Udemy - Bug Bounty : Web Hacking [Desire Course]

  • Category Other
  • Type Tutorials
  • Language English
  • Total size 2.1 GB
  • Uploaded By CourseClub
  • Downloads 648
  • Last checked 2 days ago
  • Date uploaded 6 years ago
  • Seeders 9
  • Leechers 11

Infohash : F6C69920EFD07325A5C33C714F8D72255603E182



Bug Bounty : Web Hacking

In this course you will learn how to hack facebook, google, paypalย  type ofย  web application, you will not just learn
hacking them.

For More Courses Visit: https://desirecourse.net

Files:

[DesireCourse.Net] Udemy - Bug Bounty Web Hacking 1. Let's Get Started
  • 1. Introduction.mp4 (11.3 MB)
  • 1. Introduction.srt (1.4 KB)
  • 2. Disclaimer.mp4 (5.4 MB)
  • 3. Setting Up.mp4 (22.7 MB)
  • 3. Setting Up.srt (2.5 KB)
  • 4. Make Kali Linux Bootable.mp4 (67.4 MB)
  • 4. Make Kali Linux Bootable.srt (4.3 KB)
  • 5. Set up Kali Linux in Vmware.mp4 (46.5 MB)
  • 5. Set up Kali Linux in Vmware.srt (3.0 KB)
  • 6. Setting up Metasploitable.mp4 (9.7 MB)
  • 6. Setting up Metasploitable.srt (2.0 KB)
  • 7. Github.mp4 (19.2 MB)
  • 7. Github.srt (3.1 KB)
  • 8. Free VPN to hide your location.mp4 (18.1 MB)
  • 8. Free VPN to hide your location.srt (2.2 KB)
10. Broken Authentication and Session Management
  • 1. Autorize.mp4 (20.2 MB)
  • 1. Autorize.srt (4.9 KB)
  • 2. Broken Auth - Insecure Login Forms Demo.mp4 (7.9 MB)
  • 2. Broken Auth - Insecure Login Forms Demo.srt (1.5 KB)
  • 3. Privilege.mp4 (11.7 MB)
  • 3. Privilege.srt (2.1 KB)
  • 4. Privilege Bookfresh.mp4 (7.4 MB)
  • 4. Privilege Bookfresh.srt (1.9 KB)
  • 5. Testing for Privilege Manipulation.mp4 (9.4 MB)
  • 5. Testing for Privilege Manipulation.srt (2.1 KB)
  • 6. Session Mgmt - Administrative Portals.mp4 (7.4 MB)
  • 6. Session Mgmt - Administrative Portals.srt (0.9 KB)
  • 7. Session Report.mp4 (17.1 MB)
  • 7. Session Report.srt (3.5 KB)
  • 8. Application logic report.mp4 (12.2 MB)
  • 8. Application logic report.srt (2.2 KB)
  • 9. Application logic similar report.mp4 (6.7 MB)
  • 9. Application logic similar report.srt (1.6 KB)
11. HTML Injection
  • 1. HTML Injection Detection.mp4 (17.8 MB)
  • 1. HTML Injection Detection.srt (2.7 KB)
  • 2. HTML Injection report.mp4 (9.6 MB)
  • 2. HTML Injection report.srt (2.5 KB)
  • 2.1 HTML Injection Report.html (0.1 KB)
  • 3. HTML Injection similar Report.mp4 (5.7 MB)
  • 3. HTML Injection similar Report.srt (1.3 KB)
  • 4. HTML Injection Demo.mp4 (14.8 MB)
  • 4. HTML Injection Demo.srt (2.5 KB)
  • 5. XML External entity.mp4 (9.1 MB)
  • 5. XML External entity.srt (2.0 KB)
  • 6. XXE similar Reports.mp4 (5.3 MB)
  • 6. XXE similar Reports.srt (1.3 KB)
12. Sub domain take over
  • 1. Sub Domain Take over.mp4 (10.6 MB)
  • 1. Sub Domain Take over.srt (3.3 KB)
  • 2. Sub Domain Take over Report.mp4 (9.1 MB)
  • 2. Sub Domain Take over Report.srt (2.0 KB)
  • 3. Remote file Inclusion.mp4 (6.3 MB)
  • 3. Remote file Inclusion.srt (1.7 KB)
13. Remote code execution
  • 1. Remote Code Execution.mp4 (7.8 MB)
  • 1. Remote Code Execution.srt (1.9 KB)
  • 1.1 Remote Code Execution.html (0.1 KB)
  • 10. DNS misconfiguration.mp4 (12.6 MB)
  • 10. DNS misconfiguration.srt (2.8 KB)
  • 11. DNS misconfiguration Similar Reports.mp4 (7.4 MB)
  • 11. DNS misconfiguration Similar Reports.srt (1.3 KB)
  • 2. Remote Code Execution Similar Reports.mp4 (4.9 MB)
  • 2. Remote Code Execution Similar Reports.srt (1.0 KB)
  • 3. Cookies.mp4 (16.2 MB)
  • 3. Cookies.srt (3.3 KB)
  • 4. crt.sh.mp4 (7.0 MB)
  • 4. crt.sh.srt (1.5 KB)
  • 5. Sensitive Data Exposure.mp4 (9.8 MB)
  • 5. Sensitive Data Exposure.srt (2.3 KB)
  • 6. Buffer overflow.mp4 (13.4 MB)
  • 6. Buffer overflow.srt (4.2 KB)
  • 7. Buffer overflow Similar Report.mp4 (6.3 MB)
  • 7. Buffer overflow Similar Report.srt (1.7 KB)
  • 8. IDOR.mp4 (6.6 MB)
  • 8. IDOR.srt (1.9 KB)
  • 9. IDOR Similar Report.mp4 (6.1 MB)
  • 9. IDOR Similar Report.srt (1.2 KB)
14. Denail of service (DoS)
  • 1. Denial of service (DoS).mp4 (7.9 MB)
  • 1. Denial of service (DoS).srt (2.8 KB)
  • 2. DOS report.mp4 (9.9 MB)
  • 2. DOS report.srt (2.2 KB)
  • 3. DOS Similar report.mp4 (6.4 MB)
  • 3. DOS Similar report.srt (1.4 KB)
  • 4. Finding Report using Google.mp4 (30.2 MB)
  • 4. Finding Report using Google.srt (4.6 KB)
  • 5. Searching similar Reports.mp4 (15.9 MB)
  • 5. Searching similar Reports.srt (2.5 KB)
  • 6. HTTP Parameter Pollution.mp4 (7.6 MB)
  • 6. HTTP Parameter Pollution.srt (1.9 KB)
  • 7. OSINT.mp4 (7.2 MB)
  • 7. OSINT.srt (1.8 KB)
15. Miscellaneous
  • 1. DVWA Security Setup.mp4 (8.0 MB)
  • 1. DVWA Security Setup.srt (1.6 KB)
  • 2. Command Injection On Lab.mp4 (25.1 MB)
  • 2. Command Injection On Lab.srt (4.1 KB)
  • 3. Detecting and Exploiting File Upload Vulnerabilities.mp4 (23.4 MB)
  • 3. Detecting and Exploiting File Upload Vulnerabilities.srt (4.3 KB)
  • 4. Using ZAP to Scan Target Website For Vulnerabilities.mp4 (20.9 MB)
  • 4. Using ZAP to Scan Target Website For Vulnerabilities.srt (3.0 KB)
  • 5. Analysing Scan Result.mp4 (16.3 MB)
  • 5. Analysing Scan Result.srt (2.4 KB)
  • 6. SPF Record Validation.mp4 (18.7 MB)
  • 6. SPF Record Validation.srt (2.8 KB)
  • 7. Code Disclosure on Lab.mp4 (36.6 MB)
  • 7. Code Disclosure on Lab.srt (4.0 KB)
  • 8. where you can find vulnerabilities.mp4 (32.1 MB)
  • 8. where you can find vulnerabilities.srt (3.3 KB)
16. Methodology
  • 1. Methodology.mp4 (12.2 MB)
  • 1. Methodology.srt (5.3 KB)
  • 1.1 methodology.txt.txt (2.3 KB)
  • 10. 10-Test for Shared Hosting Vulnerabilities.mp4 (3.7 MB)
  • 10. 10-Test for Shared Hosting Vulnerabilities.srt (1.3 KB)
  • 11. 11-Test for Application Server Vulnerabilities.mp4 (17.1 MB)
  • 11. 11-Test for Application Server Vulnerabilities.srt (4.9 KB)
  • 12. 12-Miscellaneous Checks.mp4 (14.0 MB)
  • 12. 12-Miscellaneous Checks.srt (3.6 KB)
  • 13. 13-Follow Up Any Information Leakage.mp4 (7.9 MB)
  • 13. 13-Follow Up Any Information Leakage.srt (2.2 KB)
  • 14. Reporting Vulnerability 1.mp4 (36.7 MB)
  • 14. Reporting Vulnerability 1.srt (5.0 KB)
  • 15. Reporting Vulnerability 2.mp4 (19.9 MB)
  • 15. Reporting Vulnerability 2.srt (4.1 KB)
  • 16. Mentality of successful bug bounty hunter.mp4 (20.7 MB)
  • 16. Mentality of successful bug bounty hunter.srt (3.1 KB)
  • 17. QUIZ.html (0.1 KB)
  • 18. Bug Bounty Web Hacking Last Lecturer.mp4 (27.2 MB)
  • 18. Bug Bounty Web Hacking Last Lecturer.srt (5.3 KB)
  • 2. 02 Analyze the Application.mp4 (5.6 MB)
  • 2. 02 Analyze the Application.srt (2.0 KB)
  • 3. 03 Test client-side Controls.mp4 (7.9 MB)
  • 3. 03 Test client-side Controls.srt (2.5 KB)
  • 4. 04 Authentication Mechanism.mp4 (9.1 MB)
  • 4. 04 Authentication Mechanism.srt (3.0 KB)
  • 5. 05 Test Session.mp4 (16.9 MB)
  • 5. 05 Test Session.srt (4.6 KB)
  • 6. 06 Test Access Control.mp4 (5.8 MB)
  • 6. 06 Test Access Control.srt (2.2 KB)
  • 7. 07 Test for Input-based vulnerabilities.mp4 (9.7 MB)
  • 7. 07 Test for Input-based vulnerabilities.srt (3.4 KB)
  • 8. 08 Test for function.mp4 (14.5 MB)
  • 8. 08 Test for function.srt (4.4 KB)
  • 9. 09-Test for Logic Flaws.mp4 (7.7 MB)
  • 9. 09-Test for Logic Flaws.srt (2.5 KB)
17. Bonus Lecture
  • 1. Bonus Lecture.html (12.1 KB)
2. Tools
  • 1. Vega.mp4 (19.9 MB)
  • 1. Vega.srt (7.0 KB)
  • 10. Burp Suite.mp4 (20.7 MB)
  • 10. Burp Suite.srt (4.3 KB)
  • 11. Burpsuite Crawling.mp4 (15.0 MB)
  • 11. Burpsuite Crawling.srt (2.4 KB)
  • 12. Scanner.mp4 (35.6 MB)
  • 12. Scanner.srt (6.9 KB)
  • 13. Intruder.mp4 (34.8 MB)
  • 13. Intruder.srt (6.4 KB)
  • 14. Repeater.mp4 (41.8 MB)
  • 14. Repeater.srt (3.4 KB)
  • 15. Sequencer.mp4 (37.0 MB)
  • 15. Sequencer.srt (4.5 KB)
  • 16. Analyzing Sequencer Data.mp4 (34.1 MB)
  • 16. Analyzing Sequencer Data.srt (4.0 KB)
  • 17. Decoder.mp4 (14.8 MB)
  • 17. Decoder.srt (2.1 KB)
  • 18. Comparer.mp4 (17.5 MB)
  • 18. Comparer.srt (1.8 KB)
  • 19. Save and Restore.mp4 (30.2 MB)
  • 19. Save and Restore.srt (3.6 KB)
  • 2. Nikto.mp4 (46.6 MB)
  • 2. Nikto.srt (5.7 KB)
  • 20. Authorization.mp4 (20.0 MB)
  • 20. Authorization.srt (5.1 KB)
  • 21. BWap.mp4 (32.9 MB)
  • 21. BWap.srt (5.0 KB)
  • 22. wapplayzer.mp4 (37.5 MB)
  • 22. wapplayzer.srt (4.5 KB)
  • 23. Firebug.mp4 (19.0 MB)
  • 23. Firebug.srt (3.1 KB)
  • 24. Hack bar.mp4 (18.3 MB)
  • 24. Hack bar.srt (3.4 KB)
  • 25. User agent Switcher.mp4 (14.4 MB)
  • 25. User agent Switcher.srt (2.6 KB)
  • 26. Sublist3r.mp4 (23.9 MB)
  • 26. Sublist3r.srt (3.4 KB)
  • 3. Sub Domain.mp4 (32.7 MB)
  • 3. Sub Domain.srt (4.8 KB)
  • 4. Recon ng.mp4 (79.9 MB)
  • 4. Recon ng.srt (8.6 KB)
  • 5. knockpy.mp4 (16.6 MB)
  • 5. knockpy.srt (2.8 KB)
  • 6. Nmap.mp4 (39.0 MB)
  • 6. Nmap.srt (5.5 KB)
  • 7. Open port Hackerone reports.mp4 (11.0 MB)
  • 7. Open port Hackerone reports.srt (1.4 KB)
  • 8. LFIsuite installation.mp4 (11.1 MB)
  • 8. LFIsuite installation.srt (1.7 KB)
  • 9. Exploitation of LFI.mp4 (17.3 MB)
  • 9. Exploitation of LFI.srt (2.0 KB)
3. WordPress Hacking
  • 1. WP Scan.mp4 (16.0 MB)
  • 1. WP Scan.srt (4.7 KB)
  • 2. WP Scan Codex.mp4 (34.8 MB)
  • 2. WP Scan Codex.srt (4.7 KB)
  • 3. WP Scan Template Monster.mp4 (59.8 MB)
  • 3. WP Scan Template Monster.srt (7.4 KB)
  • 4. WP Scan theme.mp4 (25.0 MB)
  • 4. WP Scan theme.srt (3.3 KB)
  • 5. WP Scan User.mp4 (7.0 MB)
  • 5. WP Scan User.srt (1.2 KB)
  • 6. CMS Map.mp4 (17.6 MB)
  • 6. CMS Map.srt (2.8 KB)
4. Cross-site scripting (XSS)
  • 1. XSS Demo.mp4 (14.4 MB)
  • 1. XSS Demo.srt (2.8 KB)
  • 10. XSS WhatsApp Facebook.mp4 (6.2 MB)
  • 10. XSS WhatsApp Facebook.srt (2.0 KB)
  • 11. Counter Measures for XSS.mp4 (16.6 MB)
  • 11. Counter Measures for XSS.srt (2.4 KB)
  • 2. Manual building xss vector 1.mp4 (10.2 MB)
  • 2. Manual building xss vector 1.srt (2.7 KB)
  • 3. Manual building xss vector 2.mp4 (10.6 MB)
  • 3. Manual building xss vector 2.srt (2.2 KB)
  • 4. Manual building xss vector 3.mp4 (8.9 MB)
  • 4. Manual building xss vector 3.srt (2.2 KB)
  • 5. Exploitation of XSS Phishing Through XSS.mp4 (11.2 MB)
  • 5. Exploitation of XSS Phishing Through XSS.srt (2.6 KB)
  • 6. XSS Through Filter Bypassed XSS payloads on Lab.mp4 (22.7 MB)
  • 6. XSS Through Filter Bypassed XSS payloads on Lab.srt (3.5 KB)
  • 7. XSS Lenovo Yahoo.mp4 (6.9 MB)
  • 7. XSS Lenovo Yahoo.srt (1.9 KB)
  • 8. XSS Uber.mp4 (12.0 MB)
  • 8. XSS Uber.srt (3.4 KB)
  • 9. XSS Paypal.mp4 (7.6 MB)
  • 9. XSS Paypal.srt (1.9 KB)
5. SQL Injection (SQLi)
  • 1. SQL Drupal.mp4 (9.6 MB)
  • 1. SQL Drupal.srt (2.6 KB)
  • 1.1 SQL Drupal.html (0.1 KB)
  • 2. Facebook SQL Injection.mp4 (7.5 MB)
  • 2. Facebook SQL Injection.srt (1.9 KB)
  • 3. Counter Measures for SQL.mp4 (10.6 MB)
  • 3. Counter Measures for SQL.srt (3.1 KB)
  • 4. Template Injection.mp4 (9.5 MB)
  • 4. Template Injection.srt (2.2 KB)
  • 5. Template Injection similar Reports.mp4 (5.2 MB)
  • 5. Template Injection similar Reports.srt (1.0 KB)
6. Clickjacking
  • 1. Clickjacking.mp4 (9.6 MB)
  • 1. Clickjacking.srt (2.9 KB)
  • 2. Clickjacking Report.mp4 (6.3 MB)
  • 2. Clickjacking Report.srt (1.7 KB)
  • 3. Clickjacking Injection Similar Report.mp4 (5.8 MB)
  • 3. Clickjacking Injection Similar Report.srt (1.4 KB)
  • 4. IFrame Demo.mp4 (4.4 MB)
  • 4. IFrame Demo.srt (0.9 KB)
7. Open Redirect Vulnerability
  • 1. Open Redirect Report.mp4 (8.7 MB)
  • 1. Open Redirect Report.srt (2.5 KB)
  • 1.1 Open Redirect Report.html (0.1 KB)
  • 2. Open Redirect Similar Report.mp4 (5.4 MB)
  • 2. Open Redirect Similar Report.srt (1.1 KB)
8. Cross-Site Request Forgery (CSRF)
  • 1. CSRF (change password) Demo.mp4 (6.8 MB)
  • 1. CSRF (change password) Demo.srt (1.3 KB)
  • 2. CSRF Injection.mp4 (11.9 MB)
  • 2. CSRF Injection.srt (2.4 KB)
  • 3. CSRF Townwars.mp4 (4.3 MB)
  • 3. CSRF Townwars.srt (1.2 KB)
  • 4. CRF Badoo.mp4 (9.4 MB)
  • 4. CRF Badoo.srt (2.3 KB)
  • 5. CRLF Injection Similar Report.mp4 (6.3 MB)
  • 5. CRLF Injection Similar Report.srt (1.3 KB)
  • 6. Shellshock.mp4 (5.8 MB)
  • 6. Shellshock.srt (1.6 KB)
  • 7. SSRF.mp4 (8.3 MB)
  • 7. SSRF.srt (1.9 KB)
  • 8. SSRF Similar Report.mp4 (8.1 MB)
  • 8. SSRF Similar Report.srt (1.7 KB)
9. Full Path Disclosure
  • 1. Full Path Disclosure.mp4 (7.1 MB)
  • 1. Full Path Disclosure.srt (2.2 KB)
  • 2. Full Path Disclosure Report.mp4 (5.1 MB)
  • 2. Full Path Disclosure Report.srt (1.3 KB)
  • 3. Full Path Disclosure Similar Report.mp4 (4.5 MB)
  • 3. Full Path Disclosure Similar Report.srt (1.0 KB)
  • 4. Insecure Cryptographic Storage.mp4 (8.5 MB)
  • 4. Insecure Cryptographic Storage.srt (2.1 KB)
  • 5. Insecure Direct object References.mp4 (10.5 MB)
  • 5. Insecure Direct object References.srt (2.3 KB)
  • [CourseClub.Me].url (0.0 KB)
  • [DesireCourse.Net].url (0.0 KB)

There are currently no comments. Feel free to leave one :)

Code:

  • http://0d.kebhana.mx:443/announce
  • udp://tw.opentracker.ga:36920/announce
  • udp://temp1.opentracker.gq:6969/announce
  • udp://temp2.opentracker.gq:6969/announce
  • udp://tracker.torrent.eu.org:451/announce
  • http://torrent.nwps.ws:80/announce
  • udp://explodie.org:6969/announce
  • https://opentracker.xyz:443/announce
  • https://t.quic.ws:443/announce
  • udp://tracker.leechers-paradise.org:6969/announce
  • udp://tracker.coppersurfer.tk:6969/announce
  • udp://tracker.opentrackr.org:1337/announce
  • udp://tracker.zer0day.to:1337/announce
  • udp://eddie4.nl:6969/announce
  • udp://open.demonii.si:1337/announce
R2-CACHE โ˜๏ธ R2 (hit) | CDN: MISS (0s) ๐Ÿ“„ torrent ๐Ÿ• 13 Jan 2026, 11:09:06 am IST โฐ 07 Feb 2026, 11:09:04 am IST โœ… Valid for 21d 0h ๐Ÿ”„ Refresh Cache