| 
                        Please note that this page does not hosts or makes available any of the listed filenames. You
                        cannot download any of those files from here.
                     | 
                
                    
                        | 1. 0 Intro.mp4 | 
                        44.66MB | 
                    
                    
                        | 1. 0 Intro.mp4 | 
                        19.00MB | 
                    
                    
                        | 1. 0 Intro.srt | 
                        3.14KB | 
                    
                    
                        | 1. 0 Intro.srt | 
                        3.49KB | 
                    
                    
                        | 1. 0 Introduction.mp4 | 
                        44.07MB | 
                    
                    
                        | 1. 0 Introduction.srt | 
                        3.07KB | 
                    
                    
                        | 1.1 4_XML_eXternal_Entities.pdf | 
                        183.67KB | 
                    
                    
                        | 1.1 BAC - Slides.pdf | 
                        334.85KB | 
                    
                    
                        | 1.1 Broad scope methodology - Slides.pdf | 
                        520.36KB | 
                    
                    
                        | 1.1 Bug_Report_Template_markdown.txt | 
                        1.31KB | 
                    
                    
                        | 1.1 BurpSuite with SQLi links.txt | 
                        161B | 
                    
                    
                        | 1.1 Business logic flaws - Slides.pdf | 
                        267.36KB | 
                    
                    
                        | 1.1 discord invite link.txt | 
                        27B | 
                    
                    
                        | 1.1 File Inclusion.pdf | 
                        1.33MB | 
                    
                    
                        | 1.1 IDOR - Slides.pdf | 
                        436.09KB | 
                    
                    
                        | 1.1 Main app methodology.pdf | 
                        1.22MB | 
                    
                    
                        | 1.1 Slides.pdf | 
                        984.25KB | 
                    
                    
                        | 1.1 SSRF-Slides.pdf | 
                        385.42KB | 
                    
                    
                        | 1.1 SSTI.pdf | 
                        46.86KB | 
                    
                    
                        | 1.1 Tempus Fugit 5 - Walkthrough.pdf | 
                        7.44MB | 
                    
                    
                        | 1.1 The intricaties of bug bounties.pdf | 
                        436.46KB | 
                    
                    
                        | 1.1 Ultimate XSS Guide - Slides.pdf | 
                        1.02MB | 
                    
                    
                        | 1.1 WAF_evasion_techniques.pdf | 
                        321.03KB | 
                    
                    
                        | 1.1 XXE - Slides.pdf | 
                        419.58KB | 
                    
                    
                        | 1.2 Ratnightmare2.pdf | 
                        10.56MB | 
                    
                    
                        | 1.2 The intricaties of bug bounties.pdf | 
                        436.46KB | 
                    
                    
                        | 1.2 What you need to know about bug bounties.pdf | 
                        310.33KB | 
                    
                    
                        | 1.3 master labs download links.txt | 
                        223B | 
                    
                    
                        | 1. Attack techniques - Broken Access Control - video.mp4 | 
                        98.80MB | 
                    
                    
                        | 1. Attack techniques - Broken Access Control - video.srt | 
                        13.48KB | 
                    
                    
                        | 1. Attack techniques CSRF - Video.mp4 | 
                        214.51MB | 
                    
                    
                        | 1. Attack techniques CSRF - Video.srt | 
                        12.73KB | 
                    
                    
                        | 1. Attack techniques - IDOR By Uncle Rat - Video.mp4 | 
                        154.54MB | 
                    
                    
                        | 1. Attack techniques - IDOR By Uncle Rat - Video.srt | 
                        21.11KB | 
                    
                    
                        | 1. Broad scope manual methodology - Video.mp4 | 
                        107.15MB | 
                    
                    
                        | 1. Broad scope manual methodology - Video.srt | 
                        16.04KB | 
                    
                    
                        | 1. How to enter the master labs.html | 
                        448B | 
                    
                    
                        | 1. Introduction.mp4 | 
                        13.03MB | 
                    
                    
                        | 1. Introduction.srt | 
                        1.16KB | 
                    
                    
                        | 1. Main app methodology - Video.mp4 | 
                        359.62MB | 
                    
                    
                        | 1. Main app methodology - Video.srt | 
                        37.84KB | 
                    
                    
                        | 1. Next steps.html | 
                        327B | 
                    
                    
                        | 1. Testing for SQLi with burp suite.html | 
                        4.56KB | 
                    
                    
                        | 1. The Intricacies of bug bounties.mp4 | 
                        361.77MB | 
                    
                    
                        | 1. The Intricacies of bug bounties.srt | 
                        40.35KB | 
                    
                    
                        | 1. Video Attack techniques - Business logic flaws.mp4 | 
                        70.90MB | 
                    
                    
                        | 1. Video Attack techniques - Business logic flaws.srt | 
                        7.37KB | 
                    
                    
                        | 1. Video Attack techniques - OS Command injection.mp4 | 
                        48.79MB | 
                    
                    
                        | 1. Video Attack techniques - OS Command injection.srt | 
                        8.10KB | 
                    
                    
                        | 1. Video Attack techniques - SSRF.mp4 | 
                        189.80MB | 
                    
                    
                        | 1. Video Attack techniques - SSRF.srt | 
                        11.34KB | 
                    
                    
                        | 1. Video Attack techniques - Template injections - SSTI.mp4 | 
                        107.34MB | 
                    
                    
                        | 1. Video Attack techniques - Template injections - SSTI.srt | 
                        14.72KB | 
                    
                    
                        | 1. Video Attack techniques - WAF evasion techniques.mp4 | 
                        108.62MB | 
                    
                    
                        | 1. Video Attack techniques - WAF evasion techniques.srt | 
                        29.81KB | 
                    
                    
                        | 1. Video Attack techniques - XXE.mp4 | 
                        88.55MB | 
                    
                    
                        | 1. Video Attack techniques - XXE.srt | 
                        12.60KB | 
                    
                    
                        | 1. Video Full guide on How Burp Suite works.mp4 | 
                        683.98MB | 
                    
                    
                        | 1. Video Full guide on How Burp Suite works.srt | 
                        86.51KB | 
                    
                    
                        | 1. Video Reporting.mp4 | 
                        34.20MB | 
                    
                    
                        | 1. Video Reporting.srt | 
                        4.45KB | 
                    
                    
                        | 1. Video Ultimate beginner XSS guide.mp4 | 
                        276.11MB | 
                    
                    
                        | 1. Video Ultimate beginner XSS guide.srt | 
                        39.02KB | 
                    
                    
                        | 10. Excercises 3 MSSQL injection to RCE.mp4 | 
                        151.01MB | 
                    
                    
                        | 10. Excercises 3 MSSQL injection to RCE.srt | 
                        11.22KB | 
                    
                    
                        | 10. Excercises SKFLFI2.mp4 | 
                        92.63MB | 
                    
                    
                        | 10. Excercises SKFLFI2.srt | 
                        5.81KB | 
                    
                    
                        | 10. Solutions Reflected XSS.html | 
                        764B | 
                    
                    
                        | 11. Excercises 4 Boolean Based SQLi.mp4 | 
                        115.24MB | 
                    
                    
                        | 11. Excercises 4 Boolean Based SQLi.srt | 
                        9.41KB | 
                    
                    
                        | 11. Excercises Book.mp4 | 
                        124.02MB | 
                    
                    
                        | 11. Excercises Book.srt | 
                        8.45KB | 
                    
                    
                        | 11. Lab Stored XSS.html | 
                        600B | 
                    
                    
                        | 12. Excercises 5 SQLi WAF Bypass.mp4 | 
                        133.00MB | 
                    
                    
                        | 12. Excercises 5 SQLi WAF Bypass.srt | 
                        20.64KB | 
                    
                    
                        | 12. Solutions Stored XSS.html | 
                        686B | 
                    
                    
                        | 13. Cheat sheet XSS.html | 
                        635B | 
                    
                    
                        | 13. Excercises 6 SQLi, XSS and XXE all in one payload.mp4 | 
                        192.08MB | 
                    
                    
                        | 13. Excercises 6 SQLi, XSS and XXE all in one payload.srt | 
                        24.16KB | 
                    
                    
                        | 14. Labs User submitted reflected XSS.html | 
                        652B | 
                    
                    
                        | 2.10 08_Burp_Suite_Comparer.pdf | 
                        237.61KB | 
                    
                    
                        | 2.1 03_Burp_Match_and_replace.pdf | 
                        691.44KB | 
                    
                    
                        | 2.1 Analysing javascript files.pdf | 
                        374.59KB | 
                    
                    
                        | 2.1 broad scope methodology 06-04-2021.txt | 
                        1.18KB | 
                    
                    
                        | 2.1 BurpSuite with IDOR links.txt | 
                        106B | 
                    
                    
                        | 2. 1 What are File Inclusions.mp4 | 
                        74.93MB | 
                    
                    
                        | 2. 1 What are File Inclusions.srt | 
                        5.38KB | 
                    
                    
                        | 2. 1 What are SQLi.mp4 | 
                        89.35MB | 
                    
                    
                        | 2. 1 What are SQLi.srt | 
                        6.20KB | 
                    
                    
                        | 2. 1 What is XXE.mp4 | 
                        34.88MB | 
                    
                    
                        | 2. 1 What is XXE.srt | 
                        6.69KB | 
                    
                    
                        | 2.1 What you need to know about bug bounties.pdf | 
                        310.33KB | 
                    
                    
                        | 2.2 05_Burp_Suite_repeater.pdf | 
                        201.35KB | 
                    
                    
                        | 2.2 96_Burp_Authorize.pdf | 
                        1.27MB | 
                    
                    
                        | 2.2 Main app methodology 06-04-2021.txt | 
                        1.83KB | 
                    
                    
                        | 2.3 00_Burp_Suite_Do_i_need_the_profesional_edition.pdf | 
                        57.31KB | 
                    
                    
                        | 2.4 09_Burp_Suite_Extender.pdf | 
                        51.43KB | 
                    
                    
                        | 2.5 04_Burp_suite_Intruder.pdf | 
                        521.48KB | 
                    
                    
                        | 2.6 02_Burp_suite_Target.pdf | 
                        252.66KB | 
                    
                    
                        | 2.7 07_Burp_Suite_Decoder.pdf | 
                        113.25KB | 
                    
                    
                        | 2.8 06_Burp_Suite_Sequencer.pdf | 
                        214.72KB | 
                    
                    
                        | 2.9 01_Burp_Suite_Dashboard.pdf | 
                        384.89KB | 
                    
                    
                        | 2. Attack techniques - Broken Access Control.html | 
                        4.39KB | 
                    
                    
                        | 2. Attack techniques - Business logic flaws.html | 
                        3.91KB | 
                    
                    
                        | 2. Attack techniques CSRF demonstration - video.mp4 | 
                        102.23MB | 
                    
                    
                        | 2. Attack techniques CSRF demonstration - video.srt | 
                        14.49KB | 
                    
                    
                        | 2. Attack techniques - IDOR By Uncle Rat.html | 
                        4.20KB | 
                    
                    
                        | 2. Attack techniques - OS Command injection.html | 
                        3.13KB | 
                    
                    
                        | 2. Attack techniques - Template injections - SSTI.html | 
                        4.94KB | 
                    
                    
                        | 2. Attack techniques - XXE.html | 
                        5.56KB | 
                    
                    
                        | 2. Broad scope manual methodology.html | 
                        6.82KB | 
                    
                    
                        | 2. Main app methodology.html | 
                        17.67KB | 
                    
                    
                        | 2. Quiz The Intricacies of bug bounties.html | 
                        138B | 
                    
                    
                        | 2. SSRF.html | 
                        5.59KB | 
                    
                    
                        | 2. Testing for IDORs with Burp Suite.html | 
                        3.59KB | 
                    
                    
                        | 2. Uncle Rat's Recommended public bug bounty targets.html | 
                        215B | 
                    
                    
                        | 2. Video Analyzing JS files.mp4 | 
                        71.27MB | 
                    
                    
                        | 2. Video Analyzing JS files.srt | 
                        11.45KB | 
                    
                    
                        | 2. Video Burp suite zero to hero.mp4 | 
                        145.94MB | 
                    
                    
                        | 2. Video Burp suite zero to hero.srt | 
                        17.77KB | 
                    
                    
                        | 2. What you need to know about bug bounties - Video.mp4 | 
                        133.26MB | 
                    
                    
                        | 2. What you need to know about bug bounties - Video.srt | 
                        15.14KB | 
                    
                    
                        | 3.1 BurpSuite with WS links.txt | 
                        100B | 
                    
                    
                        | 3.1 Discord Invite link.rtf | 
                        398B | 
                    
                    
                        | 3. 2 Detecting SQLi.mp4 | 
                        105.71MB | 
                    
                    
                        | 3. 2 Detecting SQLi.srt | 
                        7.94KB | 
                    
                    
                        | 3. 2 Finding a target.mp4 | 
                        69.49MB | 
                    
                    
                        | 3. 2 Finding a target.srt | 
                        5.05KB | 
                    
                    
                        | 3. 2 Finding XXE attack vectors.mp4 | 
                        43.40MB | 
                    
                    
                        | 3. 2 Finding XXE attack vectors.srt | 
                        7.08KB | 
                    
                    
                        | 3. Analyzing JS files.html | 
                        5.04KB | 
                    
                    
                        | 3. Article The origin of Business logic flaws.html | 
                        14.20KB | 
                    
                    
                        | 3. Attack techniques - Broken Access Control - Overview.html | 
                        156B | 
                    
                    
                        | 3. Attack techniques CSRF.html | 
                        10.66KB | 
                    
                    
                        | 3. Discord invite link.html | 
                        28B | 
                    
                    
                        | 3. Extra video Blind SSRF, what is it and how to exploit it.mp4 | 
                        48.66MB | 
                    
                    
                        | 3. Extra video Blind SSRF, what is it and how to exploit it.srt | 
                        5.92KB | 
                    
                    
                        | 3. Main app methodology demonstration on the owasp juice shop.html | 
                        21.89KB | 
                    
                    
                        | 3. Quiz IDOR.html | 
                        138B | 
                    
                    
                        | 3. Quiz Manual broad scope methodology.html | 
                        138B | 
                    
                    
                        | 3. SSTI overview.html | 
                        156B | 
                    
                    
                        | 3. Testing websockets in burp.html | 
                        2.75KB | 
                    
                    
                        | 3. Video My Top 10 Burp Suite extensions.mp4 | 
                        84.38MB | 
                    
                    
                        | 3. Video My Top 10 Burp Suite extensions.srt | 
                        13.13KB | 
                    
                    
                        | 3. XXE.html | 
                        138B | 
                    
                    
                        | 4.1 Broad scope methodology (1).pdf | 
                        520.36KB | 
                    
                    
                        | 4.1 BurpSuite with 2FA links.txt | 
                        85B | 
                    
                    
                        | 4.1 CSTI - Slides.pdf | 
                        154.88KB | 
                    
                    
                        | 4. 3 Exploiting XXEs.mp4 | 
                        36.85MB | 
                    
                    
                        | 4. 3 Exploiting XXEs.srt | 
                        6.16KB | 
                    
                    
                        | 4. 3 Is The Target Vulnerable.mp4 | 
                        108.03MB | 
                    
                    
                        | 4. 3 Is The Target Vulnerable.srt | 
                        8.01KB | 
                    
                    
                        | 4. 3 Types of SQLi.mp4 | 
                        206.13MB | 
                    
                    
                        | 4. 3 Types of SQLi.srt | 
                        15.61KB | 
                    
                    
                        | 4. Broad scope automated methodology - video.mp4 | 
                        72.33MB | 
                    
                    
                        | 4. Broad scope automated methodology - video.srt | 
                        15.08KB | 
                    
                    
                        | 4. Labs Attack techniques - IDOR By Uncle Rat.html | 
                        356B | 
                    
                    
                        | 4. Main app methodology - Demonstrated.mp4 | 
                        316.74MB | 
                    
                    
                        | 4. Main app methodology - Demonstrated.srt | 
                        42.20KB | 
                    
                    
                        | 4. Quiz Analyzins JS files.html | 
                        138B | 
                    
                    
                        | 4. Quiz Broken Access Control.html | 
                        138B | 
                    
                    
                        | 4. Quiz CSRF.html | 
                        138B | 
                    
                    
                        | 4. Quiz SSRF.html | 
                        138B | 
                    
                    
                        | 4. Testing a 2FA bypass in burp.html | 
                        4.79KB | 
                    
                    
                        | 4. The origin of Business logic flaws.mp4 | 
                        474.33MB | 
                    
                    
                        | 4. The origin of Business logic flaws.srt | 
                        31.11KB | 
                    
                    
                        | 4. Video Attack techniques - Template injections - CSTI.mp4 | 
                        24.39MB | 
                    
                    
                        | 4. Video Attack techniques - Template injections - CSTI.srt | 
                        4.12KB | 
                    
                    
                        | 4. Video Authorize for automating IDORs and BAC.mp4 | 
                        53.67MB | 
                    
                    
                        | 4. Video Authorize for automating IDORs and BAC.srt | 
                        6.39KB | 
                    
                    
                        | 5.1 Broad Scope Methodology.png | 
                        322.54KB | 
                    
                    
                        | 5. 4 File Inclusion to RCE.mp4 | 
                        166.79MB | 
                    
                    
                        | 5. 4 File Inclusion to RCE.srt | 
                        12.00KB | 
                    
                    
                        | 5. 4 WAF Bypasses.mp4 | 
                        37.34MB | 
                    
                    
                        | 5. 4 WAF Bypasses.srt | 
                        2.74KB | 
                    
                    
                        | 5. 4 WAFs and Filters.mp4 | 
                        16.41MB | 
                    
                    
                        | 5. 4 WAFs and Filters.srt | 
                        2.97KB | 
                    
                    
                        | 5. Attack techniques - Template injections - CSTI.html | 
                        1.89KB | 
                    
                    
                        | 5. Birdseye view of broad scope methodology.html | 
                        182B | 
                    
                    
                        | 5. Lab Broken Access Control.html | 
                        342B | 
                    
                    
                        | 5. Lab CSRF on impactful functionality.html | 
                        691B | 
                    
                    
                        | 5. Quiz Business logic flaws.html | 
                        138B | 
                    
                    
                        | 5. Quiz Main app methodology.html | 
                        138B | 
                    
                    
                        | 5. Solutions Attack techniques - IDOR By Uncle Rat.html | 
                        66B | 
                    
                    
                        | 5. Video Advanced XSS Testing.mp4 | 
                        166.12MB | 
                    
                    
                        | 5. Video Advanced XSS Testing.srt | 
                        23.49KB | 
                    
                    
                        | 6. 5 SQLMap.mp4 | 
                        64.28MB | 
                    
                    
                        | 6. 5 SQLMap.srt | 
                        5.02KB | 
                    
                    
                        | 6. 5 Tools and Mitigations.mp4 | 
                        41.23MB | 
                    
                    
                        | 6. 5 Tools and Mitigations.srt | 
                        6.68KB | 
                    
                    
                        | 6. 5 Wrapper Magic.mp4 | 
                        44.69MB | 
                    
                    
                        | 6. 5 Wrapper Magic.srt | 
                        3.28KB | 
                    
                    
                        | 6. Extra video Quickly identify a target from a list of subdomains.mp4 | 
                        42.58MB | 
                    
                    
                        | 6. Extra video Quickly identify a target from a list of subdomains.srt | 
                        4.46KB | 
                    
                    
                        | 6. Labs Attack techniques - Business logic flaws.html | 
                        445B | 
                    
                    
                        | 6. Quiz Template Injections.html | 
                        138B | 
                    
                    
                        | 6. Solutions Broken Access Control.html | 
                        125B | 
                    
                    
                        | 6. Solutions CSRF on impactful functionality.html | 
                        1.01KB | 
                    
                    
                        | 6. Video How to test for reflected XSS.mp4 | 
                        142.52MB | 
                    
                    
                        | 6. Video How to test for reflected XSS.srt | 
                        19.80KB | 
                    
                    
                        | 6 Simple Memory Techniques - All hacker use this.html | 
                        98B | 
                    
                    
                        | 7. 6 References & Exercises.mp4 | 
                        74.27MB | 
                    
                    
                        | 7. 6 References & Exercises.srt | 
                        5.67KB | 
                    
                    
                        | 7. 6 Tools Wordlists Exercises.mp4 | 
                        92.24MB | 
                    
                    
                        | 7. 6 Tools Wordlists Exercises.srt | 
                        6.42KB | 
                    
                    
                        | 7. How to test for stored XSS.mp4 | 
                        125.44MB | 
                    
                    
                        | 7. How to test for stored XSS.srt | 
                        18.18KB | 
                    
                    
                        | 7. Quiz Broad scope automated methodology.html | 
                        138B | 
                    
                    
                        | 7. Solutions Attack techniques - Business logic flaws.html | 
                        285B | 
                    
                    
                        | 8. Excercises 1 Portswigger Simple Login Bypass.mp4 | 
                        62.34MB | 
                    
                    
                        | 8. Excercises 1 Portswigger Simple Login Bypass.srt | 
                        4.32KB | 
                    
                    
                        | 8. Excercises Dogcat.mp4 | 
                        160.73MB | 
                    
                    
                        | 8. Excercises Dogcat.srt | 
                        11.69KB | 
                    
                    
                        | 8. Getting the webshop to pay you.html | 
                        142B | 
                    
                    
                        | 8. What is DOM XSS.html | 
                        7.21KB | 
                    
                    
                        | 9. Are you a @cheesShop user.html | 
                        142B | 
                    
                    
                        | 9. Excercises 2 Union Based SQLi To RCE!.mp4 | 
                        188.85MB | 
                    
                    
                        | 9. Excercises 2 Union Based SQLi To RCE!.srt | 
                        13.06KB | 
                    
                    
                        | 9. Excercises Sniper.mp4 | 
                        104.65MB | 
                    
                    
                        | 9. Excercises Sniper.srt | 
                        7.01KB | 
                    
                    
                        | 9. Labs Reflected XSS.html | 
                        714B | 
                    
                    
                        | Echo Dot (3rd Gen) - Smart speaker with Alexa - Charcoal.html | 
                        84B | 
                    
                    
                        | fiverr.html | 
                        84B | 
                    
                    
                        | Learn How to Use Linux, Linux Mint Cinnamon 20 Bootable 8GB USB Flash Drive.html | 
                        84B | 
                    
                    
                        | Linux Tails Operating System.html | 
                        84B | 
                    
                    
                        | Seagate Expansion Desktop 10TB External Hard Drive HDD - USB 3.0.html | 
                        84B | 
                    
                    
                        | USB Rubber Ducky Deluxe.html | 
                        84B | 
                    
                    
                        | You Can Boost Brain Power.html | 
                        114B |