1. Overview
3. HTTP Methods
4. Web App Infrastructure
5. Web APIs
6. Content Management Systems
7. Databases
8. Web Browser
9. Burp Suite
10. OWASP ZAP
11. Sublist3r
12. Nikto
13. Feroxbuster
14. Cewl
15. WPScan
16. SQLMap
17. FFuF
18. Manual Inspection
19. Vulnerability Scanning
20. Directory Fuzzing
21. Reflected XSS
22. Persistent XSS
23. DOM-Based XSS
24. Error-Based SQLi
25. Blind-Based SQLi
26. Session Hijacking
27. Command Injection
28. File Inclusion
29. CSRF
30. SSRF
31. JWT Attack
32. IDOR
33. Security Misconfigurations