TorBT - Torrents and Magnet Links Search Engine

ZeroToMastery - Web Security & Bug Bounty Learn Penetration Testing (4.2025)

File Name
Size
1. Introduction To Bug Bounty/1. Web Security & Bug Bounty.mp4
38 MB
1. Introduction To Bug Bounty/1. Web Security & Bug Bounty.srt
2.5 kB
1. Introduction To Bug Bounty/2. Course Outline.mp4
38 MB
1. Introduction To Bug Bounty/2. Course Outline.srt
10 kB
1. Introduction To Bug Bounty/3. Exercise Meet Your Classmates and Instructor.html
4.4 kB
1. Introduction To Bug Bounty/4. What is Penetration Testing.mp4
33 MB
1. Introduction To Bug Bounty/4. What is Penetration Testing.srt
8.1 kB
1. Introduction To Bug Bounty/5. What is a Bug Bounty.mp4
32 MB
1. Introduction To Bug Bounty/5. What is a Bug Bounty.srt
9.4 kB
1. Introduction To Bug Bounty/6. Course Resources + Guide.html
8.3 kB
1. Introduction To Bug Bounty/7. ZTM Plugin + Understanding Your Video Player.html
7.8 kB
1. Introduction To Bug Bounty/8. Set Your Learning Streak Goal.html
8.8 kB
10. Broken Access Control/1. Broken Access Control - Theory.mp4
31 MB
10. Broken Access Control/1. Broken Access Control - Theory.srt
8.8 kB
10. Broken Access Control/2. Accessing passwd With BAC.mp4
31 MB
10. Broken Access Control/2. Accessing passwd With BAC.srt
5.8 kB
10. Broken Access Control/3. Ticket Price IDOR.mp4
36 MB
10. Broken Access Control/3. Ticket Price IDOR.srt
8.4 kB
11. Security Misconfiguration/1. Security Misconfiguration - Default App Credentials.mp4
22 MB
11. Security Misconfiguration/1. Security Misconfiguration - Default App Credentials.srt
6.8 kB
11. Security Misconfiguration/2. Exercise Imposter Syndrome.mp4
20 MB
11. Security Misconfiguration/2. Exercise Imposter Syndrome.srt
4.8 kB
12. Cross Site Scripting - XSS/1. XSS Theory.mp4
37 MB
12. Cross Site Scripting - XSS/1. XSS Theory.srt
8.4 kB
12. Cross Site Scripting - XSS/2. Changing Page Content With XSS.mp4
54 MB
12. Cross Site Scripting - XSS/2. Changing Page Content With XSS.srt
15 kB
12. Cross Site Scripting - XSS/3. Bypassing Simple Filter.mp4
16 MB
12. Cross Site Scripting - XSS/3. Bypassing Simple Filter.srt
5.0 kB
12. Cross Site Scripting - XSS/4. Downloading a File With XSS Vulnerability.mp4
38 MB
12. Cross Site Scripting - XSS/4. Downloading a File With XSS Vulnerability.srt
12 kB
12. Cross Site Scripting - XSS/5. DOM XSS Password Generator.mp4
36 MB
12. Cross Site Scripting - XSS/5. DOM XSS Password Generator.srt
7.2 kB
12. Cross Site Scripting - XSS/6. JSON XSS.mp4
50 MB
12. Cross Site Scripting - XSS/6. JSON XSS.srt
11 kB
12. Cross Site Scripting - XSS/7. Old Vulnerable Real Applications.mp4
22 MB
12. Cross Site Scripting - XSS/7. Old Vulnerable Real Applications.srt
5.4 kB
13. SQL Injection/1. SQL Injection Theory.mp4
27 MB
13. SQL Injection/1. SQL Injection Theory.srt
4.8 kB
13. SQL Injection/2. Guide To Exploiting SQL Injection.mp4
33 MB
13. SQL Injection/2. Guide To Exploiting SQL Injection.srt
11 kB
13. SQL Injection/3. Getting Entire Database.mp4
32 MB
13. SQL Injection/3. Getting Entire Database.srt
7.5 kB
13. SQL Injection/4. Extracting Passwords From Database.mp4
89 MB
13. SQL Injection/4. Extracting Passwords From Database.srt
27 kB
13. SQL Injection/5. Bypassing Filter In SQL Query.mp4
31 MB
13. SQL Injection/5. Bypassing Filter In SQL Query.srt
8.2 kB
13. SQL Injection/6. Blind SQL Injection.mp4
50 MB
13. SQL Injection/6. Blind SQL Injection.srt
15 kB
14. XML, XPath Injection, XXE/1. XPath Injection.mp4
22 MB
14. XML, XPath Injection, XXE/1. XPath Injection.srt
8.6 kB
14. XML, XPath Injection, XXE/2. XPath Injection 2.mp4
19 MB
14. XML, XPath Injection, XXE/2. XPath Injection 2.srt
5.0 kB
14. XML, XPath Injection, XXE/3. XXE.mp4
31 MB
14. XML, XPath Injection, XXE/3. XXE.srt
9.7 kB
15. Components With Known Vulnerabilities/1. Components With Known Vulnerabilities.mp4
53 MB
15. Components With Known Vulnerabilities/1. Components With Known Vulnerabilities.srt
14 kB
16. Insufficient Logging And Monitoring/1. Insufficient Logging And Monitoring Example.mp4
23 MB
16. Insufficient Logging And Monitoring/1. Insufficient Logging And Monitoring Example.srt
5.4 kB
17. Monetizing Bug Hunting/1. What's Next & How To Earn Money By Finding Vulnerabilities.mp4
68 MB
17. Monetizing Bug Hunting/1. What's Next & How To Earn Money By Finding Vulnerabilities.srt
16 kB
17. Monetizing Bug Hunting/2. Unique and Interesting Bugs Discovered.html
72 kB
18. Bonus - Web Developer Fundamentals/1. Browsing the Web.mp4
15 MB
18. Bonus - Web Developer Fundamentals/1. Browsing the Web.srt
10 kB
18. Bonus - Web Developer Fundamentals/10. Your First Javascript.mp4
52 MB
18. Bonus - Web Developer Fundamentals/10. Your First Javascript.srt
16 kB
18. Bonus - Web Developer Fundamentals/11. Javascript On Our Webpage.mp4
27 MB
18. Bonus - Web Developer Fundamentals/11. Javascript On Our Webpage.srt
12 kB
18. Bonus - Web Developer Fundamentals/12. HTTPHTTPS.mp4
80 MB
18. Bonus - Web Developer Fundamentals/12. HTTPHTTPS.srt
27 kB
18. Bonus - Web Developer Fundamentals/13. Introduction To Databases.mp4
53 MB
18. Bonus - Web Developer Fundamentals/13. Introduction To Databases.srt
14 kB
18. Bonus - Web Developer Fundamentals/14. SQL Create Table.mp4
25 MB
18. Bonus - Web Developer Fundamentals/14. SQL Create Table.srt
7.0 kB
18. Bonus - Web Developer Fundamentals/15. SQL Insert Into + Select.mp4
21 MB
18. Bonus - Web Developer Fundamentals/15. SQL Insert Into + Select.srt
5.6 kB
18. Bonus - Web Developer Fundamentals/16. What is PHP.mp4
16 MB
18. Bonus - Web Developer Fundamentals/16. What is PHP.srt
7.0 kB
18. Bonus - Web Developer Fundamentals/2. Breaking Google.mp4
18 MB
18. Bonus - Web Developer Fundamentals/2. Breaking Google.srt
5.4 kB
18. Bonus - Web Developer Fundamentals/3. The Internet Backbone.mp4
47 MB
18. Bonus - Web Developer Fundamentals/3. The Internet Backbone.srt
7.8 kB
18. Bonus - Web Developer Fundamentals/4. Traceroute.mp4
19 MB
18. Bonus - Web Developer Fundamentals/4. Traceroute.srt
3.7 kB
18. Bonus - Web Developer Fundamentals/5. HTML, CSS, Javascript.mp4
36 MB
18. Bonus - Web Developer Fundamentals/5. HTML, CSS, Javascript.srt
7.3 kB
18. Bonus - Web Developer Fundamentals/6. Build Your First Website.mp4
44 MB
18. Bonus - Web Developer Fundamentals/6. Build Your First Website.srt
11 kB
18. Bonus - Web Developer Fundamentals/7. HTML Tags.mp4
53 MB
18. Bonus - Web Developer Fundamentals/7. HTML Tags.srt
12 kB
18. Bonus - Web Developer Fundamentals/8. Your First CSS.mp4
60 MB
18. Bonus - Web Developer Fundamentals/8. Your First CSS.srt
17 kB
18. Bonus - Web Developer Fundamentals/9. What Is Javascript.mp4
26 MB
18. Bonus - Web Developer Fundamentals/9. What Is Javascript.srt
8.2 kB
19. Bonus - Linux Terminal/1. Linux 1 - ls, cd, pwd, touch.mp4
49 MB
19. Bonus - Linux Terminal/1. Linux 1 - ls, cd, pwd, touch.srt
20 kB
19. Bonus - Linux Terminal/2. Linux 2 - sudo, nano, clear.mp4
25 MB
19. Bonus - Linux Terminal/2. Linux 2 - sudo, nano, clear.srt
9.7 kB
19. Bonus - Linux Terminal/3. Linux 3 - ifconfig, nslookup, host.mp4
29 MB
19. Bonus - Linux Terminal/3. Linux 3 - ifconfig, nslookup, host.srt
11 kB
2. Our Virtual Lab Setup/1. Virtual Box, Kali Linux Download.mp4
35 MB
2. Our Virtual Lab Setup/1. Virtual Box, Kali Linux Download.srt
17 kB
2. Our Virtual Lab Setup/2. Important- New Kali Linux Categories.mp4
6.6 MB
2. Our Virtual Lab Setup/2. Important- New Kali Linux Categories.srt
2.0 kB
2. Our Virtual Lab Setup/3. Kali Linux Installation.mp4
31 MB
2. Our Virtual Lab Setup/3. Kali Linux Installation.srt
20 kB
2. Our Virtual Lab Setup/4. OWASPBWA Installation.mp4
39 MB
2. Our Virtual Lab Setup/4. OWASPBWA Installation.srt
13 kB
2. Our Virtual Lab Setup/5. Creating TryHackMe Account.mp4
13 MB
2. Our Virtual Lab Setup/5. Creating TryHackMe Account.srt
4.4 kB
2. Our Virtual Lab Setup/6. 2 Paths.mp4
12 MB
2. Our Virtual Lab Setup/6. 2 Paths.srt
3.1 kB
2. Our Virtual Lab Setup/7. Let's Have Some Fun (+ Free Resources).html
15 kB
20. Bonus - Networking/1. Networking Cheatsheet.html
91 kB
21. Where To Go From Here/1. Thank You.mp4
6.9 MB
21. Where To Go From Here/1. Thank You.srt
1.7 kB
21. Where To Go From Here/2. Review This Course!.html
92 kB
21. Where To Go From Here/3. Become An Alumni.html
93 kB
21. Where To Go From Here/4. Learning Guideline.html
94 kB
21. Where To Go From Here/5. ZTM Events Every Month.html
95 kB
21. Where To Go From Here/6. LinkedIn Endorsements.html
97 kB
3. Website Enumeration & Information Gathering/1. Website Enumeration - Theory.mp4
30 MB
3. Website Enumeration & Information Gathering/1. Website Enumeration - Theory.srt
7.4 kB
3. Website Enumeration & Information Gathering/2. Google Dorks.mp4
47 MB
3. Website Enumeration & Information Gathering/2. Google Dorks.srt
17 kB
3. Website Enumeration & Information Gathering/3. Ping, Host, Nslookup.mp4
36 MB
3. Website Enumeration & Information Gathering/3. Ping, Host, Nslookup.srt
11 kB
3. Website Enumeration & Information Gathering/4. Whatweb.mp4
66 MB
3. Website Enumeration & Information Gathering/4. Whatweb.srt
13 kB
3. Website Enumeration & Information Gathering/5. Dirb.mp4
45 MB
3. Website Enumeration & Information Gathering/5. Dirb.srt
9.2 kB
3. Website Enumeration & Information Gathering/6. Nmap.mp4
80 MB
3. Website Enumeration & Information Gathering/6. Nmap.srt
17 kB
3. Website Enumeration & Information Gathering/7. Nikto.mp4
46 MB
3. Website Enumeration & Information Gathering/7. Nikto.srt
9.5 kB
3. Website Enumeration & Information Gathering/8. Unlimited Updates.html
23 kB
4. Introduction To Burpsuite/1. Burpsuite Configuration.mp4
35 MB
4. Introduction To Burpsuite/1. Burpsuite Configuration.srt
11 kB
4. Introduction To Burpsuite/2. Burpsuite Intercept.mp4
30 MB
4. Introduction To Burpsuite/2. Burpsuite Intercept.srt
9.6 kB
4. Introduction To Burpsuite/3. Burpsuite Repeater.mp4
44 MB
4. Introduction To Burpsuite/3. Burpsuite Repeater.srt
11 kB
4. Introduction To Burpsuite/4. Burpsuite Intruder.mp4
41 MB
4. Introduction To Burpsuite/4. Burpsuite Intruder.srt
14 kB
4. Introduction To Burpsuite/5. Course Check-In.html
27 kB
5. HTML Injection/1. HTML Injection - Theory.mp4
21 MB
5. HTML Injection/1. HTML Injection - Theory.srt
4.5 kB
5. HTML Injection/2. HTML Injection 1 on TryHackMe.mp4
44 MB
5. HTML Injection/2. HTML Injection 1 on TryHackMe.srt
12 kB
5. HTML Injection/3. HTML Injection 2 - Injecting User-Agent Header.mp4
21 MB
5. HTML Injection/3. HTML Injection 2 - Injecting User-Agent Header.srt
5.3 kB
5. HTML Injection/4. Injecting Cookie Field and Redirecting The Page.mp4
23 MB
5. HTML Injection/4. Injecting Cookie Field and Redirecting The Page.srt
8.1 kB
5. HTML Injection/5. Advance Example of HTML Injection.mp4
70 MB
5. HTML Injection/5. Advance Example of HTML Injection.srt
18 kB
5. HTML Injection/6. Implement a New Life System.html
33 kB
6. Command InjectionExecution/1. Command Injection Theory.mp4
24 MB
6. Command InjectionExecution/1. Command Injection Theory.srt
5.8 kB
6. Command InjectionExecution/2. Command Injection On TryHackMe and Blind Command Injection.mp4
46 MB
6. Command InjectionExecution/2. Command Injection On TryHackMe and Blind Command Injection.srt
15 kB
6. Command InjectionExecution/3. Solving Challenges With Command Injection.mp4
48 MB
6. Command InjectionExecution/3. Solving Challenges With Command Injection.srt
13 kB
6. Command InjectionExecution/4. Running PHP Reverse Shell With Command Execution Vulnerability.mp4
35 MB
6. Command InjectionExecution/4. Running PHP Reverse Shell With Command Execution Vulnerability.srt
10 kB
6. Command InjectionExecution/5. Bypassing Input Filter And Executing Command.mp4
35 MB
6. Command InjectionExecution/5. Bypassing Input Filter And Executing Command.srt
10 kB
7. Broken Authentication/1. Broken Authentication Theory.mp4
26 MB
7. Broken Authentication/1. Broken Authentication Theory.srt
6.1 kB
7. Broken Authentication/2. Broken Authentication On TryHackMe.mp4
37 MB
7. Broken Authentication/2. Broken Authentication On TryHackMe.srt
8.7 kB
7. Broken Authentication/3. Broken Authentication Via Cookie.mp4
26 MB
7. Broken Authentication/3. Broken Authentication Via Cookie.srt
6.2 kB
7. Broken Authentication/4. Basic Authorization in HTTP Request.mp4
34 MB
7. Broken Authentication/4. Basic Authorization in HTTP Request.srt
10 kB
7. Broken Authentication/5. Forgot Password Challenge.mp4
47 MB
7. Broken Authentication/5. Forgot Password Challenge.srt
12 kB
7. Broken Authentication/6. Session Fixation Challenge.mp4
30 MB
7. Broken Authentication/6. Session Fixation Challenge.srt
7.6 kB
8. Bruteforce Attacks/1. Cluster Bomb Bruteforce.mp4
28 MB
8. Bruteforce Attacks/1. Cluster Bomb Bruteforce.srt
9.8 kB
8. Bruteforce Attacks/2. Hydra Bwapp Form Bruteforce.mp4
45 MB
8. Bruteforce Attacks/2. Hydra Bwapp Form Bruteforce.srt
17 kB
8. Bruteforce Attacks/3. Hydra Post Request Form Bruteforce.mp4
22 MB
8. Bruteforce Attacks/3. Hydra Post Request Form Bruteforce.srt
7.4 kB
8. Bruteforce Attacks/4. Bonus - Hydra SSH Attack.mp4
20 MB
8. Bruteforce Attacks/4. Bonus - Hydra SSH Attack.srt
5.7 kB
9. Sensitive Data Exposure/1. Sensitive Data Exposure Example.mp4
64 MB
9. Sensitive Data Exposure/1. Sensitive Data Exposure Example.srt
15 kB