TorBT - Torrents and Magnet Links Search Engine

[DesireCourse.Com] Udemy - Bug Bounty Hunting – Offensive Approach to Hunt Bugs

File Name
Size
01 Introduction/001 About Instructor.mp4
199 MB
01 Introduction/002 Course Introduction and Overview.mp4
67 MB
01 Introduction/003 Why you should take this.mp4
27 MB
01 Introduction/004 Teaser of Offensive Approach to Hunt Bugs.mp4
1.0 GB
02 Information Gathering Basic Terminologies/005 Information Gathering.mp4
150 MB
03 Introduction of Burpsuite/006 Steps to Configure Burpsuite with Firefox.mp4
60 MB
03 Introduction of Burpsuite/007 How to Use Burpsuite - Spider Repeater Intruder.mp4
57 MB
04 Comprehensive XSS/008 Background Concept about XSS.mp4
42 MB
04 Comprehensive XSS/008 Background-Concept-XSS.m4v
10 MB
04 Comprehensive XSS/008 Background-XSS.pdf
26 kB
04 Comprehensive XSS/009 Basic XSS.mp4
155 MB
04 Comprehensive XSS/009 Basic-xss.pdf
19 kB
04 Comprehensive XSS/010 BASIC-XSS-ON-LAB.txt
1.1 kB
04 Comprehensive XSS/010 Basic XSS on Lab.mp4
200 MB
04 Comprehensive XSS/011 Manual Building XSS Vector.mp4
146 MB
04 Comprehensive XSS/011 Manual-xss.txt
791 B
04 Comprehensive XSS/012 XSS through Filter Bypassed XSS payloads On Lab.mp4
118 MB
04 Comprehensive XSS/012 xss.txt
12 kB
04 Comprehensive XSS/013 XSS On Live Websites.mp4
234 MB
04 Comprehensive XSS/014 XSS Hunting Live Part 1.mp4
93 MB
04 Comprehensive XSS/015 XSS Hunting Live Part 2.mp4
168 MB
04 Comprehensive XSS/016 XSS Hunting Live Part 3.mp4
87 MB
04 Comprehensive XSS/017 XSS Through Header Parameter.mp4
62 MB
04 Comprehensive XSS/018 Reflected XSS Vs Stored XSS.mp4
52 MB
04 Comprehensive XSS/019 Exploitation of XSS - 1. URL Redirection.mp4
18 MB
04 Comprehensive XSS/020 Exploitation of XSS - 2. Phishing Through XSS.mp4
35 MB
04 Comprehensive XSS/021 Exploitation of XSS - 3. Cookie Stealing.mp4
87 MB
04 Comprehensive XSS/022 XSS Through File Uploading.mp4
45 MB
04 Comprehensive XSS/023 XSS Through Remote File Inclusion.mp4
18 MB
04 Comprehensive XSS/024 Convert Self XSS to Reflected XSS.mp4
40 MB
04 Comprehensive XSS/025 POC - 1 XSS Attack Discovered by Shubham Maheshwari.mp4
19 MB
04 Comprehensive XSS/026 POC - 2 XSS Attack Discovered by Shubham Maheshwari.mp4
11 MB
04 Comprehensive XSS/027 POC - 3 XSS Attack Discovered by Shubham Maheshwari.mp4
11 MB
04 Comprehensive XSS/028 POC 4 XSS Attack Discovered by Ankit Singh.mp4
14 MB
04 Comprehensive XSS/029 POC 5 XSS Attack Discovered by Ankit Singh.mp4
25 MB
04 Comprehensive XSS/030 POC 6 XSS Attack Discovered by Ankit Singh.mp4
35 MB
04 Comprehensive XSS/031 POC 7 XSS Attack Discovered by Ankit Singh.mp4
13 MB
04 Comprehensive XSS/032 POC 8 XSS Attack Discovered by Ankit Singh.mp4
21 MB
05 Host Header Injection/033 HHA.txt
1.2 kB
05 Host Header Injection/033 Overview of Host Header Injection.mp4
17 MB
05 Host Header Injection/034 Host Header Attack 1. Open Redirection.mp4
73 MB
05 Host Header Injection/035 Host Header Attack 2. Cache Poisoning.mp4
20 MB
05 Host Header Injection/036 Host Header Attack 3. Password Reset Poisoning.mp4
34 MB
05 Host Header Injection/037 Host Header Attack 4. XSS Through Host Header.mp4
30 MB
05 Host Header Injection/038 POC - 1 Host Header attack by Shubham Maheshwari.mp4
8.2 MB
05 Host Header Injection/039 POC - 2 Host Header Attack Discovered by Shubham Maheshwari.mp4
8.9 MB
05 Host Header Injection/040 POC - 3 Host Header Attack Discovered by Shubham Maheshwari.mp4
9.8 MB
05 Host Header Injection/041 POC -4 Host Header Attack Discovered by Shubham Maheshwari.mp4
11 MB
05 Host Header Injection/042 POC - 5 Host Header Attack Discovered by Shubham Maheshwari.mp4
11 MB
05 Host Header Injection/043 POC - 6 Host Header Attack Discovered by Shubham Maheshwari.mp4
14 MB
05 Host Header Injection/044 POC - 7 Host Header Attack Discovered by Shubham Maheshwari.mp4
9.3 MB
06 URL Redirection/045 Background Concept about URL Redirection.mp4
2.0 MB
06 URL Redirection/045 URL-Redirection-Background.pdf
32 kB
06 URL Redirection/046 URL Redirection Through Get Parameter.mp4
22 MB
06 URL Redirection/046 URL-Redirection-Through-Get-Parameter.pdf
30 kB
06 URL Redirection/047 URL Redirection Through Path Fragments.mp4
17 MB
06 URL Redirection/048 POC of URL Redirection 1.mp4
336 kB
06 URL Redirection/048 Screen-Shot-E8-03-22-at-09.56.19.png
51 kB
06 URL Redirection/049 POC of URL Redirection 2.html
1.3 kB
06 URL Redirection/050 POC 3 Open Redirection Vulnerability Discovered by Shubham Maheshwari.mp4
5.6 MB
06 URL Redirection/051 POC 4 Open Redirection Vulnerability Discovered by Shubham Maheshwari.mp4
6.7 MB
06 URL Redirection/052 POC 5 Open Redirection Vulnerability Discovered by Shubham Maheshwari.mp4
10 MB
06 URL Redirection/053 POC 6 Open Redirection Vulnerability Discovered by Dawood Ansar.mp4
17 MB
07 Parameter Tampering/054 Background Concept about Parameter Tampering.mp4
4.8 MB
07 Parameter Tampering/054 Background-Parameter-Tampering.pdf
25 kB
07 Parameter Tampering/055 Parameter Tampering - Example 1.mp4
7.3 MB
07 Parameter Tampering/056 Parameter Tampering - Example 2.mp4
7.9 MB
07 Parameter Tampering/057 Parameter Tampering - Example 3.mp4
6.8 MB
07 Parameter Tampering/058 Parameter Tampering - Example 4.mp4
14 MB
07 Parameter Tampering/059 Parameter Tampering - Example 5.mp4
12 MB
08 HTML Injection/060 Background Concept about HTML Injection.mp4
2.2 MB
08 HTML Injection/060 Background-HTMLI.m4v
2.1 MB
08 HTML Injection/061 HTML Injection Finding - Example1.mp4
6.7 MB
08 HTML Injection/062 HTML Injection Finding - Example2.mp4
14 MB
08 HTML Injection/063 HTML Injection Finding - Example3.mp4
12 MB
08 HTML Injection/064 Exploitation of HTML Injection.html
2.4 kB
09 File Inclusion/065 Background Concept about File Inclusion.mp4
18 MB
09 File Inclusion/065 File-incusion.txt
1.1 kB
09 File Inclusion/066 LFI Vs RFI.mp4
41 MB
09 File Inclusion/067 LFI Hunting Part 1.mp4
29 MB
09 File Inclusion/068 LFI Hunting Part 2.mp4
48 MB
09 File Inclusion/068 pathtotest-huge.txt
488 kB
09 File Inclusion/069 Exploitation of LFI.mp4
31 MB
09 File Inclusion/070 RFI Hunting.mp4
51 MB
10 Missinginsufficient SPF record/071 Background Concept about Missing insufficient SPF record.mp4
3.5 MB
10 Missinginsufficient SPF record/071 Background-SPF.pdf
23 kB
10 Missinginsufficient SPF record/072 Testing SPF.mp4
6.9 MB
10 Missinginsufficient SPF record/072 Testing-SPF.pdf
20 kB
10 Missinginsufficient SPF record/073 Exploitation of SPF.mp4
11 MB
10 Missinginsufficient SPF record/074 POC 1 SPF.mp4
15 MB
10 Missinginsufficient SPF record/075 POC 2 - SPF Vulnerability Discovered by Shubham Maheshwari.mp4
14 MB
10 Missinginsufficient SPF record/076 POC 3 - SPF Vulnerability Discovered by Shubham Maheshwari.mp4
16 MB
10 Missinginsufficient SPF record/077 POC 4 - SPF Vulnerability Discovered by Shubham Maheshwari.mp4
18 MB
10 Missinginsufficient SPF record/078 POC 5 - SPF Vulnerability Discovered by Shubham Maheshwari.mp4
12 MB
11 Insecure CORS Configuration/079 Background Concept about CORS.mp4
4.4 MB
11 Insecure CORS Configuration/079 Background-Concept-Insecure-CORS.pdf
24 kB
11 Insecure CORS Configuration/080 Insecure CORS by Checking Response Header.mp4
13 MB
11 Insecure CORS Configuration/080 Insecure-CORS-Response-Header.pdf
23 kB
11 Insecure CORS Configuration/081 Insecure CORS through Request Header.mp4
17 MB
11 Insecure CORS Configuration/081 Insecure-CORS-Through-Request-Header.pdf
40 kB
11 Insecure CORS Configuration/082 Exploitation of Insecure CORS.mp4
28 MB
11 Insecure CORS Configuration/082 exploitation-cors.pdf
26 kB
11 Insecure CORS Configuration/083 POC Insecure CORS.html
1.0 kB
12 Server Side Request Forgery/084 Background Concept about SSRF.mp4
14 MB
12 Server Side Request Forgery/085 SSRF Testing on Lab.mp4
111 MB
12 Server Side Request Forgery/086 SSRF on Live web.mp4
52 MB
12 Server Side Request Forgery/086 SSRF.pdf
36 kB
12 Server Side Request Forgery/087 Exploitation of SSRF attack.mp4
103 MB
12 Server Side Request Forgery/087 SSRF.pdf
36 kB
13 Critical File Found/088 Background Concept about Critical File Found.mp4
18 MB
13 Critical File Found/089 Critical File Found on Live web 1.mp4
72 MB
13 Critical File Found/089 dicc.txt
82 kB
13 Critical File Found/090 Critical File Found on Live web 2.mp4
138 MB
13 Critical File Found/090 Critical-File.pdf
23 kB
14 Source Code Disclosure/091 Background Concept about Source Code Disclosure.mp4
12 MB
14 Source Code Disclosure/092 Source Code Disclosure on Lab.mp4
43 MB
14 Source Code Disclosure/093 Source Code Disclosure on Live Web.mp4
23 MB
14 Source Code Disclosure/093 dicc.txt
82 kB
15 Cross Site Request Forgery/094 Background Concept about CSRF.mp4
25 MB
15 Cross Site Request Forgery/095 Injection Point for CSRF.mp4
13 MB
15 Cross Site Request Forgery/096 CSRF on Logout Page.mp4
21 MB
15 Cross Site Request Forgery/097 CSRF Live.mp4
33 MB
15 Cross Site Request Forgery/098 CSRF page on some critical Business Logic Page.mp4
51 MB
15 Cross Site Request Forgery/099 CSRF POC -1 Discovered by Ankit Singh.mp4
23 MB
15 Cross Site Request Forgery/100 CSRF POC 2 Discovered by Ankit Singh.mp4
26 MB
15 Cross Site Request Forgery/101 CSRF POC -3 Discovered by Ankit Singh.mp4
21 MB
16 Hostile Subdomain Takeover/102 Background Concept about Hostile Subdomain Takeover.mp4
52 MB
16 Hostile Subdomain Takeover/103 Hostile Subdomain Takeover on Live web 1.mp4
94 MB
16 Hostile Subdomain Takeover/103 Hostile.txt
953 B
16 Hostile Subdomain Takeover/104 Hostile Subdomain Takeover on Live web 2.mp4
82 MB
17 SQL Injection/105 Background Concept about SQL injection.mp4
28 MB
17 SQL Injection/106 SQL Injection Lab Setup.mp4
74 MB
17 SQL Injection/107 Injection Point for SQL Injection.mp4
44 MB
17 SQL Injection/108 Learn SQL Query Fixing.mp4
103 MB
17 SQL Injection/108 SQLI.pdf
38 kB
17 SQL Injection/109 SQLI GET Based Part 1.mp4
118 MB
17 SQL Injection/110 SQLI GET Based Part 2.mp4
64 MB
17 SQL Injection/111 SQLI GET Based Part 3.mp4
108 MB
17 SQL Injection/112 Exploitation of GET Based SQLI.mp4
237 MB
17 SQL Injection/112 sqli.txt
4.0 kB
17 SQL Injection/113 SQLI POST Based Part 1.mp4
107 MB
17 SQL Injection/114 SQLI POST Based Part 2.mp4
114 MB
17 SQL Injection/115 Exploitation of POST Based SQLI.mp4
146 MB
17 SQL Injection/115 sqli.txt
10 kB
17 SQL Injection/116 SQLI Header Based.mp4
46 MB
17 SQL Injection/117 Exploitation of Header Based SQLI.mp4
23 MB
17 SQL Injection/118 SQLI Cookie Based.mp4
38 MB
17 SQL Injection/119 Exploitation of Cookie Based SQLI.mp4
30 MB
17 SQL Injection/120 WAF Bypassing for SQLI.mp4
90 MB
17 SQL Injection/121 Authentication Bypassing through SQLI.mp4
58 MB
17 SQL Injection/122 Automation of SQLI GET Based.mp4
176 MB
17 SQL Injection/122 SQLI.pdf
38 kB
17 SQL Injection/123 Automation of SQLI Post Based Header Based and Cookie Based.mp4
118 MB
17 SQL Injection/124 Automation of SQLI Part 3 With WAF Bypassing.mp4
97 MB
17 SQL Injection/125 SQLI on Live Web 1.mp4
48 MB
17 SQL Injection/125 SQLI.pdf
38 kB
17 SQL Injection/126 SQLI Live Bug Bounty Website.mp4
174 MB
17 SQL Injection/127 SQL Injection Live Website.mp4
43 MB
18 Command Injection/128 Background Concept about Command Injection.mp4
4.9 MB
18 Command Injection/128 Background-CMDi.pdf
27 kB
18 Command Injection/129 Command Injection on Lab Part 1.mp4
9.7 MB
18 Command Injection/130 Command Injection on Live Web 1.mp4
11 MB
18 Command Injection/131 Command Injection on Live Web 2.mp4
6.1 MB
18 Command Injection/131 Delimeter-List.txt
72 B
18 Command Injection/131 cmd.txt
4.9 kB
18 Command Injection/132 Exploitation of Command Injection.mp4
8.1 MB
18 Command Injection/132 exploitation-CMDI.pdf
31 kB
19 File Uploading/133 Background Concept about File Uploading.mp4
10 MB
19 File Uploading/133 File-Uploading.pdf
25 kB
19 File Uploading/134 File Uploading Part 1.mp4
73 MB
19 File Uploading/135 File Uploading Part 2.mp4
46 MB
19 File Uploading/136 File Uploading Part3.mp4
54 MB
19 File Uploading/137 File Uploading on Live Part 2.mp4
14 MB
20 XML External Entity Injection/138 Background Concept about XXE Injection.mp4
14 MB
20 XML External Entity Injection/138 XXE.pdf
23 kB
20 XML External Entity Injection/139 XXE on Lab.mp4
26 MB
20 XML External Entity Injection/139 xml-attacks.txt
12 kB
21 Thank you/140 Thank you message from Vikash Chaudhary.mp4
2.0 MB
[DesireCourse.Com].url
51 B