![[ICO]](/icons/blank.gif) | Name | Last modified | Size | Description |
|
![[PARENTDIR]](/icons/back.gif) | Parent Directory | | - | |
![[VID]](/icons/movie.gif) | 76._The_End_-_النهاية_❤.mp4 | 2025-06-24 11:38 | 24M | |
![[VID]](/icons/movie.gif) | 75._Forced_OAuth_profile_linking___AWAPT___Portswigger_Lab___Cyber_Security.mp4 | 2025-06-24 11:38 | 32M | |
![[VID]](/icons/movie.gif) | 74._Authentication_bypass_via_OAuth_implicit_flow___AWAPT___Portswigger_Lab___Cyber_Security.mp4 | 2025-06-24 11:38 | 33M | |
![[VID]](/icons/movie.gif) | 73._Web_shell_upload_via_race_condition___AWAPT___Portswigger_Lab___Cyber_Security.mp4 | 2025-06-24 11:38 | 38M | |
![[VID]](/icons/movie.gif) | 72._Remote_code_execution_via_polyglot_web_shell_upload___AWAPT___Portswigger_Lab___Cyber_Security.mp4 | 2025-06-24 11:38 | 30M | |
![[VID]](/icons/movie.gif) | 71._Web_shell_upload_via_obfuscated_file_extension___AWAPT___Portswigger_Lab___Cyber_Security.mp4 | 2025-06-24 11:38 | 27M | |
![[VID]](/icons/movie.gif) | 70._Web_shell_upload_via_extension_blacklist_bypass___AWAPT___Portswigger_Lab___Cyber_Security.mp4 | 2025-06-24 11:38 | 22M | |
![[VID]](/icons/movie.gif) | 69._Web_shell_upload_via_Content-Type_bypass_and_path_traversal__AWAPT__Portswigger_Lab___Cyber_Security.mp4 | 2025-06-24 11:38 | 40M | |
![[VID]](/icons/movie.gif) | 68._Remote_Code_Execution_via_web_shell_upload___AWAPT___Portswigger_Lab___Cyber_Security.mp4 | 2025-06-24 11:38 | 45M | |
![[VID]](/icons/movie.gif) | 67._#29_How_to_solve_Cryptography_challenges_(CTF_Learn)_Part_3____Cyber_security.mp4 | 2025-06-24 11:38 | 54M | |
![[VID]](/icons/movie.gif) | 66._#29_How_to_solve_Cryptography_challenges_(CTF_Learn)_Part_2____Cyber_security.mp4 | 2025-06-24 11:38 | 51M | |
![[VID]](/icons/movie.gif) | 65._#29_How_to_solve_Cryptography_challenges_(CTF_Learn)_Part_1____Cyber_security.mp4 | 2025-06-24 11:38 | 34M | |
![[VID]](/icons/movie.gif) | 64._#28_How_to_solve_Digital_Forensics_challenges_(CTF_Learn)_Part_6____Cybersecurity.mp4 | 2025-06-24 11:38 | 94M | |
![[VID]](/icons/movie.gif) | 63._#28_How_to_solve_Digital_Forensics_challenges_(CTF_Learn)_Part_5____Cybersecurity.mp4 | 2025-06-24 11:38 | 67M | |
![[VID]](/icons/movie.gif) | 62._#28_How_to_solve_Digital_Forensics_challenges_(CTF_Learn)_Part_4____Cybersecurity.mp4 | 2025-06-24 11:38 | 54M | |
![[VID]](/icons/movie.gif) | 61._#28_How_to_solve_Digital_Forensics_challenges_(CTF_Learn)_Part_3____Cybersecurity.mp4 | 2025-06-24 11:38 | 30M | |
![[VID]](/icons/movie.gif) | 60._#28_How_to_solve_Digital_Forensics_challenges_(CTF_Learn)_Part_2____Cybersecurity.mp4 | 2025-06-24 11:38 | 37M | |
![[VID]](/icons/movie.gif) | 59._#28_How_to_solve_Digital_Forensics_challenges_(CTF_Learn)_Part_1____Cybersecurity.mp4 | 2025-06-24 11:38 | 29M | |
![[VID]](/icons/movie.gif) | 58._#27_How_to_hack_WebApps_(CTF_Learn)_Part_4____Cyber_Security.mp4 | 2025-06-24 11:38 | 23M | |
![[VID]](/icons/movie.gif) | 57._#27_How_to_hack_WebApps_(CTF_Learn)_Part_3____Cyber_Security.mp4 | 2025-06-24 11:38 | 19M | |
![[VID]](/icons/movie.gif) | 56._#27_How_to_hack_WebApps_(CTF_Learn)_Part_2____Cyber_Security.mp4 | 2025-06-24 11:38 | 23M | |
![[VID]](/icons/movie.gif) | 55._#27_How_to_hack_WebApps_(CTF_Learn)_Part_1____Cyber_Security.mp4 | 2025-06-24 11:38 | 35M | |
![[VID]](/icons/movie.gif) | 54._#26_CTF_(_Capture_The_Flag_)_Road_Map_For_Beginners___Cyber_Security.mp4 | 2025-06-24 11:38 | 68M | |
![[VID]](/icons/movie.gif) | 53._#24_Metasploit_Attack_Learn_(_Metasploitable_v2)_-_Part_4___CyberSecurity.mp4 | 2025-06-24 11:38 | 34M | |
![[VID]](/icons/movie.gif) | 52._#24_Metasploit_Attack_Learn_(_Metasploitable_v2)_-_Part_2___CyberSecurity.mp4 | 2025-06-24 11:38 | 50M | |
![[VID]](/icons/movie.gif) | 51._#24_Metasploit_Attack_Learn_(_Metasploitable_v2)_-_Part_1___CyberSecurity.mp4 | 2025-06-24 11:38 | 76M | |
![[VID]](/icons/movie.gif) | 50._#23_SQLi_(_SQL_injection_#Automated_)_-_Part3___CyberSecurity.mp4 | 2025-06-24 11:38 | 65M | |
![[VID]](/icons/movie.gif) | 49._#23_SQLi_(_SQL_injection_)_-_Part2___CyberSecurity.mp4 | 2025-06-24 11:38 | 72M | |
![[VID]](/icons/movie.gif) | 48._#22_FU_(_File_Upload_)_-_Part3___CyberSecurity.mp4 | 2025-06-24 11:38 | 21M | |
![[VID]](/icons/movie.gif) | 47._#22_FU_(_File_Upload_)_-_Part2___CyberSecurity.mp4 | 2025-06-24 11:38 | 14M | |
![[VID]](/icons/movie.gif) | 46._#22_FU_(_File_Upload_)_-_Part1___CyberSecurity.mp4 | 2025-06-24 11:38 | 34M | |
![[VID]](/icons/movie.gif) | 45._#21_LFI_(_Local_File_Inclusion_)____CyberSecurity.mp4 | 2025-06-24 11:38 | 32M | |
![[VID]](/icons/movie.gif) | 44._#20_CSRF_(_Cross_Site_Request_Forgery_)____CyberSecurity.mp4 | 2025-06-24 11:38 | 58M | |
![[VID]](/icons/movie.gif) | 43._#19_CORS_&_SOP_(_Same-origin_Policy_)____CyberSecurity.mp4 | 2025-06-24 11:38 | 44M | |
![[VID]](/icons/movie.gif) | 42._#18_RCE_(_Remote_Command_Execution_)_-_Part1____CyberSecurity.mp4 | 2025-06-24 11:38 | 23M | |
![[VID]](/icons/movie.gif) | 41._#17_XSS_(_Cross_Site_Script_)_-_Part4___CyberSecurity.mp4 | 2025-06-24 11:38 | 20M | |
![[VID]](/icons/movie.gif) | 40._#17_XSS_(_Cross_Site_Script_)_-_Part3___CyberSecurity.mp4 | 2025-06-24 11:38 | 87M | |
![[VID]](/icons/movie.gif) | 39._#17_XSS_(_Cross_Site_Script_)_-_Part2___CyberSecurity.mp4 | 2025-06-24 11:38 | 107M | |
![[VID]](/icons/movie.gif) | 38._#17_XSS_(_Cross_Site_Script_)_-_Part1___CyberSecurity.mp4 | 2025-06-24 11:38 | 62M | |
![[VID]](/icons/movie.gif) | 37._#16_Introduction_To_HTML_-_Part2___CyberSecurity.mp4 | 2025-06-24 11:38 | 58M | |
![[VID]](/icons/movie.gif) | 36._#16_Introduction_To_HTML_-_Part1___CyberSecurity.mp4 | 2025-06-24 11:38 | 76M | |
![[VID]](/icons/movie.gif) | 35._#15_HTTP_Methods,Request,Response___CyberSecurity.mp4 | 2025-06-24 11:38 | 76M | |
![[VID]](/icons/movie.gif) | 34._#14_Subdomain_TakeOver___CyberSecurity.mp4 | 2025-06-24 11:38 | 57M | |
![[VID]](/icons/movie.gif) | 33._#13_SubList3r____CyberSecurity.mp4 | 2025-06-24 11:38 | 87M | |
![[VID]](/icons/movie.gif) | 32._#12_Introduction_To_BurpSuite_-_Part3___CyberSecurity.mp4 | 2025-06-24 11:38 | 98M | |
![[VID]](/icons/movie.gif) | 31._#12_Introduction_To_BurpSuite_-_Part2___CyberSecurity.mp4 | 2025-06-24 11:38 | 64M | |
![[VID]](/icons/movie.gif) | 30._#12_Introduction_To_BurpSuite_-_Part1___CyberSecurity.mp4 | 2025-06-24 11:38 | 82M | |
![[VID]](/icons/movie.gif) | 29._#11_Introduction_To_Information_Gathering_-_Part6___CyberSecurity.mp4 | 2025-06-24 11:38 | 72M | |
![[VID]](/icons/movie.gif) | 28._#11_Introduction_To_Information_Gathering_-_Part5___CyberSecurity.mp4 | 2025-06-24 11:38 | 49M | |
![[VID]](/icons/movie.gif) | 27._#11_Introduction_To_Information_Gathering_-_Part4___CyberSecurity.mp4 | 2025-06-24 11:38 | 106M | |
![[VID]](/icons/movie.gif) | 26._#11_Introduction_To_Information_Gathering_-_Part3___CyberSecurity.mp4 | 2025-06-24 11:38 | 93M | |
![[VID]](/icons/movie.gif) | 25._#11_Introduction_To_Information_Gathering_-_Part2___CyberSecurity.mp4 | 2025-06-24 11:38 | 117M | |
![[VID]](/icons/movie.gif) | 24._#11_Introduction_To_Information_Gathering_-_Part1___CyberSecurity.mp4 | 2025-06-24 11:38 | 124M | |
![[VID]](/icons/movie.gif) | 23._#10_VPN_vs_Proxy___CyberSecurity.mp4 | 2025-06-24 11:37 | 83M | |
![[VID]](/icons/movie.gif) | 22._#9_Introduction_To_Network_(_IPv4_Subnet_Mask)_-_Part8___CyberSecurity.mp4 | 2025-06-24 11:37 | 73M | |
![[VID]](/icons/movie.gif) | 21._#9_Introduction_To_Network_(_Firewall_,_Access_Point_)_-_Part7___CyberSecurity.mp4 | 2025-06-24 11:37 | 57M | |
![[VID]](/icons/movie.gif) | 20._#9_Introduction_To_Network_(_Switch_,_HUB_,_Repeater_,_Router_)_-_Part6___CyberSecurity.mp4 | 2025-06-24 11:37 | 46M | |
![[VID]](/icons/movie.gif) | 19._#9_Introduction_To_Network_(_OSI_,_DNS_,_TCP_and_UDP_)_-_Part5___CyberSecurity.mp4 | 2025-06-24 11:37 | 58M | |
![[VID]](/icons/movie.gif) | 18._#9_Introduction_To_Network_(_OSI_7_Layers_)_-_Part4___CyberSecurity.mp4 | 2025-06-24 11:37 | 78M | |
![[VID]](/icons/movie.gif) | 17._#9_Introduction_To_Network_(_Topolgies_and_OSI_7_Layers_)_-_Part3___CyberSecurity.mp4 | 2025-06-24 11:37 | 78M | |
![[VID]](/icons/movie.gif) | 16._#9_Introduction_To_Network_(_IPv4_,_ARP_,_NAT_,_MAC_)_-_Part2___CyberSecurity.mp4 | 2025-06-24 11:37 | 77M | |
![[VID]](/icons/movie.gif) | 15._#9_Introduction_To_Network_-_Part1___CyberSecurity.mp4 | 2025-06-24 11:37 | 79M | |
![[VID]](/icons/movie.gif) | 14._#8_HTTPS___CyberSecurity.mp4 | 2025-06-24 11:37 | 39M | |
![[VID]](/icons/movie.gif) | 13._#7_Encryption___CyberSecurity.mp4 | 2025-06-24 11:37 | 59M | |
![[VID]](/icons/movie.gif) | 12._#6_Encoding___CyberSecurity.mp4 | 2025-06-24 11:37 | 26M | |
![[VID]](/icons/movie.gif) | 11._#5_Hashing___CyberSecurity.mp4 | 2025-06-24 11:37 | 90M | |
![[VID]](/icons/movie.gif) | 10._#4_Basic_Linux_Commands_-_Part_7___CyberSecurity.mp4 | 2025-06-24 11:37 | 79M | |
![[VID]](/icons/movie.gif) | 09._#4_Basic_Linux_Commands_-_Part_6___CyberSecurity.mp4 | 2025-06-24 11:37 | 85M | |
![[VID]](/icons/movie.gif) | 08._#4_Basic_Linux_Commands_-_Part_5___CyberSecurity.mp4 | 2025-06-24 11:37 | 70M | |
![[VID]](/icons/movie.gif) | 07._#4_Basic_Linux_Commands_-_Part_4___CyberSecurity.mp4 | 2025-06-24 11:37 | 82M | |
![[VID]](/icons/movie.gif) | 06._#4_Basic_Linux_Commands_-_Part_3___CyberSecurity.mp4 | 2025-06-24 11:37 | 120M | |
![[VID]](/icons/movie.gif) | 05._#4_Basic_Linux_Commands_-_Part_2___Cyber_Security.mp4 | 2025-06-24 11:37 | 71M | |
![[VID]](/icons/movie.gif) | 04._#4_Basic_Linux_Commands_-_Part_1___Cyber_Security.mp4 | 2025-06-24 11:37 | 95M | |
![[VID]](/icons/movie.gif) | 03._#3_How_to_install_Kali_Linux_N_Virtual_Box_environment.mp4 | 2025-06-24 11:37 | 35M | |
![[VID]](/icons/movie.gif) | 02._#2_Introduction_To_Computer___Cyber_Security.mp4 | 2025-06-24 11:37 | 121M | |
![[VID]](/icons/movie.gif) | 01._#1_Introduction_To_Cyber_Security_-_SpicalEdition.mp4 | 2025-06-24 11:37 | 59M | |
|