TorBT - Torrents and Magnet Links Search Engine

Udemy - Mobile Application Hacking and Penetration Testing (Android)

File Name
Size
3. Preparing the Battlefield/1. Preparing the Battlefield.mp4
163 MB
1. Introduction/2. Mobile Application Security part 1.html
1.9 kB
1. Introduction/3. Mobile Application Security part 2.html
407 B
1. Introduction/4. Mobile Application Penetration Testing.html
449 B
1. Introduction/5. The most common areas where we find mobile application data resides.mp4
6.2 MB
1. Introduction/5. The most common areas where we find mobile application data resides.vtt
2.4 kB
1. Introduction/[SaleWebDesign.Com].txt
1.0 kB
1. Introduction/Download More Free Coures.txt
31 B
2. Introduction to Android/1. The Architecture of Android.mp4
27 MB
2. Introduction to Android/1. The Architecture of Android.vtt
2.9 kB
2. Introduction to Android/2. The App Sandbox and the Permission Model.mp4
3.7 MB
2. Introduction to Android/2. The App Sandbox and the Permission Model.vtt
1.4 kB
2. Introduction to Android/3. AndroidManifest.xml File.html
361 B
2. Introduction to Android/4. Android Compilation Process.html
895 B
2. Introduction to Android/5. Android Startup Process.html
1.2 kB
2. Introduction to Android/6. Android Application Components.mp4
9.0 MB
2. Introduction to Android/6. Android Application Components.vtt
1.8 kB
1. Introduction/1. Introduction To Mobile Apps.html
871 B
3. Preparing the Battlefield/1. Preparing the Battlefield.vtt
13 kB
3. Preparing the Battlefield/2. Unable to start the virtual device (Error Message).html
526 B
4. Useful utilities for Android Penetration Testing/1. Android Debug Bridge (adb).html
1.5 kB
4. Useful utilities for Android Penetration Testing/2. Digging deeper into Android (ADB tool).mp4
79 MB
4. Useful utilities for Android Penetration Testing/2. Digging deeper into Android (ADB tool).vtt
6.2 kB
4. Useful utilities for Android Penetration Testing/3. Burp Suite.html
331 B
4. Useful utilities for Android Penetration Testing/4. intercept and analyze the network traffic.mp4
56 MB
4. Useful utilities for Android Penetration Testing/4. intercept and analyze the network traffic.vtt
5.9 kB
4. Useful utilities for Android Penetration Testing/[SaleWebDesign.Com].txt
1.0 kB
4. Useful utilities for Android Penetration Testing/Download More Free Coures.txt
31 B
5. Reversing APKs/1. Reversing APKs Intro.html
696 B
5. Reversing APKs/2. Reversing an Android application.mp4
120 MB
5. Reversing APKs/2. Reversing an Android application.vtt
7.2 kB
6. OWASP - Common Mobile Attacks/1. OWASP top 10 vulnerabilities for mobiles.html
3.1 kB
6. OWASP - Common Mobile Attacks/2. Damn insecure and vulnerable App.html
274 B
6. OWASP - Common Mobile Attacks/3. Install DIVA (Damn insecure and vulnerable App).mp4
35 MB
6. OWASP - Common Mobile Attacks/3. Install DIVA (Damn insecure and vulnerable App).vtt
2.6 kB
6. OWASP - Common Mobile Attacks/4. What is Insecure Logging.html
327 B
6. OWASP - Common Mobile Attacks/5. Insecure Logging Issue.mp4
64 MB
6. OWASP - Common Mobile Attacks/5. Insecure Logging Issue.vtt
3.9 kB
6. OWASP - Common Mobile Attacks/6. What is Insecure Data Storage.html
779 B
6. OWASP - Common Mobile Attacks/7. Insecure Data Storage.mp4
72 MB
6. OWASP - Common Mobile Attacks/7. Insecure Data Storage.vtt
5.4 kB
6. OWASP - Common Mobile Attacks/8. Database Insecure Storage.mp4
35 MB
6. OWASP - Common Mobile Attacks/8. Database Insecure Storage.vtt
3.2 kB
6. OWASP - Common Mobile Attacks/9. Insecure Data Storage Inside Temporary Files.mp4
23 MB
6. OWASP - Common Mobile Attacks/9. Insecure Data Storage Inside Temporary Files.vtt
2.3 kB
6. OWASP - Common Mobile Attacks/10. Hardcoding Issues.mp4
29 MB
6. OWASP - Common Mobile Attacks/10. Hardcoding Issues.vtt
2.3 kB
6. OWASP - Common Mobile Attacks/11. What is SQL injection.html
897 B
6. OWASP - Common Mobile Attacks/12. Input Validation Issues - SQL Injection.mp4
48 MB
6. OWASP - Common Mobile Attacks/12. Input Validation Issues - SQL Injection.vtt
3.8 kB
6. OWASP - Common Mobile Attacks/13. Android WebView Vulnerabilities.html
883 B
6. OWASP - Common Mobile Attacks/14. Input Validation Issues - Exploiting Webview Vulnerability.mp4
62 MB
6. OWASP - Common Mobile Attacks/14. Input Validation Issues - Exploiting Webview Vulnerability.vtt
3.9 kB
7. Bonus Section/1. Bonus Lecture.html
790 B
7. Bonus Section/2. Exploiting Script Source Code Disclosure Vulnerability.mp4
23 MB
7. Bonus Section/2. Exploiting Script Source Code Disclosure Vulnerability.vtt
3.3 kB
7. Bonus Section/[SaleWebDesign.Com].txt
1.0 kB
7. Bonus Section/Download More Free Coures.txt
31 B