130n@calvinlai.com
Ctrlk
  • About Calvin Lai (fkclai)
  • My Work
  • Cyber Security
    • Cyber Security Centre (CSC)
  • Detection and Response
  • Application Architecture
    • Student Module Registration Flow Series using Microservices & Event-Driven Architecture
    • Comparison of MVC , N-tier and Microservice Architecture
  • AI: Using RAG-Based Enquiry Assistant using Vector Database
  • Application Security
    • Securing React Native Applications with Java Microservices
    • Securing WebView-Based Mobile Applications with Java Microservices
    • OAuth, SAML, and OpenID Connect: Key Differences and Use Cases
    • Secure Coding Principles
    • HTTP Header Security Principles
    • Mitigating Broken Object Level Authorization (BOLA)
    • Spring Boot Validation
    • Output Encoding in JavaServer Faces (JSF)
    • Session Management Security Issues
    • Common API Security Problems
    • JAVA Exception Handling
    • File Upload Validation
    • OAuth 2.0 Security
    • Microservice Security
    • Modifying and Protecting Java Class Files
    • JAVA Program
  • Exploit/CVE PoC
    • ZeroLogon Exploit
    • Remote Retrieved Chrome saved Encrypted Password
    • Twitter Control an RCE attack
  • Hacking Report (HTB)
    • Hits & Summary
    • Windows Machine
    • Linux Machine
  • Penetration Testing
    • Web Application PenTest
    • Network/System PenTest
    • Mobile Penetration Test
  • Threat Intelligence
    • Advanced Persistent Threat (APT) groups
  • Red Team (Windows)
    • 01 Reconnaissance
    • 02 Privileges Escalation
    • 03 Lateral Movement
    • 04 AD Attacks
    • 05 Bypass-Evasion
    • 06 Kerberos Attack
    • 99 Basic Command
  • Exploitation Guide
    • 01 Reconnaissance
    • 02 Port Enumeration
    • 03 Web Enumeration
    • 04 Windows Enum & Exploit
    • 05 File Enumeration
    • 06 Reverse Shell Cheat Sheet
    • 07 SQL Injection
    • 08 BruteForce
    • 09 XSS Bypass Checklist
    • 10 Spring Boot
    • 11 WPA
    • 12 Payload list
  • Vuln Hub (Writeup)
    • MrRobot
    • CYBERRY
    • MATRIX 1
    • Node-1
    • DPwwn-1
    • DC7
    • AiWeb-2
    • AiWeb-1
    • BrainPan
  • CTF (Writeup & Tips)
    • CTF Tools & Tips
    • Hacker One
    • CTF Learn
    • P.W.N. University - CTF 2018
    • HITCON
    • Pwnable
  • Useful Command/Tools
    • Kali
    • Windows
    • Linux
  • Offensive Security Lab & Exam
    • Lab
    • Tools for an Offensive Certification
  • ISO 27001
    • Disclaimer
    • What is ISO 27001
    • Documentation
    • Common Mistake
    • Q&A
    • ISO 27001 Controls and Domains
  • Risk Management
Powered by GitBook
On this page

Was this helpful?

  1. Exploitation Guide

10 Spring Boot

LogoGitHub - LandGrey/SpringBootVulExploit: SpringBoot 相关漏洞学习资料,利用方法和技巧合集,黑盒安全评估 check listGitHub

Previous09 XSS Bypass ChecklistNext11 WPA

Last updated 4 years ago

Was this helpful?