Website Hacking / Penetration Testing & Bug Bounty Hunting [Udemy...

  • Category Other
  • Type Tutorials
  • Language English
  • Total size 1.8 GB
  • Uploaded By mfp19
  • Downloads 6207
  • Last checked 7 hours ago
  • Date uploaded 5 years ago
  • Seeders 45
  • Leechers 7

Infohash : 7AB446D27126BE0D852E5892E854ED19630EC795



Become a bug bounty hunter! Hack websites & web applications like black hat hackers and secure them like experts.
What you’ll learn
Install hacking lab & needed software (works on Windows, OS X and Linux).

Discover, exploit and mitigate a number of dangerous vulnerabilities.

Use advanced techniques to discover and exploit these vulnerabilities.

Bypass security measurements and escalate privileges.
Intercept requests using a proxy.
Hack all websites on same server.
Bypass filters and client-side security
Adopt SQL queries to discover and exploit SQL injections in secure pages
Gain full control over target server using SQL injections
Discover & exploit blind SQL injections
Install Kali Linux – a penetration testing operating system
Install windows & vulnerable operating systems as virtual machines for testing
Learn linux commands and how to interact with the terminal
Learn linux basics
Understand how websites & web applications work
Understand how browsers communicate with websites
Gather sensitive information about websites
Discover servers, technologies and services used on target website
Discover emails and sensitive data associated with a specific website
Find all subdomains associated with a website
Discover unpublished directories and files associated with a target website
Find all websites hosted on the same server as the target website
Discover, exploit and fix file upload vulnerabilities
Exploit advanced file upload vulnerabilities & gain full control over the target website
Discover, exploit and fix code execution vulnerabilities
Exploit advanced code execution vulnerabilities & gain full control over the target website
Discover, exploit & fix local file inclusion vulnerabilities
Exploit advanced local file inclusion vulnerabilities & gain full control over the target website
Exploit advanced remote file inclusion vulnerabilities & gain full control over the target website
Discover, fix, and exploit SQL injection vulnerabilities
Bypass login forms and login as admin using SQL injections
Writing SQL queries to find databases, tables and sensitive data such as usernames ad passwords using SQL injections
Bypass filtering, and login as admin without password using SQL injections
Bypass filtering and security measurements
Read / Write files to the server using SQL injections
Patch SQL injections quickly
Learn the right way to write SQL queries to prevent SQL injections
Discover basic & advanced reflected XSS vulnerabilities
Discover basic & advanced stored XSS vulnerabilities
Discover DOM-based XSS vulnerabilities
How to use BeEF framwork
Hook victims to BeEF using reflected, stored and DOM based XSS vulnerabilities
Steal credentials from hooked victims
Run javascript code on hooked victims
Create an undetectable backdoor
Hack into hooked computers and gain full control over them
Fix XSS vulnerabilities & protect yourself from them as a user
What do we mean by brute force & wordlist attacks
Create a wordlist or a dictionary
Launch a wordlist attack and guess admin’s password
Discover all of the above vulnerabilities automatically using a web proxy
Run system commands on the target webserver
Access the file system (navigate between directories, read/write files)
Download, upload files
Bypass security measurements
Access all websites on the same webserver
Connect to the database and execute SQL queries or download the whole database to the local machine


For more Courses: Free Udemy Courses

For Tech Tricks and deals: Hot Pass

Files:

[FreeCourseSite.com] Udemy - Website Hacking Penetration Testing & Bug Bounty Hunting 0. Websites you may like
  • [CourseClub.ME].url (0.1 KB)
  • [FCS Forum].url (0.1 KB)
  • [FreeCourseSite.com].url (0.1 KB)
1. Chapter 1
  • 1. Course Introduction.mp4 (26.0 MB)
  • 1. Course Introduction.srt (3.5 KB)
10. SQL Injection Vulnerabilities
  • 1. What is SQL.mp4 (10.5 MB)
  • 1. What is SQL.srt (7.6 KB)
  • 2. Dangers of SQL Injections.mp4 (6.7 MB)
  • 2. Dangers of SQL Injections.srt (4.0 KB)
11. SQL Injection Vulnerabilities - SQLi In Login Pages
  • 1. Discovering SQL Injections In POST.mp4 (15.5 MB)
  • 1. Discovering SQL Injections In POST.srt (10.6 KB)
  • 1.1 Fix table metasploit.accounts doesn't exist issue.html (0.1 KB)
  • 2. Bypassing Logins Using SQL Injection Vulnerability.mp4 (8.1 MB)
  • 2. Bypassing Logins Using SQL Injection Vulnerability.srt (6.7 KB)
  • 3. Bypassing More Secure Logins Using SQL Injections.mp4 (11.4 MB)
  • 3. Bypassing More Secure Logins Using SQL Injections.srt (8.6 KB)
  • 4. [Security] Preventing SQL Injections In Login Pages.mp4 (11.9 MB)
  • 4. [Security] Preventing SQL Injections In Login Pages.srt (9.8 KB)
12. SQL injection Vulnerabilities - Extracting Data From The Database
  • 1. Discovering SQL Injections in GET.mp4 (15.4 MB)
  • 1. Discovering SQL Injections in GET.srt (8.9 KB)
  • 2. Reading Database Information.mp4 (9.1 MB)
  • 2. Reading Database Information.srt (6.1 KB)
  • 3. Finding Database Tables.mp4 (6.1 MB)
  • 3. Finding Database Tables.srt (3.4 KB)
  • 4. Extracting Sensitive Data Such As Passwords.mp4 (7.6 MB)
  • 4. Extracting Sensitive Data Such As Passwords.srt (5.2 KB)
13. SQL injection Vulnerabilities - Advanced Exploitation
  • 1. Discovering & Exploiting Blind SQL Injections.mp4 (7.9 MB)
  • 1. Discovering & Exploiting Blind SQL Injections.srt (7.6 KB)
  • 1.1 sqli-tips.txt (0.4 KB)
  • 1.2 sqli-quries.txt (0.7 KB)
  • 10. Getting a Direct SQL Shell using SQLmap.mp4 (6.4 MB)
  • 10. Getting a Direct SQL Shell using SQLmap.srt (3.1 KB)
  • 11. [Security] - The Right Way To Prevent SQL Injection Vulnerabilites.mp4 (8.4 MB)
  • 11. [Security] - The Right Way To Prevent SQL Injection Vulnerabilites.srt (6.2 KB)
  • 2. Discovering Complex SQL Injection Vulnerabilities.mp4 (13.0 MB)
  • 2. Discovering Complex SQL Injection Vulnerabilities.srt (9.5 KB)
  • 3. Exploiting an advanced SQL Injection Vulnerability to Extract Passwords.mp4 (7.7 MB)
  • 3. Exploiting an advanced SQL Injection Vulnerability to Extract Passwords.srt (5.5 KB)
  • 4. Bypassing Filters.mp4 (6.5 MB)
  • 4. Bypassing Filters.srt (6.0 KB)
  • 5. Bypassing Security & Accessing All Records.mp4 (69.3 MB)
  • 5. Bypassing Security & Accessing All Records.srt (10.5 KB)
  • 6. [Security] Quick Fix To Prevent SQL Injections.mp4 (13.2 MB)
  • 6. [Security] Quick Fix To Prevent SQL Injections.srt (9.0 KB)
  • 7. Reading & Writing Files On The Server Using SQL Injections.mp4 (12.6 MB)
  • 7. Reading & Writing Files On The Server Using SQL Injections.srt (7.0 KB)
  • 8. Getting A Shell & Controlling The Target Server Using an SQL Injection.mp4 (12.6 MB)
  • 8. Getting A Shell & Controlling The Target Server Using an SQL Injection.srt (10.8 KB)
  • 9. Discovering SQL Injections & Extracting Data Using SQLmap.mp4 (21.5 MB)
  • 9. Discovering SQL Injections & Extracting Data Using SQLmap.srt (8.4 KB)
14. XSS Vulnerabilities
  • 1. Introduction - What is XSS or Cross Site Scripting.mp4 (6.8 MB)
  • 1. Introduction - What is XSS or Cross Site Scripting.srt (3.9 KB)
  • 2. Discovering Basic Reflected XSS.mp4 (6.4 MB)
  • 2. Discovering Basic Reflected XSS.srt (4.2 KB)
  • 3. Discovering Advanced Reflected XSS.mp4 (7.7 MB)
  • 3. Discovering Advanced Reflected XSS.srt (5.9 KB)
  • 3.1 XSS Filter Evasion Cheat Sheet.html (0.1 KB)
  • 4. Discovering An Even More Advanced Reflected XSS.mp4 (11.7 MB)
  • 4. Discovering An Even More Advanced Reflected XSS.srt (9.4 KB)
  • 5. Discovering Stored XSS.mp4 (5.4 MB)
  • 5. Discovering Stored XSS.srt (3.9 KB)
  • 6. Discovering Advanced Stored XSS.mp4 (5.8 MB)
  • 6. Discovering Advanced Stored XSS.srt (4.6 KB)
15. XSS Vulnerabilities - Exploitation
  • 1. Hooking Victims To BeEF Using Reflected XSS.mp4 (10.5 MB)
  • 1. Hooking Victims To BeEF Using Reflected XSS.srt (7.4 KB)
  • 10. Bonus - Using A Basic Delivery Method To Test The Backdoor & Hack Windows 10.mp4 (17.9 MB)
  • 10. Bonus - Using A Basic Delivery Method To Test The Backdoor & Hack Windows 10.srt (9.0 KB)
  • 11. Gaining Full Control Over Windows Target.mp4 (6.4 MB)
  • 11. Gaining Full Control Over Windows Target.srt (4.6 KB)
  • 12. [Security] Fixing XSS Vulnerabilities.mp4 (17.2 MB)
  • 12. [Security] Fixing XSS Vulnerabilities.srt (9.4 KB)
  • 2. Hooking Victims To BeEF Using Stored XSS.mp4 (7.0 MB)
  • 2. Hooking Victims To BeEF Using Stored XSS.srt (5.4 KB)
  • 3. Interacting With Hooked Targets.mp4 (6.5 MB)
  • 3. Interacting With Hooked Targets.srt (5.4 KB)
  • 4. Running Basic Commands On Victims.mp4 (8.0 MB)
  • 4. Running Basic Commands On Victims.srt (5.8 KB)
  • 5. Stealing CredentialsPasswords Using A Fake Login Prompt.mp4 (4.3 MB)
  • 5. Stealing CredentialsPasswords Using A Fake Login Prompt.srt (3.0 KB)
  • 6. Bonus - Installing Veil Framework.mp4 (41.6 MB)
  • 6. Bonus - Installing Veil Framework.srt (7.9 KB)
  • 6.1 Veil Git Repo.html (0.1 KB)
  • 7. Bonus - Veil Overview & Payloads Basics.mp4 (13.6 MB)
  • 7. Bonus - Veil Overview & Payloads Basics.srt (10.0 KB)
  • 8. Bonus - Generating An Undetectable Backdoor Using Veil 3.mp4 (21.0 MB)
  • 8. Bonus - Generating An Undetectable Backdoor Using Veil 3.srt (12.4 KB)
  • 8.1 Another way of generating an undetectable backdoor.html (0.1 KB)
  • 8.2 Nodistribute - Online Virus Scanner.html (0.1 KB)
  • 8.3 Alternative to Nodistribute.html (0.1 KB)
  • 9. Bonus - Listening For Incoming Connections.mp4 (12.6 MB)
  • 9. Bonus - Listening For Incoming Connections.srt (9.1 KB)
16. Insecure Session Management
  • 1. Logging In As Admin Without a Password By Manipulating Cookies.mp4 (12.6 MB)
  • 1. Logging In As Admin Without a Password By Manipulating Cookies.srt (7.3 KB)
  • 2. Discovering Cross Site Request Forgery Vulnerabilities (CSRF).mp4 (19.1 MB)
  • 2. Discovering Cross Site Request Forgery Vulnerabilities (CSRF).srt (9.3 KB)
  • 3. Exploiting CSRF To Change Admin Password Using a HTML File.mp4 (17.7 MB)
  • 3. Exploiting CSRF To Change Admin Password Using a HTML File.srt (9.3 KB)
  • 4. Exploiting CSRF Vulnerabilities To Change Admin Password Using Link.mp4 (14.6 MB)
  • 4. Exploiting CSRF Vulnerabilities To Change Admin Password Using Link.srt (7.6 KB)
  • 5. [Security] The Right Way To Prevent CSRF Vulnerabilities.mp4 (24.3 MB)
  • 5. [Security] The Right Way To Prevent CSRF Vulnerabilities.srt (12.3 KB)
17. Brute Force & Dictionary Attacks
  • 1. Introduction to Brute Force & Dictionary Attacks.mp4 (7.4 MB)
  • 1. Introduction to Brute Force & Dictionary Attacks.srt (5.4 KB)
  • 2. Creating a Wordlist.mp4 (12.3 MB)
  • 2. Creating a Wordlist.srt (8.6 KB)
  • 2.1 Some-Links-To-Wordlists-1.txt (0.3 KB)
  • 3. Guessing Login Password Using a Wordlist Attack With Hydra.mp4 (33.9 MB)
  • 3. Guessing Login Password Using a Wordlist Attack With Hydra.srt (16.5 KB)
18. Discovering Vulnerabilities Automatically Using Owasp ZAP
  • 1. Scanning Target Website For Vulnerabilities.mp4 (8.4 MB)
  • 1. Scanning Target Website For Vulnerabilities.srt (5.4 KB)
  • 2. Analysing Scan Results.mp4 (9.4 MB)
  • 2. Analysing Scan Results.srt (4.8 KB)
19. Post Exploitation
  • 1. Post Exploitation Introduction.mp4 (8.1 MB)
  • 1. Post Exploitation Introduction.srt (5.0 KB)
  • 1.1 Post-Exploitation.pdf (167.9 KB)
  • 2. Executing System Commands On Hacked Web Servers.mp4 (13.4 MB)
  • 2. Executing System Commands On Hacked Web Servers.srt (9.2 KB)
  • 3. Escalating Reverse Shell Access To Weevely Shell.mp4 (11.4 MB)
  • 3. Escalating Reverse Shell Access To Weevely Shell.srt (9.2 KB)
  • 4. Weevely Basics - Accessing Other Websites, Running Shell Commands ...etc.mp4 (13.9 MB)
  • 4. Weevely Basics - Accessing Other Websites, Running Shell Commands ...etc.srt (8.4 KB)
  • 5. Bypassing Limited Privileges & Executing Shell Commands.mp4 (10.4 MB)
  • 5. Bypassing Limited Privileges & Executing Shell Commands.srt (6.9 KB)
  • 6. Downloading Files From Target Webserver.mp4 (10.7 MB)
  • 6. Downloading Files From Target Webserver.srt (6.1 KB)
  • 7. Uploading Files To Target Webserver.mp4 (18.2 MB)
  • 7. Uploading Files To Target Webserver.srt (9.8 KB)
  • 8. Getting a Reverse Connection From Weevely.mp4 (15.7 MB)
  • 8. Getting a Reverse Connection From Weevely.srt (9.8 KB)
  • 9. Accessing The Database.mp4 (21.2 MB)
  • 9. Accessing The Database.srt (21.2 MB)
2. Preparation - Creating a Penetration Testing Lab
  • 1. Lab Overview & Needed Software.mp4 (106.5 MB)
  • 1. Lab Overview & Needed Software.srt (9.6 KB)
  • 1.1 The Lab.pdf (347.0 KB)
  • 1.2 Virtual Box Download Page.html (0.1 KB)
  • 2. Installing Kali 2020 As a Virtual Machine Using a Ready Image.mp4 (142.3 MB)
  • 2. Installing Kali 2020 As a Virtual Machine Using a Ready Image.srt (13.8 KB)
  • 2.1 How To Fix No Nat Network Issue.html (0.1 KB)
  • 2.2 Kali 2020 Download Page.html (0.1 KB)
  • 2.3 How To Fix Blank Screen When Starting Kali.html (0.2 KB)
  • 2.4 Installing Kali Using ISO (use this method to install it as a Main machine)..html (0.1 KB)
  • 3. Installing Metasploitable As a Virtual Machine.mp4 (11.1 MB)
  • 3. Installing Metasploitable As a Virtual Machine.srt (5.4 KB)
  • 3.1 Metasploitable Download Page.html (0.1 KB)
  • 4. Installing Windows As a Virtual Machine.mp4 (9.4 MB)
  • 4. Installing Windows As a Virtual Machine.srt (4.4 KB)
  • 4.1 Windows Image Download Page.html (0.1 KB)
20. Bonus Section
  • 1. Bonus Lecture - What's Next.html (6.7 KB)
3. Preparation - Linux Basics
  • 1. Basic Overview Of Kali Linux.mp4 (107.4 MB)
  • 1. Basic Overview Of Kali Linux.srt (6.5 KB)
  • 2. The Linux Terminal & Basic Linux Commands.mp4 (223.5 MB)
  • 2. The Linux Terminal & Basic Linux Commands.srt (13.9 KB)
  • 2.1 List Of Linux Commands.html (0.1 KB)
  • 3. Configuring Metasploitable & Lab Network Settings.mp4 (15.3 MB)
  • 3. Configuring Metasploitable & Lab Network Settings.srt (7.5 KB)
  • 3.1 How To Fix No Nat Network Issue.html (0.1 KB)
4. Website Basics
  • 1. What is a Website.mp4 (11.7 MB)
  • 1. What is a Website.srt (5.5 KB)
  • 1.1 Intro-what-is-a-website.pdf (360.1 KB)
  • 2. How To Hack a Website .mp4 (16.8 MB)
  • 2. How To Hack a Website .srt (7.9 KB)
5. Information Gathering
  • 1. Gathering Information Using Whois Lookup.mp4 (11.3 MB)
  • 1. Gathering Information Using Whois Lookup.srt (5.9 KB)
  • 1.1 Domaintools Whois Lookup Palge.html (0.1 KB)
  • 1.2 Information Gathering.pdf (111.7 KB)
  • 2. Discovering Technologies Used On The Website.mp4 (16.8 MB)
  • 2. Discovering Technologies Used On The Website.srt (7.3 KB)
  • 2.1 Netcraft.html (0.1 KB)
  • 3. Gathering Comprehensive DNS Information.mp4 (106.5 MB)
  • 3. Gathering Comprehensive DNS Information.srt (12.6 KB)
  • 3.1 robtex.com.html (0.1 KB)
  • 4. Discovering Websites On The Same Server.mp4 (9.3 MB)
  • 4. Discovering Websites On The Same Server.srt (4.6 KB)
  • 5. Discovering Subdomains.mp4 (10.0 MB)
  • 5. Discovering Subdomains.srt (6.6 KB)
  • 5.1 Knock Git Repo.html (0.1 KB)
  • 6. Discovering Sensitive Files.mp4 (15.4 MB)
  • 6. Discovering Sensitive Files.srt (9.0 KB)
  • 7. Analysing Discovered Files.mp4 (8.6 MB)
  • 7. Analysing Discovered Files.srt (5.4 KB)
  • 8. Maltego - Discovering Servers, Domains & Files.mp4 (16.8 MB)
  • 8. Maltego - Discovering Servers, Domains & Files.srt (10.2 KB)
  • 9. Maltego - Discovering Websites, Hosting Provider & Emails.mp4 (10.1 MB)
  • 9. Maltego - Discovering Websites, Hosting Provider & Emails.srt (6.1 KB)
6. File Upload Vulnerabilities
  • 1. How To Discover & Exploit Basic File Upload Vulnerabilities to Hack Websites.mp4 (12.1 MB)
  • 1. How To Discover & Exploit Basic File Upload Vulnerabilities to Hack Websites.srt (8.9 KB)
  • 1.1 File upload, Code execution, LFI, RFI, SQLi, XSS.pdf (541.8 KB)
  • 2. HTTP Requests - GET & POST.mp4 (10.1 MB)
  • 2. HTTP Requests - GET & POST.srt (5.4 KB)
  • 3. Intercepting HTTP Requests.mp4 (16.0 MB)
  • 3. Intercepting HTTP Requests.srt (9.4 KB)
  • 3.1 Configuring Burp to Handle HTTPS.html (0.1 KB)
  • 4. Exploiting Advanced File Upload Vulnerabilities To Hack Websites.mp4 (11.0 MB)
  • 4. Exploiting Advanced File Upload Vulnerabilities To Hack Websites.srt (5.8 KB)
  • 5. Exploiting More Advanced File Upload Vulnerabilities.mp4 (9.1 MB)
  • 5. Exploiting More Advanced File Upload Vulnerabilities.srt (5.4 KB)
  • 6. [Security] Fixing File Upload Vulnerabilities.mp4 (13.3 MB)
  • 6. [Security] Fixing File Upload Vulnerabilities.srt (8.2 KB)
  • 6.1 Link To Secure File Upload Code.html (0.2 KB)
7. Code Execution Vulnerabilities
  • 1. How To Discover & Exploit Basic Code Execution Vulnerabilities To Hack Websites.mp4 (12.4 MB)
  • 1. How To Discover & Exploit Basic Code Execution Vulnerabilities To Hack Websites.srt (9.1 KB)
  • 1.1 code-execution-reverse-shell-commands.txt (0.9 KB)
  • 2. Exploiting Advanced Code Execution Vulnerabilities.mp4 (13.1 MB)
  • 2. Exploiting Advanced Code Execution Vulnerabilities.srt (7.7 KB)
  • 3. [Security] - Fixing Code Execution Vulnerabilities.mp4 (10.4 MB)
  • 3. [Security] - Fixing Code Execution Vulnerabilities.srt (7.4 KB)
8. Local File Inclusion Vulnerabilities (LFI)
  • 1. What are they And How To Discover & Exploit Them.mp4 (9.2 MB)
  • 1. What are they And How To Discover & Exploit Them.srt (6.6 KB)
  • 2. Gaining Shell Access From LFI Vulnerabilities - Method 1.mp4 (15.5 MB)
  • 2. Gaining Shell Access From LFI Vulnerabilities - Method 1.srt (9.1 KB)
  • 3. Gaining Shell Access From LFI Vulnerabilities - Method 2.mp4 (22.4 MB)
  • 3. Gaining Shell Access From LFI Vulnerabilities - Method 2.srt (10.2 MB)
9. Remote File Inclusion Vulnerabilities (RFI)
  • 1. Remote File Inclusion Vulnerabilities - Configuring PHP Settings.mp4 (7.3 MB)
  • 1. Remote File Inclusion Vulnerabilities - Configuring PHP Settings.srt (4.3 KB)
  • 2. Remote File Inclusion Vulnerabilities - Discovery & Exploitation.mp4 (8.5 MB)
  • 2. Remote File Inclusion Vulnerabilities - Discovery & Exploitation.srt (7.4 KB)
  • 3. Exploiting Advanced Remote File Inclusion Vulnerabilities To Hack Websites.mp4 (5.8 MB)
  • 3. Exploiting Advanced Remote File Inclusion Vulnerabilities To Hack Websites.srt (3.5 KB)
  • 4. [Security] Fixing File Inclusion Vulnerabilities.mp4 (10.4 MB)
  • 4. [Security] Fixing File Inclusion Vulnerabilities.srt (7.3 KB)

There are currently no comments. Feel free to leave one :)

Code:

  • udp://zephir.monocul.us:6969/announce
  • udp://tracker.torrent.eu.org:451/announce
  • http://tracker.ipv6tracker.ru:80/announce
  • udp://retracker.hotplug.ru:2710/announce
  • udp://tracker.birkenwald.de:6969/announce
  • udp://torrentclub.tech:6969/announce
  • udp://tracker.filepit.to:6969/announce
  • http://opentracker.h4ck.me:6969/announce
  • http://gwp2-v19.rinet.ru:80/announce
  • udp://bigfoot1942.sektori.org:6969/announce
  • http://tracker.files.fm:6969/announce
  • http://retracker.joxnet.ru:80/announce
  • http://tracker.moxing.party:6969/announce
  • udp://retracker.lanta-net.ru:2710/announce
  • udp://thetracker.org:80/announce
  • http://torrent.nwps.ws:80/announce
  • udp://tracker.iamhansen.xyz:2000/announce
  • https://tracker.vectahosting.eu:2053/announce
  • https://tracker.parrotsec.org:443/announce
  • udp://tracker.supertracker.net:1337/announce
  • udp://carapax.net:6969/announce
  • udp://xxx.xx-x.ga:53/announce
  • udp://retracker.maxnet.ua:80/announce
  • udp://tracker.uw0.xyz:6969/announce
  • udp://retracker.netbynet.ru:2710/announce
  • http://bt-tracker.gamexp.ru:2710/announce
  • udp://tracker.filemail.com:6969/announce
  • udp://bt.dy20188.com:80/announce
  • udp://explodie.org:6969/announce
  • udp://retracker.baikal-telecom.net:2710/announce
  • udp://retracker.akado-ural.ru:80/announce
  • udp://denis.stalker.upeer.me:6969/announce
  • udp://tracker.coppersurfer.tk:6969/announce
  • udp://open.demonii.si:1337/announce
  • http://t.nyaatracker.com:80/announce
  • udp://exodus.desync.com:6969/announce
  • http://tracker3.itzmx.com:6961/announce
  • udp://9.rarbg.com:2730/announce
  • http://tracker.bt4g.com:2095/announce
  • udp://tracker.novg.net:6969/announce
  • http://open.trackerlist.xyz:80/announce
  • https://tracker.fastdownload.xyz:443/announce
  • https://t.quic.ws:443/announce
  • http://web4.obit.ru:80/announce
  • udp://tracker.leechers-paradise.org:6969/announce
  • http://tracker.gbitt.info:80/announce
  • udp://tracker.cyberia.is:6969/announce
  • udp://tracker.trackton.ga:7070/announce
  • udp://tracker.nyaa.uk:6969/announce
  • udp://tracker.internetwarriors.net:1337/announce
  • udp://tracker.moeking.me:6969/announce
  • udp://tracker.opentrackr.org:1337/announce
  • udp://bt.xxx-tracker.com:2710/announce
  • udp://ipv6.tracker.harry.lu:80/announce
  • http://tracker.corpscorp.online:80/announce
  • udp://ipv4.tracker.harry.lu:80/announce
GDRIVE-CACHE πŸ“ GD (hit) | ID: 19Iyq5AbW7... πŸ“„ torrent πŸ• 27 Jan 2026, 03:28:55 pm IST ⏰ 21 Feb 2026, 03:28:55 pm IST βœ… Valid for 22d 6h πŸ”„ Refresh Cache