Create Tool:
Create Time:1970-01-01 08:00:00
File Size:5.06 GB
File Count:266
File Hash:2c3eca7f54874e82ae55150466785a45fa5d5a10
1. Course Introduction/1. Course Introduction.mp4 | 90.10 MB |
1. Course Introduction/1. Course Introduction.srt | 5.71 KB |
1. Course Introduction/2. Disclaimer.mp4 | 7.58 MB |
1. Course Introduction/2. Disclaimer.srt | 1.22 KB |
1. Course Introduction/3. Course FAQ.html | 1.52 KB |
1. Course Introduction/4. Rules for asking Questions.html | 1.72 KB |
10. Bug Bounty Reporting Templates/1. Reporting Templates.html | 871 B |
11. Exploitation of CVE 2020-5902 Remote Code Execution/1. Exploitation.mp4 | 78.54 MB |
11. Exploitation of CVE 2020-5902 Remote Code Execution/1. Exploitation.srt | 15.04 KB |
11. Exploitation of CVE 2020-5902 Remote Code Execution/2. Assets & Resources.mp4 | 66.78 MB |
11. Exploitation of CVE 2020-5902 Remote Code Execution/2. Assets & Resources.srt | 12.01 KB |
11. Exploitation of CVE 2020-5902 Remote Code Execution/2.1 Assets.html | 122 B |
11. Exploitation of CVE 2020-5902 Remote Code Execution/2.2 Favicon Ico Python script.html | 128 B |
11. Exploitation of CVE 2020-5902 Remote Code Execution/3. Final Words.mp4 | 33.88 MB |
11. Exploitation of CVE 2020-5902 Remote Code Execution/3. Final Words.srt | 3.90 KB |
12. Exploitation of CVE 2020-3452 File Read/1. Exploitation of CVE 2020-3452 File Read.mp4 | 182.80 MB |
12. Exploitation of CVE 2020-3452 File Read/1. Exploitation of CVE 2020-3452 File Read.srt | 25.42 KB |
12. Exploitation of CVE 2020-3452 File Read/1.1 Assets at Github Repo.html | 143 B |
13. Exploitation of CVE 2020-3187 File Delete/1. Exploitation of CVE 2020-3187 File Delete.mp4 | 64.81 MB |
13. Exploitation of CVE 2020-3187 File Delete/1. Exploitation of CVE 2020-3187 File Delete.srt | 10.61 KB |
2. OWASP Top 10/1. What is OWASP and Injection.mp4 | 57.93 MB |
2. OWASP Top 10/1. What is OWASP and Injection.srt | 11.44 KB |
2. OWASP Top 10/10. What is Insufficient Logging and Monitoring.mp4 | 15.36 MB |
2. OWASP Top 10/10. What is Insufficient Logging and Monitoring.srt | 3.60 KB |
2. OWASP Top 10/10.1 OWASP Quiz.pdf | 20.10 KB |
2. OWASP Top 10/2. What is Broken Authentication.mp4 | 15.21 MB |
2. OWASP Top 10/2. What is Broken Authentication.srt | 3.09 KB |
2. OWASP Top 10/3. What is Sensitive Data Exposure.mp4 | 26.78 MB |
2. OWASP Top 10/3. What is Sensitive Data Exposure.srt | 5.69 KB |
2. OWASP Top 10/4. What is XML External Entities.mp4 | 13.15 MB |
2. OWASP Top 10/4. What is XML External Entities.srt | 2.70 KB |
2. OWASP Top 10/5. What is Broken Access Control.mp4 | 22.38 MB |
2. OWASP Top 10/5. What is Broken Access Control.srt | 4.40 KB |
2. OWASP Top 10/6. What is Security Misconfiguration.mp4 | 8.52 MB |
2. OWASP Top 10/6. What is Security Misconfiguration.srt | 2.23 KB |
2. OWASP Top 10/7. What is Cross Site Scripting (XSS).mp4 | 21.97 MB |
2. OWASP Top 10/7. What is Cross Site Scripting (XSS).srt | 4.57 KB |
2. OWASP Top 10/8. What is Insecure Deserialization.mp4 | 8.99 MB |
2. OWASP Top 10/8. What is Insecure Deserialization.srt | 2.26 KB |
2. OWASP Top 10/9. What is Using Components with Known Vulnerabilities.mp4 | 10.14 MB |
2. OWASP Top 10/9. What is Using Components with Known Vulnerabilities.srt | 2.36 KB |
2. OWASP Top 10/Download Paid Udemy Courses For Free.url | 116 B |
2. OWASP Top 10/GetFreeCourses.Co.url | 116 B |
2. OWASP Top 10/How you can help GetFreeCourses.Co.txt | 182 B |
3. Burp Suite and Lab Setup/1. Burp Suite Proxy Lab Setup.mp4 | 117.21 MB |
3. Burp Suite and Lab Setup/1. Burp Suite Proxy Lab Setup.srt | 21.64 KB |
4. Authentication Bypass/1. Authentication Bypass Exploitation Live -1.mp4 | 33.59 MB |
4. Authentication Bypass/1. Authentication Bypass Exploitation Live -1.srt | 5.38 KB |
4. Authentication Bypass/10. Authentication Bypass due to OTP Exposure Live -2.mp4 | 22.53 MB |
4. Authentication Bypass/10. Authentication Bypass due to OTP Exposure Live -2.srt | 2.65 KB |
4. Authentication Bypass/11. Authentication Bypass 2FA Bypass Live.mp4 | 32.70 MB |
4. Authentication Bypass/11. Authentication Bypass 2FA Bypass Live.srt | 4.15 KB |
4. Authentication Bypass/12. Authentication Bypass - Email Takeover Live.mp4 | 37.32 MB |
4. Authentication Bypass/12. Authentication Bypass - Email Takeover Live.srt | 6.57 KB |
4. Authentication Bypass/13. Authentication Bypass Mitigations.mp4 | 10.50 MB |
4. Authentication Bypass/13. Authentication Bypass Mitigations.srt | 2.21 KB |
4. Authentication Bypass/14. Authentication Bypass Interview Questions and Answers.mp4 | 21.10 MB |
4. Authentication Bypass/14. Authentication Bypass Interview Questions and Answers.srt | 5.44 KB |
4. Authentication Bypass/14.1 Auth Bypass Quiz.pdf | 26.99 KB |
4. Authentication Bypass/2. Authentication Bypass Exploitation Live -2.mp4 | 47.46 MB |
4. Authentication Bypass/2. Authentication Bypass Exploitation Live -2.srt | 4.10 KB |
4. Authentication Bypass/3. Authentication Bypass Exploitation Live -3.mp4 | 28.08 MB |
4. Authentication Bypass/3. Authentication Bypass Exploitation Live -3.srt | 3.24 KB |
4. Authentication Bypass/4. Authentication Bypass Exploitation Live -4.mp4 | 32.95 MB |
4. Authentication Bypass/4. Authentication Bypass Exploitation Live -4.srt | 4.07 KB |
4. Authentication Bypass/5. Authentication Bypass Exploitation Live -5.mp4 | 28.95 MB |
4. Authentication Bypass/5. Authentication Bypass Exploitation Live -5.srt | 4.73 KB |
4. Authentication Bypass/6. Authentication Bypass Exploitation Captcha.mp4 | 22.25 MB |
4. Authentication Bypass/6. Authentication Bypass Exploitation Captcha.srt | 2.65 KB |
4. Authentication Bypass/7. Authentication Bypass to Account Takeover Live -1.mp4 | 38.01 MB |
4. Authentication Bypass/7. Authentication Bypass to Account Takeover Live -1.srt | 5.88 KB |
4. Authentication Bypass/8. Authentication Bypass to Account Takeover Live -2.mp4 | 38.37 MB |
4. Authentication Bypass/8. Authentication Bypass to Account Takeover Live -2.srt | 3.96 KB |
4. Authentication Bypass/9. Authentication Bypass due to OTP Exposure Live -1.mp4 | 37.96 MB |
4. Authentication Bypass/9. Authentication Bypass due to OTP Exposure Live -1.srt | 4.06 KB |
5. No Rate-Limit Attacks/1. No Rate-Limit leads to Account Takeover Live Type-1.mp4 | 107.83 MB |
5. No Rate-Limit Attacks/1. No Rate-Limit leads to Account Takeover Live Type-1.srt | 13.94 KB |
5. No Rate-Limit Attacks/10. No Rate-Limit Instagram Report Breakdown 2.mp4 | 39.56 MB |
5. No Rate-Limit Attacks/10. No Rate-Limit Instagram Report Breakdown 2.srt | 5.43 KB |
5. No Rate-Limit Attacks/11. No Rate Limit Bypass Report Breakdown.mp4 | 47.61 MB |
5. No Rate-Limit Attacks/11. No Rate Limit Bypass Report Breakdown.srt | 6.26 KB |
5. No Rate-Limit Attacks/12. No Rate Limit Bypass Report Breakdown 2.mp4 | 45.53 MB |
5. No Rate-Limit Attacks/12. No Rate Limit Bypass Report Breakdown 2.srt | 6.00 KB |
5. No Rate-Limit Attacks/12.1 No RL Check Python Script.html | 98 B |
5. No Rate-Limit Attacks/13. No Rate-Limit to Tool Fake IP Practical.mp4 | 40.41 MB |
5. No Rate-Limit Attacks/13. No Rate-Limit to Tool Fake IP Practical.srt | 5.48 KB |
5. No Rate-Limit Attacks/14. No Rate-Limit test on CloudFare.mp4 | 41.64 MB |
5. No Rate-Limit Attacks/14. No Rate-Limit test on CloudFare.srt | 6.14 KB |
5. No Rate-Limit Attacks/15. No Rate-Limit Mitigations.mp4 | 8.55 MB |
5. No Rate-Limit Attacks/15. No Rate-Limit Mitigations.srt | 2.14 KB |
5. No Rate-Limit Attacks/16. No Rate-Limit All Hackerone Reports Breakdown.mp4 | 42.82 MB |
5. No Rate-Limit Attacks/16. No Rate-Limit All Hackerone Reports Breakdown.srt | 7.13 KB |
5. No Rate-Limit Attacks/16.1 No RL Quiz.pdf | 14.78 KB |
5. No Rate-Limit Attacks/17. Burp Alternative OWASP ZAP Proxy for No RL.mp4 | 87.31 MB |
5. No Rate-Limit Attacks/17. Burp Alternative OWASP ZAP Proxy for No RL.srt | 14.51 KB |
5. No Rate-Limit Attacks/2. NO RL Alternative Tools Introduction.mp4 | 9.42 MB |
5. No Rate-Limit Attacks/2. NO RL Alternative Tools Introduction.srt | 2.14 KB |
5. No Rate-Limit Attacks/3. No Rate-Limit leads to Account Takeover Live Type -2.mp4 | 76.70 MB |
5. No Rate-Limit Attacks/3. No Rate-Limit leads to Account Takeover Live Type -2.srt | 10.39 KB |
5. No Rate-Limit Attacks/4. No Rate-Limit leads to Account Takeover Live Type -3.mp4 | 47.74 MB |
5. No Rate-Limit Attacks/4. No Rate-Limit leads to Account Takeover Live Type -3.srt | 5.70 KB |
5. No Rate-Limit Attacks/5. No Rate-Limit leads to Account Takeover Live Type -4.mp4 | 44.05 MB |
5. No Rate-Limit Attacks/5. No Rate-Limit leads to Account Takeover Live Type -4.srt | 4.28 KB |
5. No Rate-Limit Attacks/6. No Rate-Limit leads to Account Takeover Live Type -5.mp4 | 50.28 MB |
5. No Rate-Limit Attacks/6. No Rate-Limit leads to Account Takeover Live Type -5.srt | 4.76 KB |
5. No Rate-Limit Attacks/7. No Rate-Limit to Account Takeover Live - Type 6.mp4 | 45.08 MB |
5. No Rate-Limit Attacks/7. No Rate-Limit to Account Takeover Live - Type 6.srt | 5.31 KB |
5. No Rate-Limit Attacks/8. No Rate-Limit to Account Takeover Live - Type 7.mp4 | 42.18 MB |
5. No Rate-Limit Attacks/8. No Rate-Limit to Account Takeover Live - Type 7.srt | 4.91 KB |
5. No Rate-Limit Attacks/9. No Rate-Limit Instagram Report Breakdown.mp4 | 5.21 MB |
5. No Rate-Limit Attacks/9. No Rate-Limit Instagram Report Breakdown.srt | 1.13 KB |
5. No Rate-Limit Attacks/9.1 Instagram POC Writeup.html | 121 B |
6. Cross Site Scripting (XSS)/1. How XSS Works.mp4 | 32.20 MB |
6. Cross Site Scripting (XSS)/1. How XSS Works.srt | 6.43 KB |
6. Cross Site Scripting (XSS)/10. Reflected XSS Email Validator Live.mp4 | 23.06 MB |
6. Cross Site Scripting (XSS)/10. Reflected XSS Email Validator Live.srt | 5.42 KB |
6. Cross Site Scripting (XSS)/11. Reflected XSS Protection Bypass Live 1 - Base64.mp4 | 48.55 MB |
6. Cross Site Scripting (XSS)/11. Reflected XSS Protection Bypass Live 1 - Base64.srt | 6.18 KB |
6. Cross Site Scripting (XSS)/12. Reflected XSS Protection Bypass Live -2.mp4 | 46.99 MB |
6. Cross Site Scripting (XSS)/12. Reflected XSS Protection Bypass Live -2.srt | 6.12 KB |
6. Cross Site Scripting (XSS)/13. XSS using Spider.mp4 | 66.84 MB |
6. Cross Site Scripting (XSS)/13. XSS using Spider.srt | 7.54 KB |
6. Cross Site Scripting (XSS)/14. XSS Bypass Right Click Disabled.mp4 | 38.51 MB |
6. Cross Site Scripting (XSS)/14. XSS Bypass Right Click Disabled.srt | 4.75 KB |
6. Cross Site Scripting (XSS)/15. Blind XSS Exploitation.mp4 | 63.65 MB |
6. Cross Site Scripting (XSS)/15. Blind XSS Exploitation.srt | 6.42 KB |
6. Cross Site Scripting (XSS)/16. Stored XSS Exploitation Live.mp4 | 84.62 MB |
6. Cross Site Scripting (XSS)/16. Stored XSS Exploitation Live.srt | 10.27 KB |
6. Cross Site Scripting (XSS)/17. DOM XSS Name.mp4 | 30.88 MB |
6. Cross Site Scripting (XSS)/17. DOM XSS Name.srt | 6.63 KB |
6. Cross Site Scripting (XSS)/18. DOM XSS Redirect.mp4 | 13.26 MB |
6. Cross Site Scripting (XSS)/18. DOM XSS Redirect.srt | 2.90 KB |
6. Cross Site Scripting (XSS)/19. DOM XSS Index.mp4 | 14.23 MB |
6. Cross Site Scripting (XSS)/19. DOM XSS Index.srt | 2.82 KB |
6. Cross Site Scripting (XSS)/2. Reflected XSS on Live 1.mp4 | 24.99 MB |
6. Cross Site Scripting (XSS)/2. Reflected XSS on Live 1.srt | 3.56 KB |
6. Cross Site Scripting (XSS)/2.1 XSS Payloads.pdf | 46.54 KB |
6. Cross Site Scripting (XSS)/20. DOM XSS Automated Scanner.mp4 | 136.66 MB |
6. Cross Site Scripting (XSS)/20. DOM XSS Automated Scanner.srt | 15.26 KB |
6. Cross Site Scripting (XSS)/21. XSS on Live by Adding Parameters.mp4 | 43.38 MB |
6. Cross Site Scripting (XSS)/21. XSS on Live by Adding Parameters.srt | 3.81 KB |
6. Cross Site Scripting (XSS)/22. XSS Mouse on Lab.mp4 | 15.90 MB |
6. Cross Site Scripting (XSS)/22. XSS Mouse on Lab.srt | 3.56 KB |
6. Cross Site Scripting (XSS)/22.1 XSS Mouse payloads.pdf | 31.44 KB |
6. Cross Site Scripting (XSS)/23. XSS Mouse Live.mp4 | 15.63 MB |
6. Cross Site Scripting (XSS)/23. XSS Mouse Live.srt | 1.96 KB |
6. Cross Site Scripting (XSS)/24. XSS Mouse Events All Types.mp4 | 39.01 MB |
6. Cross Site Scripting (XSS)/24. XSS Mouse Events All Types.srt | 4.14 KB |
6. Cross Site Scripting (XSS)/25. XSS Polyglots Live.mp4 | 68.19 MB |
6. Cross Site Scripting (XSS)/25. XSS Polyglots Live.srt | 8.35 KB |
6. Cross Site Scripting (XSS)/25.1 XSS Polylglots Payloads.html | 168 B |
6. Cross Site Scripting (XSS)/26. XSS Polyglots Breakdown.mp4 | 17.26 MB |
6. Cross Site Scripting (XSS)/26. XSS Polyglots Breakdown.srt | 2.67 KB |
6. Cross Site Scripting (XSS)/27. XSS Exploitation - URL Redirection.mp4 | 37.77 MB |
6. Cross Site Scripting (XSS)/27. XSS Exploitation - URL Redirection.srt | 6.08 KB |
6. Cross Site Scripting (XSS)/28. XSS Exploitation - Phishing.mp4 | 34.10 MB |
6. Cross Site Scripting (XSS)/28. XSS Exploitation - Phishing.srt | 5.17 KB |
6. Cross Site Scripting (XSS)/29. XSS Exploitation Cookie Stealer Lab.mp4 | 67.01 MB |
6. Cross Site Scripting (XSS)/29. XSS Exploitation Cookie Stealer Lab.srt | 13.32 KB |
6. Cross Site Scripting (XSS)/3. Reflected XSS on Live 2.mp4 | 13.08 MB |
6. Cross Site Scripting (XSS)/3. Reflected XSS on Live 2.srt | 1.67 KB |
6. Cross Site Scripting (XSS)/30. XSS Exploitation Cookie Stealer Live.mp4 | 73.91 MB |
6. Cross Site Scripting (XSS)/30. XSS Exploitation Cookie Stealer Live.srt | 10.59 KB |
6. Cross Site Scripting (XSS)/31. XSS Exploitation File Upload Type -2.mp4 | 19.44 MB |
6. Cross Site Scripting (XSS)/31. XSS Exploitation File Upload Type -2.srt | 3.61 KB |
6. Cross Site Scripting (XSS)/32. XSS Exploitation File Upload Type -3.mp4 | 45.49 MB |
6. Cross Site Scripting (XSS)/32. XSS Exploitation File Upload Type -3.srt | 7.54 KB |
6. Cross Site Scripting (XSS)/33. XSS Exploitation File Upload Type- 1.mp4 | 24.70 MB |
6. Cross Site Scripting (XSS)/33. XSS Exploitation File Upload Type- 1.srt | 4.07 KB |
6. Cross Site Scripting (XSS)/34. XSS Mitigations.mp4 | 18.58 MB |
6. Cross Site Scripting (XSS)/34. XSS Mitigations.srt | 2.36 KB |
6. Cross Site Scripting (XSS)/35. XSS Bonus TIPS and TRICKS.mp4 | 43.67 MB |
6. Cross Site Scripting (XSS)/35. XSS Bonus TIPS and TRICKS.srt | 6.13 KB |
6. Cross Site Scripting (XSS)/36. XSS Hackerone ALL Reports Breakdown.mp4 | 69.25 MB |
6. Cross Site Scripting (XSS)/36. XSS Hackerone ALL Reports Breakdown.srt | 10.49 KB |
6. Cross Site Scripting (XSS)/37. XSS Interview Questions and Answers.mp4 | 44.53 MB |
6. Cross Site Scripting (XSS)/37. XSS Interview Questions and Answers.srt | 9.34 KB |
6. Cross Site Scripting (XSS)/37.1 XSS Quiz.pdf | 22.97 KB |
6. Cross Site Scripting (XSS)/4. Reflected XSS on Live Manual Balancing.mp4 | 103.44 MB |
6. Cross Site Scripting (XSS)/4. Reflected XSS on Live Manual Balancing.srt | 12.59 KB |
6. Cross Site Scripting (XSS)/5. Reflected XSS on Live 3 Balanced.mp4 | 30.59 MB |
6. Cross Site Scripting (XSS)/5. Reflected XSS on Live 3 Balanced.srt | 3.68 KB |
6. Cross Site Scripting (XSS)/6. XSS on Limited Inputs Live 1.mp4 | 26.72 MB |
6. Cross Site Scripting (XSS)/6. XSS on Limited Inputs Live 1.srt | 3.61 KB |
6. Cross Site Scripting (XSS)/7. XSS on Limited Inputs Live 2.mp4 | 20.67 MB |
6. Cross Site Scripting (XSS)/7. XSS on Limited Inputs Live 2.srt | 2.99 KB |
6. Cross Site Scripting (XSS)/8. XSS in Request Headers - Live.mp4 | 36.84 MB |
6. Cross Site Scripting (XSS)/8. XSS in Request Headers - Live.srt | 3.76 KB |
6. Cross Site Scripting (XSS)/9. Reflected XSS Useragent and Caching.mp4 | 42.33 MB |
6. Cross Site Scripting (XSS)/9. Reflected XSS Useragent and Caching.srt | 7.93 KB |
6. Cross Site Scripting (XSS)/Download Paid Udemy Courses For Free.url | 116 B |
6. Cross Site Scripting (XSS)/GetFreeCourses.Co.url | 116 B |
6. Cross Site Scripting (XSS)/How you can help GetFreeCourses.Co.txt | 182 B |
7. Cross Site Request Forgery (CSRF)/1. How CSRF Works.mp4 | 19.75 MB |
7. Cross Site Request Forgery (CSRF)/1. How CSRF Works.srt | 4.55 KB |
7. Cross Site Request Forgery (CSRF)/10. CSRF to Account Takeover Live -1.mp4 | 73.59 MB |
7. Cross Site Request Forgery (CSRF)/10. CSRF to Account Takeover Live -1.srt | 7.54 KB |
7. Cross Site Request Forgery (CSRF)/11. CSRF to Account Takeover Live -2.mp4 | 76.73 MB |
7. Cross Site Request Forgery (CSRF)/11. CSRF to Account Takeover Live -2.srt | 8.14 KB |
7. Cross Site Request Forgery (CSRF)/12. Chaining CSRF with XSS.mp4 | 15.69 MB |
7. Cross Site Request Forgery (CSRF)/12. Chaining CSRF with XSS.srt | 2.73 KB |
7. Cross Site Request Forgery (CSRF)/13. CSRF Mitigations.mp4 | 14.71 MB |
7. Cross Site Request Forgery (CSRF)/13. CSRF Mitigations.srt | 3.79 KB |
7. Cross Site Request Forgery (CSRF)/14. CSRF BONUS Tips and Tricks.mp4 | 14.12 MB |
7. Cross Site Request Forgery (CSRF)/14. CSRF BONUS Tips and Tricks.srt | 2.54 KB |
7. Cross Site Request Forgery (CSRF)/15. CSRF ALL Hackerone Reports Breakdown.mp4 | 121.78 MB |
7. Cross Site Request Forgery (CSRF)/15. CSRF ALL Hackerone Reports Breakdown.srt | 15.54 KB |
7. Cross Site Request Forgery (CSRF)/16. CSRF Interview Questions and Answers.mp4 | 32.26 MB |
7. Cross Site Request Forgery (CSRF)/16. CSRF Interview Questions and Answers.srt | 6.55 KB |
7. Cross Site Request Forgery (CSRF)/16.1 CSRF Quiz.pdf | 15.79 KB |
7. Cross Site Request Forgery (CSRF)/16.2 CSRF POC.pdf | 15.85 KB |
7. Cross Site Request Forgery (CSRF)/17. Alternative to Burpsuite for CSRF CSRF PoC Generator.mp4 | 72.85 MB |
7. Cross Site Request Forgery (CSRF)/17. Alternative to Burpsuite for CSRF CSRF PoC Generator.srt | 15.55 KB |
7. Cross Site Request Forgery (CSRF)/2. CSRF Alternative Tools Introduction.mp4 | 14.26 MB |
7. Cross Site Request Forgery (CSRF)/2. CSRF Alternative Tools Introduction.srt | 2.34 KB |
7. Cross Site Request Forgery (CSRF)/3. CSRF on LAB.mp4 | 24.71 MB |
7. Cross Site Request Forgery (CSRF)/3. CSRF on LAB.srt | 2.92 KB |
7. Cross Site Request Forgery (CSRF)/4. CSRF on LAB - 2.mp4 | 57.88 MB |
7. Cross Site Request Forgery (CSRF)/4. CSRF on LAB - 2.srt | 9.92 KB |
7. Cross Site Request Forgery (CSRF)/5. CSRF on Live -1.mp4 | 11.53 MB |
7. Cross Site Request Forgery (CSRF)/5. CSRF on Live -1.srt | 1.58 KB |
7. Cross Site Request Forgery (CSRF)/6. CSRF on Live -2.mp4 | 102.60 MB |
7. Cross Site Request Forgery (CSRF)/6. CSRF on Live -2.srt | 10.43 KB |
7. Cross Site Request Forgery (CSRF)/7. CSRF Password Change Lab.mp4 | 43.24 MB |
7. Cross Site Request Forgery (CSRF)/7. CSRF Password Change Lab.srt | 4.32 KB |
7. Cross Site Request Forgery (CSRF)/8. CSRF Funds Transfer Lab.mp4 | 37.88 MB |
7. Cross Site Request Forgery (CSRF)/8. CSRF Funds Transfer Lab.srt | 3.72 KB |
7. Cross Site Request Forgery (CSRF)/9. CSRF Request Methods Trick - Lab.mp4 | 36.52 MB |
7. Cross Site Request Forgery (CSRF)/9. CSRF Request Methods Trick - Lab.srt | 3.75 KB |
8. Cross Origin Resource Sharing (CORS)/1. How CORS Works.mp4 | 11.86 MB |
8. Cross Origin Resource Sharing (CORS)/1. How CORS Works.srt | 3.20 KB |
8. Cross Origin Resource Sharing (CORS)/10. CORS Breakdown of ALL Hackerone Reports.mp4 | 93.62 MB |
8. Cross Origin Resource Sharing (CORS)/10. CORS Breakdown of ALL Hackerone Reports.srt | 13.50 KB |
8. Cross Origin Resource Sharing (CORS)/10.1 CORS.pdf | 14.14 KB |
8. Cross Origin Resource Sharing (CORS)/2. CORS 3 Test Cases Fundamentals.mp4 | 77.82 MB |
8. Cross Origin Resource Sharing (CORS)/2. CORS 3 Test Cases Fundamentals.srt | 9.40 KB |
8. Cross Origin Resource Sharing (CORS)/3. CORS Exploitation Live -2 Exfiltration of Account Details.mp4 | 14.59 MB |
8. Cross Origin Resource Sharing (CORS)/3. CORS Exploitation Live -2 Exfiltration of Account Details.srt | 2.76 KB |
8. Cross Origin Resource Sharing (CORS)/4. CORS Exploitation Live -3 Exfiltration of Account Details.mp4 | 26.27 MB |
8. Cross Origin Resource Sharing (CORS)/4. CORS Exploitation Live -3 Exfiltration of Account Details.srt | 5.15 KB |
8. Cross Origin Resource Sharing (CORS)/5. CORS Live Exploitation -4.mp4 | 9.25 MB |
8. Cross Origin Resource Sharing (CORS)/5. CORS Live Exploitation -4.srt | 2.13 KB |
8. Cross Origin Resource Sharing (CORS)/6. CORS Exploitation Facebook Live.mp4 | 15.49 MB |
8. Cross Origin Resource Sharing (CORS)/6. CORS Exploitation Facebook Live.srt | 2.30 KB |
8. Cross Origin Resource Sharing (CORS)/7. CORS Live Prefix Match.mp4 | 25.21 MB |
8. Cross Origin Resource Sharing (CORS)/7. CORS Live Prefix Match.srt | 3.99 KB |
8. Cross Origin Resource Sharing (CORS)/8. CORS Live Suffix Match.mp4 | 25.29 MB |
8. Cross Origin Resource Sharing (CORS)/8. CORS Live Suffix Match.srt | 4.29 KB |
8. Cross Origin Resource Sharing (CORS)/9. CORS Mitigations.mp4 | 6.96 MB |
8. Cross Origin Resource Sharing (CORS)/9. CORS Mitigations.srt | 2.22 KB |
9. How to start with Bug Bounty Platforms and Reporting/1. BugCrowd ROADMAP.mp4 | 150.70 MB |
9. How to start with Bug Bounty Platforms and Reporting/1. BugCrowd ROADMAP.srt | 23.09 KB |
9. How to start with Bug Bounty Platforms and Reporting/2. Hackerone ROADMAP.mp4 | 77.56 MB |
9. How to start with Bug Bounty Platforms and Reporting/2. Hackerone ROADMAP.srt | 11.28 KB |
9. How to start with Bug Bounty Platforms and Reporting/3. Open Bug Bounty ROADMAP.mp4 | 80.13 MB |
9. How to start with Bug Bounty Platforms and Reporting/3. Open Bug Bounty ROADMAP.srt | 9.41 KB |
9. How to start with Bug Bounty Platforms and Reporting/4. NCIIPC Govt of Inida ROADMAP.mp4 | 99.54 MB |
9. How to start with Bug Bounty Platforms and Reporting/4. NCIIPC Govt of Inida ROADMAP.srt | 8.80 KB |
9. How to start with Bug Bounty Platforms and Reporting/5. RVDP All Websites ROADMAP.mp4 | 64.13 MB |
9. How to start with Bug Bounty Platforms and Reporting/5. RVDP All Websites ROADMAP.srt | 6.79 KB |
9. How to start with Bug Bounty Platforms and Reporting/Download Paid Udemy Courses For Free.url | 116 B |
9. How to start with Bug Bounty Platforms and Reporting/GetFreeCourses.Co.url | 116 B |
9. How to start with Bug Bounty Platforms and Reporting/How you can help GetFreeCourses.Co.txt | 182 B |
Download Paid Udemy Courses For Free.url | 116 B |
GetFreeCourses.Co.url | 116 B |
How you can help GetFreeCourses.Co.txt | 182 B |
udp://9.rarbg.to:2920/announce |
udp://tracker.coppersurfer.tk:6969/announce |
udp://tracker.cyberia.is:6969/announce |
udp://tracker.internetwarriors.net:1337/announce |
udp://tracker.leechers-paradise.org:6969/announce |
udp://tracker.opentrackr.org:1337 |
udp://tracker.pirateparty.gr:6969/announce |
TorrentBank
Copyright © 2024