From 3e8a39a87d5190bd951290150b9995fbb7ba6355 Mon Sep 17 00:00:00 2001 From: Alexandre ZANNI <16578570+noraj@users.noreply.github.com> Date: Thu, 8 Jun 2023 10:14:35 +0200 Subject: [PATCH] xxe - go secure workshop --- XXE Injection/README.md | 1 + 1 file changed, 1 insertion(+) diff --git a/XXE Injection/README.md b/XXE Injection/README.md index 89bded8..c630c30 100644 --- a/XXE Injection/README.md +++ b/XXE Injection/README.md @@ -104,6 +104,7 @@ Syntax: `` * [Exploiting XInclude to retrieve files](https://portswigger.net/web-security/xxe/lab-xinclude-attack) * [Exploiting XXE via image file upload](https://portswigger.net/web-security/xxe/lab-xxe-via-file-upload) * [Exploiting XXE to retrieve data by repurposing a local DTD](https://portswigger.net/web-security/xxe/blind/lab-xxe-trigger-error-message-by-repurposing-local-dtd) +* [GoSecure workshop - Advanced XXE Exploitation](https://gosecure.github.io/xxe-workshop) ## Detect the vulnerability