PHP execution model, dangerous functions, unsafe defaults, and why PHP apps are a prime attack surface.
Reference table covering every major PHP vulnerability class with severity, sink, and impact.
SQLi in PHP: UNION, error-based, blind, time-based, second-order, INTO OUTFILE to RCE.
Path traversal, php://filter wrappers, log poisoning, null byte bypass, RFI to RCE.
Magic methods, POP chain construction, PHPGGC gadget chains for Laravel, Symfony and more.
== vs ===, magic hashes, 0e collisions, strcmp bypass, in_array and switch juggling.
eval, assert, system, exec, preg_replace /e, disable_functions bypass techniques.
Reflected, stored, DOM XSS. Context-aware injection, htmlspecialchars bypass, CSP bypass.
curl/file_get_contents with user URLs, cloud metadata endpoints, Gopher protocol, DNS rebinding.
MySQL architecture, privilege model, dangerous defaults, attack surface overview and pentest checklist.
Reference table of all MySQL attack vectors: SQLi variants, FILE abuse, UDF, auth bypass, privesc.
MySQL-specific syntax, UNION extraction, error-based functions, WAF bypass, sqlmap cheatsheet.
SUPER abuse, mysql.user manipulation, stored procedure DEFINER tricks, trigger-based escalation.
Upload malicious .so/.dll, CREATE FUNCTION sys_exec, execute OS commands, Windows and Linux paths.
LOAD_FILE for sensitive files, INTO OUTFILE for webshells, LOAD DATA LOCAL INFILE client attack.
Default creds, CVE-2012-2122 memcmp bypass, login form SQLi, hash cracking, Gopher/SSRF chain.
Boolean-based extraction, SLEEP/BENCHMARK, heavy queries, OOB via DNS, sqlmap automation.
User privileges, network binding, secure_file_priv, authentication hardening, logging and monitoring.