Before Start
1️⃣Introduction
2️⃣Information Gathering
Web Proxies
3️⃣Cross Site Scripting
4️⃣SQL Injections
5️⃣Authentication and Authorization
6️⃣Session Security
7️⃣Flash
8️⃣HTML5
9️⃣File and Resources Attacks
🔟Other Attacks
Web Services
XPath
Penetration Testing Content Management Systems
Penetration Testing NoSQL Databases