Hypertext Transfer Protocol
Source Code Review
General Scoping
Screenshot Inspection
Aquatone

View Certificate Information
Server Header Information
Fuzzing Sub-domains
Fuzzing VHOSTs
Fuzzing Directories Files Parameters
Response Headers
Command Injection
Local File inclusion
Remote File inclusion
SQL injection
Authentication Bypass
XXE
XSS
Type
Description
Testing XSS Payloads

window.origin in the alert box, instead of a static value like 1. In this case, the alert box would reveal the URL it is being executed on, and will confirm which form is the vulnerable one, in case an IFrame was being used.XSS Discovery Automation
XSStrike
Phishing
Login Form Injection



Session Hijacking





XSS Prevention
Input Validation

email input field and returning true or false whether it matches the Regex validation of an email format
Input Sanitization

\, which should help ensure that a user does not send any input with special characters (like JavaScript code), which should prevent vulnerabilities like DOM XSS.
addslashes function to sanitize user input by escaping special characters with a backslash. In any case, direct user input (e.g. $_GET['email']) should never be directly displayed on the page, as this can lead to XSS vulnerabilities
Output HTML Encoding

Output Encoding. This means that we have to encode any special characters into their HTML codes, which is helpful if we need to display the entire user input without introducing an XSS vulnerability. For a PHP back-end, we can use the htmlspecialchars or the htmlentities functions, which would encode certain special characters into their HTML codes (e.g. < into <), so the browser will display them correctly, but they will not cause any injection of any sort
html-entities, as follows:Direct Input
Server Configuration
Nikto Vulnerability Scanner
Last updated