elhacker.INFO Downloads
Copyright issues contact webmaster@elhacker.info
Name Last modified Size
Parent Directory -
1. Introduction.mp4 2024-01-31 11:35 3.9M
2.1 OWASP Top 10.html 2024-01-31 11:37 129
2.2 OWASP Testing Checklist.html 2024-01-31 11:37 114
2.3 OWASP Testing Guide.html 2024-01-31 11:37 104
2. The OWASP Top 10 and OWASP Testing Checklist.mp4 2024-01-31 11:37 130M
3.1 OWASP Juice Shop.html 2024-01-31 11:37 101
3.2 Installing Docker on Kali.html 2024-01-31 11:37 142
3. Installing OWASP Juice Shop.mp4 2024-01-31 11:38 89M
4. Installing Foxy Proxy.mp4 2024-01-31 11:37 27M
5. Exploring Burp Suite.mp4 2024-01-31 11:37 106M
6. Introducing the Score Board.mp4 2024-01-31 11:38 31M
7.1 Top 10-2017 A1-Injection.html 2024-01-31 11:38 117
7. SQL Injection Attacks Overview.mp4 2024-01-31 11:38 19M
8. SQL Injection Walkthrough.mp4 2024-01-31 11:38 85M
9. SQL Injection Defenses.mp4 2024-01-31 11:38 9.3M
10.1 Top 10-2017 A2-Broken Authentication.html 2024-01-31 11:35 129
10. Broken Authentication Overview and Defenses.mp4 2024-01-31 11:35 79M
11. Testing for Broken Authentication.mp4 2024-01-31 11:35 64M
12.1 Top 10-2017 A3-Sensitive Data Exposure.html 2024-01-31 11:36 131
12. Sensitive Data Exposure Overview and Defenses.mp4 2024-01-31 11:35 67M
13. Testing for Sensitive Data Exposure.mp4 2024-01-31 11:36 80M
14.1 Top 10-2017 A4-XML External Entities (XXE).html 2024-01-31 11:36 135
14. XML External Entities (XXE) Overview.mp4 2024-01-31 11:36 28M
15. XXE Attack and Defense.mp4 2024-01-31 11:36 77M
16.1 Top 10-2017 A5-Broken Access Control.html 2024-01-31 11:36 129
16. Broken Access Control Overview.mp4 2024-01-31 11:35 49M
17. Broken Access Control Walkthrough.mp4 2024-01-31 11:36 35M
18.1 Top 10-2017 A6-Security Misconfiguration.html 2024-01-31 11:36 133
18. Security Misconfiguration Attacks and Defenses.mp4 2024-01-31 11:36 68M
19.1 XSS Game.html 2024-01-31 11:37 90
19.2 Top 10-2017 A7-Cross-Site Scripting (XSS).html 2024-01-31 11:37 134
19.3 DOM BASED CROSS SITE SCRIPTING.html 2024-01-31 11:37 98
19. Cross-Site Scripting (XSS) Overview.mp4 2024-01-31 11:36 82M
20. Reflected XSS Walkthrough.mp4 2024-01-31 11:37 74M
21. Stored XSS Walkthrough.mp4 2024-01-31 11:37 49M
22. Preventing XSS.mp4 2024-01-31 11:37 12M
23.1 Top 10-2017 A8-Insecure Deserialization.html 2024-01-31 11:37 132
23. Insecure Deserialization.mp4 2024-01-31 11:37 57M
24.1 Top 10-2017 A9-Using Components with Known Vulnerabilities.html 2024-01-31 11:37 151
24. Using Components with Known Vulnerabilities.mp4 2024-01-31 11:37 53M
25.1 Top 10-2017 A10-Insufficient Logging&Monitoring.html 2024-01-31 11:38 142
25. Insufficient Logging and Monitoring.mp4 2024-01-31 11:38 41M