Author Profile: yaklang

Skills published by yaklang with real stars/downloads and source-aware metadata.

Total Skills

99

Total Stars

0

Total Downloads

30.5K

RSS Feed

Skills Performance

Comparison chart based on real stars and downloads signals from source data.

hack

358

Stars
0
Downloads
358

api-sec

341

Stars
0
Downloads
341

sqli-sql-injection

339

Stars
0
Downloads
339

ssrf-server-side-request-forgery

339

Stars
0
Downloads
339

api-auth-and-jwt-abuse

338

Stars
0
Downloads
338

xss-cross-site-scripting

337

Stars
0
Downloads
337

auth-sec

336

Stars
0
Downloads
336

api-recon-and-docs

335

Stars
0
Downloads
335

Published Skills

General

hack

No summary provided by upstream source.

Repository SourceNeeds Review
General

api-sec

No summary provided by upstream source.

Repository SourceNeeds Review
General

sqli-sql-injection

No summary provided by upstream source.

Repository SourceNeeds Review
General

ssrf-server-side-request-forgery

No summary provided by upstream source.

Repository SourceNeeds Review
General

api-auth-and-jwt-abuse

No summary provided by upstream source.

Repository SourceNeeds Review
General

xss-cross-site-scripting

No summary provided by upstream source.

Repository SourceNeeds Review
General

auth-sec

No summary provided by upstream source.

Repository SourceNeeds Review
General

api-recon-and-docs

No summary provided by upstream source.

Repository SourceNeeds Review
General

authbypass-authentication-flaws

No summary provided by upstream source.

Repository SourceNeeds Review
General

jwt-oauth-token-attacks

No summary provided by upstream source.

Repository SourceNeeds Review
General

business-logic-vulnerabilities

No summary provided by upstream source.

Repository SourceNeeds Review
General

recon-and-methodology

No summary provided by upstream source.

Repository SourceNeeds Review
Security

websocket-security

No summary provided by upstream source.

Repository SourceNeeds Review
General

injection-checking

No summary provided by upstream source.

Repository SourceNeeds Review
General

cmdi-command-injection

No summary provided by upstream source.

Repository SourceNeeds Review
General

api-authorization-and-bola

No summary provided by upstream source.

Repository SourceNeeds Review
General

idor-broken-object-authorization

No summary provided by upstream source.

Repository SourceNeeds Review
General

csrf-cross-site-request-forgery

No summary provided by upstream source.

Repository SourceNeeds Review
Coding

code-obfuscation-deobfuscation

No summary provided by upstream source.

Repository SourceNeeds Review
General

business-logic-vuln

No summary provided by upstream source.

Repository SourceNeeds Review
General

file-access-vuln

No summary provided by upstream source.

Repository SourceNeeds Review
General

path-traversal-lfi

No summary provided by upstream source.

Repository SourceNeeds Review
General

http-parameter-pollution

No summary provided by upstream source.

Repository SourceNeeds Review
General

cors-cross-origin-misconfiguration

No summary provided by upstream source.

Repository SourceNeeds Review
General

oauth-oidc-misconfiguration

No summary provided by upstream source.

Repository SourceNeeds Review
General

crlf-injection

No summary provided by upstream source.

Repository SourceNeeds Review
Coding

insecure-source-code-management

No summary provided by upstream source.

Repository SourceNeeds Review
General

ssti-server-side-template-injection

No summary provided by upstream source.

Repository SourceNeeds Review
General

race-condition

No summary provided by upstream source.

Repository SourceNeeds Review
General

request-smuggling

No summary provided by upstream source.

Repository SourceNeeds Review
General

jndi-injection

No summary provided by upstream source.

Repository SourceNeeds Review
General

graphql-and-hidden-parameters

No summary provided by upstream source.

Repository SourceNeeds Review
General

web-cache-deception

No summary provided by upstream source.

Repository SourceNeeds Review
Coding

clickjacking

No summary provided by upstream source.

Repository SourceNeeds Review
General

expression-language-injection

No summary provided by upstream source.

Repository SourceNeeds Review
General

csv-formula-injection

No summary provided by upstream source.

Repository SourceNeeds Review
General

deserialization-insecure

No summary provided by upstream source.

Repository SourceNeeds Review
General

open-redirect

No summary provided by upstream source.

Repository SourceNeeds Review
General

saml-sso-assertion-attacks

No summary provided by upstream source.

Repository SourceNeeds Review
General

xslt-injection

No summary provided by upstream source.

Repository SourceNeeds Review
General

type-juggling

No summary provided by upstream source.

Repository SourceNeeds Review
General

dependency-confusion

No summary provided by upstream source.

Repository SourceNeeds Review
General

prototype-pollution

No summary provided by upstream source.

Repository SourceNeeds Review
General

upload-insecure-files

No summary provided by upstream source.

Repository SourceNeeds Review
General

android-pentesting-tricks

No summary provided by upstream source.

Repository SourceNeeds Review
General

401-403-bypass-techniques

No summary provided by upstream source.

Repository SourceNeeds Review
General

nosql-injection

No summary provided by upstream source.

Repository SourceNeeds Review
General

waf-bypass-techniques

No summary provided by upstream source.

Repository SourceNeeds Review
Research

traffic-analysis-pcap

No summary provided by upstream source.

Repository SourceNeeds Review
General

unauthorized-access-common-services

No summary provided by upstream source.

Repository SourceNeeds Review
General

heap-exploitation

No summary provided by upstream source.

Repository SourceNeeds Review
General

browser-exploitation-v8

No summary provided by upstream source.

Repository SourceNeeds Review
General

format-string-exploitation

No summary provided by upstream source.

Repository SourceNeeds Review
General

http-host-header-attacks

No summary provided by upstream source.

Repository SourceNeeds Review
General

active-directory-acl-abuse

No summary provided by upstream source.

Repository SourceNeeds Review
General

kernel-exploitation

No summary provided by upstream source.

Repository SourceNeeds Review
Coding

vm-and-bytecode-reverse

No summary provided by upstream source.

Repository SourceNeeds Review
General

anti-debugging-techniques

No summary provided by upstream source.

Repository SourceNeeds Review
Research

classical-cipher-analysis

No summary provided by upstream source.

Repository SourceNeeds Review
General

csp-bypass-advanced

No summary provided by upstream source.

Repository SourceNeeds Review
Security

ai-ml-security

No summary provided by upstream source.

Repository SourceNeeds Review
General

llm-prompt-injection

No summary provided by upstream source.

Repository SourceNeeds Review
General

arbitrary-write-to-rce

No summary provided by upstream source.

Repository SourceNeeds Review
General

active-directory-certificate-services

No summary provided by upstream source.

Repository SourceNeeds Review
General

active-directory-kerberos-attacks

No summary provided by upstream source.

Repository SourceNeeds Review
General

http2-specific-attacks

No summary provided by upstream source.

Repository SourceNeeds Review
General

hash-attack-techniques

No summary provided by upstream source.

Repository SourceNeeds Review
General

dns-rebinding-attacks

No summary provided by upstream source.

Repository SourceNeeds Review
General

email-header-injection

No summary provided by upstream source.

Repository SourceNeeds Review
General

binary-protection-bypass

No summary provided by upstream source.

Repository SourceNeeds Review
General

stack-overflow-and-rop

No summary provided by upstream source.

Repository SourceNeeds Review
General

kubernetes-pentesting

No summary provided by upstream source.

Repository SourceNeeds Review
General

container-escape-techniques

No summary provided by upstream source.

Repository SourceNeeds Review
General

memory-forensics-volatility

No summary provided by upstream source.

Repository SourceNeeds Review
Security

linux-security-bypass

No summary provided by upstream source.

Repository SourceNeeds Review
General

mobile-ssl-pinning-bypass

No summary provided by upstream source.

Repository SourceNeeds Review
General

windows-privilege-escalation

No summary provided by upstream source.

Repository SourceNeeds Review
General

steganography-techniques

No summary provided by upstream source.

Repository SourceNeeds Review
General

dangling-markup-injection

No summary provided by upstream source.

Repository SourceNeeds Review
General

ios-pentesting-tricks

No summary provided by upstream source.

Repository SourceNeeds Review
General

linux-privilege-escalation

No summary provided by upstream source.

Repository SourceNeeds Review
General

tunneling-and-pivoting

No summary provided by upstream source.

Repository SourceNeeds Review
General

prototype-pollution-advanced

No summary provided by upstream source.

Repository SourceNeeds Review
General

subdomain-takeover

No summary provided by upstream source.

Repository SourceNeeds Review
Web3

defi-attack-patterns

No summary provided by upstream source.

Repository SourceNeeds Review
General

symbolic-execution-tools

No summary provided by upstream source.

Repository SourceNeeds Review
General

network-protocol-attacks

No summary provided by upstream source.

Repository SourceNeeds Review
General

windows-av-evasion

No summary provided by upstream source.

Repository SourceNeeds Review
Web3

lattice-crypto-attacks

No summary provided by upstream source.

Repository SourceNeeds Review
General

linux-lateral-movement

No summary provided by upstream source.

Repository SourceNeeds Review
General

rsa-attack-techniques

No summary provided by upstream source.

Repository SourceNeeds Review
General

sandbox-escape-techniques

No summary provided by upstream source.

Repository SourceNeeds Review
General

symmetric-cipher-attacks

No summary provided by upstream source.

Repository SourceNeeds Review
General

windows-lateral-movement

No summary provided by upstream source.

Repository SourceNeeds Review
General

smart-contract-vulnerabilities

No summary provided by upstream source.

Repository SourceNeeds Review
General

ntlm-relay-coercion

No summary provided by upstream source.

Repository SourceNeeds Review
Security

macos-security-bypass

No summary provided by upstream source.

Repository SourceNeeds Review
General

macos-process-injection

No summary provided by upstream source.

Repository SourceNeeds Review
General

reverse-shell-techniques

No summary provided by upstream source.

Repository SourceNeeds Review
Author yaklang | V50.AI