Please note that this page does not hosts or makes available any of the listed filenames. You
cannot download any of those files from here.
|
[TGx]Downloaded from torrentgalaxy.to .txt |
585B |
0 |
8B |
001 0 Intro.en.srt |
3.64KB |
001 0 Intro.en.srt |
3.26KB |
001 0 Intro.mp4 |
44.66MB |
001 0 Intro.mp4 |
18.99MB |
001 0 Introduction.en.srt |
3.19KB |
001 0 Introduction.mp4 |
44.06MB |
001 Attack techniques_ CSRF - Video.en.srt |
13.22KB |
001 Attack techniques_ CSRF - Video.mp4 |
214.50MB |
001 Attack techniques - Broken Access Control - video.en.srt |
13.99KB |
001 Attack techniques - Broken Access Control - video.mp4 |
98.79MB |
001 Attack techniques - IDOR By Uncle Rat - Video.en.srt |
21.93KB |
001 Attack techniques - IDOR By Uncle Rat - Video.mp4 |
154.54MB |
001 Broad scope manual methodology - Video.en.srt |
16.70KB |
001 Broad scope manual methodology - Video.mp4 |
107.14MB |
001 discord invite link.txt |
27B |
001 How to enter the master labs.html |
1.32KB |
001 Introduction.en.srt |
1.20KB |
001 Introduction.mp4 |
13.03MB |
001 Main app methodology - Video.en.srt |
39.31KB |
001 Main app methodology - Video.mp4 |
359.62MB |
001 Next steps.html |
1.18KB |
001 Testing for SQLi with burp suite.html |
5.35KB |
001 The Intricacies of bug bounties.en.srt |
41.94KB |
001 The Intricacies of bug bounties.mp4 |
361.76MB |
001 Video_ Attack techniques - Business logic flaws.en.srt |
7.65KB |
001 Video_ Attack techniques - Business logic flaws.mp4 |
70.89MB |
001 Video_ Attack techniques - OS Command injection.en.srt |
8.42KB |
001 Video_ Attack techniques - OS Command injection.mp4 |
48.79MB |
001 Video_ Attack techniques - SSRF.en.srt |
11.76KB |
001 Video_ Attack techniques - SSRF.mp4 |
189.79MB |
001 Video_ Attack techniques - Template injections - SSTI.en.srt |
15.31KB |
001 Video_ Attack techniques - Template injections - SSTI.mp4 |
107.33MB |
001 Video_ Attack techniques - WAF evasion techniques.en.srt |
31.01KB |
001 Video_ Attack techniques - WAF evasion techniques.mp4 |
108.62MB |
001 Video_ Attack techniques - XXE.en.srt |
13.07KB |
001 Video_ Attack techniques - XXE.mp4 |
88.54MB |
001 Video_ Full guide on How Burp Suite works.en.srt |
90.01KB |
001 Video_ Full guide on How Burp Suite works.mp4 |
683.97MB |
001 Video_ Reporting.en.srt |
4.63KB |
001 Video_ Reporting.mp4 |
34.19MB |
001 Video_ Ultimate beginner XSS guide.en.srt |
40.52KB |
001 Video_ Ultimate beginner XSS guide.mp4 |
276.11MB |
001 What you need to know about bug bounties.pdf |
310.33KB |
002 1 What are File Inclusions.en.srt |
5.58KB |
002 1 What are File Inclusions.mp4 |
74.92MB |
002 1 What are SQLi.en.srt |
6.44KB |
002 1 What are SQLi.mp4 |
89.34MB |
002 1 What is XXE.en.srt |
6.97KB |
002 1 What is XXE.mp4 |
34.87MB |
002 Attack techniques_ CSRF demonstration - video.en.srt |
15.08KB |
002 Attack techniques_ CSRF demonstration - video.mp4 |
102.22MB |
002 Attack techniques - Broken Access Control.html |
5.29KB |
002 Attack techniques - Business logic flaws.html |
4.80KB |
002 Attack techniques - IDOR By Uncle Rat.html |
5.09KB |
002 Attack techniques - OS Command injection.html |
3.98KB |
002 Attack techniques - Template injections - SSTI.html |
5.83KB |
002 Attack techniques - XXE.html |
6.44KB |
002 Broad scope manual methodology.html |
7.64KB |
002 Main app methodology.html |
18.45KB |
002 SSRF.html |
6.41KB |
002 Testing for IDORs with Burp Suite.html |
4.38KB |
002 Uncle Rat's Recommended public bug bounty targets.html |
1.11KB |
002 Video_ Analyzing JS files.en.srt |
11.91KB |
002 Video_ Analyzing JS files.mp4 |
71.27MB |
002 Video_ Burp suite zero to hero.en.srt |
18.45KB |
002 Video_ Burp suite zero to hero.mp4 |
145.94MB |
002 What you need to know about bug bounties.pdf |
310.33KB |
002 What you need to know about bug bounties - Video.en.srt |
15.76KB |
002 What you need to know about bug bounties - Video.mp4 |
133.25MB |
003 2 Detecting SQLi.en.srt |
8.27KB |
003 2 Detecting SQLi.mp4 |
105.71MB |
003 2 Finding a target.en.srt |
5.25KB |
003 2 Finding a target.mp4 |
69.49MB |
003 2 Finding XXE attack vectors.en.srt |
7.35KB |
003 2 Finding XXE attack vectors.mp4 |
43.40MB |
003 A look at bug bounties from all perspectives.en.srt |
10.88KB |
003 A look at bug bounties from all perspectives.mp4 |
157.46MB |
003 Analyzing JS files.html |
5.88KB |
003 Article_ The origin of Business logic flaws.html |
15.04KB |
003 Attack techniques_ CSRF.html |
11.36KB |
003 Attack techniques - Broken Access Control - Overview.html |
1.04KB |
003 Broad scope automated methodology - video.en.srt |
15.69KB |
003 Broad scope automated methodology - video.mp4 |
72.32MB |
003 Extra video_ Blind SSRF, what is it and how to exploit it.en.srt |
6.15KB |
003 Extra video_ Blind SSRF, what is it and how to exploit it.mp4 |
48.65MB |
003 Labs_ Attack techniques - IDOR By Uncle Rat.html |
1.24KB |
003 Main app methodology demonstration on the owasp juice shop.html |
22.51KB |
003 SSTI overview.html |
1.00KB |
003 Testing websockets in burp.html |
3.53KB |
003 Video_ My Top 10 Burp Suite extensions.en.srt |
13.66KB |
003 Video_ My Top 10 Burp Suite extensions.mp4 |
84.37MB |
004 3 Exploiting XXEs.en.srt |
6.40KB |
004 3 Exploiting XXEs.mp4 |
36.84MB |
004 3 Is The Target Vulnerable.en.srt |
8.33KB |
004 3 Is The Target Vulnerable.mp4 |
108.03MB |
004 3 Types of SQLi.en.srt |
16.21KB |
004 3 Types of SQLi.mp4 |
206.12MB |
004 Birdseye view of broad scope methodology.html |
1.06KB |
004 Discord invite link.html |
922B |
004 Discord Invite link.rtf |
398B |
004 Lab_ Broken Access Control.html |
1.21KB |
004 Lab_ CSRF on impactful functionality.html |
1.54KB |
004 Main app methodology - Demonstrated.en.srt |
43.93KB |
004 Main app methodology - Demonstrated.mp4 |
316.74MB |
004 Solutions_ Attack techniques - IDOR By Uncle Rat.html |
989B |
004 Testing a 2FA bypass in burp.html |
5.51KB |
004 The origin of Business logic flaws.en.srt |
32.31KB |
004 The origin of Business logic flaws.mp4 |
474.32MB |
004 Video_ Advanced XSS Testing.en.srt |
24.43KB |
004 Video_ Advanced XSS Testing.mp4 |
166.11MB |
004 Video_ Attack techniques - Template injections - CSTI.en.srt |
4.28KB |
004 Video_ Attack techniques - Template injections - CSTI.mp4 |
24.38MB |
004 Video_ Authorize for automating IDORs and BAC.en.srt |
6.65KB |
004 Video_ Authorize for automating IDORs and BAC.mp4 |
53.66MB |
005 4 File Inclusion to RCE.en.srt |
12.47KB |
005 4 File Inclusion to RCE.mp4 |
166.79MB |
005 4 WAF Bypasses.en.srt |
2.84KB |
005 4 WAF Bypasses.mp4 |
37.34MB |
005 4 WAFs and Filters.en.srt |
3.09KB |
005 4 WAFs and Filters.mp4 |
16.40MB |
005 Attack techniques - Template injections - CSTI.html |
2.79KB |
005 Extra video_ Quickly identify a target from a list of subdomains.en.srt |
4.64KB |
005 Extra video_ Quickly identify a target from a list of subdomains.mp4 |
42.57MB |
005 Labs_ Attack techniques - Business logic flaws.html |
1.33KB |
005 Solutions_ Broken Access Control.html |
1.01KB |
005 Solutions_ CSRF on impactful functionality.html |
1.91KB |
005 The intricaties of bug bounties.pdf |
436.46KB |
005 Video_ How to test for reflected XSS.en.srt |
20.56KB |
005 Video_ How to test for reflected XSS.mp4 |
142.51MB |
006 5 SQLMap.en.srt |
5.21KB |
006 5 SQLMap.mp4 |
64.28MB |
006 5 Tools and Mitigations.en.srt |
6.95KB |
006 5 Tools and Mitigations.mp4 |
41.23MB |
006 5 Wrapper Magic.en.srt |
3.39KB |
006 5 Wrapper Magic.mp4 |
44.68MB |
006 How to test for stored XSS.en.srt |
18.84KB |
006 How to test for stored XSS.mp4 |
125.44MB |
006 Main app methodology.pdf |
1.22MB |
006 Solutions_ Attack techniques - Business logic flaws.html |
1.18KB |
007 6 References & Exercises.en.srt |
5.89KB |
007 6 References & Exercises.mp4 |
74.27MB |
007 6 Tools Wordlists Exercises.en.srt |
6.67KB |
007 6 Tools Wordlists Exercises.mp4 |
92.23MB |
007 What is DOM XSS.html |
8.08KB |
008 Excercises_ 1 Portswigger Simple Login Bypass.en.srt |
4.49KB |
008 Excercises_ 1 Portswigger Simple Login Bypass.mp4 |
62.33MB |
008 Excercises_ Dogcat.en.srt |
12.20KB |
008 Excercises_ Dogcat.mp4 |
160.72MB |
008 Labs_ Reflected XSS.html |
1.55KB |
009 Excercises_ 2 Union Based SQLi To RCE!.en.srt |
13.56KB |
009 Excercises_ 2 Union Based SQLi To RCE!.mp4 |
188.84MB |
009 Excercises_ Sniper.en.srt |
7.30KB |
009 Excercises_ Sniper.mp4 |
104.65MB |
009 Solutions_ Reflected XSS.html |
1.62KB |
010 Broad scope methodology - Slides.pdf |
520.36KB |
010 Excercises_ 3 MSSQL injection to RCE.en.srt |
11.69KB |
010 Excercises_ 3 MSSQL injection to RCE.mp4 |
151.00MB |
010 Excercises_ SKFLFI2.en.srt |
6.05KB |
010 Excercises_ SKFLFI2.mp4 |
92.63MB |
010 Lab_ Stored XSS.html |
1.44KB |
011 Excercises_ 4 Boolean Based SQLi.en.srt |
9.82KB |
011 Excercises_ 4 Boolean Based SQLi.mp4 |
115.23MB |
011 Excercises_ Book.en.srt |
8.78KB |
011 Excercises_ Book.mp4 |
124.02MB |
011 Solutions_ Stored XSS.html |
1.54KB |
012 Broad scope methodology (1).pdf |
520.36KB |
012 Cheat sheet_ XSS.html |
1.43KB |
012 Excercises_ 5 SQLi WAF Bypass.en.srt |
21.57KB |
012 Excercises_ 5 SQLi WAF Bypass.mp4 |
132.99MB |
013 Broad Scope Methodology.png |
322.54KB |
013 Excercises_ 6 SQLi, XSS and XXE all in one payload.en.srt |
25.20KB |
013 Excercises_ 6 SQLi, XSS and XXE all in one payload.mp4 |
192.08MB |
013 Labs_ User submitted reflected XSS.html |
1.52KB |
020 BAC - Slides.pdf |
334.85KB |
025 IDOR - Slides.pdf |
436.09KB |
029 File Inclusion.pdf |
1.33MB |
040 Slides.pdf |
984.25KB |
053 Business logic flaws - Slides.pdf |
267.36KB |
059 XXE - Slides.pdf |
419.58KB |
061 4_XML_eXternal_Entities.pdf |
183.67KB |
067 SSTI.pdf |
46.86KB |
070 CSTI - Slides.pdf |
154.88KB |
072 Ultimate XSS Guide - Slides.pdf |
1.02MB |
073 Analysing javascript files.pdf |
374.59KB |
085 SSRF-Slides.pdf |
385.42KB |
090 WAF_evasion_techniques.pdf |
321.03KB |
092 00_Burp_Suite_Do_i_need_the_profesional_edition.pdf |
57.31KB |
092 01_Burp_Suite_Dashboard.pdf |
384.89KB |
092 02_Burp_suite_Target.pdf |
252.66KB |
092 03_Burp_Match_and_replace.pdf |
691.44KB |
092 04_Burp_suite_Intruder.pdf |
521.48KB |
092 05_Burp_Suite_repeater.pdf |
201.35KB |
092 06_Burp_Suite_Sequencer.pdf |
214.72KB |
092 07_Burp_Suite_Decoder.pdf |
113.25KB |
092 08_Burp_Suite_Comparer.pdf |
237.61KB |
092 09_Burp_Suite_Extender.pdf |
51.43KB |
095 BurpSuite with SQLi links.txt |
161B |
096 96_Burp_Authorize.pdf |
1.27MB |
096 BurpSuite with IDOR links.txt |
106B |
097 BurpSuite with WS links.txt |
100B |
098 BurpSuite with 2FA links.txt |
85B |
099 Bug_Report_Template_markdown.txt |
1.31KB |
1 |
9B |
10 |
430B |
101 broad scope methodology 06-04-2021.txt |
1.18KB |
101 Main app methodology 06-04-2021.txt |
1.83KB |
102 master labs download links.txt |
223B |
102 Ratnightmare2.pdf |
10.56MB |
102 Tempus Fugit 5 - Walkthrough.pdf |
7.44MB |
11 |
503B |
12 |
74B |
13 |
657.54KB |
14 |
555.55KB |
15 |
472.65KB |
16 |
2.57KB |
17 |
58.57KB |
18 |
501.79KB |
19 |
763.13KB |
2 |
67B |
20 |
9.16KB |
21 |
574.73KB |
22 |
1000.16KB |
23 |
787.47KB |
24 |
394.22KB |
25 |
992.53KB |
26 |
684.00KB |
27 |
875.84KB |
28 |
300.74KB |
29 |
357.79KB |
3 |
9B |
30 |
801.46KB |
31 |
217.35KB |
32 |
383.82KB |
33 |
788.96KB |
34 |
673.87KB |
35 |
469.63KB |
36 |
640.13KB |
37 |
80.46KB |
38 |
746.74KB |
39 |
694.24KB |
4 |
249B |
40 |
751.42KB |
41 |
110.29KB |
42 |
517.78KB |
43 |
732.89KB |
44 |
688.14KB |
45 |
345.83KB |
46 |
214.18KB |
47 |
363.14KB |
48 |
328.30KB |
49 |
348.31KB |
5 |
82B |
50 |
966.10KB |
51 |
612.48KB |
52 |
441.49KB |
53 |
786.18KB |
54 |
673.59KB |
55 |
160.87KB |
56 |
137.70KB |
57 |
825.38KB |
58 |
632.48KB |
59 |
6.30KB |
6 |
36B |
60 |
613.91KB |
61 |
988.37KB |
62 |
446.98KB |
63 |
576.33KB |
64 |
685.77KB |
65 |
743.23KB |
66 |
799.08KB |
7 |
65B |
8 |
5B |
9 |
494B |
TutsNode.com.txt |
63B |