• The Developer's Vulnerability Manual
  • Vulnerability Manual
  • Table of Contents
  • Part 1: Python
  • 1. Insecure Direct Object References (IDOR)
  • 2. Insecure File Handling
  • Part 2: C
  • 3. Buffer Overflow
  • 4. Use After Free (UAF)
  • Part 3: Php
  • 5. SQL Injection
  • 6. Remote Code Execution (RCE)
  • Part 4: Java
  • 7. Injection Attack
  • 8. Insecure Deserialization
  • References

Vuln Manual

  • Book
  • Contents

Table of Contents

  • Vulnerability Manual
    A manual for developers on how to deal with various vulnerabilities in the C, Python, and PHP programming languages.
  • Part 1: Python
    • Chapter 1. Insecure Direct Object References (IDOR)
      Learn what IDOR vulnerabilities are and how to prevent them.
    • Chapter 2. Insecure File Handling
      Learn how insecure file handling happens in Python and how to mitigate it.
  • Part 2: C
    • Chapter 3. Buffer Overflow
      Learn about the famous buffer overflow vulnerability and how to prevent them.
    • Chapter 4. Use After Free (UAF)
      Prevent UAF with Memory Management Best Practices
  • Part 3: Php
    • Chapter 5. SQL Injection
      Secure your PHP app - Prevent SQL injection with proper input validation.
    • Chapter 6. Remote Code Execution (RCE)
      Understand and prevent Remote Code Execution (RCE) vulnerabilities in PHP applications.
  • Part 4: Java
    • Chapter 7. Injection Attack
      Prevent Java injection attacks with robust input validation.
    • Chapter 8. Insecure Deserialization
      Harden your Java app's defenses against insecure deserialization by validating all received data.
  • References
Next: Part 1.
Python
Previous:
Vulnerability Manual
Home - Book - My GitHub
© 2023- 2024 Joel Wisdom