Invent Your Shit

Unleash your chaos & Hack the Planet.

Invent Your Shit - Learn Ethical Hacking online
What You’ll learn Here

Red Teaming

CTF Writeups

OSINT

Forensics

DIY Projects

Threat Hunting

Malware Analysis

Invent Your Shit - Learn Ethical Hacking online
Invent Your Shit - Learn Ethical Hacking online

Eat.
Sleep.
Hack.
Repeat.

Invent Your Shit

Latest Posts

Webgoat - Missing Function Level Access Control
Webgoat - Missing Function Level Access Control
Webgoat - Missing Function Level Access Control
In this walk through, we will be going through the Missing Function Level Access Control vulnerability...
Read More
Webgoat - Logging Security
Webgoat - Logging Security
In this walk through, we will be going through the Logging Security vulnerability section from Webgoat...
Read More
Webgoat - JWT tokens
Webgoat - JWT tokens
In this walk through, we will be going through the JWT tokens vulnerability section from Webgoat Labs....
Read More
Webgoat - Insecure Login
Webgoat - Insecure Login
In this walk through, we will be going through the Insecure Login vulnerability section from Webgoat...
Read More
Webgoat - Insecure Direct Object References
Webgoat - Insecure Direct Object References
In this walk through, we will be going through the Insecure Direct Object References vulnerability section...
Read More
Webgoat - Insecure Deserialization
Webgoat - Insecure Deserialization
In this walk through, we will be going through the Insecure Deserialization vulnerability section from...
Read More
Webgoat - HTML tampering
Webgoat - HTML tampering
In this walk through, we will be going through the HTML tampering vulnerability section from Webgoat...
Read More
Webgoat - Hijack a Session
Webgoat - Hijack a Session
In this walk through, we will be going through the Hijack a Session vulnerability section from Webgoat...
Read More
Webgoat - Crypto Basics
Webgoat - Crypto Basics
In this walk through, we will be going through the Crypto Basics vulnerability section from Webgoat Labs....
Read More
Scroll to Top