Reward your researchers fairly – try our bug bounty calculator today!
Intigriti Hackademy
The Intigriti Hackademy is a collection of free online learning resources in the field of web security.
For every vulnerability category, you will find a detailed explanation with real-life examples, write-ups, bug bounty tips and accompanying videos. We will be updating this list on a regular basis, so make sure to subscribe to our weekly newsletter to get informed about the latest updates!
Vulnerability types
Cross-Site Scripting
XSS
Explore Cross‑Site Scripting in depth: reflected, stored & DOM‑based XSS attacks, testing methods, and best prevention practices.
Stored Cross-Site Scripting
Explore stored XSS vulnerabilities—how attackers inject persistent scripts, impact analysis, and how to properly sanitize user data.
DOM-Based Cross-Site Scripting
Dive into DOM‑based XSS: how it happens in the browser, exploit examples, and secure JavaScript coding tips to mitigate risk.
Reflected Cross-Site Scripting
Learn about reflected XSS, with examples of HTTP-based injection, detection tips, and immediate hardening strategies for web apps.
How to test for cross-site scripting?
Discover real-world methods to test for Cross‑Site Scripting vulnerabilities using live payloads, tools, and example scenarios.
Server-Side Request Forgery
SSRF
Understand SSRF vulnerabilities, real-world use cases, and preventative steps like URL whitelisting and access control.
Cross-Site Request Forgery
CSRF
Understand CSRF attacks step-by-step, see real-world exploitation demos, and learn proven mitigation techniques for secure web development.
XML External Entity Injection (XXE)
Explore XXE attacks that expose sensitive data via XML parsers, with examples and secure configuration techniques.
Insecure Direct Object Reference
IDOR
Insecure Direct Object References (IDOR) occur when an application provides direct access to objects based on user-supplied input.
Clickjacking
Learn what clickjacking is, how attackers trick users, and practical defence strategies to protect web apps. Step up your app security.
Directory Traversal
Understand directory traversal exploits that reveal sensitive files, with real examples and defensive coding to secure your infrastructure.
File Upload Vulnerabilities
File upload vulnerabilities enable an attacker to place a file of their choosing onto the target server, e.g. leading to the execution of code remotely
Open Redirect
Learn what open redirect issues are, how attackers exploit them for phishing, and effective ways to validate user input.
SQL Injection
A SQL injection attack consists of insertion or “injection” of a SQL query via the input data from the client to the application.
HTTP Parameter Pollution
Discover HTTP Parameter Pollution vulnerabilities with examples, exploitation techniques, and robust input validation methods.
Guides and tutorials
How to write a good report
Master bug bounty reporting: structure, clarity, scoring methods, and samples. Get your findings validated and rewarded faster.
Monthly Challenges
Test and improve your Cross‑Site Scripting skills with interactive XSS challenge exercises and walkthroughs.
Hacking Tools
A list of hacking tools to allows us to focus on the interesting parts of our jobs and that is to find vulnerabilities in complex processes!
Best platforms to learn ethical hacking!
Compare best platforms to learn ethical hacking, their features, rewards, and community tools. Find the best for your security career.
