TorBT - Torrents and Magnet Links Search Engine

Udemy - Ethical Hacking with JavaScript (10.2022)

File Name
Size
1 - Introduction/1 - Introduction and Course Contents.mp4
32 MB
1 - Introduction/1 - Introduction and Course Contents.vtt
6.8 kB
1 - Introduction/2 - How Does This Help My Career.mp4
10 MB
1 - Introduction/2 - How Does This Help My Career.vtt
1.9 kB
1 - Introduction/3 - Ethics.mp4
4.6 MB
1 - Introduction/3 - Ethics.vtt
2.4 kB
10 - Defensive Measures/34 - OWASP Top Ten.mp4
24 MB
10 - Defensive Measures/34 - OWASP Top Ten.vtt
7.2 kB
10 - Defensive Measures/35 - Encryption and Cookie Protection.mp4
13 MB
10 - Defensive Measures/35 - Encryption and Cookie Protection.vtt
2.4 kB
10 - Defensive Measures/36 - Secure Design and Access Control.mp4
34 MB
10 - Defensive Measures/36 - Secure Design and Access Control.vtt
6.0 kB
10 - Defensive Measures/37 - Untrusted Input.mp4
43 MB
10 - Defensive Measures/37 - Untrusted Input.vtt
7.4 kB
11 - Additional Content/38 - Alternative HTTP Listener Nodejs.mp4
15 MB
11 - Additional Content/38 - Alternative HTTP Listener Nodejs.vtt
6.0 kB
12 - Conclusion/39 - Summary.mp4
21 MB
12 - Conclusion/39 - Summary.vtt
4.6 kB
2 - JavaScript Refresher/4 - Basic Operations.mp4
56 MB
2 - JavaScript Refresher/4 - Basic Operations.vtt
9.9 kB
2 - JavaScript Refresher/5 - Events.mp4
20 MB
2 - JavaScript Refresher/5 - Events.vtt
3.9 kB
2 - JavaScript Refresher/6 - Document Object Model.mp4
38 MB
2 - JavaScript Refresher/6 - Document Object Model.vtt
6.9 kB
3 - Cross Site Scripting XSS Refresher/7 - Reflected XSS.mp4
29 MB
3 - Cross Site Scripting XSS Refresher/7 - Reflected XSS.vtt
5.6 kB
3 - Cross Site Scripting XSS Refresher/8 - Persisted XSS.mp4
19 MB
3 - Cross Site Scripting XSS Refresher/8 - Persisted XSS.vtt
2.8 kB
3 - Cross Site Scripting XSS Refresher/9 - DOMbased XSS.mp4
16 MB
3 - Cross Site Scripting XSS Refresher/9 - DOMbased XSS.vtt
2.7 kB
4 - Building a Lab/10 - DVWA for Target Practice.mp4
26 MB
4 - Building a Lab/10 - DVWA for Target Practice.vtt
6.8 kB
4 - Building a Lab/11 - Encoding Data with Burp Suite.mp4
35 MB
4 - Building a Lab/11 - Encoding Data with Burp Suite.vtt
4.3 kB
4 - Building a Lab/12 - Python Web Server.mp4
19 MB
4 - Building a Lab/12 - Python Web Server.vtt
3.7 kB
4 - Building a Lab/13 - Netcat Listener.mp4
28 MB
4 - Building a Lab/13 - Netcat Listener.vtt
5.0 kB
5 - Penetration Testing Approach/14 - Approach and Tools.mp4
27 MB
5 - Penetration Testing Approach/14 - Approach and Tools.vtt
9.3 kB
6 - Altering Content/15 - Altering HTML Content for Web Site Defacement.mp4
48 MB
6 - Altering Content/15 - Altering HTML Content for Web Site Defacement.vtt
9.6 kB
6 - Altering Content/16 - Setting Up a Social Engineering Attack.mp4
65 MB
6 - Altering Content/16 - Setting Up a Social Engineering Attack.vtt
12 kB
6 - Altering Content/17 - Tampering with Links.mp4
31 MB
6 - Altering Content/17 - Tampering with Links.vtt
7.1 kB
7 - Stealing Credentials and Cookies/18 - Disclosing Cookie Content.mp4
23 MB
7 - Stealing Credentials and Cookies/18 - Disclosing Cookie Content.vtt
6.4 kB
7 - Stealing Credentials and Cookies/19 - Stealing Cookies.mp4
34 MB
7 - Stealing Credentials and Cookies/19 - Stealing Cookies.vtt
6.8 kB
7 - Stealing Credentials and Cookies/20 - Stealing Credentials.mp4
40 MB
7 - Stealing Credentials and Cookies/20 - Stealing Credentials.vtt
7.9 kB
7 - Stealing Credentials and Cookies/21 - Obtaining Additional Form Data.mp4
64 MB
7 - Stealing Credentials and Cookies/21 - Obtaining Additional Form Data.vtt
12 kB
7 - Stealing Credentials and Cookies/22 - Hijacking KnowledgeBased Authentication.mp4
64 MB
7 - Stealing Credentials and Cookies/22 - Hijacking KnowledgeBased Authentication.vtt
13 kB
8 - Tampering with User Interactions/23 - Spear Phishing to Detect the Users Operating System.mp4
35 MB
8 - Tampering with User Interactions/23 - Spear Phishing to Detect the Users Operating System.vtt
7.3 kB
8 - Tampering with User Interactions/24 - Browser Detection.mp4
42 MB
8 - Tampering with User Interactions/24 - Browser Detection.vtt
9.3 kB
8 - Tampering with User Interactions/25 - Capturing Mouse Activity.mp4
35 MB
8 - Tampering with User Interactions/25 - Capturing Mouse Activity.vtt
7.2 kB
8 - Tampering with User Interactions/26 - Key Logging.mp4
46 MB
8 - Tampering with User Interactions/26 - Key Logging.vtt
10 kB
8 - Tampering with User Interactions/27 - Making Fraudulent Posts.mp4
83 MB
8 - Tampering with User Interactions/27 - Making Fraudulent Posts.vtt
16 kB
8 - Tampering with User Interactions/28 - From Reflected XSS to Persisted XSS.mp4
73 MB
8 - Tampering with User Interactions/28 - From Reflected XSS to Persisted XSS.vtt
14 kB
8 - Tampering with User Interactions/29 - Changing Passwords with a CSRF Weakness.mp4
67 MB
8 - Tampering with User Interactions/29 - Changing Passwords with a CSRF Weakness.vtt
12 kB
9 - Working with Files Data and the Operating System/30 - Including Remote JavaScript Files.mp4
50 MB
9 - Working with Files Data and the Operating System/30 - Including Remote JavaScript Files.vtt
10 kB
9 - Working with Files Data and the Operating System/31 - Obtaining the Passwd File.mp4
76 MB
9 - Working with Files Data and the Operating System/31 - Obtaining the Passwd File.vtt
15 kB
9 - Working with Files Data and the Operating System/32 - Accessing the File and Operating Systems.mp4
84 MB
9 - Working with Files Data and the Operating System/32 - Accessing the File and Operating Systems.vtt
18 kB
9 - Working with Files Data and the Operating System/33 - Uploading a Web Shell.mp4
73 MB
9 - Working with Files Data and the Operating System/33 - Uploading a Web Shell.vtt
12 kB