Security Guides#
An index of application security topics I research and write about, organized by category with links to detailed content and ongoing research areas.
Core Vulnerability Guides#
๐ฏ Comprehensive XSS Guide#
34KB reference covering 20 attack techniques โ Context-aware payloads, filter/WAF/CSP bypasses, framework-specific exploits, DOM clobbering, polyglots, and real-world exploitation chains. Compiled from 293 research sources.
๐ฏ Comprehensive SSRF Guide#
40KB reference covering internal network exploitation โ Attack surface mapping, cloud metadata extraction, bypass techniques, exploitation chains, and defense strategies. Compiled from 299 research sources.
๐ฏ Comprehensive SQL Injection Guide#
38KB reference covering database exploitation โ Attack classes, database-specific payloads, blind techniques, WAF bypasses, ORM/NoSQL variants, and prevention methods. Compiled from 33 research sources.
๐ฏ Comprehensive CSRF Guide#
45KB reference covering state-changing attacks โ Attack surface, exploitation techniques, SameSite and token bypasses, real-world chains, and detection/prevention. Compiled from 37 research sources.
๐ฏ Comprehensive IDOR Guide#
44KB reference covering authorization bypasses โ Attack surface, enumeration patterns, BOLA techniques, real-world writeups, detection workflow, and prevention. Compiled from 21 research sources.
๐ฏ Comprehensive RCE Guide#
58KB reference covering code execution attacks โ Vulnerability classes, exploitation primitives, language-specific chains, real-world CVEs, and detection/prevention. Compiled from 63 research sources.
๐ฏ Comprehensive XXE Guide#
45KB reference covering XML exploitation โ Parser quirks, in-band and out-of-band exfiltration, parameter entity chains, file-format vectors, and hardening. Compiled from 40 research sources.
๐ฏ Comprehensive Deserialization Guide#
66KB reference covering object injection attacks โ Language-specific attack surface, gadget chain mechanics, real-world CVE chains, tools, and detection/prevention. Compiled from 47 research sources.
API & Application Security#
๐ฏ Comprehensive API Security Guide#
38KB reference covering API attack surface โ OWASP API Top 10 exploitation, authentication and authorization bypasses, rate limit evasion, real-world chains, and detection/prevention. Compiled from 30 research sources.
๐ฏ Comprehensive GraphQL Security Guide#
39KB reference covering GraphQL attacks โ Discovery, introspection, schema recovery, injection, authorization flaws, batching, DoS, subscriptions, and engine-specific quirks. Compiled from 31 research sources.
๐ฏ Comprehensive Authorization & Access Control Guide#
43KB reference covering Broken Access Control โ Authorization models, bug classes, bypass techniques, real-world chains, and detection/prevention patterns for web and API testing. Compiled from 33 research sources.
Security Methodology & Techniques#
๐ฏ Comprehensive Mobile Application Security Guide#
53KB reference covering iOS and Android security โ Threat models, platform attack surface, reverse engineering, runtime instrumentation, bypass techniques, testing methodology, and defensive controls. Compiled from 16 research sources.
๐ฏ Comprehensive Python Security Guide#
50KB reference covering Python application security โ Dangerous APIs, deserialization pitfalls, framework-specific risks, supply chain attacks, LLM-era CVEs, static analysis tooling, and hardening patterns. Compiled from 81 research sources.
๐ฏ Comprehensive Fuzzing Guide#
46KB reference covering fuzz testing โ Fundamentals, coverage feedback, harness construction, corpus strategy, sanitizer usage, and the tool stack for web, binary, kernel, and API targets. Compiled from 23 research sources.
๐ฏ Comprehensive Recon Guide#
41KB reference covering web reconnaissance โ Attack surface discovery, subdomain enumeration, live host probing, content discovery, JS mining, cloud asset hunting, automation, and continuous monitoring. Compiled from 23 research sources.
๐ฏ Comprehensive OSINT Guide#
52KB reference covering Open Source Intelligence โ Methodology, collection disciplines, tooling, pivoting techniques, and operational security for intelligence gathering. Compiled from 34 research sources.
๐ฏ Comprehensive Secrets Management & Leakage Guide#
53KB reference covering secrets sprawl and credential leakage โ Detection, remediation, and hardening with coverage of GitGuardian research, OWASP guidance, TruffleHog/Gitleaks, real-world breaches, and AI-era patterns. Compiled from 30 research sources.
Professional Tools & Career#
๐ฏ Comprehensive Bug Bounty Hunting Guide#
57KB reference covering modern bug bounty hunting โ Methodology, platforms, reconnaissance pipelines, vulnerability hunting, exploit chaining, report writing, and career strategy. Compiled from 97 research sources (the largest collection in the research library).
๐ฏ Comprehensive Burp Suite Guide#
51KB reference covering professional web testing โ Core tools, essential extensions, Bambdas and BChecks, Collaborator, macros and session handling, custom extension development, Burp AI, and real-world testing workflows. Compiled from 69 research sources.
๐ฏ Software Supply Chain Security Guide#
55KB reference covering supply chain risks โ Threat model across the SDLC, package-registry attack patterns, CI/CD hardening, artifact provenance and signing, SBOMs, dependency scanning, case studies, and defensive checklists. Compiled from 29 research sources.
Blog Posts by Topic#
Server-Side Request Forgery (SSRF)#
- SSRF Defense Strategies - Comprehensive mitigation techniques
- SSRF Attack Vectors - Understanding the threat landscape
- CVE-2026-27696: ChangeDetection SSRF - Real-world vulnerability analysis
Cross-Site Scripting (XSS)#
- Content Security Policy Toolkit - Modern CSP implementation guide
- Content Security Policy Deep Dive - Foundation concepts and best practices
XML External Entity (XXE)#
- XXE Payload Collection - Practical exploitation examples
Memory Safety & Binary Security#
Use After Free#
- Use After Free Exploitation - Memory corruption fundamentals
Python Security#
Core Security Concepts#
- Python Context Managers - Secure resource handling
- Python Magic Methods - Security implications of dunder methods
- Python Deserialization Security - Guide planned
Security Tools & Libraries#
- Getting Started with Requests - Secure HTTP client usage
- Python Cryptography Best Practices - Coming soon
Advanced Topics#
Tool Poisoning & Supply Chain#
- MCP Tool Poisoning - Modern supply chain attack vectors
Security Research & Bug Bounty#
Research Methodology#
- Common Weakness Enumeration (CWE) - Understanding vulnerability classification
- Vulnerability Discovery Techniques - Methodology guide coming soon
Tool Poisoning & Supply Chain#
- MCP Tool Poisoning - Modern supply chain attack vectors
- Dependency Confusion Attacks - Research ongoing
Security Tools & Techniques#
Burp Suite#
- Advanced Extensions Development - Guide planned
- Custom Scanner Rules - Coming soon
Fuzzing#
- Web Application Fuzzing - Methodology guide in development
- API Endpoint Discovery - Techniques compilation planned
OSINT & Reconnaissance#
- Asset Discovery Methodology - Guide planned
- Social Engineering Reconnaissance - Research compilation coming soon
Secret Management#
- Credential Exposure Prevention - Best practices guide planned
- Secret Scanning Techniques - Tool comparison coming soon
Talks & Presentations#
Check out my speaking page for conference talks and presentations on these security topics.
Additional Resources#
For curated security resources and tools, visit appsec.fyi - my collection of application security resources.
This guides index is continuously updated as I research and publish new security content. Each topic represents areas of active research and practical experience.