1. DLL Hjacking
  2. API Pentesting & Business Logic Vulnerabilities
  3. Hardcoded Secrets
  4. Unquoted Service Path
  5. Misconfigured File Permission
  6. Binary Compilation (ASLR,DEP,SEH)
  7. Check Config Files ( IV + Secrets + Config Setting + Credentials)
  8. Memory Overwrite
  9. Code Obfuscation
  10. Application/Binary Hooking
  11. Misconfigured Registry Permission
  12. Hidden GUI Controls
  13. Sensitive Data Stored in Memory
  14. Vulnerable Dependency
  15. Created By: Devansh Bordia @devansh3008