Please note that this page does not hosts or makes available any of the listed filenames. You
cannot download any of those files from here.
|
1. 0 Intro.mp4 |
44.66MB |
1. 0 Intro.mp4 |
19.00MB |
1. 0 Intro.srt |
3.14KB |
1. 0 Intro.srt |
3.49KB |
1. 0 Introduction.mp4 |
44.07MB |
1. 0 Introduction.srt |
3.07KB |
1.1 4_XML_eXternal_Entities.pdf |
183.67KB |
1.1 BAC - Slides.pdf |
334.85KB |
1.1 Broad scope methodology - Slides.pdf |
520.36KB |
1.1 Bug_Report_Template_markdown.txt |
1.31KB |
1.1 BurpSuite with SQLi links.txt |
161B |
1.1 Business logic flaws - Slides.pdf |
267.36KB |
1.1 discord invite link.txt |
27B |
1.1 File Inclusion.pdf |
1.33MB |
1.1 IDOR - Slides.pdf |
436.09KB |
1.1 Main app methodology.pdf |
1.22MB |
1.1 Slides.pdf |
984.25KB |
1.1 SSRF-Slides.pdf |
385.42KB |
1.1 SSTI.pdf |
46.86KB |
1.1 Tempus Fugit 5 - Walkthrough.pdf |
7.44MB |
1.1 The intricaties of bug bounties.pdf |
436.46KB |
1.1 Ultimate XSS Guide - Slides.pdf |
1.02MB |
1.1 WAF_evasion_techniques.pdf |
321.03KB |
1.1 XXE - Slides.pdf |
419.58KB |
1.2 Ratnightmare2.pdf |
10.56MB |
1.2 The intricaties of bug bounties.pdf |
436.46KB |
1.2 What you need to know about bug bounties.pdf |
310.33KB |
1.3 master labs download links.txt |
223B |
1. Attack techniques - Broken Access Control - video.mp4 |
98.80MB |
1. Attack techniques - Broken Access Control - video.srt |
13.48KB |
1. Attack techniques CSRF - Video.mp4 |
214.51MB |
1. Attack techniques CSRF - Video.srt |
12.73KB |
1. Attack techniques - IDOR By Uncle Rat - Video.mp4 |
154.54MB |
1. Attack techniques - IDOR By Uncle Rat - Video.srt |
21.11KB |
1. Broad scope manual methodology - Video.mp4 |
107.15MB |
1. Broad scope manual methodology - Video.srt |
16.04KB |
1. How to enter the master labs.html |
448B |
1. Introduction.mp4 |
13.03MB |
1. Introduction.srt |
1.16KB |
1. Main app methodology - Video.mp4 |
359.62MB |
1. Main app methodology - Video.srt |
37.84KB |
1. Next steps.html |
327B |
1. Testing for SQLi with burp suite.html |
4.56KB |
1. The Intricacies of bug bounties.mp4 |
361.77MB |
1. The Intricacies of bug bounties.srt |
40.35KB |
1. Video Attack techniques - Business logic flaws.mp4 |
70.90MB |
1. Video Attack techniques - Business logic flaws.srt |
7.37KB |
1. Video Attack techniques - OS Command injection.mp4 |
48.79MB |
1. Video Attack techniques - OS Command injection.srt |
8.10KB |
1. Video Attack techniques - SSRF.mp4 |
189.80MB |
1. Video Attack techniques - SSRF.srt |
11.34KB |
1. Video Attack techniques - Template injections - SSTI.mp4 |
107.34MB |
1. Video Attack techniques - Template injections - SSTI.srt |
14.72KB |
1. Video Attack techniques - WAF evasion techniques.mp4 |
108.62MB |
1. Video Attack techniques - WAF evasion techniques.srt |
29.81KB |
1. Video Attack techniques - XXE.mp4 |
88.55MB |
1. Video Attack techniques - XXE.srt |
12.60KB |
1. Video Full guide on How Burp Suite works.mp4 |
683.98MB |
1. Video Full guide on How Burp Suite works.srt |
86.51KB |
1. Video Reporting.mp4 |
34.20MB |
1. Video Reporting.srt |
4.45KB |
1. Video Ultimate beginner XSS guide.mp4 |
276.11MB |
1. Video Ultimate beginner XSS guide.srt |
39.02KB |
10. Excercises 3 MSSQL injection to RCE.mp4 |
151.01MB |
10. Excercises 3 MSSQL injection to RCE.srt |
11.22KB |
10. Excercises SKFLFI2.mp4 |
92.63MB |
10. Excercises SKFLFI2.srt |
5.81KB |
10. Solutions Reflected XSS.html |
764B |
11. Excercises 4 Boolean Based SQLi.mp4 |
115.24MB |
11. Excercises 4 Boolean Based SQLi.srt |
9.41KB |
11. Excercises Book.mp4 |
124.02MB |
11. Excercises Book.srt |
8.45KB |
11. Lab Stored XSS.html |
600B |
12. Excercises 5 SQLi WAF Bypass.mp4 |
133.00MB |
12. Excercises 5 SQLi WAF Bypass.srt |
20.64KB |
12. Solutions Stored XSS.html |
686B |
13. Cheat sheet XSS.html |
635B |
13. Excercises 6 SQLi, XSS and XXE all in one payload.mp4 |
192.08MB |
13. Excercises 6 SQLi, XSS and XXE all in one payload.srt |
24.16KB |
14. Labs User submitted reflected XSS.html |
652B |
2.10 08_Burp_Suite_Comparer.pdf |
237.61KB |
2.1 03_Burp_Match_and_replace.pdf |
691.44KB |
2.1 Analysing javascript files.pdf |
374.59KB |
2.1 broad scope methodology 06-04-2021.txt |
1.18KB |
2.1 BurpSuite with IDOR links.txt |
106B |
2. 1 What are File Inclusions.mp4 |
74.93MB |
2. 1 What are File Inclusions.srt |
5.38KB |
2. 1 What are SQLi.mp4 |
89.35MB |
2. 1 What are SQLi.srt |
6.20KB |
2. 1 What is XXE.mp4 |
34.88MB |
2. 1 What is XXE.srt |
6.69KB |
2.1 What you need to know about bug bounties.pdf |
310.33KB |
2.2 05_Burp_Suite_repeater.pdf |
201.35KB |
2.2 96_Burp_Authorize.pdf |
1.27MB |
2.2 Main app methodology 06-04-2021.txt |
1.83KB |
2.3 00_Burp_Suite_Do_i_need_the_profesional_edition.pdf |
57.31KB |
2.4 09_Burp_Suite_Extender.pdf |
51.43KB |
2.5 04_Burp_suite_Intruder.pdf |
521.48KB |
2.6 02_Burp_suite_Target.pdf |
252.66KB |
2.7 07_Burp_Suite_Decoder.pdf |
113.25KB |
2.8 06_Burp_Suite_Sequencer.pdf |
214.72KB |
2.9 01_Burp_Suite_Dashboard.pdf |
384.89KB |
2. Attack techniques - Broken Access Control.html |
4.39KB |
2. Attack techniques - Business logic flaws.html |
3.91KB |
2. Attack techniques CSRF demonstration - video.mp4 |
102.23MB |
2. Attack techniques CSRF demonstration - video.srt |
14.49KB |
2. Attack techniques - IDOR By Uncle Rat.html |
4.20KB |
2. Attack techniques - OS Command injection.html |
3.13KB |
2. Attack techniques - Template injections - SSTI.html |
4.94KB |
2. Attack techniques - XXE.html |
5.56KB |
2. Broad scope manual methodology.html |
6.82KB |
2. Main app methodology.html |
17.67KB |
2. Quiz The Intricacies of bug bounties.html |
138B |
2. SSRF.html |
5.59KB |
2. Testing for IDORs with Burp Suite.html |
3.59KB |
2. Uncle Rat's Recommended public bug bounty targets.html |
215B |
2. Video Analyzing JS files.mp4 |
71.27MB |
2. Video Analyzing JS files.srt |
11.45KB |
2. Video Burp suite zero to hero.mp4 |
145.94MB |
2. Video Burp suite zero to hero.srt |
17.77KB |
2. What you need to know about bug bounties - Video.mp4 |
133.26MB |
2. What you need to know about bug bounties - Video.srt |
15.14KB |
3.1 BurpSuite with WS links.txt |
100B |
3.1 Discord Invite link.rtf |
398B |
3. 2 Detecting SQLi.mp4 |
105.71MB |
3. 2 Detecting SQLi.srt |
7.94KB |
3. 2 Finding a target.mp4 |
69.49MB |
3. 2 Finding a target.srt |
5.05KB |
3. 2 Finding XXE attack vectors.mp4 |
43.40MB |
3. 2 Finding XXE attack vectors.srt |
7.08KB |
3. Analyzing JS files.html |
5.04KB |
3. Article The origin of Business logic flaws.html |
14.20KB |
3. Attack techniques - Broken Access Control - Overview.html |
156B |
3. Attack techniques CSRF.html |
10.66KB |
3. Discord invite link.html |
28B |
3. Extra video Blind SSRF, what is it and how to exploit it.mp4 |
48.66MB |
3. Extra video Blind SSRF, what is it and how to exploit it.srt |
5.92KB |
3. Main app methodology demonstration on the owasp juice shop.html |
21.89KB |
3. Quiz IDOR.html |
138B |
3. Quiz Manual broad scope methodology.html |
138B |
3. SSTI overview.html |
156B |
3. Testing websockets in burp.html |
2.75KB |
3. Video My Top 10 Burp Suite extensions.mp4 |
84.38MB |
3. Video My Top 10 Burp Suite extensions.srt |
13.13KB |
3. XXE.html |
138B |
4.1 Broad scope methodology (1).pdf |
520.36KB |
4.1 BurpSuite with 2FA links.txt |
85B |
4.1 CSTI - Slides.pdf |
154.88KB |
4. 3 Exploiting XXEs.mp4 |
36.85MB |
4. 3 Exploiting XXEs.srt |
6.16KB |
4. 3 Is The Target Vulnerable.mp4 |
108.03MB |
4. 3 Is The Target Vulnerable.srt |
8.01KB |
4. 3 Types of SQLi.mp4 |
206.13MB |
4. 3 Types of SQLi.srt |
15.61KB |
4. Broad scope automated methodology - video.mp4 |
72.33MB |
4. Broad scope automated methodology - video.srt |
15.08KB |
4. Labs Attack techniques - IDOR By Uncle Rat.html |
356B |
4. Main app methodology - Demonstrated.mp4 |
316.74MB |
4. Main app methodology - Demonstrated.srt |
42.20KB |
4. Quiz Analyzins JS files.html |
138B |
4. Quiz Broken Access Control.html |
138B |
4. Quiz CSRF.html |
138B |
4. Quiz SSRF.html |
138B |
4. Testing a 2FA bypass in burp.html |
4.79KB |
4. The origin of Business logic flaws.mp4 |
474.33MB |
4. The origin of Business logic flaws.srt |
31.11KB |
4. Video Attack techniques - Template injections - CSTI.mp4 |
24.39MB |
4. Video Attack techniques - Template injections - CSTI.srt |
4.12KB |
4. Video Authorize for automating IDORs and BAC.mp4 |
53.67MB |
4. Video Authorize for automating IDORs and BAC.srt |
6.39KB |
5.1 Broad Scope Methodology.png |
322.54KB |
5. 4 File Inclusion to RCE.mp4 |
166.79MB |
5. 4 File Inclusion to RCE.srt |
12.00KB |
5. 4 WAF Bypasses.mp4 |
37.34MB |
5. 4 WAF Bypasses.srt |
2.74KB |
5. 4 WAFs and Filters.mp4 |
16.41MB |
5. 4 WAFs and Filters.srt |
2.97KB |
5. Attack techniques - Template injections - CSTI.html |
1.89KB |
5. Birdseye view of broad scope methodology.html |
182B |
5. Lab Broken Access Control.html |
342B |
5. Lab CSRF on impactful functionality.html |
691B |
5. Quiz Business logic flaws.html |
138B |
5. Quiz Main app methodology.html |
138B |
5. Solutions Attack techniques - IDOR By Uncle Rat.html |
66B |
5. Video Advanced XSS Testing.mp4 |
166.12MB |
5. Video Advanced XSS Testing.srt |
23.49KB |
6. 5 SQLMap.mp4 |
64.28MB |
6. 5 SQLMap.srt |
5.02KB |
6. 5 Tools and Mitigations.mp4 |
41.23MB |
6. 5 Tools and Mitigations.srt |
6.68KB |
6. 5 Wrapper Magic.mp4 |
44.69MB |
6. 5 Wrapper Magic.srt |
3.28KB |
6. Extra video Quickly identify a target from a list of subdomains.mp4 |
42.58MB |
6. Extra video Quickly identify a target from a list of subdomains.srt |
4.46KB |
6. Labs Attack techniques - Business logic flaws.html |
445B |
6. Quiz Template Injections.html |
138B |
6. Solutions Broken Access Control.html |
125B |
6. Solutions CSRF on impactful functionality.html |
1.01KB |
6. Video How to test for reflected XSS.mp4 |
142.52MB |
6. Video How to test for reflected XSS.srt |
19.80KB |
6 Simple Memory Techniques - All hacker use this.html |
98B |
7. 6 References & Exercises.mp4 |
74.27MB |
7. 6 References & Exercises.srt |
5.67KB |
7. 6 Tools Wordlists Exercises.mp4 |
92.24MB |
7. 6 Tools Wordlists Exercises.srt |
6.42KB |
7. How to test for stored XSS.mp4 |
125.44MB |
7. How to test for stored XSS.srt |
18.18KB |
7. Quiz Broad scope automated methodology.html |
138B |
7. Solutions Attack techniques - Business logic flaws.html |
285B |
8. Excercises 1 Portswigger Simple Login Bypass.mp4 |
62.34MB |
8. Excercises 1 Portswigger Simple Login Bypass.srt |
4.32KB |
8. Excercises Dogcat.mp4 |
160.73MB |
8. Excercises Dogcat.srt |
11.69KB |
8. Getting the webshop to pay you.html |
142B |
8. What is DOM XSS.html |
7.21KB |
9. Are you a @cheesShop user.html |
142B |
9. Excercises 2 Union Based SQLi To RCE!.mp4 |
188.85MB |
9. Excercises 2 Union Based SQLi To RCE!.srt |
13.06KB |
9. Excercises Sniper.mp4 |
104.65MB |
9. Excercises Sniper.srt |
7.01KB |
9. Labs Reflected XSS.html |
714B |
Echo Dot (3rd Gen) - Smart speaker with Alexa - Charcoal.html |
84B |
fiverr.html |
84B |
Learn How to Use Linux, Linux Mint Cinnamon 20 Bootable 8GB USB Flash Drive.html |
84B |
Linux Tails Operating System.html |
84B |
Seagate Expansion Desktop 10TB External Hard Drive HDD - USB 3.0.html |
84B |
USB Rubber Ducky Deluxe.html |
84B |
You Can Boost Brain Power.html |
114B |