RAR-files |
lltot1-5803-xqzt.rar |
50,000,000 |
67E53238 |
lltot1-5803-xqzt.r00 |
50,000,000 |
1240E8C9 |
lltot1-5803-xqzt.r01 |
24,927,529 |
A40AC087 |
|
Total size: |
124,927,529 |
|
|
Archived
files |
Learning the OWASP Top 10\1.Introduction\01.Welcome.en.srt |
1,459 |
8C5EBB1B |
Learning the OWASP Top 10\1.Introduction\02.OWASP and the OWASP Top 10.en.srt |
2,838 |
F1277D43 |
Learning the OWASP Top 10\1.Introduction\02.OWASP and the OWASP Top 10.mp4
[9bbb4ba286833cec]
|
4,990,027 |
D81A89EB |
Learning the OWASP Top 10\1.Introduction\01.Welcome.mp4
[b928dae73a665bfc]
|
4,470,533 |
C582A211 |
Learning the OWASP Top 10\2.1. The Top 10\05.Sensitive data exposure.mp4
[929dc6be2dee9a3f]
|
9,586,102 |
45EFC480 |
Learning the OWASP Top 10\2.1. The Top 10\05.Sensitive data exposure.en.srt |
5,801 |
9320CEB0 |
Learning the OWASP Top 10\2.1. The Top 10\09.Cross-site scripting.mp4
[162a77dbb1d4f20b]
|
5,359,968 |
99FD3E9C |
Learning the OWASP Top 10\2.1. The Top 10\11.Using components with known vulnerabilities.en.srt |
6,371 |
454160D6 |
Learning the OWASP Top 10\2.1. The Top 10\12.Insufficient logging and monitoring.en.srt |
5,228 |
EC60A834 |
Learning the OWASP Top 10\2.1. The Top 10\12.Insufficient logging and monitoring.mp4
[b48eafa204887515]
|
9,456,023 |
2AE07EE4 |
Learning the OWASP Top 10\2.1. The Top 10\07.Broken access control.mp4
[95c04b63da25d84c]
|
10,118,539 |
8A0A8E7F |
Learning the OWASP Top 10\2.1. The Top 10\10.Insecure deserialization.mp4
[10df63212058f140]
|
6,857,573 |
1ADBA290 |
Learning the OWASP Top 10\2.1. The Top 10\10.Insecure deserialization.en.srt |
3,827 |
11866C08 |
Learning the OWASP Top 10\2.1. The Top 10\08.Security misconfiguration.en.srt |
6,813 |
D92931F1 |
Learning the OWASP Top 10\2.1. The Top 10\08.Security misconfiguration.mp4
[6bd5be9ce1e1ab48]
|
10,802,416 |
D0990E31 |
Learning the OWASP Top 10\2.1. The Top 10\03.Injection.en.srt |
4,383 |
BA6E4D78 |
Learning the OWASP Top 10\2.1. The Top 10\11.Using components with known vulnerabilities.mp4
[f007873f86968af9]
|
13,423,654 |
26D87F3B |
Learning the OWASP Top 10\2.1. The Top 10\03.Injection.mp4
[267d30727eb0a46c]
|
7,029,519 |
55D01392 |
Learning the OWASP Top 10\2.1. The Top 10\06.XML external entity (XXE).mp4
[bfe6979c78afa47c]
|
12,058,155 |
2E0BBCFA |
Learning the OWASP Top 10\2.1. The Top 10\04.Broken authentication and session management.en.srt |
16,738 |
6EA9861F |
Learning the OWASP Top 10\2.1. The Top 10\07.Broken access control.en.srt |
6,797 |
E3126ACB |
Learning the OWASP Top 10\2.1. The Top 10\09.Cross-site scripting.en.srt |
3,185 |
C1E6F345 |
Learning the OWASP Top 10\2.1. The Top 10\06.XML external entity (XXE).en.srt |
5,417 |
2CA0B788 |
Learning the OWASP Top 10\2.1. The Top 10\04.Broken authentication and session management.mp4
[422065f03f7b98ed]
|
27,102,375 |
67E8168A |
Learning the OWASP Top 10\6.Conclusion\13.Next steps.en.srt |
1,708 |
3E94F98F |
Learning the OWASP Top 10\6.Conclusion\13.Next steps.mp4
[8518bcf898ddebb3]
|
3,598,647 |
E0F38CA3 |
Learning the OWASP Top 10\1.Introduction |
0 |
00000000 |
Learning the OWASP Top 10\2.1. The Top 10 |
0 |
00000000 |
Learning the OWASP Top 10\6.Conclusion |
0 |
00000000 |
Learning the OWASP Top 10 |
0 |
00000000 |
|
Total size: |
124,924,096 |
|
|