elhacker.INFO Downloads
Copyright issues contact webmaster@elhacker.info
    Name                                                                 Last modified      Size
 Name                                                                 Last modified      Size  
![[Volver]](/icons/back.gif) Parent Directory                                                                          -
 Parent Directory                                                                          -   
![[VID]](/icons/movie.gif) 25. Insufficient Logging and Monitoring.mp4                          2024-01-31 11:38   41M
 25. Insufficient Logging and Monitoring.mp4                          2024-01-31 11:38   41M  
![[TXT]](/icons/text.gif) 25.1 Top 10-2017 A10-Insufficient Logging&Monitoring.html            2024-01-31 11:38  142
 25.1 Top 10-2017 A10-Insufficient Logging&Monitoring.html            2024-01-31 11:38  142   
![[VID]](/icons/movie.gif) 24. Using Components with Known Vulnerabilities.mp4                  2024-01-31 11:37   53M
 24. Using Components with Known Vulnerabilities.mp4                  2024-01-31 11:37   53M  
![[TXT]](/icons/text.gif) 24.1 Top 10-2017 A9-Using Components with Known Vulnerabilities.html 2024-01-31 11:37  151
 24.1 Top 10-2017 A9-Using Components with Known Vulnerabilities.html 2024-01-31 11:37  151   
![[VID]](/icons/movie.gif) 23. Insecure Deserialization.mp4                                     2024-01-31 11:37   57M
 23. Insecure Deserialization.mp4                                     2024-01-31 11:37   57M  
![[TXT]](/icons/text.gif) 23.1 Top 10-2017 A8-Insecure Deserialization.html                    2024-01-31 11:37  132
 23.1 Top 10-2017 A8-Insecure Deserialization.html                    2024-01-31 11:37  132   
![[VID]](/icons/movie.gif) 22. Preventing XSS.mp4                                               2024-01-31 11:37   12M
 22. Preventing XSS.mp4                                               2024-01-31 11:37   12M  
![[VID]](/icons/movie.gif) 21. Stored XSS Walkthrough.mp4                                       2024-01-31 11:37   49M
 21. Stored XSS Walkthrough.mp4                                       2024-01-31 11:37   49M  
![[VID]](/icons/movie.gif) 20. Reflected XSS Walkthrough.mp4                                    2024-01-31 11:37   74M
 20. Reflected XSS Walkthrough.mp4                                    2024-01-31 11:37   74M  
![[VID]](/icons/movie.gif) 19. Cross-Site Scripting (XSS) Overview.mp4                          2024-01-31 11:36   82M
 19. Cross-Site Scripting (XSS) Overview.mp4                          2024-01-31 11:36   82M  
![[TXT]](/icons/text.gif) 19.3 DOM BASED CROSS SITE SCRIPTING.html                             2024-01-31 11:37   98
 19.3 DOM BASED CROSS SITE SCRIPTING.html                             2024-01-31 11:37   98   
![[TXT]](/icons/text.gif) 19.2 Top 10-2017 A7-Cross-Site Scripting (XSS).html                  2024-01-31 11:37  134
 19.2 Top 10-2017 A7-Cross-Site Scripting (XSS).html                  2024-01-31 11:37  134   
![[TXT]](/icons/text.gif) 19.1 XSS Game.html                                                   2024-01-31 11:37   90
 19.1 XSS Game.html                                                   2024-01-31 11:37   90   
![[VID]](/icons/movie.gif) 18. Security Misconfiguration Attacks and Defenses.mp4               2024-01-31 11:36   68M
 18. Security Misconfiguration Attacks and Defenses.mp4               2024-01-31 11:36   68M  
![[TXT]](/icons/text.gif) 18.1 Top 10-2017 A6-Security Misconfiguration.html                   2024-01-31 11:36  133
 18.1 Top 10-2017 A6-Security Misconfiguration.html                   2024-01-31 11:36  133   
![[VID]](/icons/movie.gif) 17. Broken Access Control Walkthrough.mp4                            2024-01-31 11:36   35M
 17. Broken Access Control Walkthrough.mp4                            2024-01-31 11:36   35M  
![[VID]](/icons/movie.gif) 16. Broken Access Control Overview.mp4                               2024-01-31 11:35   49M
 16. Broken Access Control Overview.mp4                               2024-01-31 11:35   49M  
![[TXT]](/icons/text.gif) 16.1 Top 10-2017 A5-Broken Access Control.html                       2024-01-31 11:36  129
 16.1 Top 10-2017 A5-Broken Access Control.html                       2024-01-31 11:36  129   
![[VID]](/icons/movie.gif) 15. XXE Attack and Defense.mp4                                       2024-01-31 11:36   77M
 15. XXE Attack and Defense.mp4                                       2024-01-31 11:36   77M  
![[VID]](/icons/movie.gif) 14. XML External Entities (XXE) Overview.mp4                         2024-01-31 11:36   28M
 14. XML External Entities (XXE) Overview.mp4                         2024-01-31 11:36   28M  
![[TXT]](/icons/text.gif) 14.1 Top 10-2017 A4-XML External Entities (XXE).html                 2024-01-31 11:36  135
 14.1 Top 10-2017 A4-XML External Entities (XXE).html                 2024-01-31 11:36  135   
![[VID]](/icons/movie.gif) 13. Testing for Sensitive Data Exposure.mp4                          2024-01-31 11:36   80M
 13. Testing for Sensitive Data Exposure.mp4                          2024-01-31 11:36   80M  
![[VID]](/icons/movie.gif) 12. Sensitive Data Exposure Overview and Defenses.mp4                2024-01-31 11:35   67M
 12. Sensitive Data Exposure Overview and Defenses.mp4                2024-01-31 11:35   67M  
![[TXT]](/icons/text.gif) 12.1 Top 10-2017 A3-Sensitive Data Exposure.html                     2024-01-31 11:36  131
 12.1 Top 10-2017 A3-Sensitive Data Exposure.html                     2024-01-31 11:36  131   
![[VID]](/icons/movie.gif) 11. Testing for Broken Authentication.mp4                            2024-01-31 11:35   64M
 11. Testing for Broken Authentication.mp4                            2024-01-31 11:35   64M  
![[VID]](/icons/movie.gif) 10. Broken Authentication Overview and Defenses.mp4                  2024-01-31 11:35   79M
 10. Broken Authentication Overview and Defenses.mp4                  2024-01-31 11:35   79M  
![[TXT]](/icons/text.gif) 10.1 Top 10-2017 A2-Broken Authentication.html                       2024-01-31 11:35  129
 10.1 Top 10-2017 A2-Broken Authentication.html                       2024-01-31 11:35  129   
![[VID]](/icons/movie.gif) 9. SQL Injection Defenses.mp4                                        2024-01-31 11:38  9.3M
 9. SQL Injection Defenses.mp4                                        2024-01-31 11:38  9.3M  
![[VID]](/icons/movie.gif) 8. SQL Injection Walkthrough.mp4                                     2024-01-31 11:38   85M
 8. SQL Injection Walkthrough.mp4                                     2024-01-31 11:38   85M  
![[VID]](/icons/movie.gif) 7. SQL Injection Attacks Overview.mp4                                2024-01-31 11:38   19M
 7. SQL Injection Attacks Overview.mp4                                2024-01-31 11:38   19M  
![[TXT]](/icons/text.gif) 7.1 Top 10-2017 A1-Injection.html                                    2024-01-31 11:38  117
 7.1 Top 10-2017 A1-Injection.html                                    2024-01-31 11:38  117   
![[VID]](/icons/movie.gif) 6. Introducing the Score Board.mp4                                   2024-01-31 11:38   31M
 6. Introducing the Score Board.mp4                                   2024-01-31 11:38   31M  
![[VID]](/icons/movie.gif) 5. Exploring Burp Suite.mp4                                          2024-01-31 11:37  106M
 5. Exploring Burp Suite.mp4                                          2024-01-31 11:37  106M  
![[VID]](/icons/movie.gif) 4. Installing Foxy Proxy.mp4                                         2024-01-31 11:37   27M
 4. Installing Foxy Proxy.mp4                                         2024-01-31 11:37   27M  
![[VID]](/icons/movie.gif) 3. Installing OWASP Juice Shop.mp4                                   2024-01-31 11:38   89M
 3. Installing OWASP Juice Shop.mp4                                   2024-01-31 11:38   89M  
![[TXT]](/icons/text.gif) 3.2 Installing Docker on Kali.html                                   2024-01-31 11:37  142
 3.2 Installing Docker on Kali.html                                   2024-01-31 11:37  142   
![[TXT]](/icons/text.gif) 3.1 OWASP Juice Shop.html                                            2024-01-31 11:37  101
 3.1 OWASP Juice Shop.html                                            2024-01-31 11:37  101   
![[VID]](/icons/movie.gif) 2. The OWASP Top 10 and OWASP Testing Checklist.mp4                  2024-01-31 11:37  130M
 2. The OWASP Top 10 and OWASP Testing Checklist.mp4                  2024-01-31 11:37  130M  
![[TXT]](/icons/text.gif) 2.3 OWASP Testing Guide.html                                         2024-01-31 11:37  104
 2.3 OWASP Testing Guide.html                                         2024-01-31 11:37  104   
![[TXT]](/icons/text.gif) 2.2 OWASP Testing Checklist.html                                     2024-01-31 11:37  114
 2.2 OWASP Testing Checklist.html                                     2024-01-31 11:37  114   
![[TXT]](/icons/text.gif) 2.1 OWASP Top 10.html                                                2024-01-31 11:37  129
 2.1 OWASP Top 10.html                                                2024-01-31 11:37  129   
![[VID]](/icons/movie.gif) 1. Introduction.mp4                                                  2024-01-31 11:35  3.9M
 1. Introduction.mp4                                                  2024-01-31 11:35  3.9M