elhacker.INFO Downloads
Copyright issues contact webmaster@elhacker.info
Name Last modified Size
Parent Directory -
1 of 18 - Course Roadmap .webm 2025-09-18 10:10 2.5M
2 of 18 - Cloud Customer Identity and Access Management Solutions .webm 2025-09-18 10:10 9.5M
3 of 18 - OAuth 2.0, OpenID Connect, and SAML .webm 2025-09-18 10:10 107M
4 of 18 - Microsoft Identity Platform .webm 2025-09-18 10:10 6.6M
5 of 18 - Case Study 2023 Microsoft Signing Key Compromise .webm 2025-09-18 10:10 13M
6 of 18 - Amazon Cognito User Pools .webm 2025-09-18 10:10 35M
7 of 18 - User Enumeration Attacks .webm 2025-09-18 10:10 30M
8 of 18 - Amazon Cognito User Pools Creating a User Pool Client .webm 2025-09-18 10:10 8.7M
9 of 18 - Amazon Cognito User Pools User Can Update Own Attributes .webm 2025-09-18 10:10 15M
10 of 18 - Case Study User Account Takeover via User Admin Scope .webm 2025-09-18 10:10 20M
11 of 18 - Amazon Cognito Identity Pools .webm 2025-09-18 10:10 15M
12 of 18 - Amazon Cognito Identity Pools Attribute Mapping .webm 2025-09-18 10:10 3.5M
13 of 18 - Google Cloud Identity .webm 2025-09-18 10:10 15M
14 of 18 - Firebase Authentication .webm 2025-09-18 10:10 4.0M
15 of 18 - Firebase Authentication Anonymous Provider .webm 2025-09-18 10:10 17M
16 of 18 - Firebase Authentication Email Enumeration Vulnerability .webm 2025-09-18 10:10 14M
17 of 18 - Using and Exploiting CIAM .webm 2025-09-18 10:10 107M
18 of 18 - Lab 4.3 Summary Using and Exploiting CIAM .webm 2025-09-18 10:10 4.2M