<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/"><channel><title>chs.us — Carl Sampson</title><link>https://chs.us/</link><description/><language>en-us</language><managingEditor>carl.sampson@gmail.com (Carl Sampson)</managingEditor><webMaster>carl.sampson@gmail.com (Carl Sampson)</webMaster><lastBuildDate>Fri, 10 Apr 2026 17:05:31 -0400</lastBuildDate><atom:link href="https://chs.us/tags/penetration-testing/index.xml" rel="self" type="application/rss+xml"/><item><title>Comprehensive XSS Guide</title><link>https://chs.us/guides/xss/</link><pubDate>Fri, 10 Apr 2026 00:00:00 +0000</pubDate><author>carl.sampson@gmail.com (Carl Sampson)</author><guid>https://chs.us/guides/xss/</guid><description>A practitioner&amp;#39;s reference for Cross-Site Scripting — attack surface, context-aware payloads, filter/WAF/CSP bypass techniques, framework-specific vulnerabilities, real-world chains, and detection/prevention. Compiled from 293 research sources.</description><category>Security-Guides</category><category>Xss</category><category>Web-Security</category><category>Javascript</category><category>Penetration-Testing</category></item><item><title>Comprehensive SSRF Guide</title><link>https://chs.us/guides/ssrf/</link><pubDate>Fri, 10 Apr 2026 00:00:00 +0000</pubDate><author>carl.sampson@gmail.com (Carl Sampson)</author><guid>https://chs.us/guides/ssrf/</guid><description>A practitioner&amp;#39;s reference for Server-Side Request Forgery — attack surface, exploitation techniques, bypass methods, real-world chains, and detection/prevention. Compiled from 299 research sources.</description><category>Security-Guides</category><category>Ssrf</category><category>Web-Security</category><category>Cloud-Security</category><category>Penetration-Testing</category></item><item><title>Comprehensive SQL Injection Guide</title><link>https://chs.us/guides/sqli/</link><pubDate>Fri, 10 Apr 2026 00:00:00 +0000</pubDate><author>carl.sampson@gmail.com (Carl Sampson)</author><guid>https://chs.us/guides/sqli/</guid><description>A practitioner&amp;#39;s reference for SQL Injection — attack classes, exploitation techniques, database-specific payloads, WAF bypass methods, ORM/NoSQL variants, real-world CVEs, and detection/prevention. Compiled from 33 research sources.</description><category>Security-Guides</category><category>Sqli</category><category>Database-Security</category><category>Web-Security</category><category>Penetration-Testing</category></item><item><title>Comprehensive CSRF Guide</title><link>https://chs.us/guides/csrf/</link><pubDate>Fri, 10 Apr 2026 00:00:00 +0000</pubDate><author>carl.sampson@gmail.com (Carl Sampson)</author><guid>https://chs.us/guides/csrf/</guid><description>A practitioner&amp;#39;s reference for Cross-Site Request Forgery — attack surface, exploitation techniques, SameSite and token bypasses, real-world chains, and detection/prevention. Compiled from 37 research sources.</description><category>Security-Guides</category><category>Csrf</category><category>Web-Security</category><category>Session-Management</category><category>Penetration-Testing</category></item><item><title>Comprehensive IDOR Guide</title><link>https://chs.us/guides/idor/</link><pubDate>Fri, 10 Apr 2026 00:00:00 +0000</pubDate><author>carl.sampson@gmail.com (Carl Sampson)</author><guid>https://chs.us/guides/idor/</guid><description>A practitioner&amp;#39;s reference for Insecure Direct Object Reference (IDOR) and Broken Object Level Authorization (BOLA) — attack surface, enumeration patterns, bypass techniques, real-world writeups, detection workflow, and prevention. Compiled from 21 research sources.</description><category>Security-Guides</category><category>Idor</category><category>Authorization</category><category>Web-Security</category><category>Penetration-Testing</category></item><item><title>Comprehensive RCE Guide</title><link>https://chs.us/guides/rce/</link><pubDate>Fri, 10 Apr 2026 00:00:00 +0000</pubDate><author>carl.sampson@gmail.com (Carl Sampson)</author><guid>https://chs.us/guides/rce/</guid><description>A practitioner&amp;#39;s reference for Remote Code Execution — vulnerability classes, exploitation primitives, language-specific chains, real-world CVEs, and detection/prevention. Compiled from 63 research sources.</description><category>Security-Guides</category><category>Rce</category><category>Code-Injection</category><category>Web-Security</category><category>Penetration-Testing</category></item><item><title>Comprehensive XXE Guide</title><link>https://chs.us/guides/xxe/</link><pubDate>Fri, 10 Apr 2026 00:00:00 +0000</pubDate><author>carl.sampson@gmail.com (Carl Sampson)</author><guid>https://chs.us/guides/xxe/</guid><description>A practitioner&amp;#39;s reference for XML External Entity injection — fundamentals, parser quirks, in-band and out-of-band exfiltration, parameter entity chains, file-format vectors, real-world CVEs, tooling, and hardening. Compiled from 40 research sources.</description><category>Security-Guides</category><category>Xxe</category><category>Xml-Security</category><category>Web-Security</category><category>Penetration-Testing</category></item><item><title>Comprehensive Insecure Deserialization Guide</title><link>https://chs.us/guides/deserialization/</link><pubDate>Fri, 10 Apr 2026 00:00:00 +0000</pubDate><author>carl.sampson@gmail.com (Carl Sampson)</author><guid>https://chs.us/guides/deserialization/</guid><description>A practitioner&amp;#39;s reference for insecure deserialization — language-specific attack surface, gadget chain mechanics, real-world CVE chains, tools, and detection/prevention. Compiled from 47 research sources.</description><category>Security-Guides</category><category>Deserialization</category><category>Object-Injection</category><category>Web-Security</category><category>Penetration-Testing</category></item><item><title>Comprehensive GraphQL Security Guide</title><link>https://chs.us/guides/graphql/</link><pubDate>Fri, 10 Apr 2026 00:00:00 +0000</pubDate><author>carl.sampson@gmail.com (Carl Sampson)</author><guid>https://chs.us/guides/graphql/</guid><description>A practitioner&amp;#39;s reference for attacking and defending GraphQL APIs — discovery, introspection, schema recovery, injection, authorization flaws, batching, DoS, subscriptions, CSRF/CSWSH, engine-specific quirks, and detection/prevention. Compiled from 31 research sources.</description><category>Security-Guides</category><category>Graphql</category><category>Api-Security</category><category>Web-Security</category><category>Penetration-Testing</category></item><item><title>Comprehensive API Security Guide</title><link>https://chs.us/guides/api-security/</link><pubDate>Fri, 10 Apr 2026 00:00:00 +0000</pubDate><author>carl.sampson@gmail.com (Carl Sampson)</author><guid>https://chs.us/guides/api-security/</guid><description>A practitioner&amp;#39;s reference for API security — attack surface, OWASP API Top 10 exploitation, authentication and authorization bypasses, GraphQL-specific attacks, rate limit evasion, real-world chains, and detection/prevention. Compiled from 30 research sources.</description><category>Security-Guides</category><category>Api-Security</category><category>Web-Security</category><category>Authentication</category><category>Penetration-Testing</category></item><item><title>Comprehensive Authorization &amp; Access Control Guide</title><link>https://chs.us/guides/authz/</link><pubDate>Fri, 10 Apr 2026 00:00:00 +0000</pubDate><author>carl.sampson@gmail.com (Carl Sampson)</author><guid>https://chs.us/guides/authz/</guid><description>A practitioner&amp;#39;s reference for Broken Access Control (OWASP A01) — the models, bug classes, bypass techniques, real-world chains, and detection/prevention patterns that matter in modern web and API testing. Compiled from 33 research sources.</description><category>Security-Guides</category><category>Authorization</category><category>Access-Control</category><category>Web-Security</category><category>Penetration-Testing</category></item><item><title>Comprehensive Mobile Application Security Guide</title><link>https://chs.us/guides/mobile/</link><pubDate>Fri, 10 Apr 2026 00:00:00 +0000</pubDate><author>carl.sampson@gmail.com (Carl Sampson)</author><guid>https://chs.us/guides/mobile/</guid><description>A practitioner&amp;#39;s reference for iOS and Android application security — threat models, platform attack surface, reverse engineering, runtime instrumentation, bypass techniques, testing methodology, and defensive controls. Compiled from 16 research sources.</description><category>Security-Guides</category><category>Mobile-Security</category><category>Ios-Security</category><category>Android-Security</category><category>Penetration-Testing</category></item><item><title>Comprehensive Recon Guide</title><link>https://chs.us/guides/recon/</link><pubDate>Fri, 10 Apr 2026 00:00:00 +0000</pubDate><author>carl.sampson@gmail.com (Carl Sampson)</author><guid>https://chs.us/guides/recon/</guid><description>A practitioner&amp;#39;s reference for web reconnaissance — attack surface discovery, subdomain enumeration, live host probing, content discovery, JS mining, cloud asset hunting, automation, and continuous monitoring. Compiled from 23 research sources.</description><category>Security-Guides</category><category>Reconnaissance</category><category>Attack-Surface</category><category>Enumeration</category><category>Penetration-Testing</category></item><item><title>Comprehensive Bug Bounty Hunting Guide</title><link>https://chs.us/guides/bug-bounty/</link><pubDate>Fri, 10 Apr 2026 00:00:00 +0000</pubDate><author>carl.sampson@gmail.com (Carl Sampson)</author><guid>https://chs.us/guides/bug-bounty/</guid><description>A practitioner&amp;#39;s reference for modern bug bounty hunting — methodology, platforms, reconnaissance pipelines, vulnerability hunting, exploit chaining, report writing, and career strategy. Compiled from 97 research sources (the largest collection in the research library).</description><category>Security-Guides</category><category>Bug-Bounty</category><category>Vulnerability-Research</category><category>Ethical-Hacking</category><category>Penetration-Testing</category></item><item><title>Comprehensive Burp Suite Guide</title><link>https://chs.us/guides/burp-suite/</link><pubDate>Fri, 10 Apr 2026 00:00:00 +0000</pubDate><author>carl.sampson@gmail.com (Carl Sampson)</author><guid>https://chs.us/guides/burp-suite/</guid><description>A practitioner&amp;#39;s reference for Burp Suite — core tools, essential extensions, Bambdas and BChecks, Collaborator, macros and session handling, custom extension development, Burp AI, and real-world testing workflows. Compiled from 69 research sources.</description><category>Security-Guides</category><category>Burp-Suite</category><category>Web-Testing</category><category>Security-Tools</category><category>Penetration-Testing</category></item></channel></rss>