Filename | Size |
| 1. Introduction/1. Welcome To the Web Applications Hacking and Penetration Testing Course.mp4 | 2.3 MB |
| 1. Introduction/1. Welcome To the Web Applications Hacking and Penetration Testing Course.vtt | 854 B |
| 1. Introduction/2. How I Hacked The Payment System of Origin Energy (Australian Company).mp4 | 12.4 MB |
| 1. Introduction/2. How I Hacked The Payment System of Origin Energy (Australian Company).vtt | 38 B |
| 1. Introduction/3. Facebook Bug- Facebook Users (Denial of Use) Attack.mp4 | 9.9 MB |
| 1. Introduction/3. Facebook Bug- Facebook Users (Denial of Use) Attack.vtt | 68 B |
| 10. Brute Force Attack/1. Brute Force a Login Page.mp4 | 16.5 MB |
| 10. Brute Force Attack/1. Brute Force a Login Page.vtt | 6.5 KB |
| 10. Brute Force Attack/2. Create Word lists for Password Cracking.mp4 | 42.4 MB |
| 10. Brute Force Attack/2. Create Word lists for Password Cracking.vtt | 4.3 KB |
| 10. Brute Force Attack/2.1 Download Crunch tool.html | 117 B |
| 10. Brute Force Attack/3. Real World Brute Force Attack.mp4 | 165.6 MB |
| 10. Brute Force Attack/3. Real World Brute Force Attack.vtt | 6.3 KB |
| 10. Brute Force Attack/3.1 Download Hydra tool.html | 104 B |
| 11. Real World Hacking/1. Discover vulnerabilities using Vega scanner.mp4 | 8.3 MB |
| 11. Real World Hacking/1. Discover vulnerabilities using Vega scanner.vtt | 3.1 KB |
| 11. Real World Hacking/2. Exploiting SQL injection using sqlmap.mp4 | 30.1 MB |
| 11. Real World Hacking/2. Exploiting SQL injection using sqlmap.vtt | 7.1 KB |
| 11. Real World Hacking/3. Exploiting Cross Site Scripting (XSS) using BruteXSS tool.mp4 | 22 MB |
| 11. Real World Hacking/3. Exploiting Cross Site Scripting (XSS) using BruteXSS tool.vtt | 6.2 KB |
| 11. Real World Hacking/4. Exploiting Script Source Code Disclosure Vulnerability.mp4 | 8.9 MB |
| 11. Real World Hacking/4. Exploiting Script Source Code Disclosure Vulnerability.vtt | 3.3 KB |
| 11. Real World Hacking/5. Discover Vulnerabilities using Arachni Scanner.mp4 | 21.3 MB |
| 11. Real World Hacking/5. Discover Vulnerabilities using Arachni Scanner.vtt | 4.4 KB |
| 12. Bonus Section/1. Bonus Lecture.html | 771 B |
| 2. Basics/1. How Websites work.mp4 | 4.8 MB |
| 2. Basics/1. How Websites work.vtt | 2.6 KB |
| 3. Preperation/1. Install XAMPP & DVWA.mp4 | 18 MB |
| 3. Preperation/1. Install XAMPP & DVWA.vtt | 3.8 KB |
| 3. Preperation/2. Questions.html | 358 B |
| 3. Preperation/3. Install Burp Suite Proxy.mp4 | 11.5 MB |
| 3. Preperation/3. Install Burp Suite Proxy.vtt | 2.2 KB |
| 3. Preperation/4. Configure Burp Suite Proxy.mp4 | 5.4 MB |
| 3. Preperation/4. Configure Burp Suite Proxy.vtt | 1.4 KB |
| 3. Preperation/5. Make Burp Suite Capture SSL Traffic.mp4 | 6.4 MB |
| 3. Preperation/5. Make Burp Suite Capture SSL Traffic.vtt | 1.4 KB |
| 3. Preperation/6. Install Python.mp4 | 10.6 MB |
| 3. Preperation/6. Install Python.vtt | 2.5 KB |
| 3. Preperation/7. Install Vega Scanner.mp4 | 5.1 MB |
| 3. Preperation/7. Install Vega Scanner.vtt | 1.5 KB |
| 3. Preperation/8. Setting the DVWA Security Level.mp4 | 2.1 MB |
| 3. Preperation/8. Setting the DVWA Security Level.vtt | 561 B |
| 4. Information Gathering/1. Getting Domain Information.mp4 | 16 MB |
| 4. Information Gathering/1. Getting Domain Information.vtt | 3.1 KB |
| 4. Information Gathering/2. Identify Technology & Software On Websites.mp4 | 24.4 MB |
| 4. Information Gathering/2. Identify Technology & Software On Websites.vtt | 5 KB |
| 4. Information Gathering/3. Finding Subdomains.mp4 | 8.9 MB |
| 4. Information Gathering/3. Finding Subdomains.vtt | 2.9 KB |
| 5. Cross Site Scripting (XSS)/1. Cross Site Scripting (XSS) Explained.mp4 | 4.6 MB |
| 5. Cross Site Scripting (XSS)/1. Cross Site Scripting (XSS) Explained.vtt | 1.7 KB |
| 5. Cross Site Scripting (XSS)/2. Stored Cross Site Scripting (XSS) Vulnerability.mp4 | 7.3 MB |
| 5. Cross Site Scripting (XSS)/2. Stored Cross Site Scripting (XSS) Vulnerability.vtt | 2.4 KB |
| 5. Cross Site Scripting (XSS)/3. Reflected Cross Site Scripting (XSS) Vulnerability.mp4 | 11 MB |
| 5. Cross Site Scripting (XSS)/3. Reflected Cross Site Scripting (XSS) Vulnerability.vtt | 3.7 KB |
| 6. Cross Site Request Forgery (CSRF)/1. Cross Site Request Forgery (CSRF) Explained.mp4 | 4.4 MB |
| 6. Cross Site Request Forgery (CSRF)/1. Cross Site Request Forgery (CSRF) Explained.vtt | 1.8 KB |
| 6. Cross Site Request Forgery (CSRF)/2. Cross Site Request Forgery (CSRF) Vulnerability.mp4 | 15.5 MB |
| 6. Cross Site Request Forgery (CSRF)/2. Cross Site Request Forgery (CSRF) Vulnerability.vtt | 4.7 KB |
| 7. SQL Injection/1. SQL Injection Explained.mp4 | 6.9 MB |
| 7. SQL Injection/1. SQL Injection Explained.vtt | 2.4 KB |
| 7. SQL Injection/2. SQL Injection Vulnerability.mp4 | 7.6 MB |
| 7. SQL Injection/2. SQL Injection Vulnerability.vtt | 2.7 KB |
| 8. Command Execution/1. Command Execution Explained.mp4 | 5.6 MB |
| 8. Command Execution/1. Command Execution Explained.vtt | 2.1 KB |
| 8. Command Execution/2. Command Execution Vulnerability.mp4 | 8.1 MB |
| 8. Command Execution/2. Command Execution Vulnerability.vtt | 2.6 KB |
| 9. File Upload/1. File Upload Vulnerability.mp4 | 4.9 MB |
| 9. File Upload/1. File Upload Vulnerability.vtt | 2.2 KB |
| 9. File Upload/2. How to Generate Web Backdoors (Shells).mp4 | 14.7 MB |
| 9. File Upload/2. How to Generate Web Backdoors (Shells).vtt | 5.8 KB |