ZDResearch Advanced Web Hacking

  • Category Other
  • Type Tutorials
  • Language English
  • Total size 2.3 GB
  • Uploaded By Source1337
  • Downloads 287
  • Last checked 3 days ago
  • Date uploaded 4 years ago
  • Seeders 6
  • Leechers 6

Infohash : 8C012CB4CC5766619915218A08D82D1182B70216



❤❤❤❤❤❤❤❤❤❤❤❤❤❤❤❤❤❤❤❤❤❤❤❤❤❤❤❤❤❤❤❤❤❤❤❤❤❤❤❤❤❤❤❤❤❤❤❤❤❤❤❤❤❤

Quote:

We upload these learning materials for the people from all over the world, who have the talent and motivation to sharpen their skills/knowledge but do not have the financial support to afford the materials. If you like this content and if you are truly in a position that you can actually buy the materials, then Please, we repeat, Please, Support Authors. They Deserve it! Because always remember, without “Them”, you and we won’t be here having this conversation. Think about it! ☮️ Peace.✌️



Code:

This is the flagship web application security course provided by ZDResearch Training. In this course you will go through a multitude of web application security topics, all accompanied by demos and hands-on labs. Topics will cover traditional OWASP Top 10 issues as well as several other cutting-edge topics, such as HTML5 attacks, Source Code Auditing and Analysis, CAPTCHA bypass and many more.

Advanced Web Hacking course is the product of 10+ years of web application vulnerability research performed by ZDResearch hunters. Not only it will go through some of the typical methods and techniques used to attack and exploit (as well as defend) web applications, it will teach you the delicate tricks of the trade in the process. For example, you will learn how to fully exploit a system that only allows SQL injection into the LIMIT BY clause, or how to bypass taint based web application firewalls.


Files:

ZDResearchAdvancedWebHacking.5.2 CH_4_CSRF Attacks
  • Section4-Lecture1-Introduction.mp4 (56.1 MB)
  • Advanced Web Hacking Exdemy.mp4 (24.5 MB)
  • Section4-Assignment1-FetchAPI.pdf (326.5 KB)
  • Section4-Lecture2-IntroductionDemo.mp4 (11.9 MB)
  • Section4-Lecture3-CSRFAndCSRFToken.mp4 (22.5 MB)
  • Section4-Lecture4-HowCSRFWorks.mp4 (11.4 MB)
  • Section4-Lecture5-GetAndPostCSRF.mp4 (26.6 MB)
  • Section4-Lecture6-CSRFViaJavascript.mp4 (27.4 MB)
  • Section4-Lecture7-FileUploadCSRF.mp4 (14.2 MB)
  • Section4-Lecture9-RealWorldCSRFProtection.mp4 (21.6 MB)
CH_1_Advanced SQL Injection
  • 6 Simple Memory Techniques.html (0.1 KB)
  • Chap_1_SQLi_Prologue.mp4 (39.3 MB)
  • Section1-Assignment1-FindingSQLInjection.pdf (348.9 KB)
  • Section1-Assignment2-PatchSQLInjection.pdf (455.4 KB)
  • Section1-Assignment3-AuthenticationBypass.pdf (258.4 KB)
  • Section1-Assignment4-DumpTable.pdf (285.8 KB)
  • Section1-Assignment5-WriteFilesWithSQLInjection.pdf (335.3 KB)
  • Section1-Assignment6-AutomaticBlindSQLInjection-script.pdf (372.5 KB)
  • Section1-Assignment7-BypassBlacklists.pdf (294.9 KB)
  • Section1-Assignment8-SecondOrderSQLInjection.pdf (245.7 KB)
  • Section1-Lecture2-Finding_SQL_Injection-Automatticaly.mp4 (50.0 MB)
  • Section1-Lecture2-Finding_SQL_Injection-Manually.mp4 (40.0 MB)
  • Section1-Lecture3-Protection_Strategies.mp4 (19.1 MB)
  • Section1-Lecture4-DBMS_Detection.mp4 (17.9 MB)
  • Section1-Lecture5-Authentication_Bypass.mp4 (19.1 MB)
  • Section1-Lecture6-Union_Based.mp4 (49.7 MB)
  • Section1-Lecture7-Reading_and_Writing_Files.mp4 (18.4 MB)
  • Section1-Lecture8-Blind_Injection.mp4 (35.4 MB)
  • Section1-Lecture9-Double_Blind.mp4 (20.8 MB)
  • Section1-Lecture10-Error_Based.mp4 (46.7 MB)
  • Section1-Lecture11-System_Takeover.mp4 (52.8 MB)
  • Section1-Lecture12-Automated_Tools.mp4 (8.2 MB)
  • Section1-Lecture13-Bypassing_Blacklists.mp4 (10.3 MB)
  • Section1-Lecture14-Orderby_Limit.mp4 (16.4 MB)
  • Section1-Lecture15-Second_Order.mp4 (42.1 MB)
  • ZDResearch-AWH-Prologue.pdf (268.3 KB)
CH_2_Other Injection Attacks
  • Linux Tails Operating System.html (0.1 KB)
  • Section2-Assignment1-CommandInjection.pdf (240.9 KB)
  • Section2-Assignment2-CodeInjection.pdf (236.6 KB)
  • Section2-Assignment3-XPathInjection.pdf (240.7 KB)
  • Section2-Lecture1-OSCommandInjection.mp4 (10.1 MB)
  • Section2-Lecture2-FindingOSCommandInjection.mp4 (13.7 MB)
  • Section2-Lecture3-ReverseShellUsingCommandInjection.mp4 (14.1 MB)
  • Section2-Lecture4-BypassingFilenameFilters.mp4 (22.0 MB)
  • Section2-Lecture5-BypassingFilenameFiltersDemo.mp4 (14.2 MB)
  • Section2-Lecture6-BypassingDirectoryStructureFilters.mp4 (11.6 MB)
  • Section2-Lecture7-BypassingFileTypeFilters.mp4 (21.0 MB)
  • Section2-Lecture8-CodeInjection.mp4 (45.2 MB)
  • Section2-Lecture9-FileInclusionDemo.mp4 (15.9 MB)
  • Section2-Lecture10-CodeInjectionDemo.mp4 (19.3 MB)
  • Section2-Lecture11-UnsafeReflection.mp4 (14.9 MB)
  • Section2-Lecture12-ObjectInjection.mp4 (34.3 MB)
  • Section2-Lecture13-ObjectInjectionDemo.mp4 (36.5 MB)
  • Section2-Lecture14-XXEInjection.mp4 (10.5 MB)
  • Section2-Lecture15-XXEDemo.mp4 (11.8 MB)
  • Section2-Lecture16-XPathInjection.mp4 (16.8 MB)
CH_3_XSS Attacks
  • Section3-Assignment1-ReflectiveXSS.pdf (237.1 KB)
  • Section3-Assignment2-SessionHijacking.pdf (236.4 KB)
  • Section3-Assignment3-BypassXSSFilter.pdf (298.0 KB)
  • Section3-Assignment4-XSSAndEncoding.pdf (248.4 KB)
  • Section3-Assignment5-PreventXSS.pdf (250.3 KB)
  • Section3-Lecture1-Introduction.mp4 (17.3 MB)
  • Section3-Lecture2-ReflectiveXSS.mp4 (7.6 MB)
  • Section3-Lecture3-ReflectiveXSSDemo.mp4 (8.8 MB)
  • Section3-Lecture4-ReflectiveXSSRealWorldDemo.mp4 (7.9 MB)
  • Section3-Lecture5-PersistentXSS.mp4 (6.6 MB)
  • Section3-Lecture6-PersistentXSSDemo.mp4 (4.1 MB)
  • Section3-Lecture7-PersistentXSSRealWorldDemo.mp4 (8.9 MB)
  • Section3-Lecture8-DOMXSS.mp4 (5.9 MB)
  • Section3-Lecture9-DOMXSSDemo.mp4 (9.1 MB)
  • Section3-Lecture10-DOMXSSRealWorldExample.mp4 (9.8 MB)
  • Section3-Lecture11-mXSS.mp4 (5.5 MB)
  • Section3-Lecture12-mXSSDemo.mp4 (15.4 MB)
  • Section3-Lecture13-SessionHijackingWithXSS.mp4 (11.0 MB)
  • Section3-Lecture14-SessionHijackingDemo.mp4 (9.4 MB)
  • Section3-Lecture15-PhishingWithXSS.mp4 (12.6 MB)
  • Section3-Lecture16-XSSKeyloggers.mp4 (19.6 MB)
  • Section3-Lecture17-ClickjackingWithXSS.mp4 (14.7 MB)
  • Section3-Lecture18-ClickjackingDemo.mp4 (4.5 MB)
  • Section3-Lecture19-CryptocurrencyMiningWithXSS.mp4 (29.6 MB)
  • Section3-Lecture20-RemoteControlWithXSS.mp4 (16.9 MB)
  • Section3-Lecture21-BypassingXSSBlacklists.mp4 (14.6 MB)
  • Section3-Lecture22-PreventingXSS.mp4 (15.7 MB)
. Before you Start - Download Resources and tools
  • Download Resources and Tools (Attechments).html (0.1 KB)
CH_5_HTML5 Attacks
  • Section5-Assignment1-Pastejacking.pdf (255.1 KB)
  • Section5-Lecture1-Introduction.mp4 (1.6 MB)
  • Section5-Lecture2-CrossWindowMessaging.mp4 (16.5 MB)
  • Section5-Lecture3-CrossWindowMessagingDemo.mp4 (11.5 MB)
  • Section5-Lecture4-CrossOriginResourceSharing.mp4 (13.7 MB)
  • Section5-Lecture5-CORSRealWorldExample.mp4 (13.8 MB)
  • Section5-Lecture6-WebSockets.mp4 (38.8 MB)
  • Section5-Lecture7-WebSocketHijackingDemo.mp4 (16.4 MB)
  • Section5-Lecture8-WebStorage.mp4 (6.9 MB)
  • Section5-Lecture9-WebStorageDemo.mp4 (10.5 MB)
  • Section5-Lecture10-ContentSecurityPolicy.mp4 (10.2 MB)
  • Section5-Lecture11-CSPDemo.mp4 (17.7 MB)
  • Section5-Lecture12-DragAndDrop.mp4 (6.9 MB)
  • Section5-Lecture13-DragAndDropXSS.mp4 (7.1 MB)
  • You Can Boost Brain Power.html (0.1 KB)
CH_6_Session Management Attacks
  • Seagate Expansion Desktop 10TB External Hard Drive HDD - USB 3.0.html (0.1 KB)
  • Section6-Assignment1-SessionHijacking.pdf (239.0 KB)
  • Section6-Lecture1-Introduction.mp4 (7.7 MB)
  • Section6-Lecture2-SessionHijacking.mp4 (21.9 MB)
  • Section6-Lecture3-SessionHijackingDemo.mp4 (16.1 MB)
  • Section6-Lecture4-SessionFixation.mp4 (27.4 MB)
  • Section6-Lecture5-SessionFixationDemo.mp4 (13.5 MB)
  • Section6-Lecture6-SessionFixationRealWorldExample.mp4 (12.5 MB)
CH_7_Web Service Attacks
  • Section7-Assignment1-BypassAccessControl.pdf (363.9 KB)
  • Section7-Assignment2-JSONWebToken.pdf (288.0 KB)
  • Section7-Assignment3-WordpressContentInjection.pdf (252.9 KB)
  • Section7-Lecture1-Introduction.mp4 (1.0 MB)
  • Section7-Lecture2-UnderstandingWebServices.mp4 (17.7 MB)
  • Section7-Lecture3-AttackingREST.mp4 (5.5 MB)
  • Section7-Lecture4-RESTApi.mp4 (13.2 MB)
  • Section7-Lecture5-InputValidationInREST.mp4 (6.4 MB)
  • Section7-Lecture6-AccessControlInREST.mp4 (9.1 MB)
  • Section7-Lecture7-JWT.mp4 (12.9 MB)
  • Section7-Lecture8-JWTDemo.mp4 (24.1 MB)
  • Section7-Lecture9-SecurityHeadersInREST.mp4 (10.3 MB)
  • Section7-Lecture10-ErrorHandlingInREST.mp4 (12.5 MB)
  • Section7-Lecture11-ContentInjectionRealWorldExample.mp4 (18.8 MB)
  • Section7-Lecture12-AttackingSOAP.mp4 (5.3 MB)
  • Section7-Lecture13-ValidationInSOAP.mp4 (6.5 MB)
  • Section7-Lecture14-WSDLEnumeration.mp4 (7.1 MB)
  • Section7-Lecture15-WSDLEnumerationDemo.mp4 (17.6 MB)
  • Section7-Lecture16-SAXInjection.mp4 (3.0 MB)
  • Section7-Lecture17-SAXInjectionDemo.mp4 (8.0 MB)
  • Section7-Lecture18-SOAPWebServiceSQLInjectionDemo.mp4 (12.1 MB)
  • Section7-Lecture19-SSRF.mp4 (14.1 MB)
  • Section7-Lecture20-SSRFRealWorldExample.mp4 (16.1 MB)
CH_8_Authentication & Authorization Attacks
  • Section8-Assignment1-HTTPBasicAuthentication.pdf (308.2 KB)
  • Section8-Assignment2-SentryMBA.pdf (624.2 KB)
  • Section8-Lecture1-Introduction.mp4 (27.3 MB)
  • Section8-Lecture2-SniffingWebBasedAuthentication.mp4 (14.1 MB)
  • Section8-Lecture3-BreakingAuthorization.mp4 (10.1 MB)
  • Section8-Lecture4-BreakingAuthorizationDemo.mp4 (14.6 MB)
  • Section8-Lecture5-HTTPVerbTamperingDemo.mp4 (11.6 MB)
  • Section8-Lecture6-BruteForceAttacks.mp4 (23.0 MB)
  • Section8-Lecture7-BruteForceAttackDemo.mp4 (25.4 MB)
  • Section8-Lecture8-BruteForceAttackDemo2.mp4 (31.2 MB)
  • Section8-Lecture9-BypassingCaptchas.mp4 (15.4 MB)
  • Section8-Lecture10-BypassingCaptchaDemo.mp4 (21.1 MB)
  • Section8-Lecture11-BypassingCaptchaRealWorldExample.mp4 (10.2 MB)
  • Section8-Lecture12-SentryMBA.mp4 (11.4 MB)
  • Section8-Lecture13-SentryMBADemo.mp4 (22.4 MB)
  • Section8-Lecture14-OtherWebsitesOnServer.mp4 (9.7 MB)
  • Section8-Lecture15-BypassingAuthorizationWithSymlinks.mp4 (19.9 MB)
  • Section8-Lecture16-DirtyCowLocalRootExploit.mp4 (7.3 MB)
  • Yubico - YubiKey 5 NFC.html (0.1 KB)
CH_9_Other Attacks
  • Defense against the Black Arts.html (0.1 KB)
  • Section9-Assignment1-ProtectWebserverAgainstSlowloris.pdf (270.5 KB)
  • Section9-Assignment2-CachePoisoning.pdf (246.5 KB)
  • Section9-Lecture1-HumanApiForCAPTCHA.mp4 (5.3 MB)
  • Section9-Lecture2-HumanApiForCAPTCHADemo.mp4 (32.5 MB)
  • Section9-Lecture3-WAF.mp4 (8.0 MB)
  • Section9-Lecture4-ModSecurityDemo.mp4 (40.6 MB)
  • Section9-Lecture5-ModSecurityDemo2.mp4 (15.3 MB)
  • Section9-Lecture6-ThirdPartyComponents.mp4 (8.6 MB)
  • Section9-Lecture7-DetectingVulnerableThirdPartyComponents.mp4 (42.7 MB)
  • Section9-Lecture8-OpenRedirect.mp4 (6.6 MB)
  • Section9-Lecture9-OpenRedirectRealWorldExample.mp4 (9.9 MB)
  • Section9-Lecture10-DenialOfService.mp4 (26.0 MB)
  • Section9-Lecture11-DOSDemo.mp4 (21.4 MB)
  • Section9-Lecture12-DefendingAgainstDOSDemo.mp4 (40.2 MB)
  • Section9-Lecture13-HTTPResponseSplitting.mp4 (6.1 MB)
  • Section9-Lecture14-HTTPResponseSplittingDemo.mp4 (11.8 MB)
  • Section9-Lecture15-HTTPVerbTampering.mp4 (6.9 MB)
  • Section9-Lecture16-HTTPVerbTamperingDemo.mp4 (11.6 MB)
referrals
  • Echo Dot (3rd Gen) - Smart speaker with Alexa - Charcoal.html (0.1 KB)
  • hackers bags.html (0.1 KB)
  • Learn How to Use Linux, Linux Mint Cinnamon 20 Bootable 8GB USB Flash Drive.html (0.1 KB)
  • LIFX 1100-Lumen.html (0.1 KB)
  • Zip Password.txt (1.0 KB)

There are currently no comments. Feel free to leave one :)

Code:

  • udp://tracker.torrent.eu.org:451/announce
  • udp://tracker.moeking.me:6969/announce
  • http://tracker-cdn.moeking.me:2095/announce
  • udp://wassermann.online:6969/announce
  • udp://vibe.community:6969/announce
  • udp://valakas.rollo.dnsabr.com:2710/announce
  • udp://udp-tracker.shittyurl.org:6969/announce
  • udp://tracker1.bt.moack.co.kr:80/announce
  • udp://tracker0.ufibox.com:6969/announce
  • udp://tracker.zerobytes.xyz:1337/announce
  • udp://tracker.zemoj.com:6969/announce
  • udp://tracker.v6speed.org:6969/announce
  • udp://tracker.uw0.xyz:6969/announce
R2-CACHE ☁️ R2 (hit) | CDN: MISS (0s) 📄 torrent 🕐 18 Jan 2026, 10:18:34 am IST ⏰ 12 Feb 2026, 10:18:34 am IST ✅ Valid for 23d 7h 🔄 Refresh Cache