layout | title | tags | level | type | pitch |
---|---|---|---|---|---|
col-sidebar |
OWASP Top 25 Parameters |
top25 |
2 |
documentation |
For basic researches, top 25 vulnerability parameters that can be used in automation tools or manual recon. |
For basic researches, top 25 vulnerability parameters that can be used in automation tools or manual recon
For basic researches, top 25 vulnerable parameters based on frequency of use with reference to various articles. These parameters can be used for automation tools or manual recon. Although the prevalence percentages of these parameters cannot be proven precisely.
This repo contains common parameters of the following vulnerabilities:
- Cross-Site Scripting
- Server-Side Request Forgery
- Local File Inclusion
- SQL Injection
- Remote Code Execution
- Open Redirect
To report issues or make suggestions for the Top-25 Parameters, please use GitHub Issues.
For everything else, we're easy to answer your e-mail :
- Send an e-mail to lutfu.mertceylan[at]owasp.org
- Send an e-mail to info[at]lutfumertceylan.com.tr
You can @ us on Twitter @lutfumertceylan.