<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/"><channel><title>chs.us — Carl Sampson</title><link>https://chs.us/</link><description/><language>en-us</language><managingEditor>carl.sampson@gmail.com (Carl Sampson)</managingEditor><webMaster>carl.sampson@gmail.com (Carl Sampson)</webMaster><lastBuildDate>Sun, 12 Apr 2026 21:17:44 -0400</lastBuildDate><atom:link href="https://chs.us/categories/security-guides/index.xml" rel="self" type="application/rss+xml"/><item><title>Comprehensive XSS Guide</title><link>https://chs.us/guides/xss/</link><pubDate>Fri, 10 Apr 2026 00:00:00 +0000</pubDate><author>carl.sampson@gmail.com (Carl Sampson)</author><guid>https://chs.us/guides/xss/</guid><description>A practitioner&amp;#39;s reference for Cross-Site Scripting — attack surface, context-aware payloads, filter/WAF/CSP bypass techniques, framework-specific vulnerabilities, real-world chains, and detection/prevention. Compiled from 294 research sources.</description><category>Security-Guides</category><category>Xss</category><category>Web-Security</category><category>Javascript</category><category>Penetration-Testing</category></item><item><title>Comprehensive SSRF Guide</title><link>https://chs.us/guides/ssrf/</link><pubDate>Fri, 10 Apr 2026 00:00:00 +0000</pubDate><author>carl.sampson@gmail.com (Carl Sampson)</author><guid>https://chs.us/guides/ssrf/</guid><description>A practitioner&amp;#39;s reference for Server-Side Request Forgery — attack surface, exploitation techniques, bypass methods, real-world chains, and detection/prevention. Compiled from 385 research sources.</description><category>Security-Guides</category><category>Ssrf</category><category>Web-Security</category><category>Cloud-Security</category><category>Penetration-Testing</category></item><item><title>Comprehensive SQL Injection Guide</title><link>https://chs.us/guides/sqli/</link><pubDate>Fri, 10 Apr 2026 00:00:00 +0000</pubDate><author>carl.sampson@gmail.com (Carl Sampson)</author><guid>https://chs.us/guides/sqli/</guid><description>A practitioner&amp;#39;s reference for SQL Injection — attack classes, exploitation techniques, database-specific payloads, WAF bypass methods, ORM/NoSQL variants, real-world CVEs, and detection/prevention. Compiled from 35 research sources.</description><category>Security-Guides</category><category>Sqli</category><category>Database-Security</category><category>Web-Security</category><category>Penetration-Testing</category></item><item><title>Comprehensive CSRF Guide</title><link>https://chs.us/guides/csrf/</link><pubDate>Fri, 10 Apr 2026 00:00:00 +0000</pubDate><author>carl.sampson@gmail.com (Carl Sampson)</author><guid>https://chs.us/guides/csrf/</guid><description>A practitioner&amp;#39;s reference for Cross-Site Request Forgery — attack surface, exploitation techniques, SameSite and token bypasses, real-world chains, and detection/prevention. Compiled from 38 research sources.</description><category>Security-Guides</category><category>Csrf</category><category>Web-Security</category><category>Session-Management</category><category>Penetration-Testing</category></item><item><title>Comprehensive IDOR Guide</title><link>https://chs.us/guides/idor/</link><pubDate>Fri, 10 Apr 2026 00:00:00 +0000</pubDate><author>carl.sampson@gmail.com (Carl Sampson)</author><guid>https://chs.us/guides/idor/</guid><description>A practitioner&amp;#39;s reference for Insecure Direct Object Reference (IDOR) and Broken Object Level Authorization (BOLA) — attack surface, enumeration patterns, bypass techniques, real-world writeups, detection workflow, and prevention. Compiled from 22 research sources.</description><category>Security-Guides</category><category>Idor</category><category>Authorization</category><category>Web-Security</category><category>Penetration-Testing</category></item><item><title>Comprehensive RCE Guide</title><link>https://chs.us/guides/rce/</link><pubDate>Fri, 10 Apr 2026 00:00:00 +0000</pubDate><author>carl.sampson@gmail.com (Carl Sampson)</author><guid>https://chs.us/guides/rce/</guid><description>A practitioner&amp;#39;s reference for Remote Code Execution — vulnerability classes, exploitation primitives, language-specific chains, real-world CVEs, and detection/prevention. Compiled from 95 research sources.</description><category>Security-Guides</category><category>Rce</category><category>Code-Injection</category><category>Web-Security</category><category>Penetration-Testing</category></item><item><title>Comprehensive XXE Guide</title><link>https://chs.us/guides/xxe/</link><pubDate>Fri, 10 Apr 2026 00:00:00 +0000</pubDate><author>carl.sampson@gmail.com (Carl Sampson)</author><guid>https://chs.us/guides/xxe/</guid><description>A practitioner&amp;#39;s reference for XML External Entity injection — fundamentals, parser quirks, in-band and out-of-band exfiltration, parameter entity chains, file-format vectors, real-world CVEs, tooling, and hardening. Compiled from 41 research sources.</description><category>Security-Guides</category><category>Xxe</category><category>Xml-Security</category><category>Web-Security</category><category>Penetration-Testing</category></item><item><title>Comprehensive Insecure Deserialization Guide</title><link>https://chs.us/guides/deserialization/</link><pubDate>Fri, 10 Apr 2026 00:00:00 +0000</pubDate><author>carl.sampson@gmail.com (Carl Sampson)</author><guid>https://chs.us/guides/deserialization/</guid><description>A practitioner&amp;#39;s reference for insecure deserialization — language-specific attack surface, gadget chain mechanics, real-world CVE chains, tools, and detection/prevention. Compiled from 49 research sources.</description><category>Security-Guides</category><category>Deserialization</category><category>Object-Injection</category><category>Web-Security</category><category>Penetration-Testing</category></item><item><title>Comprehensive GraphQL Security Guide</title><link>https://chs.us/guides/graphql/</link><pubDate>Fri, 10 Apr 2026 00:00:00 +0000</pubDate><author>carl.sampson@gmail.com (Carl Sampson)</author><guid>https://chs.us/guides/graphql/</guid><description>A practitioner&amp;#39;s reference for attacking and defending GraphQL APIs — discovery, introspection, schema recovery, injection, authorization flaws, batching, DoS, subscriptions, CSRF/CSWSH, engine-specific quirks, and detection/prevention. Compiled from 31 research sources.</description><category>Security-Guides</category><category>Graphql</category><category>Api-Security</category><category>Web-Security</category><category>Penetration-Testing</category></item><item><title>Comprehensive API Security Guide</title><link>https://chs.us/guides/api-security/</link><pubDate>Fri, 10 Apr 2026 00:00:00 +0000</pubDate><author>carl.sampson@gmail.com (Carl Sampson)</author><guid>https://chs.us/guides/api-security/</guid><description>A practitioner&amp;#39;s reference for API security — attack surface, OWASP API Top 10 exploitation, authentication and authorization bypasses, GraphQL-specific attacks, rate limit evasion, API gateway hardening, open banking compliance, AI/MCP risks, real-world chains, and detection/prevention. Compiled from 49 research sources.</description><category>Security-Guides</category><category>Api-Security</category><category>Web-Security</category><category>Authentication</category><category>Penetration-Testing</category></item><item><title>Comprehensive Authorization &amp; Access Control Guide</title><link>https://chs.us/guides/authz/</link><pubDate>Fri, 10 Apr 2026 00:00:00 +0000</pubDate><author>carl.sampson@gmail.com (Carl Sampson)</author><guid>https://chs.us/guides/authz/</guid><description>A practitioner&amp;#39;s reference for Broken Access Control (OWASP A01) — the models, bug classes, bypass techniques, real-world chains, and detection/prevention patterns that matter in modern web and API testing. Compiled from 80 research sources.</description><category>Security-Guides</category><category>Authorization</category><category>Access-Control</category><category>Web-Security</category><category>Penetration-Testing</category></item><item><title>Comprehensive Mobile Application Security Guide</title><link>https://chs.us/guides/mobile/</link><pubDate>Fri, 10 Apr 2026 00:00:00 +0000</pubDate><author>carl.sampson@gmail.com (Carl Sampson)</author><guid>https://chs.us/guides/mobile/</guid><description>A practitioner&amp;#39;s reference for iOS and Android application security — threat models, platform attack surface, reverse engineering, runtime instrumentation, bypass techniques, testing methodology, and defensive controls. Compiled from 34 research sources.</description><category>Security-Guides</category><category>Mobile-Security</category><category>Ios-Security</category><category>Android-Security</category><category>Penetration-Testing</category></item><item><title>Comprehensive Python Security Guide</title><link>https://chs.us/guides/python/</link><pubDate>Fri, 10 Apr 2026 00:00:00 +0000</pubDate><author>carl.sampson@gmail.com (Carl Sampson)</author><guid>https://chs.us/guides/python/</guid><description>A practitioner&amp;#39;s defensive reference for securing Python applications — dangerous APIs, deserialization pitfalls, framework-specific risks, supply chain attacks, LLM-era CVEs, static analysis tooling, and hardening patterns. Compiled from 184 research sources.</description><category>Security-Guides</category><category>Python-Security</category><category>Web-Security</category><category>Supply-Chain-Security</category><category>Static-Analysis</category></item><item><title>Comprehensive Fuzzing Guide</title><link>https://chs.us/guides/fuzzing/</link><pubDate>Fri, 10 Apr 2026 00:00:00 +0000</pubDate><author>carl.sampson@gmail.com (Carl Sampson)</author><guid>https://chs.us/guides/fuzzing/</guid><description>A practitioner&amp;#39;s reference for fuzz testing — fundamentals, coverage feedback, harness construction, corpus strategy, sanitizer usage, and the tool stack for web, binary, kernel, API, and smart-contract targets. Compiled from 46 research sources.</description><category>Security-Guides</category><category>Fuzzing</category><category>Testing</category><category>Vulnerability-Research</category><category>Security-Testing</category></item><item><title>Comprehensive Recon Guide</title><link>https://chs.us/guides/recon/</link><pubDate>Fri, 10 Apr 2026 00:00:00 +0000</pubDate><author>carl.sampson@gmail.com (Carl Sampson)</author><guid>https://chs.us/guides/recon/</guid><description>A practitioner&amp;#39;s reference for web reconnaissance — attack surface discovery, subdomain enumeration, live host probing, content discovery, JS mining, cloud asset hunting, automation, and continuous monitoring. Compiled from 23 research sources.</description><category>Security-Guides</category><category>Reconnaissance</category><category>Attack-Surface</category><category>Enumeration</category><category>Penetration-Testing</category></item><item><title>Comprehensive OSINT Guide</title><link>https://chs.us/guides/osint/</link><pubDate>Fri, 10 Apr 2026 00:00:00 +0000</pubDate><author>carl.sampson@gmail.com (Carl Sampson)</author><guid>https://chs.us/guides/osint/</guid><description>A practitioner&amp;#39;s reference for Open Source Intelligence — methodology, collection disciplines, tooling, pivoting techniques, and operational security. Compiled from 34 research sources.</description><category>Security-Guides</category><category>Osint</category><category>Intelligence-Gathering</category><category>Reconnaissance</category><category>Social-Engineering</category></item><item><title>Comprehensive Secrets Management &amp; Leakage Guide</title><link>https://chs.us/guides/secrets/</link><pubDate>Fri, 10 Apr 2026 00:00:00 +0000</pubDate><author>carl.sampson@gmail.com (Carl Sampson)</author><guid>https://chs.us/guides/secrets/</guid><description>A practitioner&amp;#39;s reference for secrets sprawl, credential leakage, detection, remediation, and hardening. Compiled from 54 research sources covering GitGuardian State of Secrets Sprawl 2025/2026, OWASP Secrets Management Cheat Sheet, TruffleHog, Gitleaks, real-world breaches (Trivy/European Commission, Shai-Hulud, LiteLLM, EleKtra-Leak, .env extortion campaigns, GCP SecOps SIEM token leak), AI-era leakage patterns (Claude Code source leak, vibe-coding fingerprints, ChatGPT API key exposure), certificate/private key leak research (Google-GitGuardian), GitHub search syntax for secret discovery, vault hardening (HashiCorp Vault production guide, AWS SM vs Vault, Infisical, SOPS+age), Terraform/Kubernetes secrets management, IAM Roles Anywhere, shift-left speed budgets, and NHI governance guidance.</description><category>Security-Guides</category><category>Secrets-Management</category><category>Credential-Leakage</category><category>Security-Tooling</category><category>Devops-Security</category></item><item><title>Comprehensive Bug Bounty Hunting Guide</title><link>https://chs.us/guides/bug-bounty/</link><pubDate>Fri, 10 Apr 2026 00:00:00 +0000</pubDate><author>carl.sampson@gmail.com (Carl Sampson)</author><guid>https://chs.us/guides/bug-bounty/</guid><description>A practitioner&amp;#39;s reference for modern bug bounty hunting — methodology, platforms, reconnaissance pipelines, vulnerability hunting, exploit chaining, report writing, and career strategy. Compiled from 98 research sources.</description><category>Security-Guides</category><category>Bug-Bounty</category><category>Vulnerability-Research</category><category>Ethical-Hacking</category><category>Penetration-Testing</category></item><item><title>Software Supply Chain Security Guide</title><link>https://chs.us/guides/supply-chain/</link><pubDate>Fri, 10 Apr 2026 00:00:00 +0000</pubDate><author>carl.sampson@gmail.com (Carl Sampson)</author><guid>https://chs.us/guides/supply-chain/</guid><description>A defender&amp;#39;s reference for software supply chain risks — threat model across the SDLC, package-registry attack patterns, CI/CD hardening, artifact provenance and signing, SBOMs, dependency scanning, case studies, and a checklist. Compiled from 54 research articles, advisories, and incident writeups in `raw/Supply Chain/`.</description><category>Security-Guides</category><category>Supply-Chain-Security</category><category>Devops-Security</category><category>Dependency-Security</category><category>Ci-Cd-Security</category></item><item><title>Comprehensive Burp Suite Guide</title><link>https://chs.us/guides/burp-suite/</link><pubDate>Fri, 10 Apr 2026 00:00:00 +0000</pubDate><author>carl.sampson@gmail.com (Carl Sampson)</author><guid>https://chs.us/guides/burp-suite/</guid><description>A practitioner&amp;#39;s reference for Burp Suite — core tools, essential extensions, Bambdas and BChecks, Collaborator, macros and session handling, custom extension development, Burp AI, and real-world testing workflows. Compiled from 71 research sources.</description><category>Security-Guides</category><category>Burp-Suite</category><category>Web-Testing</category><category>Security-Tools</category><category>Penetration-Testing</category></item><item><title>Comprehensive AI / LLM Security Guide</title><link>https://chs.us/guides/ai/</link><pubDate>Fri, 10 Apr 2026 00:00:00 +0000</pubDate><author>carl.sampson@gmail.com (Carl Sampson)</author><guid>https://chs.us/guides/ai/</guid><description>A practitioner&amp;#39;s reference for securing Large Language Model and agentic AI systems — attack surface, exploitation techniques, real-world CVE chains, payloads, and layered detection/prevention. Compiled from 60 research sources (OWASP, NVIDIA AI Red Team, Unit 42, Lakera/Check Point, NCSC, CrowdStrike/Pangea, Equixly, Anthropic, OpenAI, Microsoft MSRC, Google, AWS, MITRE ATLAS, Penligent, Red Hat, Pillar Security, JFrog, AuthZed, Trend Micro, Nature, and independent researchers).</description><category>Security-Guides</category><category>Ai-Security</category><category>Llm-Security</category><category>Prompt-Injection</category><category>Machine-Learning</category></item><item><title>Comprehensive Authentication Guide</title><link>https://chs.us/guides/authentication/</link><pubDate>Fri, 10 Apr 2026 00:00:00 +0000</pubDate><author>carl.sampson@gmail.com (Carl Sampson)</author><guid>https://chs.us/guides/authentication/</guid><description>A practitioner&amp;#39;s reference for authentication security — protocols, mechanisms, vulnerabilities, exploitation techniques, and defense strategies. Covers traditional and modern authentication methods from enterprise to web applications. Compiled from 55 research sources.</description><category>Security-Guides</category><category>Authentication</category><category>Sso-Security</category><category>Mfa-Security</category><category>Web-Security</category></item><item><title>Comprehensive JWT Security Guide</title><link>https://chs.us/guides/jwt/</link><pubDate>Fri, 10 Apr 2026 00:00:00 +0000</pubDate><author>carl.sampson@gmail.com (Carl Sampson)</author><guid>https://chs.us/guides/jwt/</guid><description>A practitioner&amp;#39;s reference for JSON Web Token security -- vulnerabilities, exploitation techniques, attack vectors, implementation flaws, and defense strategies. Covers algorithm confusion, signature bypass, header injection, key confusion, library-specific issues, cryptographic attacks, attack chaining, and secure implementation patterns. Compiled from 42 research sources.</description><category>Security-Guides</category><category>Jwt-Security</category><category>Token-Security</category><category>Authentication</category><category>Web-Security</category></item><item><title>Comprehensive SSTI Guide</title><link>https://chs.us/guides/ssti/</link><pubDate>Fri, 10 Apr 2026 00:00:00 +0000</pubDate><author>carl.sampson@gmail.com (Carl Sampson)</author><guid>https://chs.us/guides/ssti/</guid><description>A practitioner&amp;#39;s reference for Server-Side Template Injection — template engine vulnerabilities, exploitation techniques, payload development, framework-specific attacks, and defense strategies. Covers detection methodologies, engine-specific exploitation, and secure templating practices. Compiled from 40 research sources.</description><category>Security-Guides</category><category>Ssti</category><category>Template-Injection</category><category>Rce</category><category>Web-Security</category></item><item><title>Security Conference Talks &amp; Research Guide</title><link>https://chs.us/guides/talks/</link><pubDate>Fri, 10 Apr 2026 00:00:00 +0000</pubDate><author>carl.sampson@gmail.com (Carl Sampson)</author><guid>https://chs.us/guides/talks/</guid><description>A practitioner&amp;#39;s reference for the global security conference circuit — where research is published, which venues matter for which subject areas, how to pick talks, and how to submit your own. Compiled from 35 research sources.</description><category>Security-Guides</category><category>Security-Conferences</category><category>Talks</category><category>Research</category><category>Ctf</category></item></channel></rss>