget chains
Prototype Pollution
JS prototype chain, XSS, RCE via pollution
WebSocket
CSWSH, message manipulation, injection
Open Redirect
Bypass techniques, OAuth chaining
Host Header
Cache poisoning, password reset
HPP
Parameter pollution, WAF bypass
Command Injection
OS command injection, blind techniques
LFI/RFI
Local/Remote File Inclusion, wrappers
Authentication Attacks
Brute force, logic flaws, bypass
Access Control
Vertical/Horizontal privilege escalation
Business Logic
Logic flaws, workflow bypass
Reconnaissance
Asset discovery and information gathering
Subdomain Enumeration
subfinder, amass, DNS resolution
Content Discovery
ffuf, gobuster, wordlists, hidden files
Port Scanning
Nmap, masscan, service enumeration
JS Analysis
Endpoint extraction, secrets, source maps
API Enumeration
Swagger, parameters, version discovery
OSINT
Company intel, GitHub recon, cloud assets
Google Dorking
Advanced operators, sensitive files
Tech Fingerprinting
Wappalyzer, header analysis
CTF
Capture The Flag competition techniques
CTF Methodology
Systematic approach to solving challenges
Binary Exploitation
Buffer overflow, ROP, format strings, heap
Privilege Escalation (Linux)
SUID, Kernel, Capabilities, NFS
Privilege Escalation (Windows)
Token manipulation, Services, Registry
Active Directory
Kerberoasting, BloodHound, Lateral Movement
Network Pivoting
SSH tunneling, Chisel, Ligolo-ng
Forensics
Memory analysis, disk forensics, artifacts
File Analysis & Stego
strings, binwalk, steghide, exiftool
Cryptography
Encodings, ciphers, RSA, hash cracking
Web Exploitation
PHP tricks, type juggling, LFI, bypasses
Reverse Engineering
Ghidra, GDB, radare2, binary analysis
Steganography
Hidden data in images/audio
CTF Misc
Esoteric languages, encoding
Need More Depth?
Access in-depth private notes with advanced techniques and methodologies.