This post is by a banned member (loveaghost) - Unhide
10 July, 2021 - 09:40 AM
Reply
This post is by a banned member (Hkdash) - Unhide
12 July, 2021 - 06:32 PM
Reply
This post is by a banned member (Rohana) - Unhide
26 July, 2021 - 08:51 AM
Reply
This post is by a banned member (c00ki3s) - Unhide
26 July, 2021 - 09:32 AM
Reply
This post is by a banned member (EA7) - Unhide
30 July, 2021 - 12:02 AM
Reply
(06 June, 2021 - 07:49 PM)Mastiff Wrote: Show More
Credits to Zer0Day Lab.
Download:
Table of Content:
Code:
│ 1.png
│ Broad scope methodology - Manual.html
│ Medium articles.html
│ OWASP top 10.html
│ Practical Demonstration - Main Web Application hacking.html
│ Rat's methodology.html
│ Tools.html
│ Vulnerability types.html
│
├───Broad scope methodology - Manual
│ │ 0 Subdomain enumeration.html
│ │ 1 Creating our list of subdomains.html
│ │ 2 Processing Our List Of Subdomain.html
│ │ 3 Subdomain flyover.html
│ │ 4 Exploiting open ports.html
│ │ 98 Running your scripts on a VPS.html
│ │ A Vulnerability scanning.html
│ │ B Vulnerability testing strategy.html
│ │ Untitled 1.png
│ │ Untitled 2.png
│ │ Untitled 3.png
│ │ Untitled.png
│ │
│ ├───0 Subdomain enumeration
│ │ Subdomain_Enum.png
│ │ Untitled 1.png
│ │ Untitled 2.png
│ │ Untitled 3.png
│ │ Untitled.png
│ │
│ ├───1 Creating our list of subdomains
│ ├───4 Exploiting open ports
│ │ Untitled.png
│ │
│ ├───98 Running your scripts on a VPS
│ ├───A Vulnerability scanning
│ │ Nuclei_scanning.png
│ │ Untitled.png
│ │
│ └───B Vulnerability testing strategy
├───Medium articles
│ │ Are you a competitive hacker.html
│ │ Bugbountyhunter com membership.html
│ │ Docker A Bug Bounty Hunters Best Friend.html
│ │ How to become a hacker.html
│ │ How to handle failure.html
│ │ Rat's mobile methodology.html
│ │
│ └───Docker A Bug Bounty Hunters Best Friend
├───OWASP top 10
│ │ Full.html
│ │
│ └───Full
│ │ 1 Injection.html
│ │ 7 XSS.html
│ │ Introduction.html
│ │
│ ├───1 Injection
│ ├───4 XML eXternal Entities
│ └───5 Broken Access Control
├───Practical Demonstration - Main Web Application hac
│ burpproject.png
│ dashboard.jpeg
│ deploy.jpeg
│ enter_to_procee.jpeg
│ h1.png
│ heroku_terms.jpeg
│ Screenshot_from_2021-03-11_15-19-23.jpeg
│ Screenshot_from_2021-03-11_15-23-14.jpeg
│ Screenshot_from_2021-03-11_15-29-50.jpeg
│ Untitled 1.png
│ Untitled 10.png
│ Untitled 11.png
│ Untitled 12.png
│ Untitled 13.png
│ Untitled 14.png
│ Untitled 15.png
│ Untitled 16.png
│ Untitled 17.png
│ Untitled 18.png
│ Untitled 19.png
│ Untitled 2.png
│ Untitled 3.png
│ Untitled 4.png
│ Untitled 5.png
│ Untitled 6.png
│ Untitled 7.png
│ Untitled 8.png
│ Untitled 9.png
│ Untitled.png
│
├───Rat's methodology
│ Untitled 1.png
│ Untitled 2.png
│ Untitled 3.png
│ Untitled 4.png
│ Untitled 5.png
│ Untitled 6.png
│ Untitled.png
│
├───Tools
│ │ Analyzing javascript files.html
│ │ Burp suite.html
│ │ Directory brute forcing.html
│ │ Nmap.html
│ │
│ ├───Analyzing javascript files
│ │ Untitled 1.png
│ │ Untitled.png
│ │
│ ├───Burp suite
│ │ │ Burp Authorize.html
│ │ │ Burp Match and replace.html
│ │ │ Burp Suite Comparer.html
│ │ │ Burp Suite Dashboard.html
│ │ │ Burp Suite Decoder.html
│ │ │ Burp Suite Extender.html
│ │ │ Burp suite Intruder.html
│ │ │ Burp suite Proxy.html
│ │ │ Burp Suite repeater.html
│ │ │ Burp Suite Sequencer.html
│ │ │ Burp suite Target.html
│ │ │
│ │ ├───Burp Match and replace
│ │ ├───Burp Suite Comparer
│ │ ├───Burp Suite Dashboard
│ │ ├───Burp Suite Decoder
│ │ ├───Burp Suite Extender
│ │ ├───Burp suite Intruder
│ │ ├───Burp suite Proxy
│ │ ├───Burp Suite repeater
│ │ ├───Burp Suite Sequencer
│ │ └───Burp suite Target
│ └───Directory brute forcing
│ Untitled 1.png
│ Untitled 2.png
│ Untitled.png
│
└───Vulnerability types
│ BAC.html
│ Business logic flaws.html
│ Command injection.html
│ CSRF.html
│ IDOR.html
│ Insecure deserialization.html
│ SSRF.html
│ Template injections.html
│ The Origin Of Business logic vulnerabilities.html
│ XSS.html
│ XXE.html
│
├───Command injection
│ Untitled 1.png
│ Untitled 2.png
│ Untitled.png
│
├───CSRF
│ Untitled 1.png
│ Untitled 10.png
│ Untitled 11.png
│ Untitled 2.png
│ Untitled 3.png
│ Untitled 4.png
│ Untitled 5.png
│ Untitled 6.png
│ Untitled 7.png
│ Untitled 8.png
│ Untitled 9.png
│ Untitled.png
│
├───IDOR
│ Untitled 1.png
│ Untitled.png
│
├───Insecure deserialization
│ Untitled_Diagram.png
│
├───SSRF
│ Untitled 1.png
│ Untitled 2.png
│ Untitled.png
│
├───Template injections
├───The Origin Of Business logic vulnerabilities
│ agile.png
│ Untitled.png
│ V-Model.png
│ waterfal.png
│
└───XSS
│ DOM XSS.html
│ XSS Cheat sheet.html
│
└───XSS Cheat sheet
Dude this is awesome! Great share!
This post is by a banned member (QAHAX) - Unhide
30 December, 2021 - 07:17 PM
Reply
Interested to know more I had only read his free course
This post is by a banned member (CreamyGuy) - Unhide
28 March, 2022 - 08:22 AM
Reply
This post is by a banned member (Vayafxd) - Unhide
25 May, 2022 - 07:31 PM
Reply
(06 June, 2021 - 07:49 PM)Mastiff Wrote: Show More
Credits to Zer0Day Lab.
Download:
Table of Content:
Code:
│ 1.png
│ Broad scope methodology - Manual.html
│ Medium articles.html
│ OWASP top 10.html
│ Practical Demonstration - Main Web Application hacking.html
│ Rat's methodology.html
│ Tools.html
│ Vulnerability types.html
│
├───Broad scope methodology - Manual
│ │ 0 Subdomain enumeration.html
│ │ 1 Creating our list of subdomains.html
│ │ 2 Processing Our List Of Subdomain.html
│ │ 3 Subdomain flyover.html
│ │ 4 Exploiting open ports.html
│ │ 98 Running your scripts on a VPS.html
│ │ A Vulnerability scanning.html
│ │ B Vulnerability testing strategy.html
│ │ Untitled 1.png
│ │ Untitled 2.png
│ │ Untitled 3.png
│ │ Untitled.png
│ │
│ ├───0 Subdomain enumeration
│ │ Subdomain_Enum.png
│ │ Untitled 1.png
│ │ Untitled 2.png
│ │ Untitled 3.png
│ │ Untitled.png
│ │
│ ├───1 Creating our list of subdomains
│ ├───4 Exploiting open ports
│ │ Untitled.png
│ │
│ ├───98 Running your scripts on a VPS
│ ├───A Vulnerability scanning
│ │ Nuclei_scanning.png
│ │ Untitled.png
│ │
│ └───B Vulnerability testing strategy
├───Medium articles
│ │ Are you a competitive hacker.html
│ │ Bugbountyhunter com membership.html
│ │ Docker A Bug Bounty Hunters Best Friend.html
│ │ How to become a hacker.html
│ │ How to handle failure.html
│ │ Rat's mobile methodology.html
│ │
│ └───Docker A Bug Bounty Hunters Best Friend
├───OWASP top 10
│ │ Full.html
│ │
│ └───Full
│ │ 1 Injection.html
│ │ 7 XSS.html
│ │ Introduction.html
│ │
│ ├───1 Injection
│ ├───4 XML eXternal Entities
│ └───5 Broken Access Control
├───Practical Demonstration - Main Web Application hac
│ burpproject.png
│ dashboard.jpeg
│ deploy.jpeg
│ enter_to_procee.jpeg
│ h1.png
│ heroku_terms.jpeg
│ Screenshot_from_2021-03-11_15-19-23.jpeg
│ Screenshot_from_2021-03-11_15-23-14.jpeg
│ Screenshot_from_2021-03-11_15-29-50.jpeg
│ Untitled 1.png
│ Untitled 10.png
│ Untitled 11.png
│ Untitled 12.png
│ Untitled 13.png
│ Untitled 14.png
│ Untitled 15.png
│ Untitled 16.png
│ Untitled 17.png
│ Untitled 18.png
│ Untitled 19.png
│ Untitled 2.png
│ Untitled 3.png
│ Untitled 4.png
│ Untitled 5.png
│ Untitled 6.png
│ Untitled 7.png
│ Untitled 8.png
│ Untitled 9.png
│ Untitled.png
│
├───Rat's methodology
│ Untitled 1.png
│ Untitled 2.png
│ Untitled 3.png
│ Untitled 4.png
│ Untitled 5.png
│ Untitled 6.png
│ Untitled.png
│
├───Tools
│ │ Analyzing javascript files.html
│ │ Burp suite.html
│ │ Directory brute forcing.html
│ │ Nmap.html
│ │
│ ├───Analyzing javascript files
│ │ Untitled 1.png
│ │ Untitled.png
│ │
│ ├───Burp suite
│ │ │ Burp Authorize.html
│ │ │ Burp Match and replace.html
│ │ │ Burp Suite Comparer.html
│ │ │ Burp Suite Dashboard.html
│ │ │ Burp Suite Decoder.html
│ │ │ Burp Suite Extender.html
│ │ │ Burp suite Intruder.html
│ │ │ Burp suite Proxy.html
│ │ │ Burp Suite repeater.html
│ │ │ Burp Suite Sequencer.html
│ │ │ Burp suite Target.html
│ │ │
│ │ ├───Burp Match and replace
│ │ ├───Burp Suite Comparer
│ │ ├───Burp Suite Dashboard
│ │ ├───Burp Suite Decoder
│ │ ├───Burp Suite Extender
│ │ ├───Burp suite Intruder
│ │ ├───Burp suite Proxy
│ │ ├───Burp Suite repeater
│ │ ├───Burp Suite Sequencer
│ │ └───Burp suite Target
│ └───Directory brute forcing
│ Untitled 1.png
│ Untitled 2.png
│ Untitled.png
│
└───Vulnerability types
│ BAC.html
│ Business logic flaws.html
│ Command injection.html
│ CSRF.html
│ IDOR.html
│ Insecure deserialization.html
│ SSRF.html
│ Template injections.html
│ The Origin Of Business logic vulnerabilities.html
│ XSS.html
│ XXE.html
│
├───Command injection
│ Untitled 1.png
│ Untitled 2.png
│ Untitled.png
│
├───CSRF
│ Untitled 1.png
│ Untitled 10.png
│ Untitled 11.png
│ Untitled 2.png
│ Untitled 3.png
│ Untitled 4.png
│ Untitled 5.png
│ Untitled 6.png
│ Untitled 7.png
│ Untitled 8.png
│ Untitled 9.png
│ Untitled.png
│
├───IDOR
│ Untitled 1.png
│ Untitled.png
│
├───Insecure deserialization
│ Untitled_Diagram.png
│
├───SSRF
│ Untitled 1.png
│ Untitled 2.png
│ Untitled.png
│
├───Template injections
├───The Origin Of Business logic vulnerabilities
│ agile.png
│ Untitled.png
│ V-Model.png
│ waterfal.png
│
└───XSS
│ DOM XSS.html
│ XSS Cheat sheet.html
│
└───XSS Cheat sheet
thx brpoooo