SQL Injection Sources

JWT Sources

Log Analysis

Other:

https://brightsec.com/blog/cross-site-scripting-xss/

https://www.techtarget.com/searchsecurity/definition/timing-attack

https://www.rapid7.com/fundamentals/man-in-the-middle-attacks/

https://hacksplaining.com/lessons

https://stackoverflow.com/questions/3466850/regular-expression-to-enforce-complex-passwords-matching-3-out-of-4-rules