web security

  1. SUB-ZER0

    DEKSTERECON - WEB APPLICATION RECON AUTOMATION

    It takes a target domain as an input and performs reconnaissance on it and gives out - Screenshots, javscripts from wayback machine, endpoints, subdomains, Valid paths, xss parameters, check for live ports , check for Subdomain takeover , etc.. Hidden content
  2. SudoDragon

    LOI LIANG YANG COURSES - ETHICAL HACKING + MOBILE HACKING + WEB ETHICAL HACKING

    Loi Liang Yang – Ethical Hacker | Penetration Tester | Cybersecurity Consultant Top Three Courses Bundle Included 1 - Full Ethical Hacking Course 2 - Full Mobile Hacking Course 3 - Full Web Ethical Hacking Course Link : Hidden content
  3. REDEYE

    MYSQL INJECTION-FULL LESSON

    Hidden content
  4. REDEYE

    HOW TO MAKE RECAPTCHA CONFIGS IN STORM

    Hidden content
  5. Anduril

    Learn Bug Bounty Hunting Web Security Testing From Scratch

    Requirements Basic IT Skills No prior knowledge required in bug hunting, hacking or programming. Computer with a minimum of 4GB ram/memory. Operating System: Windows / Apple Mac OS / Linux. Description Welcome to my comprehensive course on Bug Bounty Hunting & Web Security Testing course. This...
  6. SudoDragon

    ⭐⭐⭐SQL INJECTION TUTORAIL⭐⭐⭐

    Hidden content
  7. SudoDragon

    ☠ MEGA SQL INJECTION GUIDE #3 ☠ -0X8

    Hidden content[/HIDEREPLYREACT]
  8. SudoDragon

    AN UNUSUAL WAY TO FIND XSS INJECTION IN ONE MINUTE

    An unusual way to find XSS injection in one minute Hidden content
  9. SudoDragon

    SQL INJECTION WITH JSQL | WITH PHOTOS | UPDATED TUTORIAL

    Enjoy :) Hidden content
  10. SudoDragon

    HACKING WITH XSS CROSS SITE SCRIPTING - 800 MB

    Hidden content
  11. SudoDragon

    100+ WEB HACKING TOOLS - BECOME A MASTER AT WEB HACKING

    Enjoy! :) Run this on a Sandboxie or an RDP, as some might contain malicious software. I found these on forums and websites, so I am not responsible for anything that happens, if you decide to run them on your own pc. Hidden content
  12. SudoDragon

    BYPASS ADMIN PANEL BY SQL INJECTION

    So uhh here: Hidden content
  13. SudoDragon

    [EXPLOIT SITES IN SECONDS] - CROSS-SITE SCRIPTING CHEAT SHEET

    Hidden content
  14. SudoDragon

    XSS SCANNER | FIND SITES VULN TO XSS WITH 1 CLICK!

    This tool, is for Kali Linux, idk if it supports Windows. Hidden content
  15. SudoDragon

    ⚠️ WEBHACKING⚠️ HACK ANY WEBSITE ⚠️ ⭐️FREE⭐️

    Hidden content Webhacking refers to the practice of exploiting vulnerabilities in websites to gain unauthorized access, manipulate data, or disrupt services. Common techniques used in webhacking include SQL injection, cross-site scripting (XSS), and remote code execution.. Understanding...
  16. SudoDragon

    ETHICAL HACKING: LEARN TO HACK WEBSITES AND APPLICATIONS

    . Name: Ethical Hacking: Learn to hack Websites and Applications Language: English Date of Leak: 05-12-2025 Download: Hidden content
  17. SudoDragon

    ⚡EXPLOITING XSS⚡ IN HIDDEN INPUTS AND META TAGS - ✅2025 NEW WEB EXPLOIT TECNIQUE✅

    In this post we are going to show how you can (ab)use the new HTML popup functionality in Chrome to exploit XSS in meta tags and hidden inputs. YOU MUST Hidden content
  18. SudoDragon

    LEARN ETHICAL HACKING BY HACKING REAL WEBSITES LEGALLY [10/2025]

    . Name: Learn Ethical Hacking By Hacking Real Websites Legally [10/2025] Language: English Date of Leak: 24-11-2025 Download: Hidden content
  19. SudoDragon

    ⚡ABUSING JQUERY FOR CSS POWERED TIMING ATTACKS⚡- ✅2025 NEW WEB EXPLOIT TECNIQUE✅

    Abusing jQuery for CSS powered timing attacks Hidden content
  20. SudoDragon

    MYBB VERSION 3.0.0 XSS BUG SHIT !!TESTED!!

    Hidden content
  21. SudoDragon

    [SQLI] 5SITES WITH SQLI INJECTION BUG JUST FOR PRACTISE NO MORE

    Hidden content
  22. SUB-ZER0

    BEST XSS EXPLOITATION TOOL

    Hidden content Virustotal link VirusTotal
  23. SUB-ZER0

    XSS EXPLOITATION TOOL

    XSS Exploitation Tool is a penetration testing tool that focuses on the exploit of Cross-Site Scripting vulnerabilities. Features Technical Data about victim browser Geolocation of the victim Snapshot of the hooked/visited page Source code of the hooked/visited page Exfiltrate input field...
  24. SUB-ZER0

    BURPSUITE PROFESSIONAL V2025.7.2

    Burpsuite the latest professional version, you need jdk 11 minimum. Works on Linux, Mac, and Windows. Hidden content Virustotal link VirusTotal
  25. SUB-ZER0

    BURPSUITE PROFESSIONAL V2025.9.4 + BURPBOUNTYPRO V2.8.0

    Burp Suite Professional is a comprehensive toolkit used for web application security testing. Its capabilities include: Proxy Interception: Allows you to intercept and modify requests between the browser and web servers for manual testing. Spidering: Automatically crawls web applications to...
  26. SUB-ZER0

    NIKTO - A FREE WEB SERVER SCANNER.

    Nikto A free and open source web server scanner. Links and other resources: Hidden content Copy paste description: Nikto 2.5 is an Open Source web server scanner which performs comprehensive tests against web servers for multiple items, including over 7,000 potentially dangerous...
  27. SUB-ZER0

    SCULPTOR-V1.1 - EXPLOITING SQL INJECTION VULNERABILITIES

    Hidden content Virustotal link VirusTotal
  28. SudoDragon

    ☆ HACKING WEB SERVERS ☆ ETHICAL HACKING ☆

    :pepegun: No Likes = Report = BaN :am1nolbroken: Hidden content Show your appreciation by clicking on the ❤️ Like
  29. SudoDragon

    ☆ SQL INJECTION ☆ ETHICAL HACKING ☆

    Hidden content
  30. SudoDragon

    [VIDEO TUTORIAL] COMPLETE SQL INJECTION TUTORIAL - 1.5 HR-BEGINNER TO ADVANCE - 2025

    ⭐GUIDE⭐
  31. SudoDragon

    SQLI INJECTION ⚡️ DORKS

    Hidden content
  32. SudoDragon

    [HACKING - 2021] VULNERABLE WEB APPLICATION TO PRACTICE (DVWA)

    Hello, I bring you an application for those hackers who are learning the "basics" of hacking. It is a vulnerable web application and your job will be to exploit all these vulnerabilities. There are three levels of difficulty available: easy, intermediate or difficult level. It is a simple way...
  33. Miyelec

    Recruit penetration technology

    Recruiting penetration techniques, collecting online loan disbursement history, shopping in Vietnam, TG: http://t.me/qqjm89 (@qqjm89)
  34. Nightmare

    Udemy - Web Security & Bug Bounty Learn Penetration Testing

    Udemy - Web Security & Bug Bounty Learn Penetration Testing Hidden content
  35. Nightmare

    Udemy - Web Security & Bug Bounty Learn Penetration Testing

    Udemy - Web Security & Bug Bounty Learn Penetration Testing Hidden content
  36. Nightmare

    WEB HACKING 101 BOOK

    PETER YAWORSKI'S WEB HACKING 101 BOOK Hidden content
  37. Nightmare

    Payloads and bypasses for Web Application Security 🚀

    Hidden content Hidden content
Top