- Purpose
- Usage
- SQL Injection (SQLi)
- Cross-site Scripting (XSS)
- Cross-site Request Forgery (CSRF)
- DOM-Based Vulnerabilities
- Cross-origin Resource Sharing (CORS)
- XML External Entity (XXE) Injection
Run script to solve portswigger lab and for users to debug their payload.
Change lab_id and run script to solve.
Title | Difficulty | Vulnerabilities | Code |
---|---|---|---|
DOM XSS using web messages | Practitioner | DOM-Based | dom-based1.py |
DOM XSS using web messages and a JavaScript URL | Practitioner | DOM-Based | dom-based2.py |
DOM XSS using web messages and JSON.parse | Practitioner | DOM-Based | dom-based3.py |
DOM-based open redirection | Practitioner | DOM-Based | dom-based4.py |
DOM-based cookie manipulation | Practitioner | DOM-Based | dom-based5.py |
Title | Difficulty | Vulnerabilities | Code |
---|---|---|---|
CORS vulnerability with basic origin reflection | Apprentice | CORS | cors1.py cors1_2.py |
CORS vulnerability with trusted null origin | Apprentice | CORS | cors2.py |
CORS vulnerability with trusted insecure protocols | Practitioner | CORS | cors3.py cors3_2.py |
Title | Difficulty | Vulnerabilities | Code |
---|---|---|---|
Exploiting XXE using external entities to retrieve files | Apprentice | XXE | xxe1.py |
Exploiting XXE to perform SSRF attacks | Apprentice | XXE SSRF |
xxe2.py |
Blind XXE with out-of-band interaction | Practitioner | XXE | xxe3.py |
Blind XXE with out-of-band interaction via XML parameter entities | Practitioner | XXE | xxe4.py |
Exploiting blind XXE to exfiltrate data using a malicious external DTD | Practitioner | XXE | xxe5.py xxe5_2.py |
Exploiting blind XXE to retrieve data via error messages | Practitioner | XXE | xxe6.py |
Exploiting XInclude to retrieve files | Practitioner | XXE | xxe7.py |
Exploiting XXE via image file upload | Practitioner | XXE | xxe8.py |