Hack to learn, not learn to hack

File Upload Vulnerabilities

Path Traversal Vulnerabilities

Command Injection Vulnerabilities

SQL Injection

Symlink Attack

PHP Deserialization

Java Deserialization