TorBT - Torrents and Magnet Links Search Engine
Udemy - The Complete Web Penetration Testing & Bug Bounty Course (4.2025)
- Date: 2026-03-24
- Size: 8.9 GB
- Files: 294
File Name
Size
01. Introduction/2. Course Manual.mp4
14 MB
01. Introduction/1. Introduction.mp4
9.8 MB
01. Introduction/2. Course Manual.vtt
7.4 kB
01. Introduction/1. Introduction.vtt
1.4 kB
02. Kali Linux Setup/12. Taking Snapshots.mp4
131 MB
02. Kali Linux Setup/5. Kali Linux Download.mp4
121 MB
02. Kali Linux Setup/7. Kali Linux Installation.mp4
120 MB
02. Kali Linux Setup/10. Installation Problem Solving (MAC).mp4
117 MB
02. Kali Linux Setup/16. Privilege and Permissions.mp4
103 MB
02. Kali Linux Setup/8. Installation Problem Solving (Windows).mp4
91 MB
02. Kali Linux Setup/3. Virtualbox Installation (Windows).mp4
90 MB
02. Kali Linux Setup/13. Kali Linux Overview.mp4
89 MB
02. Kali Linux Setup/9. Kali Linux Manual ISO Installation.mp4
64 MB
02. Kali Linux Setup/18. Linux Package Managers.mp4
61 MB
02. Kali Linux Setup/4. Virtualbox Installation (MAC).mp4
59 MB
02. Kali Linux Setup/14. Navigation.mp4
50 MB
02. Kali Linux Setup/15. Moving Stuff.mp4
42 MB
02. Kali Linux Setup/17. Linux Folders.mp4
39 MB
02. Kali Linux Setup/20. Changing Password.mp4
34 MB
02. Kali Linux Setup/19. Nano.mp4
22 MB
02. Kali Linux Setup/2. What is Virtual Machine.mp4
22 MB
02. Kali Linux Setup/1. Kali Linux Setup Intro.mp4
13 MB
02. Kali Linux Setup/7. Kali Linux Installation.vtt
23 kB
02. Kali Linux Setup/10. Installation Problem Solving (MAC).vtt
22 kB
02. Kali Linux Setup/3. Virtualbox Installation (Windows).vtt
18 kB
02. Kali Linux Setup/16. Privilege and Permissions.vtt
17 kB
02. Kali Linux Setup/5. Kali Linux Download.vtt
17 kB
02. Kali Linux Setup/13. Kali Linux Overview.vtt
16 kB
02. Kali Linux Setup/9. Kali Linux Manual ISO Installation.vtt
16 kB
02. Kali Linux Setup/14. Navigation.vtt
13 kB
02. Kali Linux Setup/4. Virtualbox Installation (MAC).vtt
12 kB
02. Kali Linux Setup/8. Installation Problem Solving (Windows).vtt
12 kB
02. Kali Linux Setup/12. Taking Snapshots.vtt
11 kB
02. Kali Linux Setup/15. Moving Stuff.vtt
10 kB
02. Kali Linux Setup/18. Linux Package Managers.vtt
9.4 kB
02. Kali Linux Setup/17. Linux Folders.vtt
9.1 kB
02. Kali Linux Setup/20. Changing Password.vtt
7.7 kB
02. Kali Linux Setup/19. Nano.vtt
6.1 kB
02. Kali Linux Setup/2. What is Virtual Machine.vtt
3.0 kB
02. Kali Linux Setup/11. Solutions to Common Problems & Links.html
2.7 kB
02. Kali Linux Setup/6. Kali Linux Download Links.html
1.3 kB
02. Kali Linux Setup/1. Kali Linux Setup Intro.vtt
952 B
03. HTML Crash Course/3. Introduction to HTML.mp4
78 MB
03. HTML Crash Course/6. Forms.mp4
68 MB
03. HTML Crash Course/7. Footer & Header.mp4
50 MB
03. HTML Crash Course/4. Tags.mp4
45 MB
03. HTML Crash Course/2. What is a Website.mp4
42 MB
03. HTML Crash Course/5. Elements and Attributes.mp4
40 MB
03. HTML Crash Course/1. HTML Crash Course Intro.mp4
12 MB
03. HTML Crash Course/6. Forms.vtt
15 kB
03. HTML Crash Course/3. Introduction to HTML.vtt
14 kB
03. HTML Crash Course/4. Tags.vtt
10 kB
03. HTML Crash Course/5. Elements and Attributes.vtt
9.8 kB
03. HTML Crash Course/7. Footer & Header.vtt
9.8 kB
03. HTML Crash Course/2. What is a Website.vtt
7.3 kB
03. HTML Crash Course/1. HTML Crash Course Intro.vtt
774 B
04. HTML Injection/3. Burpsuite Setup.mp4
171 MB
04. HTML Injection/7. Dirbuster Usage.mp4
135 MB
04. HTML Injection/2. Installing Beebox.mp4
126 MB
04. HTML Injection/5. Stored HTML Injection.mp4
121 MB
04. HTML Injection/4. HTML Injection.mp4
89 MB
04. HTML Injection/8. iFrame Injection.mp4
70 MB
04. HTML Injection/6. Hacking with Forms.mp4
58 MB
04. HTML Injection/1. HTML Injection Intro.mp4
12 MB
04. HTML Injection/3. Burpsuite Setup.vtt
27 kB
04. HTML Injection/5. Stored HTML Injection.vtt
19 kB
04. HTML Injection/4. HTML Injection.vtt
15 kB
04. HTML Injection/7. Dirbuster Usage.vtt
15 kB
04. HTML Injection/6. Hacking with Forms.vtt
13 kB
04. HTML Injection/2. Installing Beebox.vtt
12 kB
04. HTML Injection/8. iFrame Injection.vtt
9.6 kB
04. HTML Injection/1. HTML Injection Intro.vtt
851 B
04. HTML Injection/2. Beebox-Link.txt
53 B
05. PHP Injection/2. PHP Code Injection.mp4
121 MB
05. PHP Injection/3. Upload Vulnerability.mp4
86 MB
05. PHP Injection/1. PHP Injection Intro.mp4
6.9 MB
05. PHP Injection/2. PHP Code Injection.vtt
18 kB
05. PHP Injection/3. Upload Vulnerability.vtt
13 kB
05. PHP Injection/1. PHP Injection Intro.vtt
480 B
06. Command Execution & SSI/3. OS Command Injection.mp4
80 MB
06. Command Execution & SSI/4. Commix.mp4
72 MB
06. Command Execution & SSI/5. SSI Injection.mp4
65 MB
06. Command Execution & SSI/6. SSI Medium.mp4
47 MB
06. Command Execution & SSI/2. Foxy Proxy.mp4
34 MB
06. Command Execution & SSI/1. Command Execution Intro.mp4
5.4 MB
06. Command Execution & SSI/3. OS Command Injection.vtt
11 kB
06. Command Execution & SSI/4. Commix.vtt
11 kB
06. Command Execution & SSI/5. SSI Injection.vtt
8.7 kB
06. Command Execution & SSI/2. Foxy Proxy.vtt
6.7 kB
06. Command Execution & SSI/6. SSI Medium.vtt
5.3 kB
06. Command Execution & SSI/1. Command Execution Intro.vtt
387 B
07. Directory Traversal/4. Dotdotpwn.mp4
79 MB
07. Directory Traversal/2. What is Directory Traversal.mp4
68 MB
07. Directory Traversal/3. Directory Traversal Vulnerabilities.mp4
64 MB
07. Directory Traversal/1. Directory Traversal Intro.mp4
9.5 MB
07. Directory Traversal/2. What is Directory Traversal.vtt
10 kB
07. Directory Traversal/4. Dotdotpwn.vtt
8.9 kB
07. Directory Traversal/3. Directory Traversal Vulnerabilities.vtt
8.2 kB
07. Directory Traversal/1. Directory Traversal Intro.vtt
630 B
08. XSS/2. Reflected XSS.mp4
117 MB
08. XSS/3. Reflected AJAX XSS.mp4
78 MB
08. XSS/4. Stored XSS.mp4
38 MB
08. XSS/1. XSS Intro.mp4
8.4 MB
08. XSS/2. Reflected XSS.vtt
15 kB
08. XSS/3. Reflected AJAX XSS.vtt
12 kB
08. XSS/4. Stored XSS.vtt
5.5 kB
08. XSS/1. XSS Intro.vtt
567 B
09. Access Control & IDOR/1. Broken Access Control.mp4
114 MB
09. Access Control & IDOR/2. IDOR.mp4
109 MB
09. Access Control & IDOR/3. Reading Other Users Chat.mp4
41 MB
09. Access Control & IDOR/1. Broken Access Control.vtt
15 kB
09. Access Control & IDOR/2. IDOR.vtt
14 kB
09. Access Control & IDOR/3. Reading Other Users Chat.vtt
7.4 kB
10. CSRF/2. Metasploitable Installation.mp4
104 MB
10. CSRF/3. Metasploitable Config.mp4
100 MB
10. CSRF/6. CSRF Simple Hack.mp4
61 MB
10. CSRF/5. CSRF Introduction.mp4
44 MB
10. CSRF/4. Cookies.mp4
42 MB
10. CSRF/7. CSRF Hacking with Link.mp4
34 MB
10. CSRF/1. CSRF Intro.mp4
12 MB
10. CSRF/3. Metasploitable Config.vtt
12 kB
10. CSRF/6. CSRF Simple Hack.vtt
12 kB
10. CSRF/2. Metasploitable Installation.vtt
10 kB
10. CSRF/5. CSRF Introduction.vtt
8.3 kB
10. CSRF/7. CSRF Hacking with Link.vtt
8.0 kB
10. CSRF/4. Cookies.vtt
7.3 kB
10. CSRF/1. CSRF Intro.vtt
860 B
11. Brute Force/2. Brute Force Attacks.mp4
84 MB
11. Brute Force/3. Intruder.mp4
33 MB
11. Brute Force/1. Brute Force Intro.mp4
6.8 MB
11. Brute Force/2. Brute Force Attacks.vtt
19 kB
11. Brute Force/3. Intruder.vtt
6.9 kB
11. Brute Force/1. Brute Force Intro.vtt
484 B
12. SQL Crash Course/3. Creating SQL Tables.mp4
44 MB
12. SQL Crash Course/2. What is SQL.mp4
39 MB
12. SQL Crash Course/6. Advanced Query.mp4
36 MB
12. SQL Crash Course/5. Filtering.mp4
28 MB
12. SQL Crash Course/4. Inserting Values to Tables.mp4
27 MB
12. SQL Crash Course/7. Guessing.mp4
23 MB
12. SQL Crash Course/1. SQL Crash Course Intro.mp4
17 MB
12. SQL Crash Course/3. Creating SQL Tables.vtt
10 kB
12. SQL Crash Course/6. Advanced Query.vtt
9.3 kB
12. SQL Crash Course/5. Filtering.vtt
8.5 kB
12. SQL Crash Course/7. Guessing.vtt
7.4 kB
12. SQL Crash Course/4. Inserting Values to Tables.vtt
6.7 kB
12. SQL Crash Course/2. What is SQL.vtt
5.6 kB
12. SQL Crash Course/1. SQL Crash Course Intro.vtt
1.1 kB
13. SQL Injection Introduction/2. Confirming SQLi Vulnerabilities.mp4
68 MB
13. SQL Injection Introduction/5. SQLi In Hardened Security.mp4
46 MB
13. SQL Injection Introduction/4. OR.mp4
32 MB
13. SQL Injection Introduction/3. Logging In Without Password.mp4
24 MB
13. SQL Injection Introduction/1. SQL Injection Intro.mp4
5.9 MB
13. SQL Injection Introduction/2. Confirming SQLi Vulnerabilities.vtt
14 kB
13. SQL Injection Introduction/5. SQLi In Hardened Security.vtt
9.8 kB
13. SQL Injection Introduction/4. OR.vtt
7.8 kB
13. SQL Injection Introduction/3. Logging In Without Password.vtt
6.6 kB
13. SQL Injection Introduction/1. SQL Injection Intro.vtt
418 B
14. SQLi GET Request/4. Credit Card Numbers.mp4
93 MB
14. SQLi GET Request/3. Union Select Operations.mp4
92 MB
14. SQLi GET Request/2. GET Vulnerabilities and Decoder.mp4
66 MB
14. SQLi GET Request/1. SQLi GET Request Intro.mp4
6.6 MB
14. SQLi GET Request/2. GET Vulnerabilities and Decoder.vtt
14 kB
14. SQLi GET Request/3. Union Select Operations.vtt
13 kB
14. SQLi GET Request/4. Credit Card Numbers.vtt
13 kB
14. SQLi GET Request/1. SQLi GET Request Intro.vtt
490 B
15. SQLi Advanced/3. SQLi Alternative Tests.mp4
86 MB
15. SQLi Advanced/2. Blind Injections.mp4
57 MB
15. SQLi Advanced/5. Reading and Writing Files.mp4
51 MB
15. SQLi Advanced/7. SQLMap.mp4
49 MB
15. SQLi Advanced/6. Shell with SQLi.mp4
48 MB
15. SQLi Advanced/4. Hex Values.mp4
47 MB
15. SQLi Advanced/1. SQLi Advanced Intro.mp4
9.7 MB
15. SQLi Advanced/3. SQLi Alternative Tests.vtt
14 kB
15. SQLi Advanced/2. Blind Injections.vtt
12 kB
15. SQLi Advanced/5. Reading and Writing Files.vtt
9.2 kB
15. SQLi Advanced/6. Shell with SQLi.vtt
8.9 kB
15. SQLi Advanced/4. Hex Values.vtt
8.6 kB
15. SQLi Advanced/7. SQLMap.vtt
7.7 kB
15. SQLi Advanced/7. SQL Injection Notes.txt
2.0 kB
15. SQLi Advanced/1. SQLi Advanced Intro.vtt
719 B
16. Juice Shop/4. Scoreboard.mp4
105 MB
16. Juice Shop/2. What is Juice Shop.mp4
91 MB
16. Juice Shop/3. Juice Shop Deployment.mp4
82 MB
16. Juice Shop/12. XXE Attacks.mp4
80 MB
16. Juice Shop/9. SQL Injection.mp4
76 MB
16. Juice Shop/5. DOM XSS.mp4
75 MB
16. Juice Shop/7. Feedback.mp4
64 MB
16. Juice Shop/10. Decrypting Password from Cookies.mp4
56 MB
16. Juice Shop/16. Faking Feedbacks and Reviews.mp4
52 MB
16. Juice Shop/8. Viewing Someone Else's Basket.mp4
44 MB
16. Juice Shop/15. Changing Requests.mp4
42 MB
16. Juice Shop/17. Order Negative Amount.mp4
40 MB
16. Juice Shop/13. Creating Users with Admin Privileges.mp4
38 MB
16. Juice Shop/6. Registering Users.mp4
34 MB
16. Juice Shop/11. Accessing Admin Dashboard.mp4
34 MB
16. Juice Shop/14. Captcha Bypass.mp4
31 MB
16. Juice Shop/1. Juice Shop Intro.mp4
10 MB
16. Juice Shop/4. Scoreboard.vtt
16 kB
16. Juice Shop/9. SQL Injection.vtt
14 kB
16. Juice Shop/12. XXE Attacks.vtt
14 kB
16. Juice Shop/5. DOM XSS.vtt
14 kB
16. Juice Shop/3. Juice Shop Deployment.vtt
12 kB
16. Juice Shop/2. What is Juice Shop.vtt
11 kB
16. Juice Shop/7. Feedback.vtt
11 kB
16. Juice Shop/10. Decrypting Password from Cookies.vtt
10 kB
16. Juice Shop/8. Viewing Someone Else's Basket.vtt
9.3 kB
16. Juice Shop/16. Faking Feedbacks and Reviews.vtt
8.5 kB
16. Juice Shop/15. Changing Requests.vtt
8.5 kB
16. Juice Shop/17. Order Negative Amount.vtt
7.9 kB
16. Juice Shop/13. Creating Users with Admin Privileges.vtt
7.4 kB
16. Juice Shop/6. Registering Users.vtt
7.4 kB
16. Juice Shop/11. Accessing Admin Dashboard.vtt
5.7 kB
16. Juice Shop/14. Captcha Bypass.vtt
5.2 kB
16. Juice Shop/1. Juice Shop Intro.vtt
780 B
16. Juice Shop/3. Juice-Shop-Link.txt
45 B
17. SSRF/2. First SSRF Attack.mp4
98 MB
17. SSRF/1. What is SSRF.mp4
89 MB
17. SSRF/3. SSRF Backend Attack.mp4
63 MB
17. SSRF/5. Whitelist.mp4
63 MB
17. SSRF/4. Blacklist.mp4
55 MB
17. SSRF/2. First SSRF Attack.vtt
16 kB
17. SSRF/3. SSRF Backend Attack.vtt
11 kB
17. SSRF/1. What is SSRF.vtt
11 kB
17. SSRF/5. Whitelist.vtt
10 kB
17. SSRF/4. Blacklist.vtt
9.7 kB
18. Information Gathering/3. DNS Lookup.mp4
89 MB
18. Information Gathering/4. Sitereport.mp4
68 MB
18. Information Gathering/2. Whois Lookup.mp4
58 MB
18. Information Gathering/5. Firewall.mp4
58 MB
18. Information Gathering/1. Information Gathering Intro.mp4
15 MB
18. Information Gathering/3. DNS Lookup.vtt
9.6 kB
18. Information Gathering/5. Firewall.vtt
9.4 kB
18. Information Gathering/4. Sitereport.vtt
8.9 kB
18. Information Gathering/2. Whois Lookup.vtt
8.0 kB
18. Information Gathering/1. Information Gathering Intro.vtt
1.0 kB
19. API Pentesting/5. Burpsuite Settings.mp4
122 MB
19. API Pentesting/8. Broken Authentication.mp4
110 MB
19. API Pentesting/3. Creating Server.mp4
104 MB
19. API Pentesting/1. What is API Security.mp4
104 MB
19. API Pentesting/9. Excessive Data Exposure.mp4
93 MB
19. API Pentesting/6. Postman.mp4
93 MB
19. API Pentesting/7. Broken Object Authorization.mp4
89 MB
19. API Pentesting/14. SQLi.mp4
84 MB
19. API Pentesting/4. Installing API in Server.mp4
74 MB
19. API Pentesting/10. One Time Password Bypass.mp4
57 MB
19. API Pentesting/15. Improper Asset Management.mp4
56 MB
19. API Pentesting/11. Broken Function Level Authentication.mp4
42 MB
19. API Pentesting/13. Cors.mp4
38 MB
19. API Pentesting/12. Mass Assignment.mp4
25 MB
19. API Pentesting/16. Closing.mp4
17 MB
19. API Pentesting/8. Broken Authentication.vtt
22 kB
19. API Pentesting/6. Postman.vtt
20 kB
19. API Pentesting/9. Excessive Data Exposure.vtt
19 kB
19. API Pentesting/5. Burpsuite Settings.vtt
18 kB
19. API Pentesting/3. Creating Server.vtt
18 kB
19. API Pentesting/7. Broken Object Authorization.vtt
17 kB
19. API Pentesting/14. SQLi.vtt
15 kB
19. API Pentesting/4. Installing API in Server.vtt
14 kB
19. API Pentesting/1. What is API Security.vtt
14 kB
19. API Pentesting/10. One Time Password Bypass.vtt
12 kB
19. API Pentesting/15. Improper Asset Management.vtt
10 kB
19. API Pentesting/11. Broken Function Level Authentication.vtt
9.3 kB
19. API Pentesting/13. Cors.vtt
7.6 kB
19. API Pentesting/12. Mass Assignment.vtt
6.2 kB
19. API Pentesting/16. Closing.vtt
3.3 kB
19. API Pentesting/14. sqli.txt
1.5 kB
19. API Pentesting/2. DigitalOcean Free Credit Link.html
390 B
20. Making Legal Money/2. Making Legal Money & Next Steps.mp4
108 MB
20. Making Legal Money/3. Web Pentest Reporting.mp4
100 MB
20. Making Legal Money/1. Making Legal Money Intro.mp4
11 MB
20. Making Legal Money/3. Web Pentest Reporting.vtt
13 kB
20. Making Legal Money/2. Making Legal Money & Next Steps.vtt
11 kB
20. Making Legal Money/1. Making Legal Money Intro.vtt
817 B
21. Live Bug Bounty/10. Stored XSS.mp4
204 MB
21. Live Bug Bounty/6. Login Exploration.mp4
166 MB
21. Live Bug Bounty/2. Information Gathering.mp4
99 MB
21. Live Bug Bounty/3. Javascript Reviews.mp4
93 MB
21. Live Bug Bounty/8. Admin Vulnerability.mp4
84 MB
21. Live Bug Bounty/5. XSS Vulnerability.mp4
76 MB
21. Live Bug Bounty/4. Open Redirect Vulnerability.mp4
73 MB
21. Live Bug Bounty/7. Broken Access Control.mp4
63 MB
21. Live Bug Bounty/9. IDOR Vulnerability.mp4
57 MB
21. Live Bug Bounty/1. Live Bug Bounty.mp4
54 MB
21. Live Bug Bounty/10. Stored XSS.vtt
22 kB
21. Live Bug Bounty/6. Login Exploration.vtt
17 kB
21. Live Bug Bounty/4. Open Redirect Vulnerability.vtt
13 kB
21. Live Bug Bounty/5. XSS Vulnerability.vtt
11 kB
21. Live Bug Bounty/8. Admin Vulnerability.vtt
11 kB
21. Live Bug Bounty/2. Information Gathering.vtt
10 kB
21. Live Bug Bounty/11. Bonus.html
9.9 kB
21. Live Bug Bounty/7. Broken Access Control.vtt
8.9 kB
21. Live Bug Bounty/3. Javascript Reviews.vtt
8.7 kB
21. Live Bug Bounty/9. IDOR Vulnerability.vtt
8.6 kB
21. Live Bug Bounty/1. Live Bug Bounty.vtt
7.3 kB