PakistanDatabase.com

Web Security / Bug Hunting THE XSS RAT'S LEAKED COURSE TO WEB APPLICATIONS HACKING [2021]

Legion

Active member
Satan
Joined
Nov 21, 2023
Messages
1,314
Hellcoins
♆2,871
[Image: CHpTlRb.png]

Broad scope methodology - Manual.html
│ Medium articles.html
│ OWASP top 10.html
│ Practical Demonstration - Main Web Application hacking.html
│ Rat's methodology.html
│ Tools.html
│ Vulnerability types.html

├───Broad scope methodology - Manual
│ │ 0 Subdomain enumeration.html
│ │ 1 Creating our list of subdomains.html
│ │ 2 Processing Our List Of Subdomain.html
│ │ 3 Subdomain flyover.html
│ │ 4 Exploiting open ports.html
│ │ 98 Running your scripts on a VPS.html
│ │ A Vulnerability scanning.html
│ │ B Vulnerability testing strategy.html

│ ├───0 Subdomain enumeration
│ │ Subdomain_Enum.png

│ │
│ ├───1 Creating our list of subdomains
│ ├───4 Exploiting open ports

│ │
│ ├───98 Running your scripts on a VPS
│ ├───A Vulnerability scanning
│ │ Nuclei_scanning.png

│ │
│ └───B Vulnerability testing strategy
├───Medium articles
│ │ Are you a competitive hacker.html
│ │ Bugbountyhunter com membership.html
│ │ Docker A Bug Bounty Hunters Best Friend.html
│ │ How to become a hacker.html
│ │ How to handle failure.html
│ │ Rat's mobile methodology.html
│ │
│ └───Docker A Bug Bounty Hunters Best Friend
├───OWASP top 10
│ │ Full.html
│ │
│ └───Full
│ │ 1 Injection.html
│ │ 7 XSS.html
│ │ Introduction.html
│ │
│ ├───1 Injection
│ ├───4 XML eXternal Entities
│ └───5 Broken Access Control
├───Practical Demonstration - Main Web Application hac
│ burpproject.png
│ dashboard.jpeg
│ deploy.jpeg
│ enter_to_procee.jpeg
│ h1.png
│ heroku_terms.jpeg

├───Tools
│ │ Analyzing javascript files.html
│ │ Burp suite.html
│ │ Directory brute forcing.html
│ │ Nmap.html
│ │
│ ├───Analyzing javascript files
│ │ Untitled 1.png
│ │ Untitled.png
│ │
│ ├───Burp suite
│ │ │ Burp Authorize.html
│ │ │ Burp Match and replace.html
│ │ │ Burp Suite Comparer.html
│ │ │ Burp Suite Dashboard.html
│ │ │ Burp Suite Decoder.html
│ │ │ Burp Suite Extender.html
│ │ │ Burp suite Intruder.html
│ │ │ Burp suite Proxy.html
│ │ │ Burp Suite repeater.html
│ │ │ Burp Suite Sequencer.html
│ │ │ Burp suite Target.html
│ │ │
│ │ ├───Burp Match and replace
│ │ ├───Burp Suite Comparer
│ │ ├───Burp Suite Dashboard
│ │ ├───Burp Suite Decoder
│ │ ├───Burp Suite Extender
│ │ ├───Burp suite Intruder
│ │ ├───Burp suite Proxy
│ │ ├───Burp Suite repeater
│ │ ├───Burp Suite Sequencer
│ │ └───Burp suite Target
│ └───Directory brute forcing
│ Untitled 1.png
│ Untitled 2.png
│ Untitled.png

└───Vulnerability types
│ BAC.html
│ Business logic flaws.html
│ Command injection.html
│ CSRF.html
│ IDOR.html
│ Insecure deserialization.html
│ SSRF.html
│ Template injections.html
│ The Origin Of Business logic vulnerabilities.html
│ XSS.html
│ XXE.html

├───Command injection
├───IDOR
│ Untitled 1.png
│ Untitled.png

├───Insecure deserialization
│ Untitled_Diagram.png

├───SSRF
│ Untitled 1.png
│ Untitled 2.png
│ Untitled.png

├───Template injections
├───The Origin Of Business logic vulnerabilities
│ agile.png
│ Untitled.png
│ V-Model.png
│ waterfal.png

└───XSS
│ DOM XSS.html
│ XSS Cheat sheet.html

└───XSS Cheat sheet


 
Last edited by a moderator:
Top