⚑ Educational Security Resource

Learn Web
Vulnerabilities

Hands-on interactive guides for understanding how modern web attacks work β€” and how to defend against them.

8
Topics Planned
13
Interactive Labs
100%
Free & Open Source
∞
Always Growing

Vulnerability Topics

Each module covers theory, attack mechanics, live demos, and defenses β€” all in one page.

πŸ’‰
Coming Soon

SQL Injection

Manipulate database queries to extract, modify, or delete data. Union-based, blind, error-based, and second-order SQLi.

Injection Server-Side OWASP A03
πŸ”„
Coming Soon

CSRF

Force authenticated users to perform unintended actions. Token protection, SameSite cookies, and bypass techniques.

Session Client-Side OWASP A01
🌐
Coming Soon

SSRF

Trick servers into requesting internal resources. Cloud metadata endpoints, DNS rebinding, and port scanning.

Server-Side Cloud OWASP A10
πŸ’»
Coming Soon

Remote Code Execution

Execute arbitrary code on the server. Command injection, insecure deserialization, template injection.

Injection Critical Server-Side
πŸ“‚
Coming Soon

File Inclusion (LFI/RFI)

Include arbitrary files via path traversal, log poisoning, and PHP wrapper chains.

Server-Side File System
πŸ“œ
Coming Soon

XXE Injection

Exploit XML parsers to read files, perform SSRF, and exfiltrate data. In-band and out-of-band techniques.

Injection XML Parser

How Each Module Works

Every vulnerability page is structured to take you from zero to confident.

01
πŸ“–

Theory First

Clear, plain-English explanations of what the vulnerability is, why it exists, and how attackers discover it.

02
βš—οΈ

Live Demos

Interactive sandboxed labs where you try the attack yourself in a safe, controlled environment β€” no setup needed.

03
πŸ›‘οΈ

Learn to Defend

Practical mitigation techniques with real code examples β€” so you can write secure applications from day one.