www.securityidiots.com Open in urlscan Pro
2a06:98c1:3121::3  Public Scan

URL: https://www.securityidiots.com/
Submission: On February 02 via manual from AR — Scanned from NL

Form analysis 1 forms found in the DOM

Name: membedded-subscribe-formPOST #

<form class="subscribe-form validate" action="#" method="POST" id="membedded-subscribe-form" name="membedded-subscribe-form" target="_blank" novalidate="">
  <label class="screen-reader-text" for="mce-EMAIL">Email address</label>
  <input class="subscribe-email required email" id="mce-EMAIL" type="text" name="EMAIL" placeholder="Your email address">
  <button class="button subscribe-button" id="membedded-subscribe" type="submit" name="subscribe">Subscribe</button>
</form>

Text Content

SecurityIdiots
Menu
 * Home
 * About
 * Contact




Search for Blog



HI, I'M KHAN.


SECURITY ENGINEER, BUG BOUNTY HUNTER

I spend a lot of time programming and breaking the applications logic.

Read more about me



XXE CHEAT SHEET - SECURITYIDIOTS

Just another article bring together the tips and tricks to find/exploit XXE and
bypass it.

Rahul & Faraz 2019-10-16
Web-PentestXXE


DIFFERENT CONTEXTS FOR XSS EXECUTION

Here we will learn, different types of contexts where XSS may reflect. How to
deal with them and how we can balance the injection.

Rahul Maini 2018-05-31
Web-PentestXSS


XSS EXPLOITATION PART 1

Finally, we are finished with basics of javascript for XSS and here we are with
the first part of XSS exploitation.

Rahul Maini 2017-05-27
Web-PentestXSS


BASICS OF JAVASCRIPT FOR XSS - FINAL

In this post we will finally finish up our requirements of Javascript for XSS,
from our next post we will bang with XSS..

Rahul Maini 2017-05-13
Web-PentestXSS


BASICS OF JAVASCRIPT FOR XSS PART 2

In this post we will cover some other requirements a attacker need to understand
about Javascript for advanced XSS exploitation.

Rahul Maini 2017-04-29
Web-PentestXSS


XSS SERIES BY SECURITYIDIOTS

Securityidiots is back with its all amazing tutorials, Monter maini is gonna
cover basics to advanced XSS in this series.

Rahul Maini 2017-04-22
Web-PentestXSS


BYPASS ADDSLASHES USING MULTIBYTE CHARACTER

I beleive this tutorial is nother unique or new as compared to some other
tutorials on Securityidiots. Tutorial related to Addslash bypass can be found
easily

H_SQLi.EMpiRe 2015-05-13
Web-PentestSQL-Injection


MSSQL PRACTICAL SECOND ORDER EXPLOITATION

MSSQL out of band exploitation, very useful while you are not able to extract
that data in all those old ways, here we are with a awesome fucking new way ;)

Zen Javanicus 2015-05-11
Web-PentestSQL-Injection


ORACLE SQL INJECTION AND DIOS QUERY

Here is a complete tutorial on how to injection in oracle based website, along
with into to oracle DIOS.

SecurityIdiots 2015-05-09
Web-PentestSQL-Injection


MSSQL SECOND ORDER EXPLOITATION

MSSQL Insert Query injection and Second order Exploitation tutorial with
video...

Zen Javanicus 2015-04-12
Web-PentestSQL-Injection


BYPASS SUCURI WEBSITE FIREWALL(WAF)

In this tutorial we'll bypass the latest WAF Sucuri. Which is becoming a pain in
the ass to many Inj3ct0rs

Zen Javanicus 2015-04-05
Web-PentestWAF-Bypass


GUIDE TO WAF BYPASS BY SECURITYIDIOTS

Heres one of the most requested tutorial yet, Lets start learning and exploring
WAF techniques and bypasses.

Zen Javanicus 2015-03-28
Web-PentestWAF-Bypass


ONE PAYLOAD TO INJECT THEM ALL - MULTIQUERY INJECTION

Multi Query injection, one of my favorites. Heres a little explanation on it and
why its different from Routed SQLi

Zen Javanicus 2015-03-14
Web-PentestSQL-Injection


XPATH INJECTION : ITERATING THROUGH ELEMENT AND ENTITIES

Learn how to test XPATHi and confirm it, Inject and extract the data from XML
using XPATHi

Zenodermus Javanicus 2015-02-22
Web-PentestXPATH-Injection


SHELL THE WEB - METHODS OF A NINJA

Learn what securities developers use against shell uploading and how can we
bypass those securities to get our shell over that website.

Zenodermus Javanicus 2015-02-14
Web-Pentest


MSSQL ERROR BASED INJECTION

Many times you fall into a situation when Union doesnt work so herez basics of
how to use error based MSSQL injection, and what are the conditions need to be
met for an error based SQLi

Zen Javanicus 2015-02-01
Web-PentestSQL-InjectionMSSQL


ROUTED SQL INJECTION

Security Idiots is up with some of the most tricky parts of SQL injection, brace
yourself to have some more fun with SQL injection.

Zenodermus Javanicus 2014-11-21
Web-PentestSQL-Injection


STEP BY STEP MSSQL UNION BASED INJECTION

A complete series on MSSQL Injection for those who are still not really
comfortable with MSSQL Injection

Zenodermus Javanicus 2014-08-21
Web-PentestSQL-InjectionMSSQL


HAND GUIDE TO LOCAL FILE INCLUSION(LFI)

Guide to Local File Inclusion. Learn how to shell website using LFI and other
Bypass tricks

Rahul Maini 2014-08-11
Web-PentestLFI


MANUAL INJ3CT0RS GUIDE TO RECOGNIZE DATABASE

Learn how to recognize the database used by the application even when you can
not see any kind of errors. Handy guide for manual SQL injectors.

Zenodermus Javanicus 2014-08-05
Web-PentestSQL-Injection


MSSQL DIOS (DUMP IN ONE SHOT)

Explanation on MS SQL Dump in one shot query.

Rummy Khan & Zen 2014-07-29
Web-PentestSQL-InjectionMSSQL


DIOS THE SQL INJECTORS WEAPON (UPGRADED)

Learn some more about DIOS and check out the other complete new flavors of SQLi
DUMP In One Shot.

Zenodermus Javanicus 2014-07-21
Web-PentestSQL-Injection


STEAL IP ADDRESS USING IMAGE

Steal IP address of victim using an image, the same trick can be used with SQLi
and XSS also.

Zenodermus Javanicus 2014-07-01
Web-PentestTricks


DIOS (DUMP IN ONE SHOT) EXPLAINED PART 2

Here we will learn Some more advanced tricks to use with our DIOS and make it a
complete query to work with

Anas Ali 2014-06-17
Web-PentestSQL-Injection


BASICS XPATH INJECTION

This is our first tutorial where will will be discussing how can we inject into
XPATH queries with live example and scenario to make it easy to understand.

Zenodermus Javanicus 2014-06-12
Web-PentestXPATH-Injection


DIOS (DUMP IN ONE SHOT) EXPLAINED

Most of the Inj3ct0rs are using DIOS but very few actually know how it is
working or how can they change it to get the required output. so here is a
tutorial which will help you on that

Zenodermus Javanicus 2014-06-03
Web-PentestSQL-Injection


BASICS OF XPATH FOR XPATH INJECTION 1

In this tutorial we will understand the basics of XPATH and its all the
relations and terms used in XPATH to better understand how to inject into XPATH
queries

Zenodermus Javanicus 2014-06-01
Web-PentestXPATH-Injection


BASICS OF XPATH FOR XPATH INJECTION 2

In this tutorial we will understand the basics of XPATH Queries and then also
start with the basics of XPATH injection

Zenodermus Javanicus 2014-06-01
Web-PentestXPATH-Injection


UNION BASED ORACLE INJECTION

After all of our tutorials on injecting into MySQL database this tutorial
concentrates on the basics of injecting in Oracle database

Zenodermus Javanicus 2014-05-28
Web-PentestSQL-Injection


GROUP BY AND ORDER BY SQL INJECTION

Here we will learn how can an attacker inject into Order by and group by clause
to extract the data using SQL injection

Zenodermus Javanicus 2014-04-27
Web-PentestSQL-Injection
Prev
Page 0
Next



RECENT POSTS

Nov 13, 2018

XXE CHEAT SHEET - SECURITYIDIOTS

Nov 13, 2018

DIFFERENT CONTEXTS FOR XSS EXECUTION





SUBSCRIBE TO NEW POSTS

Subscribe to our newsletter and we’ll send you the emails of latest posts.
Email address Subscribe
 * 
 * 
 * 
 * 
 * 
 * 

2021 © SecurityIdiots. Crafted & Designed by Artem Sheludko.