Web Exploitation
Modern web stacks. Modern flaws.
GET /api/orders?id=42 HTTP/1.1Server-side template injection, prototype pollution, SSRF chains through cloud metadata services, second-order SQL injection, JWT misuse, and the occasional CSP bypass via overlooked HTML sinks. Everything served behind realistic authentication, with logs, observability and the kind of mistakes you would see in a production codebase.