web security

  1. Web Security and Bug Bounty Full Mega Course

    Hidden content
  2. KesionCMS X2.0 Reinstall Add Admin Vulnerability 0-day

    ==================================================================================================================================== | # Title : KesionCMS X2.0 Reinstall Add Admin Vulnerability | | # Author : indoushka | | # Tested on : windows 10 Français V.(Pro) / browser : Mozilla firefox...
  3. KesionCMS X2.0 Reinstall Add Admin Vulnerability 0-day

    Hidden content
  4. LOI LIANG YANG COURSES - WEB/ETHICAL HACKING + MOBILE HACKING

    Top Three Courses Bundle Included 1 - Full Ethical Hacking Course 2 - Full Mobile Hacking Course 3 - Full Web Ethical Hacking Course Link : Hidden contentHidden contentHidden contentHidden content
  5. WORDPRESS ✔️ COOKIES X48

    Hidden content
  6. Burp Web Security Academy – Practitioner Labs Walkthrough

    Become professional in Web Application Penetration Testing and prepare for the Burp Suite Certified Practitioner (BSCP) What you’ll learn: advanced web application vulnerabilities get to a professional level in web application penetration testing get to a professional level in web application...
  7. Burp Web Security Academy – Apprentice Labs Walkthrough | Udemy

    Master the basics of Web Application Penetration Testing What you’ll learn: basic web application vulnerabilities getting started in web application penetration testing getting started in web application bug bounty preparing for the Burp Suite Certified Practitioner (BSCP) certification 52...
  8. Rana Khalil – Web Security Academy Series

    Learn how to hack web applications, automate your exploits in python and defend web applications against real world attacks! For each vulnerability type, we dive into the technical details and then gain hands-on experience by solving labs that model real-world vulnerabilities. Syllabus...
  9. Web Security, v2 | Frontend Masters

    This course is intended for frontend web developers and JavaScript engineers who want to enhance their understanding and skills in web security. This workshop is designed to provide frontend web developers and JavaScript engineers with a comprehensive understanding of web security. Covering...
  10. Webtretho.com

    What? Webtretho is social media for vietnamese women Data format: CSV file Data Count: 1,703,776 lines Sample...
  11. [TUTO] GRAB VULNERABLE WEBSITES LIST FOR SPECIFIC EXPL0IT - MANUALLY

    Description: A short tutorial on how to get a list of vulnerable websites for specific exploits or bots using Google Dorking ( more about Google Dorking : https://www.simplilearn.com/tutorials/cy...le-dorking ) Hidden content[/HIDEREPLYREACT]
  12. DEKSTERECON - WEB APPLICATION RECON AUTOMATION

    It takes a target domain as an input and performs reconnaissance on it and gives out - Screenshots, javscripts from wayback machine, endpoints, subdomains, Valid paths, xss parameters, check for live ports , check for Subdomain takeover , etc.. Hidden content
  13. ☠ MEGA SQL INJECTION GUIDE ☠ -0X6

    Hidden content
  14. LOI LIANG YANG COURSES - ETHICAL HACKING + MOBILE HACKING + WEB ETHICAL HACKING

    Loi Liang Yang – Ethical Hacker | Penetration Tester | Cybersecurity Consultant Top Three Courses Bundle Included 1 - Full Ethical Hacking Course 2 - Full Mobile Hacking Course 3 - Full Web Ethical Hacking Course Link : Hidden content
  15. MYSQL INJECTION-FULL LESSON

    Hidden content
  16. HOW TO MAKE RECAPTCHA CONFIGS IN STORM

    Hidden content
  17. Learn Bug Bounty Hunting Web Security Testing From Scratch

    Requirements Basic IT Skills No prior knowledge required in bug hunting, hacking or programming. Computer with a minimum of 4GB ram/memory. Operating System: Windows / Apple Mac OS / Linux. Description Welcome to my comprehensive course on Bug Bounty Hunting & Web Security Testing course. This...
  18. ⭐⭐⭐SQL INJECTION TUTORAIL⭐⭐⭐

    Hidden content
  19. ☠ MEGA SQL INJECTION GUIDE #3 ☠ -0X8

    Hidden content[/HIDEREPLYREACT]
  20. AN UNUSUAL WAY TO FIND XSS INJECTION IN ONE MINUTE

    An unusual way to find XSS injection in one minute Hidden content
  21. SQL INJECTION WITH JSQL | WITH PHOTOS | UPDATED TUTORIAL

    Enjoy :) Hidden content
  22. HACKING WITH XSS CROSS SITE SCRIPTING - 800 MB

    Hidden content
  23. 100+ WEB HACKING TOOLS - BECOME A MASTER AT WEB HACKING

    Enjoy! :) Run this on a Sandboxie or an RDP, as some might contain malicious software. I found these on forums and websites, so I am not responsible for anything that happens, if you decide to run them on your own pc. Hidden content
  24. BYPASS ADMIN PANEL BY SQL INJECTION

    So uhh here: Hidden content
  25. [EXPLOIT SITES IN SECONDS] - CROSS-SITE SCRIPTING CHEAT SHEET

    Hidden content
  26. XSS SCANNER | FIND SITES VULN TO XSS WITH 1 CLICK!

    This tool, is for Kali Linux, idk if it supports Windows. Hidden content
  27. ⚠️ WEBHACKING⚠️ HACK ANY WEBSITE ⚠️ ⭐️FREE⭐️

    Hidden content Webhacking refers to the practice of exploiting vulnerabilities in websites to gain unauthorized access, manipulate data, or disrupt services. Common techniques used in webhacking include SQL injection, cross-site scripting (XSS), and remote code execution.. Understanding...
  28. ETHICAL HACKING: LEARN TO HACK WEBSITES AND APPLICATIONS

    . Name: Ethical Hacking: Learn to hack Websites and Applications Language: English Date of Leak: 05-12-2025 Download: Hidden content
  29. ⚡EXPLOITING XSS⚡ IN HIDDEN INPUTS AND META TAGS - ✅2025 NEW WEB EXPLOIT TECNIQUE✅

    In this post we are going to show how you can (ab)use the new HTML popup functionality in Chrome to exploit XSS in meta tags and hidden inputs. YOU MUST Hidden content
  30. LEARN ETHICAL HACKING BY HACKING REAL WEBSITES LEGALLY [10/2025]

    . Name: Learn Ethical Hacking By Hacking Real Websites Legally [10/2025] Language: English Date of Leak: 24-11-2025 Download: Hidden content
  31. ⚡ABUSING JQUERY FOR CSS POWERED TIMING ATTACKS⚡- ✅2025 NEW WEB EXPLOIT TECNIQUE✅

    Abusing jQuery for CSS powered timing attacks Hidden content
  32. MYBB VERSION 3.0.0 XSS BUG SHIT !!TESTED!!

    Hidden content
  33. [SQLI] 5SITES WITH SQLI INJECTION BUG JUST FOR PRACTISE NO MORE

    Hidden content
  34. BEST XSS EXPLOITATION TOOL

    Hidden content Virustotal link VirusTotal
  35. XSS EXPLOITATION TOOL

    XSS Exploitation Tool is a penetration testing tool that focuses on the exploit of Cross-Site Scripting vulnerabilities. Features Technical Data about victim browser Geolocation of the victim Snapshot of the hooked/visited page Source code of the hooked/visited page Exfiltrate input field...
  36. BURPSUITE PROFESSIONAL V2025.7.2

    Burpsuite the latest professional version, you need jdk 11 minimum. Works on Linux, Mac, and Windows. Hidden content Virustotal link VirusTotal
  37. BURPSUITE PROFESSIONAL V2025.9.4 + BURPBOUNTYPRO V2.8.0

    Burp Suite Professional is a comprehensive toolkit used for web application security testing. Its capabilities include: Proxy Interception: Allows you to intercept and modify requests between the browser and web servers for manual testing. Spidering: Automatically crawls web applications to...
  38. NIKTO - A FREE WEB SERVER SCANNER.

    Nikto A free and open source web server scanner. Links and other resources: Hidden content Copy paste description: Nikto 2.5 is an Open Source web server scanner which performs comprehensive tests against web servers for multiple items, including over 7,000 potentially dangerous...
  39. SCULPTOR-V1.1 - EXPLOITING SQL INJECTION VULNERABILITIES

    Hidden content Virustotal link VirusTotal
  40. ☆ HACKING WEB SERVERS ☆ ETHICAL HACKING ☆

    :pepegun: No Likes = Report = BaN :am1nolbroken: Hidden content Show your appreciation by clicking on the ❤️ Like
  41. ☆ SQL INJECTION ☆ ETHICAL HACKING ☆

    Hidden content
  42. [VIDEO TUTORIAL] COMPLETE SQL INJECTION TUTORIAL - 1.5 HR-BEGINNER TO ADVANCE - 2025

    ⭐GUIDE⭐
  43. SQLI INJECTION ⚡️ DORKS

    Hidden content
  44. [HACKING - 2021] VULNERABLE WEB APPLICATION TO PRACTICE (DVWA)

    Hello, I bring you an application for those hackers who are learning the "basics" of hacking. It is a vulnerable web application and your job will be to exploit all these vulnerabilities. There are three levels of difficulty available: easy, intermediate or difficult level. It is a simple way...
  45. Recruit penetration technology

    Recruiting penetration techniques, collecting online loan disbursement history, shopping in Vietnam, TG: http://t.me/qqjm89 (@qqjm89)
  46. Udemy - Web Security & Bug Bounty Learn Penetration Testing

    Udemy - Web Security & Bug Bounty Learn Penetration Testing Hidden content
  47. Udemy - Web Security & Bug Bounty Learn Penetration Testing

    Udemy - Web Security & Bug Bounty Learn Penetration Testing Hidden content
  48. WEB HACKING 101 BOOK

    PETER YAWORSKI'S WEB HACKING 101 BOOK Hidden content
  49. Payloads and bypasses for Web Application Security 🚀

    Hidden content Hidden content