Обратите внимание, что наш сайт не размещает какие-либо файлы из списка. Вы не можете скачать
эти файлы или скачать torrent-файл.
|
1. 0 Intro.mp4 |
44.66Мб |
1. 0 Intro.mp4 |
19.00Мб |
1. 0 Intro.srt |
3.14Кб |
1. 0 Intro.srt |
3.49Кб |
1. 0 Introduction.mp4 |
44.07Мб |
1. 0 Introduction.srt |
3.07Кб |
1.1 4_XML_eXternal_Entities.pdf |
183.67Кб |
1.1 BAC - Slides.pdf |
334.85Кб |
1.1 Broad scope methodology - Slides.pdf |
520.36Кб |
1.1 Bug_Report_Template_markdown.txt |
1.31Кб |
1.1 BurpSuite with SQLi links.txt |
161б |
1.1 Business logic flaws - Slides.pdf |
267.36Кб |
1.1 discord invite link.txt |
27б |
1.1 File Inclusion.pdf |
1.33Мб |
1.1 IDOR - Slides.pdf |
436.09Кб |
1.1 Main app methodology.pdf |
1.22Мб |
1.1 Slides.pdf |
984.25Кб |
1.1 SSRF-Slides.pdf |
385.42Кб |
1.1 SSTI.pdf |
46.86Кб |
1.1 Tempus Fugit 5 - Walkthrough.pdf |
7.44Мб |
1.1 The intricaties of bug bounties.pdf |
436.46Кб |
1.1 Ultimate XSS Guide - Slides.pdf |
1.02Мб |
1.1 WAF_evasion_techniques.pdf |
321.03Кб |
1.1 XXE - Slides.pdf |
419.58Кб |
1.2 Ratnightmare2.pdf |
10.56Мб |
1.2 The intricaties of bug bounties.pdf |
436.46Кб |
1.2 What you need to know about bug bounties.pdf |
310.33Кб |
1.3 master labs download links.txt |
223б |
1. Attack techniques - Broken Access Control - video.mp4 |
98.80Мб |
1. Attack techniques - Broken Access Control - video.srt |
13.48Кб |
1. Attack techniques CSRF - Video.mp4 |
214.51Мб |
1. Attack techniques CSRF - Video.srt |
12.73Кб |
1. Attack techniques - IDOR By Uncle Rat - Video.mp4 |
154.54Мб |
1. Attack techniques - IDOR By Uncle Rat - Video.srt |
21.11Кб |
1. Broad scope manual methodology - Video.mp4 |
107.15Мб |
1. Broad scope manual methodology - Video.srt |
16.04Кб |
1. How to enter the master labs.html |
448б |
1. Introduction.mp4 |
13.03Мб |
1. Introduction.srt |
1.16Кб |
1. Main app methodology - Video.mp4 |
359.62Мб |
1. Main app methodology - Video.srt |
37.84Кб |
1. Next steps.html |
327б |
1. Testing for SQLi with burp suite.html |
4.56Кб |
1. The Intricacies of bug bounties.mp4 |
361.77Мб |
1. The Intricacies of bug bounties.srt |
40.35Кб |
1. Video Attack techniques - Business logic flaws.mp4 |
70.90Мб |
1. Video Attack techniques - Business logic flaws.srt |
7.37Кб |
1. Video Attack techniques - OS Command injection.mp4 |
48.79Мб |
1. Video Attack techniques - OS Command injection.srt |
8.10Кб |
1. Video Attack techniques - SSRF.mp4 |
189.80Мб |
1. Video Attack techniques - SSRF.srt |
11.34Кб |
1. Video Attack techniques - Template injections - SSTI.mp4 |
107.34Мб |
1. Video Attack techniques - Template injections - SSTI.srt |
14.72Кб |
1. Video Attack techniques - WAF evasion techniques.mp4 |
108.62Мб |
1. Video Attack techniques - WAF evasion techniques.srt |
29.81Кб |
1. Video Attack techniques - XXE.mp4 |
88.55Мб |
1. Video Attack techniques - XXE.srt |
12.60Кб |
1. Video Full guide on How Burp Suite works.mp4 |
683.98Мб |
1. Video Full guide on How Burp Suite works.srt |
86.51Кб |
1. Video Reporting.mp4 |
34.20Мб |
1. Video Reporting.srt |
4.45Кб |
1. Video Ultimate beginner XSS guide.mp4 |
276.11Мб |
1. Video Ultimate beginner XSS guide.srt |
39.02Кб |
10. Excercises 3 MSSQL injection to RCE.mp4 |
151.01Мб |
10. Excercises 3 MSSQL injection to RCE.srt |
11.22Кб |
10. Excercises SKFLFI2.mp4 |
92.63Мб |
10. Excercises SKFLFI2.srt |
5.81Кб |
10. Solutions Reflected XSS.html |
764б |
11. Excercises 4 Boolean Based SQLi.mp4 |
115.24Мб |
11. Excercises 4 Boolean Based SQLi.srt |
9.41Кб |
11. Excercises Book.mp4 |
124.02Мб |
11. Excercises Book.srt |
8.45Кб |
11. Lab Stored XSS.html |
600б |
12. Excercises 5 SQLi WAF Bypass.mp4 |
133.00Мб |
12. Excercises 5 SQLi WAF Bypass.srt |
20.64Кб |
12. Solutions Stored XSS.html |
686б |
13. Cheat sheet XSS.html |
635б |
13. Excercises 6 SQLi, XSS and XXE all in one payload.mp4 |
192.08Мб |
13. Excercises 6 SQLi, XSS and XXE all in one payload.srt |
24.16Кб |
14. Labs User submitted reflected XSS.html |
652б |
2.10 08_Burp_Suite_Comparer.pdf |
237.61Кб |
2.1 03_Burp_Match_and_replace.pdf |
691.44Кб |
2.1 Analysing javascript files.pdf |
374.59Кб |
2.1 broad scope methodology 06-04-2021.txt |
1.18Кб |
2.1 BurpSuite with IDOR links.txt |
106б |
2. 1 What are File Inclusions.mp4 |
74.93Мб |
2. 1 What are File Inclusions.srt |
5.38Кб |
2. 1 What are SQLi.mp4 |
89.35Мб |
2. 1 What are SQLi.srt |
6.20Кб |
2. 1 What is XXE.mp4 |
34.88Мб |
2. 1 What is XXE.srt |
6.69Кб |
2.1 What you need to know about bug bounties.pdf |
310.33Кб |
2.2 05_Burp_Suite_repeater.pdf |
201.35Кб |
2.2 96_Burp_Authorize.pdf |
1.27Мб |
2.2 Main app methodology 06-04-2021.txt |
1.83Кб |
2.3 00_Burp_Suite_Do_i_need_the_profesional_edition.pdf |
57.31Кб |
2.4 09_Burp_Suite_Extender.pdf |
51.43Кб |
2.5 04_Burp_suite_Intruder.pdf |
521.48Кб |
2.6 02_Burp_suite_Target.pdf |
252.66Кб |
2.7 07_Burp_Suite_Decoder.pdf |
113.25Кб |
2.8 06_Burp_Suite_Sequencer.pdf |
214.72Кб |
2.9 01_Burp_Suite_Dashboard.pdf |
384.89Кб |
2. Attack techniques - Broken Access Control.html |
4.39Кб |
2. Attack techniques - Business logic flaws.html |
3.91Кб |
2. Attack techniques CSRF demonstration - video.mp4 |
102.23Мб |
2. Attack techniques CSRF demonstration - video.srt |
14.49Кб |
2. Attack techniques - IDOR By Uncle Rat.html |
4.20Кб |
2. Attack techniques - OS Command injection.html |
3.13Кб |
2. Attack techniques - Template injections - SSTI.html |
4.94Кб |
2. Attack techniques - XXE.html |
5.56Кб |
2. Broad scope manual methodology.html |
6.82Кб |
2. Main app methodology.html |
17.67Кб |
2. Quiz The Intricacies of bug bounties.html |
138б |
2. SSRF.html |
5.59Кб |
2. Testing for IDORs with Burp Suite.html |
3.59Кб |
2. Uncle Rat's Recommended public bug bounty targets.html |
215б |
2. Video Analyzing JS files.mp4 |
71.27Мб |
2. Video Analyzing JS files.srt |
11.45Кб |
2. Video Burp suite zero to hero.mp4 |
145.94Мб |
2. Video Burp suite zero to hero.srt |
17.77Кб |
2. What you need to know about bug bounties - Video.mp4 |
133.26Мб |
2. What you need to know about bug bounties - Video.srt |
15.14Кб |
3.1 BurpSuite with WS links.txt |
100б |
3.1 Discord Invite link.rtf |
398б |
3. 2 Detecting SQLi.mp4 |
105.71Мб |
3. 2 Detecting SQLi.srt |
7.94Кб |
3. 2 Finding a target.mp4 |
69.49Мб |
3. 2 Finding a target.srt |
5.05Кб |
3. 2 Finding XXE attack vectors.mp4 |
43.40Мб |
3. 2 Finding XXE attack vectors.srt |
7.08Кб |
3. Analyzing JS files.html |
5.04Кб |
3. Article The origin of Business logic flaws.html |
14.20Кб |
3. Attack techniques - Broken Access Control - Overview.html |
156б |
3. Attack techniques CSRF.html |
10.66Кб |
3. Discord invite link.html |
28б |
3. Extra video Blind SSRF, what is it and how to exploit it.mp4 |
48.66Мб |
3. Extra video Blind SSRF, what is it and how to exploit it.srt |
5.92Кб |
3. Main app methodology demonstration on the owasp juice shop.html |
21.89Кб |
3. Quiz IDOR.html |
138б |
3. Quiz Manual broad scope methodology.html |
138б |
3. SSTI overview.html |
156б |
3. Testing websockets in burp.html |
2.75Кб |
3. Video My Top 10 Burp Suite extensions.mp4 |
84.38Мб |
3. Video My Top 10 Burp Suite extensions.srt |
13.13Кб |
3. XXE.html |
138б |
4.1 Broad scope methodology (1).pdf |
520.36Кб |
4.1 BurpSuite with 2FA links.txt |
85б |
4.1 CSTI - Slides.pdf |
154.88Кб |
4. 3 Exploiting XXEs.mp4 |
36.85Мб |
4. 3 Exploiting XXEs.srt |
6.16Кб |
4. 3 Is The Target Vulnerable.mp4 |
108.03Мб |
4. 3 Is The Target Vulnerable.srt |
8.01Кб |
4. 3 Types of SQLi.mp4 |
206.13Мб |
4. 3 Types of SQLi.srt |
15.61Кб |
4. Broad scope automated methodology - video.mp4 |
72.33Мб |
4. Broad scope automated methodology - video.srt |
15.08Кб |
4. Labs Attack techniques - IDOR By Uncle Rat.html |
356б |
4. Main app methodology - Demonstrated.mp4 |
316.74Мб |
4. Main app methodology - Demonstrated.srt |
42.20Кб |
4. Quiz Analyzins JS files.html |
138б |
4. Quiz Broken Access Control.html |
138б |
4. Quiz CSRF.html |
138б |
4. Quiz SSRF.html |
138б |
4. Testing a 2FA bypass in burp.html |
4.79Кб |
4. The origin of Business logic flaws.mp4 |
474.33Мб |
4. The origin of Business logic flaws.srt |
31.11Кб |
4. Video Attack techniques - Template injections - CSTI.mp4 |
24.39Мб |
4. Video Attack techniques - Template injections - CSTI.srt |
4.12Кб |
4. Video Authorize for automating IDORs and BAC.mp4 |
53.67Мб |
4. Video Authorize for automating IDORs and BAC.srt |
6.39Кб |
5.1 Broad Scope Methodology.png |
322.54Кб |
5. 4 File Inclusion to RCE.mp4 |
166.79Мб |
5. 4 File Inclusion to RCE.srt |
12.00Кб |
5. 4 WAF Bypasses.mp4 |
37.34Мб |
5. 4 WAF Bypasses.srt |
2.74Кб |
5. 4 WAFs and Filters.mp4 |
16.41Мб |
5. 4 WAFs and Filters.srt |
2.97Кб |
5. Attack techniques - Template injections - CSTI.html |
1.89Кб |
5. Birdseye view of broad scope methodology.html |
182б |
5. Lab Broken Access Control.html |
342б |
5. Lab CSRF on impactful functionality.html |
691б |
5. Quiz Business logic flaws.html |
138б |
5. Quiz Main app methodology.html |
138б |
5. Solutions Attack techniques - IDOR By Uncle Rat.html |
66б |
5. Video Advanced XSS Testing.mp4 |
166.12Мб |
5. Video Advanced XSS Testing.srt |
23.49Кб |
6. 5 SQLMap.mp4 |
64.28Мб |
6. 5 SQLMap.srt |
5.02Кб |
6. 5 Tools and Mitigations.mp4 |
41.23Мб |
6. 5 Tools and Mitigations.srt |
6.68Кб |
6. 5 Wrapper Magic.mp4 |
44.69Мб |
6. 5 Wrapper Magic.srt |
3.28Кб |
6. Extra video Quickly identify a target from a list of subdomains.mp4 |
42.58Мб |
6. Extra video Quickly identify a target from a list of subdomains.srt |
4.46Кб |
6. Labs Attack techniques - Business logic flaws.html |
445б |
6. Quiz Template Injections.html |
138б |
6. Solutions Broken Access Control.html |
125б |
6. Solutions CSRF on impactful functionality.html |
1.01Кб |
6. Video How to test for reflected XSS.mp4 |
142.52Мб |
6. Video How to test for reflected XSS.srt |
19.80Кб |
6 Simple Memory Techniques - All hacker use this.html |
98б |
7. 6 References & Exercises.mp4 |
74.27Мб |
7. 6 References & Exercises.srt |
5.67Кб |
7. 6 Tools Wordlists Exercises.mp4 |
92.24Мб |
7. 6 Tools Wordlists Exercises.srt |
6.42Кб |
7. How to test for stored XSS.mp4 |
125.44Мб |
7. How to test for stored XSS.srt |
18.18Кб |
7. Quiz Broad scope automated methodology.html |
138б |
7. Solutions Attack techniques - Business logic flaws.html |
285б |
8. Excercises 1 Portswigger Simple Login Bypass.mp4 |
62.34Мб |
8. Excercises 1 Portswigger Simple Login Bypass.srt |
4.32Кб |
8. Excercises Dogcat.mp4 |
160.73Мб |
8. Excercises Dogcat.srt |
11.69Кб |
8. Getting the webshop to pay you.html |
142б |
8. What is DOM XSS.html |
7.21Кб |
9. Are you a @cheesShop user.html |
142б |
9. Excercises 2 Union Based SQLi To RCE!.mp4 |
188.85Мб |
9. Excercises 2 Union Based SQLi To RCE!.srt |
13.06Кб |
9. Excercises Sniper.mp4 |
104.65Мб |
9. Excercises Sniper.srt |
7.01Кб |
9. Labs Reflected XSS.html |
714б |
Echo Dot (3rd Gen) - Smart speaker with Alexa - Charcoal.html |
84б |
fiverr.html |
84б |
Learn How to Use Linux, Linux Mint Cinnamon 20 Bootable 8GB USB Flash Drive.html |
84б |
Linux Tails Operating System.html |
84б |
Seagate Expansion Desktop 10TB External Hard Drive HDD - USB 3.0.html |
84б |
USB Rubber Ducky Deluxe.html |
84б |
You Can Boost Brain Power.html |
114б |