# Home

[xss-exploitation-tool-v0.8.0-alpha-1](https://sharpforce.gitbook.io/cybersecurity/mes-articles/2025/juin/xss-exploitation-tool-v0.8.0-alpha-1 "mention")

La version 0.8.0-alpha-1 de XET (XSS Exploitation Tool) est maintenant disponible :&#x20;

<https://github.com/Sharpforce/XSS-Exploitation-Tool/releases/tag/v0.8.0-alpha-1>

:date: 05 Déc 2025 :open\_file\_folder:[XSS](https://sharpforce.gitbook.io/cybersecurity/categories#xss) :open\_file\_folder:[Tooling](https://sharpforce.gitbook.io/cybersecurity/categories#tooling)

***

[xss-exploitation-tool-v0.7.1](https://sharpforce.gitbook.io/cybersecurity/mes-articles/2025/juin/xss-exploitation-tool-v0.7.1 "mention")

La version 0.7.1 de XET (XSS Exploitation Tool) est maintenant disponible : <https://github.com/Sharpforce/XSS-Exploitation-Tool/releases/tag/v0.7.1>

:date: 16 Juin 2025 :open\_file\_folder:[XSS](https://sharpforce.gitbook.io/cybersecurity/categories#xss) :open\_file\_folder:[Tooling](https://sharpforce.gitbook.io/cybersecurity/categories#tooling)

***

[comment-les-requetes-preparees-prepared-statement-protegent-elles-contre-les-injections-sql](https://sharpforce.gitbook.io/cybersecurity/mes-articles/2025/mars/comment-les-requetes-preparees-prepared-statement-protegent-elles-contre-les-injections-sql "mention")

Les injections SQL sont des vulnérabilités largement connues et souvent critiques, mais elles demeurent encore très répandues dans les applications web actuelles. La principale protection contre cette vulnérabilité repose sur l'utilisation des requêtes préparées, mais comment fonctionnent-elles exactement ?

:date: 04 Mars 2025 :open\_file\_folder:[SQL Injection](https://sharpforce.gitbook.io/cybersecurity/categories#sql-injection)

***

[cve-2024-29415](https://sharpforce.gitbook.io/cybersecurity/cve/2024/cve-2024-29415 "mention")

La **CVE-2024-29415** est une vulnérabilité de type Server-Side Request Forgery (SSRF) qui découle de la **CVE-2023-42282** mais qui a pourtant comme un effet de déjà vu.

:date: 25 Fév 2025 :open\_file\_folder:[SSRF](https://sharpforce.gitbook.io/cybersecurity/categories#ssrf) :open\_file\_folder:[CVE](https://sharpforce.gitbook.io/cybersecurity/categories#cve)

***

[attacking-and-exploiting-modern-web-applications](https://sharpforce.gitbook.io/cybersecurity/livres/2023/attacking-and-exploiting-modern-web-applications "mention")

Mon analyse du livre *Attacking and Exploiting Modern Web Applications* de Simone Onofri et Donato Onofri, publié en 2023.

:date: 21 Fév 2025 :open\_file\_folder:[Books](https://sharpforce.gitbook.io/cybersecurity/categories#books)

***

[cve-2023-42282](https://sharpforce.gitbook.io/cybersecurity/cve/2023/cve-2023-42282 "mention")

Analyse de la faiblesse **CVE-2023-42282**. Cette vulnérabilité de type Server-Side Request Forgery (SSRF) affecte la dépendance ip, ce qui a conduit à son archivage temporaire.

:date: 10 Fév 2025 :open\_file\_folder:[SSRF](https://sharpforce.gitbook.io/cybersecurity/categories#ssrf) :open\_file\_folder:[CVE](https://sharpforce.gitbook.io/cybersecurity/categories#cve)

***

[xss-exploitation-tool-v0.7.0](https://sharpforce.gitbook.io/cybersecurity/mes-articles/2025/janvier/xss-exploitation-tool-v0.7.0 "mention")

La version 0.7.0 vient XET (XSS Exploitation Tool) est maintenant disponible : <https://github.com/Sharpforce/XSS-Exploitation-Tool/releases/tag/v0.7.0>

:date: 27 Jan 2025 :open\_file\_folder:[XSS](https://sharpforce.gitbook.io/cybersecurity/categories#xss) :open\_file\_folder:[Tooling](https://sharpforce.gitbook.io/cybersecurity/categories#tooling)


---

# Agent Instructions: Querying This Documentation

If you need additional information that is not directly available in this page, you can query the documentation dynamically by asking a question.

Perform an HTTP GET request on the current page URL with the `ask` query parameter:

```
GET https://sharpforce.gitbook.io/cybersecurity/mon-blog/readme.md?ask=<question>
```

The question should be specific, self-contained, and written in natural language.
The response will contain a direct answer to the question and relevant excerpts and sources from the documentation.

Use this mechanism when the answer is not explicitly present in the current page, you need clarification or additional context, or you want to retrieve related documentation sections.
