Section1 - Advanced Attacks.zip
582.7 MB
1 - Introduction
2 - Methodology and Context
3 - File Inclusion
4 - SQL Injection
5 - NoSQL Injection
6 - XSS and XSRF Together
2 - Methodology and Context
3 - File Inclusion
4 - SQL Injection
5 - NoSQL Injection
6 - XSS and XSRF Together
Section2 - Web Frameworks.zip
442.3 MB
1 - Introduction
2 - Content Management Systems
3 - Web Architectures
4 - Languages and Frameworks
2 - Content Management Systems
3 - Web Architectures
4 - Languages and Frameworks
Section3 - Web Cryptography.zip
471.3 MB
1 - Introduction to Web Cryptography
2 - Basic Crypto Concepts
3 - Ciphers and Ciphers Modes
4 - Identifying Crypto
5 - Crypto Exploit Concepts
6 - Attacking Encryption Keys
7 - Attacking Stream Ciphers
8 - Attacking ECB Cipher Mode
9 - Attacking CBC Cipher Mode
10 - Attacking PKCS#7
2 - Basic Crypto Concepts
3 - Ciphers and Ciphers Modes
4 - Identifying Crypto
5 - Crypto Exploit Concepts
6 - Attacking Encryption Keys
7 - Attacking Stream Ciphers
8 - Attacking ECB Cipher Mode
9 - Attacking CBC Cipher Mode
10 - Attacking PKCS#7
Section4 - Alternative Web Interfaces.zip
419.5 MB
1 - Introduction
2 - Hash Length Extensions Attacks
3 - Alternative Web Interfaces
4 - Mobile Applications
5 - Compiled Objects
6 - Web Services
7 - WebSockets
8 - HTTP2
2 - Hash Length Extensions Attacks
3 - Alternative Web Interfaces
4 - Mobile Applications
5 - Compiled Objects
6 - Web Services
7 - WebSockets
8 - HTTP2
Section5 - Web Application Firewall and Filter Bypass.zip
287.4 MB
1 - Web Application Security Defenses
2 - Developer Created Defenses
3 - Web Framework Defenses
4 - Inline Security Defenses
5 - Figerprint Defenses
6 - Bypassing XSS Defense
7 - Bypassing SQL Injection Defense
2 - Developer Created Defenses
3 - Web Framework Defenses
4 - Inline Security Defenses
5 - Figerprint Defenses
6 - Bypassing XSS Defense
7 - Bypassing SQL Injection Defense
👍1