23 OCT 2025 - We are back! If you have been following us over the last few years, you will know that the last 2 months have been rough. We website was practically not loading. Sorry for the mess. We are back though and everything should run smoothly now. New servers. Updated domains. And new owners. We invite you all to start uploading torrents again!
TORRENT DETAILS
Udemy - The Complete Practical Web Application Penetration Testing
TORRENT SUMMARY
Status:
All the torrents in this section have been verified by our verification system
Language: English | Size: 2.11 GB | Duration: 4h 17m
Learn How to Uncover Web Application Vulnerabilities
What you'll learn
OWASP TOP 10.
Understand Web Application Vulnerabilities.
nstrate Practical Ability To Discover and Detect Web Application Vulnerabilities.
nstrate Practical Ability To Exploit Web Application Vulnerabilities.
Description
Welcome to this complete course about web application penetration testing. The course doesn't require any prior knowledge of testing web applications for security vulnerabilities nor it requires any level of coding knowledge although it's preferred.
If You Need More Stuff, kindly Visit and Support Us -->> https://CourseWikia.com
Get More Tutorials and Support Us -->> https://FreeCourseWeb.com
We upload these learning materials for the people from all over the world, who have the talent and motivation to sharpen their skills/ knowledge but do not have the financial support to afford the materials. If you like this content and if you are truly in a position that you can actually buy the materials, then Please, we repeat, Please, Support Authors. They Deserve it! Because always remember, without "Them", you and we won't be here having this conversation. Think about it! Peace...
VISITOR COMMENTS (0 )
FILE LIST
Filename
Size
~Get Your Files Here !/1. Introduction/1. Introduction.mp4
21.8 MB
~Get Your Files Here !/1. Introduction/1. Introduction.srt
4.3 KB
~Get Your Files Here !/1. Introduction/1.1 Course Slides.pdf
1.1 MB
~Get Your Files Here !/2. Injection Vulnerabilities/1. Introduction to injection vulnerabilities.mp4
83.1 MB
~Get Your Files Here !/2. Injection Vulnerabilities/1. Introduction to injection vulnerabilities.srt
12.4 KB
~Get Your Files Here !/2. Injection Vulnerabilities/2. SQL Injection - Authentication Bypass.mp4
155.1 MB
~Get Your Files Here !/2. Injection Vulnerabilities/2. SQL Injection - Authentication Bypass.srt
22 KB
~Get Your Files Here !/2. Injection Vulnerabilities/3. SQL Injection - Error Based.mp4
192.2 MB
~Get Your Files Here !/2. Injection Vulnerabilities/3. SQL Injection - Error Based.srt
29.6 KB
~Get Your Files Here !/2. Injection Vulnerabilities/4. SQL Injection - Blind Boolean Based.mp4
215.8 MB
~Get Your Files Here !/2. Injection Vulnerabilities/4. SQL Injection - Blind Boolean Based.srt
35.3 KB
~Get Your Files Here !/2. Injection Vulnerabilities/5. SQL Injection - Blind Time Based.mp4
114.6 MB
~Get Your Files Here !/2. Injection Vulnerabilities/5. SQL Injection - Blind Time Based.srt
19.9 KB
~Get Your Files Here !/2. Injection Vulnerabilities/6. SQL Injection with SQLmap.mp4
179.5 MB
~Get Your Files Here !/2. Injection Vulnerabilities/6. SQL Injection with SQLmap.srt
18.1 KB
~Get Your Files Here !/2. Injection Vulnerabilities/7. Command Injection.mp4
103 MB
~Get Your Files Here !/2. Injection Vulnerabilities/7. Command Injection.srt
16.8 KB
~Get Your Files Here !/3. Broken Authentication and Security Misconfigurations/1. Broken Authentication.mp4
84.7 MB
~Get Your Files Here !/3. Broken Authentication and Security Misconfigurations/1. Broken Authentication.srt
17.9 KB
~Get Your Files Here !/3. Broken Authentication and Security Misconfigurations/2. Sensitive Data Exposure.mp4
140.8 MB
~Get Your Files Here !/3. Broken Authentication and Security Misconfigurations/2. Sensitive Data Exposure.srt
19.6 KB
~Get Your Files Here !/3. Broken Authentication and Security Misconfigurations/3. Broken Access Control.mp4
88.5 MB
~Get Your Files Here !/3. Broken Authentication and Security Misconfigurations/3. Broken Access Control.srt
14.7 KB
~Get Your Files Here !/4. Other Common Web Application Vulnerabilities/1. SSRF - Server Side Request Forgery.mp4
124.1 MB
~Get Your Files Here !/4. Other Common Web Application Vulnerabilities/1. SSRF - Server Side Request Forgery.srt
18.6 KB
~Get Your Files Here !/4. Other Common Web Application Vulnerabilities/2. XSS - Cross Site Scripting.mp4
192.1 MB
~Get Your Files Here !/4. Other Common Web Application Vulnerabilities/2. XSS - Cross Site Scripting.srt
31.9 KB
~Get Your Files Here !/4. Other Common Web Application Vulnerabilities/3. CSRF - Cross Site Request Forgery.mp4
86.6 MB
~Get Your Files Here !/4. Other Common Web Application Vulnerabilities/3. CSRF - Cross Site Request Forgery.srt
12.3 KB
~Get Your Files Here !/4. Other Common Web Application Vulnerabilities/4. SSTI - Server Side Template Injection.mp4
112.3 MB
~Get Your Files Here !/4. Other Common Web Application Vulnerabilities/4. SSTI - Server Side Template Injection.srt
15.9 KB
~Get Your Files Here !/4. Other Common Web Application Vulnerabilities/5. XXE - XML External Entity Injection.mp4
137.3 MB
~Get Your Files Here !/4. Other Common Web Application Vulnerabilities/5. XXE - XML External Entity Injection.srt
22.9 KB
~Get Your Files Here !/4. Other Common Web Application Vulnerabilities/6. JWT - Json Web Token Vulnerabilities.mp4
133.5 MB
~Get Your Files Here !/4. Other Common Web Application Vulnerabilities/6. JWT - Json Web Token Vulnerabilities.srt