GetFreeCourses.Co-Udemy-Bug Bounty Hunting – Offensive Approach to Hunt Bugs

mp4   Hot:26   Size:7.39 GB   Created:2022-07-13 19:15:30   Update:2023-12-05 20:57:14  

File List

  • 01 Introduction/001 About Instructor.mp4 198.92 MB
    01 Introduction/002 Course Introduction and Overview.mp4 67.03 MB
    01 Introduction/003 Why you should take this.mp4 26.76 MB
    01 Introduction/004 Teaser of Offensive Approach to Hunt Bugs.mp4 1.04 GB
    02 Information Gathering Basic Terminologies/005 Information Gathering.mp4 150.13 MB
    03 Introduction of Burpsuite/006 Steps to Configure Burpsuite with Firefox.mp4 60.11 MB
    03 Introduction of Burpsuite/007 How to Use Burpsuite - Spider Repeater Intruder.mp4 57.27 MB
    04 Comprehensive XSS/008 Background Concept about XSS.mp4 42.08 MB
    04 Comprehensive XSS/008 Background-Concept-XSS.m4v 10.51 MB
    04 Comprehensive XSS/008 Background-XSS.pdf 25.8 KB
    04 Comprehensive XSS/009 Basic XSS.mp4 155.3 MB
    04 Comprehensive XSS/009 Basic-xss.pdf 18.69 KB
    04 Comprehensive XSS/010 BASIC-XSS-ON-LAB.txt 1.13 KB
    04 Comprehensive XSS/010 Basic XSS on Lab.mp4 199.6 MB
    04 Comprehensive XSS/011 Manual Building XSS Vector.mp4 145.96 MB
    04 Comprehensive XSS/011 Manual-xss.txt 791 B
    04 Comprehensive XSS/012 XSS through Filter Bypassed XSS payloads On Lab.mp4 117.68 MB
    04 Comprehensive XSS/012 xss.txt 11.67 KB
    04 Comprehensive XSS/013 XSS On Live Websites.mp4 233.96 MB
    04 Comprehensive XSS/014 XSS Hunting Live Part 1.mp4 93.41 MB
    04 Comprehensive XSS/015 XSS Hunting Live Part 2.mp4 168.52 MB
    04 Comprehensive XSS/016 XSS Hunting Live Part 3.mp4 86.97 MB
    04 Comprehensive XSS/017 XSS Through Header Parameter.mp4 62.53 MB
    04 Comprehensive XSS/018 Reflected XSS Vs Stored XSS.mp4 51.82 MB
    04 Comprehensive XSS/019 Exploitation of XSS - 1. URL Redirection.mp4 17.83 MB
    04 Comprehensive XSS/020 Exploitation of XSS - 2. Phishing Through XSS.mp4 35.03 MB
    04 Comprehensive XSS/021 Exploitation of XSS - 3. Cookie Stealing.mp4 86.98 MB
    04 Comprehensive XSS/022 XSS Through File Uploading.mp4 45.39 MB
    04 Comprehensive XSS/023 XSS Through Remote File Inclusion.mp4 17.63 MB
    04 Comprehensive XSS/024 Convert Self XSS to Reflected XSS.mp4 39.91 MB
    04 Comprehensive XSS/025 POC - 1 XSS Attack Discovered by Shubham Maheshwari.mp4 18.94 MB
    04 Comprehensive XSS/026 POC - 2 XSS Attack Discovered by Shubham Maheshwari.mp4 10.86 MB
    04 Comprehensive XSS/027 POC - 3 XSS Attack Discovered by Shubham Maheshwari.mp4 10.93 MB
    04 Comprehensive XSS/028 POC 4 XSS Attack Discovered by Ankit Singh.mp4 14.39 MB
    04 Comprehensive XSS/029 POC 5 XSS Attack Discovered by Ankit Singh.mp4 24.95 MB
    04 Comprehensive XSS/030 POC 6 XSS Attack Discovered by Ankit Singh.mp4 35.41 MB
    04 Comprehensive XSS/031 POC 7 XSS Attack Discovered by Ankit Singh.mp4 12.55 MB
    04 Comprehensive XSS/032 POC 8 XSS Attack Discovered by Ankit Singh.mp4 20.87 MB
    05 Host Header Injection/033 HHA.txt 1.17 KB
    05 Host Header Injection/033 Overview of Host Header Injection.mp4 16.56 MB
    05 Host Header Injection/034 Host Header Attack 1. Open Redirection.mp4 72.96 MB
    05 Host Header Injection/035 Host Header Attack 2. Cache Poisoning.mp4 19.77 MB
    05 Host Header Injection/036 Host Header Attack 3. Password Reset Poisoning.mp4 34.52 MB
    05 Host Header Injection/037 Host Header Attack 4. XSS Through Host Header.mp4 30.52 MB
    05 Host Header Injection/038 POC - 1 Host Header attack by Shubham Maheshwari.mp4 8.18 MB
    05 Host Header Injection/039 POC - 2 Host Header Attack Discovered by Shubham Maheshwari.mp4 8.88 MB
    05 Host Header Injection/040 POC - 3 Host Header Attack Discovered by Shubham Maheshwari.mp4 9.77 MB
    05 Host Header Injection/041 POC -4 Host Header Attack Discovered by Shubham Maheshwari.mp4 10.78 MB
    05 Host Header Injection/042 POC - 5 Host Header Attack Discovered by Shubham Maheshwari.mp4 11.39 MB
    05 Host Header Injection/043 POC - 6 Host Header Attack Discovered by Shubham Maheshwari.mp4 14.01 MB
    05 Host Header Injection/044 POC - 7 Host Header Attack Discovered by Shubham Maheshwari.mp4 9.29 MB
    06 URL Redirection/045 Background Concept about URL Redirection.mp4 1.96 MB
    06 URL Redirection/045 URL-Redirection-Background.pdf 31.99 KB
    06 URL Redirection/046 URL Redirection Through Get Parameter.mp4 21.85 MB
    06 URL Redirection/046 URL-Redirection-Through-Get-Parameter.pdf 30.14 KB
    06 URL Redirection/047 URL Redirection Through Path Fragments.mp4 17.39 MB
    06 URL Redirection/048 POC of URL Redirection 1.mp4 335.79 KB
    06 URL Redirection/048 Screen-Shot-E8-03-22-at-09.56.19.png 50.69 KB
    06 URL Redirection/049 POC of URL Redirection 2.html 1.26 KB
    06 URL Redirection/050 POC 3 Open Redirection Vulnerability Discovered by Shubham Maheshwari.mp4 5.65 MB
    06 URL Redirection/051 POC 4 Open Redirection Vulnerability Discovered by Shubham Maheshwari.mp4 6.67 MB
    06 URL Redirection/052 POC 5 Open Redirection Vulnerability Discovered by Shubham Maheshwari.mp4 9.99 MB
    06 URL Redirection/053 POC 6 Open Redirection Vulnerability Discovered by Dawood Ansar.mp4 17.03 MB
    07 Parameter Tampering/054 Background Concept about Parameter Tampering.mp4 4.84 MB
    07 Parameter Tampering/054 Background-Parameter-Tampering.pdf 25.29 KB
    07 Parameter Tampering/055 Parameter Tampering - Example 1.mp4 7.31 MB
    07 Parameter Tampering/056 Parameter Tampering - Example 2.mp4 7.88 MB
    07 Parameter Tampering/057 Parameter Tampering - Example 3.mp4 6.82 MB
    07 Parameter Tampering/058 Parameter Tampering - Example 4.mp4 13.89 MB
    07 Parameter Tampering/059 Parameter Tampering - Example 5.mp4 12.31 MB
    08 HTML Injection/060 Background Concept about HTML Injection.mp4 2.16 MB
    08 HTML Injection/060 Background-HTMLI.m4v 2.14 MB
    08 HTML Injection/061 HTML Injection Finding - Example1.mp4 6.67 MB
    08 HTML Injection/062 HTML Injection Finding - Example2.mp4 13.65 MB
    08 HTML Injection/063 HTML Injection Finding - Example3.mp4 12.44 MB
    08 HTML Injection/064 Exploitation of HTML Injection.html 2.42 KB
    09 File Inclusion/065 Background Concept about File Inclusion.mp4 17.89 MB
    09 File Inclusion/065 File-incusion.txt 1.11 KB
    09 File Inclusion/066 LFI Vs RFI.mp4 41.26 MB
    09 File Inclusion/067 LFI Hunting Part 1.mp4 28.91 MB
    09 File Inclusion/068 LFI Hunting Part 2.mp4 48.37 MB
    09 File Inclusion/068 pathtotest-huge.txt 488.35 KB
    09 File Inclusion/069 Exploitation of LFI.mp4 31.34 MB
    09 File Inclusion/070 RFI Hunting.mp4 50.9 MB
    10 Missinginsufficient SPF record/071 Background Concept about Missing insufficient SPF record.mp4 3.45 MB
    10 Missinginsufficient SPF record/071 Background-SPF.pdf 23.05 KB
    10 Missinginsufficient SPF record/072 Testing SPF.mp4 6.9 MB
    10 Missinginsufficient SPF record/072 Testing-SPF.pdf 19.67 KB
    10 Missinginsufficient SPF record/073 Exploitation of SPF.mp4 11.42 MB
    10 Missinginsufficient SPF record/074 POC 1 SPF.mp4 15.17 MB
    10 Missinginsufficient SPF record/075 POC 2 - SPF Vulnerability Discovered by Shubham Maheshwari.mp4 14.33 MB
    10 Missinginsufficient SPF record/076 POC 3 - SPF Vulnerability Discovered by Shubham Maheshwari.mp4 15.48 MB
    10 Missinginsufficient SPF record/077 POC 4 - SPF Vulnerability Discovered by Shubham Maheshwari.mp4 18.37 MB
    10 Missinginsufficient SPF record/078 POC 5 - SPF Vulnerability Discovered by Shubham Maheshwari.mp4 12.39 MB
    11 Insecure CORS Configuration/079 Background Concept about CORS.mp4 4.37 MB
    11 Insecure CORS Configuration/079 Background-Concept-Insecure-CORS.pdf 23.93 KB
    11 Insecure CORS Configuration/080 Insecure CORS by Checking Response Header.mp4 13.08 MB
    11 Insecure CORS Configuration/080 Insecure-CORS-Response-Header.pdf 22.9 KB
    11 Insecure CORS Configuration/081 Insecure CORS through Request Header.mp4 17.1 MB
    11 Insecure CORS Configuration/081 Insecure-CORS-Through-Request-Header.pdf 40.31 KB
    11 Insecure CORS Configuration/082 Exploitation of Insecure CORS.mp4 28.16 MB
    11 Insecure CORS Configuration/082 exploitation-cors.pdf 26.51 KB
    11 Insecure CORS Configuration/083 POC Insecure CORS.html 1.02 KB
    12 Server Side Request Forgery/084 Background Concept about SSRF.mp4 13.69 MB
    12 Server Side Request Forgery/085 SSRF Testing on Lab.mp4 110.84 MB
    12 Server Side Request Forgery/086 SSRF on Live web.mp4 52.12 MB
    12 Server Side Request Forgery/086 SSRF.pdf 35.96 KB
    12 Server Side Request Forgery/087 Exploitation of SSRF attack.mp4 102.59 MB
    12 Server Side Request Forgery/087 SSRF.pdf 35.96 KB
    13 Critical File Found/088 Background Concept about Critical File Found.mp4 17.63 MB
    13 Critical File Found/089 Critical File Found on Live web 1.mp4 72.38 MB
    13 Critical File Found/089 dicc.txt 82.14 KB
    13 Critical File Found/090 Critical File Found on Live web 2.mp4 137.58 MB
    13 Critical File Found/090 Critical-File.pdf 23.07 KB
    14 Source Code Disclosure/091 Background Concept about Source Code Disclosure.mp4 12.28 MB
    14 Source Code Disclosure/092 Source Code Disclosure on Lab.mp4 42.57 MB
    14 Source Code Disclosure/093 Source Code Disclosure on Live Web.mp4 23.14 MB
    14 Source Code Disclosure/093 dicc.txt 82.14 KB
    15 Cross Site Request Forgery/094 Background Concept about CSRF.mp4 25.41 MB
    15 Cross Site Request Forgery/095 Injection Point for CSRF.mp4 12.64 MB
    15 Cross Site Request Forgery/096 CSRF on Logout Page.mp4 21.08 MB
    15 Cross Site Request Forgery/097 CSRF Live.mp4 33.03 MB
    15 Cross Site Request Forgery/098 CSRF page on some critical Business Logic Page.mp4 50.71 MB
    15 Cross Site Request Forgery/099 CSRF POC -1 Discovered by Ankit Singh.mp4 22.65 MB
    15 Cross Site Request Forgery/100 CSRF POC 2 Discovered by Ankit Singh.mp4 26.32 MB
    15 Cross Site Request Forgery/101 CSRF POC -3 Discovered by Ankit Singh.mp4 20.6 MB
    16 Hostile Subdomain Takeover/102 Background Concept about Hostile Subdomain Takeover.mp4 51.88 MB
    16 Hostile Subdomain Takeover/103 Hostile Subdomain Takeover on Live web 1.mp4 93.94 MB
    16 Hostile Subdomain Takeover/103 Hostile.txt 953 B
    16 Hostile Subdomain Takeover/104 Hostile Subdomain Takeover on Live web 2.mp4 82.22 MB
    17 SQL Injection/105 Background Concept about SQL injection.mp4 27.49 MB
    17 SQL Injection/106 SQL Injection Lab Setup.mp4 73.9 MB
    17 SQL Injection/107 Injection Point for SQL Injection.mp4 43.58 MB
    17 SQL Injection/108 Learn SQL Query Fixing.mp4 103.34 MB
    17 SQL Injection/108 SQLI.pdf 38.41 KB
    17 SQL Injection/109 SQLI GET Based Part 1.mp4 117.91 MB
    17 SQL Injection/110 SQLI GET Based Part 2.mp4 63.64 MB
    17 SQL Injection/111 SQLI GET Based Part 3.mp4 107.64 MB
    17 SQL Injection/112 Exploitation of GET Based SQLI.mp4 236.99 MB
    17 SQL Injection/112 sqli.txt 3.97 KB
    17 SQL Injection/113 SQLI POST Based Part 1.mp4 107.3 MB
    17 SQL Injection/114 SQLI POST Based Part 2.mp4 113.97 MB
    17 SQL Injection/115 Exploitation of POST Based SQLI.mp4 146.13 MB
    17 SQL Injection/115 sqli.txt 10.53 KB
    17 SQL Injection/116 SQLI Header Based.mp4 45.98 MB
    17 SQL Injection/117 Exploitation of Header Based SQLI.mp4 23.19 MB
    17 SQL Injection/118 SQLI Cookie Based.mp4 37.56 MB
    17 SQL Injection/119 Exploitation of Cookie Based SQLI.mp4 30.07 MB
    17 SQL Injection/120 WAF Bypassing for SQLI.mp4 90.14 MB
    17 SQL Injection/121 Authentication Bypassing through SQLI.mp4 57.87 MB
    17 SQL Injection/122 Automation of SQLI GET Based.mp4 175.65 MB
    17 SQL Injection/122 SQLI.pdf 38.41 KB
    17 SQL Injection/123 Automation of SQLI Post Based Header Based and Cookie Based.mp4 118.05 MB
    17 SQL Injection/124 Automation of SQLI Part 3 With WAF Bypassing.mp4 96.77 MB
    17 SQL Injection/125 SQLI on Live Web 1.mp4 48.19 MB
    17 SQL Injection/125 SQLI.pdf 38.41 KB
    17 SQL Injection/126 SQLI Live Bug Bounty Website.mp4 174.36 MB
    17 SQL Injection/127 SQL Injection Live Website.mp4 43.28 MB
    18 Command Injection/128 Background Concept about Command Injection.mp4 4.94 MB
    18 Command Injection/128 Background-CMDi.pdf 26.89 KB
    18 Command Injection/129 Command Injection on Lab Part 1.mp4 9.67 MB
    18 Command Injection/130 Command Injection on Live Web 1.mp4 11.32 MB
    18 Command Injection/131 Command Injection on Live Web 2.mp4 6.14 MB
    18 Command Injection/131 Delimeter-List.txt 72 B
    18 Command Injection/131 cmd.txt 4.87 KB
    18 Command Injection/132 Exploitation of Command Injection.mp4 8.09 MB
    18 Command Injection/132 exploitation-CMDI.pdf 30.84 KB
    19 File Uploading/133 Background Concept about File Uploading.mp4 10.03 MB
    19 File Uploading/133 File-Uploading.pdf 25 KB
    19 File Uploading/134 File Uploading Part 1.mp4 73.42 MB
    19 File Uploading/135 File Uploading Part 2.mp4 46.15 MB
    19 File Uploading/136 File Uploading Part3.mp4 54.4 MB
    19 File Uploading/137 File Uploading on Live Part 2.mp4 13.51 MB
    20 XML External Entity Injection/138 Background Concept about XXE Injection.mp4 13.85 MB
    20 XML External Entity Injection/138 XXE.pdf 22.63 KB
    20 XML External Entity Injection/139 XXE on Lab.mp4 25.81 MB
    20 XML External Entity Injection/139 xml-attacks.txt 12.16 KB
    21 Thank you/140 Thank you message from Vikash Chaudhary.mp4 2.02 MB
    Download Paid Udemy Courses For Free.url 116 B
    GetFreeCourses.Co.url 116 B
    How you can help GetFreeCourses.Co.txt 182 B

Download Info

  • Tips

    “GetFreeCourses.Co-Udemy-Bug Bounty Hunting – Offensive Approach to Hunt Bugs” Its related downloads are collected from the DHT sharing network, the site will be 24 hours of real-time updates, to ensure that you get the latest resources.This site is not responsible for the authenticity of the resources, please pay attention to screening.If found bad resources, please send a report below the right, we will be the first time shielding.

  • DMCA Notice and Takedown Procedure

    If this resource infringes your copyright, please email([email protected]) us or leave your message here ! we will block the download link as soon as possiable.