Offensive Po3nyo
search
⌘Ctrlk
GitHubBlog
Offensive Po3nyo
  • Introduction
  • 📌Pinned
    • Cheat Sheet
  • 📖background knowledge
    • Active Directory & Windows
    • Linux
    • Web
    • Network
    • CS
  • 🟥Offensive Security
    • axe-battleRed Team Infrastructure
    • shield-keyholeBlue Team Infrastructure
    • magnifying-glassReconnaissance
    • radarInitial Access
    • square-terminalExecution
    • anchorPersistence
    • escalatorPrivilege Escalation
    • book-skullDefense Evasion
    • rectangle-history-circle-userCredential Access
    • map-location-dotDiscovery
    • arrow-progressLateral Movement
    • rssCollection
    • cart-flatbed-boxesExfiltration
    • gamepadCommand and Control
  • 🟦Web Pentesting
    • serverServer-Side
    • desktopClient-Side
      • Cross-site scripting (XSS)
      • Cross-site request forgery (CSRF)
      • Cross-origin resource sharing (CORS)
      • Clickjacking
      • Dom-based vulnerabilities
      • WebSockets
      • Web LLM attacks
      • Prototype pollution
  • 🟩Mobile Pentesting
    • androidAndroid
    • appleIOS
  • 🟨reverse engineering
    • Reverse Engineering
  • 🟧forensic
    • windowsWindows
    • linuxLinux
  • 🟫ETC
    • screwdriver-wrenchTools
    • booksCVE Research
gitbookPowered by GitBook
block-quoteOn this pagechevron-down
  1. 🟦Web Pentesting

desktopClient-Side

Cross-site scripting (XSS)chevron-rightCross-site request forgery (CSRF)chevron-rightCross-origin resource sharing (CORS)chevron-rightClickjackingchevron-rightDom-based vulnerabilitieschevron-rightWebSocketschevron-rightWeb LLM attackschevron-rightPrototype pollutionchevron-right
PreviousJWT attackschevron-leftNextCross-site scripting (XSS)chevron-right