1. whoami
  2. Web Security Academy
  3. Authentication Vulnerabilities - Theory
  4. CSRF - Theory
  5. SQL Injection - Theory
  6. JWT - Theory
  7. XSS - Theory
  8. SSRF - Theory
  9. Clickjacking - Theory
  10. Web Socket Vulnerabilities - Theory
  11. XXE - Theory
  12. CORS - Theory
  13. Command Injection - Theory
  14. Insecure Deserialization - Theory
  15. HTTP Request Smuggling - Theory
  16. Damn Vulnerable Web Application
  17. Brute Force
  18. Command Injection
  19. CSRF
  20. File Inclusion
  21. File Upload
  22. SQL Injection
  23. XSS