Reward your researchers fairly – try our bug bounty calculator today!

Try our bug bounty calculator

Intigriti Hackademy

The Intigriti Hackademy is a collection of free online learning resources in the field of web security.

For every vulnerability category, you will find a detailed explanation with real-life examples, write-ups, bug bounty tips and accompanying videos. We will be updating this list on a regular basis, so make sure to subscribe to our weekly newsletter to get informed about the latest updates!

Request a demo
Intigriti Hackademy

Vulnerability types

Cross-Site Scripting

XSS

Client-side

Explore Cross‑Site Scripting in depth: reflected, stored & DOM‑based XSS attacks, testing methods, and best prevention practices.

Read more

Stored Cross-Site Scripting

Client-side
Server-side

Explore stored XSS vulnerabilities—how attackers inject persistent scripts, impact analysis, and how to properly sanitize user data.

Read more

DOM-Based Cross-Site Scripting

Client-side

Dive into DOM‑based XSS: how it happens in the browser, exploit examples, and secure JavaScript coding tips to mitigate risk.

Read more

Reflected Cross-Site Scripting

Client-side

Learn about reflected XSS, with examples of HTTP-based injection, detection tips, and immediate hardening strategies for web apps.

Read more

How to test for cross-site scripting?

Discover real-world methods to test for Cross‑Site Scripting vulnerabilities using live payloads, tools, and example scenarios.

Read more

Server-Side Request Forgery

SSRF

Server-side

Understand SSRF vulnerabilities, real-world use cases, and preventative steps like URL whitelisting and access control.

Read more

Cross-Site Request Forgery

CSRF

Client-side

Understand CSRF attacks step-by-step, see real-world exploitation demos, and learn proven mitigation techniques for secure web development.

Read more

XML External Entity Injection (XXE)

Server-side

Explore XXE attacks that expose sensitive data via XML parsers, with examples and secure configuration techniques.

Read more

Insecure Direct Object Reference

IDOR

Server-side

Insecure Direct Object References (IDOR) occur when an application provides direct access to objects based on user-supplied input.

Read more

Clickjacking

Client-side

Learn what clickjacking is, how attackers trick users, and practical defence strategies to protect web apps. Step up your app security.

Read more

Directory Traversal

Server-side

Understand directory traversal exploits that reveal sensitive files, with real examples and defensive coding to secure your infrastructure.

Read more

File Upload Vulnerabilities

Server-side

File upload vulnerabilities enable an attacker to place a file of their choosing onto the target server, e.g. leading to the execution of code remotely

Read more

Open Redirect

Client-side
Server-side

Learn what open redirect issues are, how attackers exploit them for phishing, and effective ways to validate user input.

Read more

SQL Injection

Server-side

A SQL injection attack consists of insertion or “injection” of a SQL query via the input data from the client to the application.

Read more

HTTP Parameter Pollution

Client-side
Server-side

Discover HTTP Parameter Pollution vulnerabilities with examples, exploitation techniques, and robust input validation methods.

Read more

Guides and tutorials

How to write a good report

Master bug bounty reporting: structure, clarity, scoring methods, and samples. Get your findings validated and rewarded faster.

Read more

Monthly Challenges

Test and improve your Cross‑Site Scripting skills with interactive XSS challenge exercises and walkthroughs.

Read more

Hacking Tools

A list of hacking tools to allows us to focus on the interesting parts of our jobs and that is to find vulnerabilities in complex processes!

Read more

Best platforms to learn ethical hacking!

Compare best platforms to learn ethical hacking, their features, rewards, and community tools. Find the best for your security career.

Read more