Chapter 2: Fuzzing and Exploiting XSS and SQL Injection
Chapter 3: Fuzzing SOAP Endpoints
Chapter 4: Writing Connect-Back, Binding, and Metasploit Payloads
Chapter 8: Automating Cuckoo Sandbox
Chapter 11: Automating Metasploit
Chapter 12: Automating Arachni
Chapter 13: Decompiling and Reversing Managed Assemblies