磁力链接

magnet:?xt=urn:btih:63927A89DE70A8644AFE98A89A90B5D411029457
推荐使用PIKPAK网盘下载资源,PIKPAK是目前最好用网盘,10T超大空间,不和谐任何资源,支持无限次数离线下载,视频在线观看

资源截图

API Integration

文件列表

  • 9. Working with Files, Data, and the Operating System/3. Accessing the File and Operating Systems.mp4 88.4 MB
  • 8. Tampering with User Interactions/5. Making Fraudulent Posts.mp4 86.9 MB
  • 9. Working with Files, Data, and the Operating System/2. Obtaining the Passwd File.mp4 80.1 MB
  • 8. Tampering with User Interactions/6. From Reflected XSS to Persisted XSS.mp4 76.8 MB
  • 9. Working with Files, Data, and the Operating System/4. Uploading a Web Shell.mp4 76.6 MB
  • 8. Tampering with User Interactions/7. Changing Passwords with a CSRF Weakness.mp4 70.1 MB
  • 6. Altering Content/2. Setting Up a Social Engineering Attack.mp4 67.8 MB
  • 7. Stealing Credentials and Cookies/5. Hijacking Knowledge-Based Authentication.mp4 67.5 MB
  • 7. Stealing Credentials and Cookies/4. Obtaining Additional Form Data.mp4 67.1 MB
  • 2. JavaScript Refresher/1. Basic Operations.mp4 58.9 MB
  • 9. Working with Files, Data, and the Operating System/1. Including Remote JavaScript Files.mp4 53.0 MB
  • 6. Altering Content/1. Altering HTML Content for Web Site Defacement.mp4 50.5 MB
  • 8. Tampering with User Interactions/4. Key Logging.mp4 48.2 MB
  • 10. Defensive Measures/4. Untrusted Input.mp4 45.3 MB
  • 8. Tampering with User Interactions/2. Browser Detection.mp4 43.6 MB
  • 7. Stealing Credentials and Cookies/3. Stealing Credentials.mp4 42.4 MB
  • 2. JavaScript Refresher/3. Document Object Model.mp4 40.2 MB
  • 4. Building a Lab/2. Encoding Data with Burp Suite.mp4 36.7 MB
  • 8. Tampering with User Interactions/1. Spear Phishing to Detect the User's Operating System.mp4 36.7 MB
  • 8. Tampering with User Interactions/3. Capturing Mouse Activity.mp4 36.4 MB
  • 7. Stealing Credentials and Cookies/2. Stealing Cookies.mp4 36.2 MB
  • 10. Defensive Measures/3. Secure Design and Access Control.mp4 35.2 MB
  • 1. Introduction/1. Introduction and Course Contents.mp4 34.0 MB
  • 6. Altering Content/3. Tampering with Links.mp4 32.3 MB
  • 3. Cross Site Scripting (XSS) Refresher/1. Reflected XSS.mp4 30.8 MB
  • 4. Building a Lab/4. Netcat Listener.mp4 28.9 MB
  • 5. Penetration Testing Approach/1. Approach and Tools.mp4 28.0 MB
  • 4. Building a Lab/1. DVWA for Target Practice.mp4 27.5 MB
  • 10. Defensive Measures/1. OWASP Top Ten.mp4 24.6 MB
  • 7. Stealing Credentials and Cookies/1. Disclosing Cookie Content.mp4 24.3 MB
  • 11. Conclusion/1. Summary.mp4 21.7 MB
  • 2. JavaScript Refresher/2. Events.mp4 21.2 MB
  • 3. Cross Site Scripting (XSS) Refresher/2. Persisted XSS.mp4 19.7 MB
  • 4. Building a Lab/3. Python Web Server.mp4 19.5 MB
  • 3. Cross Site Scripting (XSS) Refresher/3. DOM-based XSS.mp4 16.3 MB
  • 10. Defensive Measures/2. Encryption and Cookie Protection.mp4 13.6 MB
  • 1. Introduction/2. How Does This Help My Career.mp4 10.6 MB
  • 1. Introduction/3. Ethics.mp4 4.8 MB
  • #Support Us/Visit Us.png 390.9 kB
  • 11. Conclusion/#Support Us/Visit Us.png 390.9 kB
  • 9. Working with Files, Data, and the Operating System/3. Accessing the File and Operating Systems.srt 20.0 kB
  • 8. Tampering with User Interactions/5. Making Fraudulent Posts.srt 17.9 kB
  • 9. Working with Files, Data, and the Operating System/2. Obtaining the Passwd File.srt 16.8 kB
  • 8. Tampering with User Interactions/6. From Reflected XSS to Persisted XSS.srt 15.5 kB
  • 7. Stealing Credentials and Cookies/5. Hijacking Knowledge-Based Authentication.srt 14.5 kB
  • 6. Altering Content/2. Setting Up a Social Engineering Attack.srt 14.0 kB
  • 8. Tampering with User Interactions/7. Changing Passwords with a CSRF Weakness.srt 13.9 kB
  • 7. Stealing Credentials and Cookies/4. Obtaining Additional Form Data.srt 13.2 kB
  • 9. Working with Files, Data, and the Operating System/4. Uploading a Web Shell.srt 13.1 kB
  • 9. Working with Files, Data, and the Operating System/1. Including Remote JavaScript Files.srt 11.5 kB
  • 8. Tampering with User Interactions/4. Key Logging.srt 11.4 kB
  • 2. JavaScript Refresher/1. Basic Operations.srt 11.2 kB
  • 6. Altering Content/1. Altering HTML Content for Web Site Defacement.srt 10.9 kB
  • 8. Tampering with User Interactions/2. Browser Detection.srt 10.5 kB
  • 5. Penetration Testing Approach/1. Approach and Tools.srt 10.4 kB
  • 7. Stealing Credentials and Cookies/3. Stealing Credentials.srt 8.9 kB
  • 10. Defensive Measures/4. Untrusted Input.srt 8.3 kB
  • 8. Tampering with User Interactions/1. Spear Phishing to Detect the User's Operating System.srt 8.2 kB
  • 8. Tampering with User Interactions/3. Capturing Mouse Activity.srt 8.1 kB
  • 6. Altering Content/3. Tampering with Links.srt 8.1 kB
  • 10. Defensive Measures/1. OWASP Top Ten.srt 8.1 kB
  • 2. JavaScript Refresher/3. Document Object Model.srt 7.8 kB
  • 1. Introduction/1. Introduction and Course Contents.srt 7.7 kB
  • 7. Stealing Credentials and Cookies/2. Stealing Cookies.srt 7.7 kB
  • 4. Building a Lab/1. DVWA for Target Practice.srt 7.6 kB
  • 7. Stealing Credentials and Cookies/1. Disclosing Cookie Content.srt 7.2 kB
  • 10. Defensive Measures/3. Secure Design and Access Control.srt 6.7 kB
  • 3. Cross Site Scripting (XSS) Refresher/1. Reflected XSS.srt 6.3 kB
  • 4. Building a Lab/4. Netcat Listener.srt 5.7 kB
  • 11. Conclusion/1. Summary.srt 5.1 kB
  • 4. Building a Lab/2. Encoding Data with Burp Suite.srt 4.9 kB
  • 2. JavaScript Refresher/2. Events.srt 4.4 kB
  • 4. Building a Lab/3. Python Web Server.srt 4.2 kB
  • 3. Cross Site Scripting (XSS) Refresher/2. Persisted XSS.srt 3.1 kB
  • 3. Cross Site Scripting (XSS) Refresher/3. DOM-based XSS.srt 3.0 kB
  • 1. Introduction/3. Ethics.srt 2.7 kB
  • 10. Defensive Measures/2. Encryption and Cookie Protection.srt 2.7 kB
  • 1. Introduction/2. How Does This Help My Career.srt 2.1 kB
  • #Support Us/4. CrackEnd - About Us!.txt 683 Bytes
  • 11. Conclusion/#Support Us/4. CrackEnd - About Us!.txt 683 Bytes
  • #Support Us/3. [TGx]Downloaded from torrentgalaxy.to.txt 585 Bytes
  • 11. Conclusion/#Support Us/3. [TGx]Downloaded from torrentgalaxy.to.txt 585 Bytes
  • #Support Us/2. My Latest Torrent @1337x.url 119 Bytes
  • 11. Conclusion/#Support Us/2. My Latest Torrent @1337x.url 119 Bytes
  • #Support Us/1. CrackEnd - Latest Cracked Apps For Windows & Mac.url 111 Bytes
  • 11. Conclusion/#Support Us/1. CrackEnd - Latest Cracked Apps For Windows & Mac.url 111 Bytes

温馨提示

本站不存储任何资源内容,只收集BT种子元数据(例如文件名和文件大小)和磁力链接(BT种子标识符),并提供查询服务,是一个完全合法的搜索引擎系统。网站不提供种子下载服务,用户可以通过第三方链接或磁力链接获取到相关的种子资源。本站也不对BT种子真实性及合法性负责,请用户注意甄别!