Главная
Study mode:
on
You
History
Saved
In progress
0 courses
compleat
0 courses
#Art & Design
#Adobe
#ChatGPT
#GitHub
#SQL Injection
YouTube
education
#sqlmap
Showing:
149
courses
Sort by Relevancy
Highest rated
Lowest rated
Most recently added
Great Learning
Ethical Hacking Tutorial - 2020
3
rewiews
As all the companies are going the digital route, it becomes extremely important for them to secure their data.This is why the demand for ethical hackers is increasing and the salaries for Ethical Hackers are more than any other IT Professional.
Add to list
12
Lesons
3 hours 33 minutes
On-Demand
Free-Video
Bug Bounty Training Lessons and Bug Bounty Tutorials
1
rewiews
Comprehensive bug bounty training covering various security vulnerabilities, testing techniques, and tools. Ideal for aspiring ethical hackers and cybersecurity professionals.
Add to list
79
Lesons
20 hours
On-Demand
Free-Video
Bug Bounty for Beginners in Tamil
3
rewiews
Aprende a encontrar vulnerabilidades en sitios web y participa en programas de recompensas por errores. Técnicas de hacking ético explicadas paso a paso en tamil.
Add to list
24
Lesons
7 hours
On-Demand
Free-Video
Cloud Security Alliance
Authorization Best Practices for Systems Using Large Language Models
0
rewiews
Explore authorization best practices for LLM-based systems, covering security implications, design patterns, and robust solutions for various use cases.
Add to list
1
Lesons
26 minutes
On-Demand
Free-Video
HackerOne
Hacker101
0
rewiews
Learn essential bug bounty hunting skills through comprehensive video tutorials covering web security, exploitation techniques, and ethical hacking practices.
Add to list
27
Lesons
4 hours 30 minutes
On-Demand
Free-Video
Beginner Bug Bounty Course - Web Application Hacking
0
rewiews
Learn web application hacking and bug bounty hunting techniques, from basic recon to advanced exploits like SQL injection and XSS, using popular tools and platforms for hands-on practice.
Add to list
11
Lesons
4 hours 52 minutes
On-Demand
Free-Video
Cyber Mentor
Beginner Web Application Hacking
0
rewiews
Comprehensive introduction to web application hacking, covering enumeration, XSS, SQL injection, broken access control, and more. Includes live bug bounty hunting demonstration.
Add to list
6
Lesons
5 hours 8 minutes
On-Demand
Free-Video
Cyber Mentor
Web App Testing - SQL Injections and Live Bug Bounty Hunting
0
rewiews
Explore advanced SQL injections, participate in a giveaway, and engage in live bug bounty hunting. Learn practical techniques for web app testing and ethical hacking.
Add to list
16
Lesons
2 hours 52 minutes
On-Demand
Free-Video
David Bombal
Burp Suite
0
rewiews
Comprehensive introduction to Burp Suite for web application security testing, covering key features like proxy, repeater, and intruder. Includes hands-on demos for SQL injection and fuzzing.
Add to list
26
Lesons
1 hour 6 minutes
On-Demand
Free-Video
Cyber Mentor
Web Application Pentesting
0
rewiews
Learn comprehensive web application penetration testing techniques, from enumeration to advanced exploits, with hands-on practice and real-world bug bounty hunting scenarios.
Add to list
7
Lesons
12 hours
On-Demand
Free-Video
David Bombal
Hacking with Daniel Lowrie
0
rewiews
Explore cybersecurity fundamentals and hacking techniques with expert guidance, covering SQL injection, Metasploit, password security, and Burp Suite for practical skills development.
Add to list
7
Lesons
4 hours 30 minutes
On-Demand
Free-Video
David Bombal
Cybersecurity and Hacking with Neal Bridges
0
rewiews
Explore ethical hacking and cybersecurity careers with ex-NSA hacker Neal Bridges. Learn about red and blue teams, essential skills, tools, and strategies for landing your first job in the field.
Add to list
22
Lesons
12 hours
On-Demand
Free-Video
Kali Linux Installation and Demo
0
rewiews
Learn to install and use Kali Linux for ethical hacking, including VirtualBox setup, network configurations, and tools like NMAP, SQLMap, and Snort for cybersecurity tasks.
Add to list
10
Lesons
1 hour 30 minutes
On-Demand
Free-Video
Using Burp to Test for the OWASP Top Ten
0
rewiews
Learn to use Burp Suite for detecting and exploiting various web vulnerabilities, including SQL injection, XSS, and authentication bypass, aligned with OWASP Top Ten security risks.
Add to list
12
Lesons
30 minutes
On-Demand
Free-Video
Hussein Nasser
Popular Web Attacks - XSS, CSRF, SSRF, SQL Injection, MIME Sniffing, Smuggling and More
0
rewiews
Comprehensive overview of common web attacks, including XSS, CSRF, SSRF, SQL injection, and more. Practical examples and explanations enhance understanding of web security vulnerabilities.
Add to list
8
Lesons
1 hour 19 minutes
On-Demand
Free-Video
Bug Bounty In Hindi
0
rewiews
Comprehensive guide to bug bounty hunting, covering various vulnerabilities and techniques using tools like Burp Suite. Includes practical demonstrations and real-world examples.
Add to list
15
Lesons
3 hours 30 minutes
On-Demand
Free-Video
Bug Bounty - Web Application Penetration Testing Tutorials
0
rewiews
Comprehensive tutorials on web application penetration testing, covering tools like Burpsuite, vulnerabilities such as XSS and SQL injection, and practical lab setups for hands-on learning.
Add to list
15
Lesons
2 hours 30 minutes
On-Demand
Free-Video
Bug Bounty Tutorial
0
rewiews
Learn web application security through hands-on tutorials, covering tools, techniques, and methodologies for finding and reporting vulnerabilities in bug bounty programs and penetration testing.
Add to list
20
Lesons
2 hours 30 minutes
On-Demand
Free-Video
Bug Bounty - Bugs and POC
0
rewiews
Explore bug bounty techniques including recon, subdomain enumeration, XSS, clickjacking, file vulnerabilities, CORS, SQL injection, and LFI. Learn to identify and exploit web security flaws.
Add to list
12
Lesons
1 hour 30 minutes
On-Demand
Free-Video
Bugcrowd
Bad API, HAPI Hackers!
0
rewiews
Explore API hacking methodology, from information gathering to privilege escalation. Learn techniques for testing vulnerabilities, automating processes, and uncovering critical security flaws in web applications.
Add to list
20
Lesons
24 minutes
On-Demand
Free-Video
NahamSec
Hacking SQHell from TryHackMe - SQL Injection Guide
0
rewiews
Comprehensive guide on SQL injection techniques, covering various attack vectors and practical examples to enhance offensive security skills and understanding of database vulnerabilities.
Add to list
1
Lesons
1 hour 51 minutes
On-Demand
Free-Video
NahamSec
SQL Injection Techniques - SQLMap and Hacker101's Photo Gallery CTF
0
rewiews
Explore SQL injection techniques using SQLMap and tackle Hacker101's "Photo Gallery" CTF challenge to enhance your ethical hacking skills and web security knowledge.
Add to list
1
Lesons
1 hour 57 minutes
On-Demand
Free-Video
Cyber Mentor
Exploiting ChatGPT Code for Web Security Vulnerabilities
0
rewiews
Learn to exploit vulnerabilities in ChatGPT-generated code, including SQL injection and cross-site scripting. Practical demonstrations enhance cybersecurity skills for ethical hacking and penetration testing.
Add to list
9
Lesons
23 minutes
On-Demand
Free-Video
Cyber Mentor
Web App Testing - XSS, SQL Injection, and Broken Access Control
0
rewiews
Explore XSS, SQL injection, and broken access control in web app testing. Learn to identify and exploit these vulnerabilities to enhance your cybersecurity skills.
Add to list
1
Lesons
1 hour 33 minutes
On-Demand
Free-Video
Cyber Mentor
Bypassing SQL Filters - SQL Injection Techniques
0
rewiews
Learn advanced SQL injection techniques to bypass filters and secure web applications. Practical examples and strategies for penetration testing and ethical hacking.
Add to list
9
Lesons
14 minutes
On-Demand
Free-Video
White Hat Cal Poly
Input Sanitization - Peter Faiman
0
rewiews
Learn essential techniques for validating user input, protecting against common vulnerabilities, and developing a security-focused mindset to safeguard your applications from malicious or unintended user actions.
Add to list
11
Lesons
26 minutes
On-Demand
Free-Video
Bill Buchanan OBE
Intro to Security and Network Forensics - Threat Analysis
0
rewiews
Comprehensive overview of security threats, including penetration testing, vulnerability analysis, and common attack methods like phishing and SQL injection, with practical demonstrations.
Add to list
10
Lesons
1 hour 7 minutes
On-Demand
Free-Video
Bill Buchanan OBE
Web Attacks
0
rewiews
Explore common web vulnerabilities and attack methods, including discovery techniques, backdoors, weak passwords, and injection attacks, to enhance your cybersecurity knowledge.
Add to list
8
Lesons
27 minutes
On-Demand
Free-Video
Bill Buchanan OBE
Data Loss Prevention: Databases and Web Security
0
rewiews
Explore web vulnerabilities, SQL injection, and database security techniques to enhance your cybersecurity skills and protect against data loss.
Add to list
11
Lesons
31 minutes
On-Demand
Free-Video
Bill Buchanan OBE
Introduction to Security and Network Forensics - Threat Analysis - Lecture 8
0
rewiews
Comprehensive overview of threat analysis techniques, including penetration testing, vulnerability assessment, and common attack methods like SQL injection and phishing.
Add to list
10
Lesons
1 hour 8 minutes
On-Demand
Free-Video
Web Penetration Testing Workshop: Uploading a Web Shell via SQL Injection - Part 3
0
rewiews
Explore SQL injection techniques to upload web shells, enhancing your penetration testing skills in this hands-on workshop segment led by security expert Jeremy Druin.
Add to list
1
Lesons
22 minutes
On-Demand
Free-Video
Web Penetration Testing Workshop: SQL Injection - Part 2 of 12
0
rewiews
Learn SQL injection techniques for web penetration testing, covering methods to identify and exploit database vulnerabilities in web applications.
Add to list
1
Lesons
47 minutes
On-Demand
Free-Video
Mirror Mirror - Reflected PDF Attacks Using SQL Injection
0
rewiews
Explore innovative techniques for exploiting SQL injection vulnerabilities to launch reflected PDF attacks, enhancing your understanding of web application security.
Add to list
1
Lesons
51 minutes
On-Demand
Free-Video
Application Security Testing and SDLC for Developers
0
rewiews
Learn app security testing techniques and tools for the software development lifecycle, including reconnaissance, mapping, vulnerability assessment, and exploitation.
Add to list
39
Lesons
58 minutes
On-Demand
Free-Video
OWASP Foundation
Over 20 Years of SQL Injection Attacks - Refining Web Attack Detection Using Data Mining Techniques
0
rewiews
Explore data mining techniques to refine SQL injection attack detection using CDN logs, NLP, and clustering for improved web security and emerging threat identification.
Add to list
12
Lesons
25 minutes
On-Demand
Free-Video
OWASP Foundation
Purple Team Strategies for Application Security
0
rewiews
Explore purple team strategies for application security, blending red and blue team approaches to enhance vulnerability testing, automation, and security infrastructure integration.
Add to list
30
Lesons
34 minutes
On-Demand
Free-Video
OWASP Foundation
HUNT: Data-Driven Web Hacking and Manual Testing
0
rewiews
Turbocharge web hacking with HUNT, a Burp Suite extension using real threat intelligence to provide parameter-level vulnerability suggestions and organize testing methodologies for more thorough assessments.
Add to list
29
Lesons
44 minutes
On-Demand
Free-Video
OWASP Foundation
The Path of Secure Software Development - AppSec EU 2017
0
rewiews
Explore proactive security controls for developers to build safer applications. Learn techniques to address common vulnerabilities and integrate security throughout the development lifecycle.
Add to list
25
Lesons
37 minutes
On-Demand
Free-Video
OWASP Foundation
The Dark Side of Search Engine Optimization Campaigns - AppSec EU 2017
0
rewiews
Explores how threat actors exploit SEO techniques and web attacks to manipulate search engine rankings, evaluating campaign success and proposing detection and mitigation strategies.
Add to list
19
Lesons
35 minutes
On-Demand
Free-Video
OWASP Foundation
How Security, Development, and Testing Can Work Together to Stop Recurring Vulnerabilities - OWASP Top 10
0
rewiews
Explore strategies for integrating security, development, and testing to prevent recurring vulnerabilities in the OWASP Top 10, fostering collaboration and cultural change for secure software development.
Add to list
16
Lesons
27 minutes
On-Demand
Free-Video
OWASP Foundation
50 Shades of Application Security
0
rewiews
Explore diverse aspects of application security, from democratization of hacking to user experience and government involvement, in this comprehensive overview by Troy Hunt.
Add to list
15
Lesons
43 minutes
On-Demand
Free-Video
OWASP Foundation
Securing Software's Future: Why API Design Matters
0
rewiews
Explore how API design can prevent vulnerabilities, guide developers towards secure implementations, and shape the future of software security through better development environments.
Add to list
28
Lesons
48 minutes
On-Demand
Free-Video
OWASP Foundation
SQLViking - Pillaging Your Data
0
rewiews
Explore SQLViking, a tool for passive SQL query logging and active TCP injection attacks on databases. Learn about network security vulnerabilities and potential countermeasures.
Add to list
1
Lesons
36 minutes
On-Demand
Free-Video
OWASP Foundation
Mantra OS - Penetration Testing Tools and Methodologies
0
rewiews
Explore Mantra OS's penetration testing tools for web application security, including DDoS, SQL injection, and man-in-the-middle attacks. Learn practical methodologies and controlled environment testing techniques.
Add to list
1
Lesons
23 minutes
On-Demand
Free-Video
OWASP Foundation
Blended Web and Database Attacks on Real-time, In-Memory Platforms
0
rewiews
Explore blended web and database attacks on real-time, in-memory platforms, focusing on SAP HANA. Learn about novel exploit techniques, vulnerabilities, and security considerations for these high-performance systems.
Add to list
17
Lesons
49 minutes
On-Demand
Free-Video
OWASP Foundation
Libinjection: From SQLi to XSS Detection - New Algorithm Introduction
0
rewiews
Explore advanced techniques for detecting SQLi and XSS attacks using libinjection, a fast and accurate algorithm. Learn about its implementation, benefits, and future developments in web security.
Add to list
28
Lesons
34 minutes
On-Demand
Free-Video
Linux Foundation
Hacking for Developers
0
rewiews
Learn ethical hacking techniques, tools, and methodologies to enhance your development skills and improve software security. Gain insights into vulnerability assessment and exploitation.
Add to list
12
Lesons
35 minutes
On-Demand
Free-Video
Hack In The Box Security Conference
Injecting Brains Into Blind SQL Injection - Optimizing Data Exfiltration
0
rewiews
Innovative approach to optimize Blind SQL Injection using Machine Learning and statistics. Introduces Hakuin, a tool that significantly improves exfiltration speed for database schemas and content compared to standard methods.
Add to list
1
Lesons
33 minutes
On-Demand
Free-Video
Cyber Mentor
Hacking Web Applications
0
rewiews
Comprehensive guide to web application vulnerabilities, covering OWASP Top 10, hands-on walkthroughs, and defense strategies. Learn to identify, exploit, and mitigate common security risks in web applications.
Add to list
28
Lesons
2 hours 33 minutes
On-Demand
Free-Video
Cyber Mentor
Blind SQL Injection Made Easy
0
rewiews
Learn hands-on techniques for exploiting blind SQL injection vulnerabilities with a practical lab demonstration and expert guidance on this critical web security issue.
Add to list
5
Lesons
12 minutes
On-Demand
Free-Video
HackerSploit
OWASP Juice Shop - SQL Injection
0
rewiews
Learn to perform SQL injection on OWASP Juice Shop in this hands-on demonstration. Gain practical skills in identifying and exploiting web application vulnerabilities to enhance your cybersecurity knowledge.
Add to list
1
Lesons
22 minutes
On-Demand
Free-Video
INFOSEC TRAIN
Web Application Security: The Secret to Hack-Proof Apps - SQL Injection - Part 2
0
rewiews
Discover step-by-step methods to secure web applications from SQL injection threats. Learn to identify vulnerabilities, exploit techniques, and implement effective prevention strategies for robust security.
Add to list
1
Lesons
1 hour 49 minutes
On-Demand
Free-Video
ACCU Conference
Code Red: Navigating the Minefield of Security Programming Blunders
0
rewiews
Explore infamous security breaches, learn from programming mishaps, and gain practical strategies to enhance cybersecurity in this dynamic session on secure coding practices.
Add to list
1
Lesons
1 hour 24 minutes
On-Demand
Free-Video
HackerSploit
SQL Injection 101 - Pentesting Diaries
0
rewiews
Explore SQL injection techniques and tools in this weekly pentesting series. Learn attack methods, tool usage, and optimization for deeper understanding and improved efficiency.
Add to list
1
Lesons
1 hour 20 minutes
On-Demand
Free-Video
NahamSec
SQL Injection Explained - With Free Labs
0
rewiews
Comprehensive guide to SQL injection vulnerabilities, featuring expert insights and hands-on practice labs for enhancing web security skills and bug bounty hunting techniques.
Add to list
1
Lesons
18 minutes
On-Demand
Free-Video
John Hammond
Interactive SQL Injection
0
rewiews
Hands-on practice with SQL injection techniques in a safe environment. Learn to identify and exploit vulnerabilities, enhancing your cybersecurity skills and understanding of database security.
Add to list
1
Lesons
49 minutes
On-Demand
Free-Video
Great Learning
SQL Injection Explained - Understanding Attacks and Prevention
0
rewiews
Comprehensive guide to SQL injection attacks: types, vulnerabilities, and prevention techniques. Learn to identify, exploit, and protect against database security threats through practical examples and best practices.
Add to list
21
Lesons
49 minutes
On-Demand
Free-Video
Great Learning
The Ultimate 2024 Cybersecurity Tutorial - From Fundamentals to Advanced Concepts
0
rewiews
Master cybersecurity fundamentals, from threats and frameworks to tools and AI applications. Gain practical skills for data protection, forensics, and career growth in this comprehensive tutorial.
Add to list
72
Lesons
4 hours 56 minutes
On-Demand
Free-Video
EuroPython Conference
Zero Trust APIs with Python
0
rewiews
Explore Zero Trust Security for APIs using Python. Learn to identify and address vulnerabilities, implement robust data validation, and use tools for automated security testing.
Add to list
1
Lesons
28 minutes
On-Demand
Free-Video
Conf42
When Not to Use a Web Application Firewall and Its Alternatives - Lecture
0
rewiews
Explore when to avoid Web Application Firewalls (WAFs) and learn their limitations. Understand WAF architecture, common web threats, and alternative security approaches for effective application protection.
Add to list
71
Lesons
27 minutes
On-Demand
Free-Video
Conf42
Building an LLM Vulnerability Scanner to Secure AI Applications
0
rewiews
Develop an LLM vulnerability scanner to audit and secure AI applications. Learn about LLM security risks and build a CLI tool for detecting vulnerabilities in AI systems.
Add to list
17
Lesons
32 minutes
On-Demand
Free-Video
LASCON
The Case for Runtime Protection
0
rewiews
Runtime protection: inoculating apps against vulnerabilities without changing code. Explores how instrumentation hardens applications, making OWASP Top Ten harder to exploit. Discusses accuracy, performance, and impact on security culture.
Add to list
1
Lesons
51 minutes
On-Demand
Free-Video
SecurityFWD
Advanced Android Studio Hacking - Part 2
0
rewiews
Explore Android device hacking using Android Studio. Learn emulation, user agent tracking, reverse engineering, API tokens, decompilation, and SQL injection techniques.
Add to list
19
Lesons
1 hour 2 minutes
On-Demand
Free-Video
OWASP Foundation
Novel Exploitation Techniques in WordPress - Prepared Statements and Object Injection
0
rewiews
Explore novel WordPress exploitation techniques, focusing on a core design flaw leading to SQL injection and PHP object injection vulnerabilities. Learn prevention strategies for developers.
Add to list
24
Lesons
34 minutes
On-Demand
Free-Video
OWASP Foundation
Hacking Fantasy Sports Sites - Mobile App Security Vulnerabilities
0
rewiews
Explore mobile app vulnerabilities through fantasy sports hacking. Learn techniques for intercepting traffic, exploiting formats like JSON and REST, and manipulating data in popular applications.
Add to list
10
Lesons
46 minutes
On-Demand
Free-Video
OWASP Foundation
Breaking and Fixing Web Application Security
0
rewiews
Explore web application security challenges, attack vectors, and proactive measures. Learn to identify vulnerabilities, implement secure coding practices, and safeguard user data in the digital realm.
Add to list
1
Lesons
55 minutes
On-Demand
Free-Video
media.ccc.de
Fuzz Everything, Everywhere, All at Once - Advanced QEMU-Based Fuzzing
0
rewiews
Explore advanced QEMU-based fuzzing techniques for binary-only targets, including command and SQL injection detection, and scalable Android library testing without physical devices.
Add to list
1
Lesons
41 minutes
On-Demand
Free-Video
Python Simplified
Testing GUI Apps - What to Test and How to Test It - Mini Coding Course for Beginners
0
rewiews
Learn automated software testing with a hands-on Kivy GUI project. Covers static and dynamic analysis, unit testing, and various test scenarios to improve code quality and reliability.
Add to list
23
Lesons
38 minutes
On-Demand
Free-Video
OWASP Foundation
DevOps for the Discouraged - Integrating Security into Continuous Delivery
0
rewiews
Equipping security teams with tools and strategies to integrate into DevOps practices, focusing on continuous delivery pipelines and open-source security tools for web application stacks.
Add to list
1
Lesons
59 minutes
On-Demand
Free-Video
Exploiting the Top Ten Database Vulnerabilities and Misconfigurations - BSidesRI 2013
0
rewiews
Explore top database vulnerabilities and misconfigurations, learning how to identify and exploit them for improved security awareness and defense strategies.
Add to list
1
Lesons
48 minutes
On-Demand
Free-Video
Beginner to Advanced Bug Bounty Hunting Course - 2022
0
rewiews
Comprehensive ethical hacking course covering web application vulnerabilities, penetration testing techniques, and programming skills for aspiring bug bounty hunters and security professionals.
Add to list
21
Lesons
11 hours 20 minutes
On-Demand
Free-Video
NorthSec
CTF or WTF?
0
rewiews
Compara desafíos CTF con pruebas de penetración reales, explorando similitudes y diferencias en habilidades, escenarios y lecciones aprendidas para profesionales de ciberseguridad.
Add to list
50
Lesons
27 minutes
On-Demand
Free-Video
NorthSec
Web Application Firewall Workshop
0
rewiews
Hands-on workshop exploring Web Application Firewall bypass techniques, including encoding, SQL injection, protocol switching, and syntax alternatives. Practical exercises with in-depth explanations for each method.
Add to list
1
Lesons
1 hour 53 minutes
On-Demand
Free-Video
Ekoparty Security Conference
Pwning Oracle EBS for Real Profit
0
rewiews
Explore critical vulnerabilities in Oracle E-Business Suite, including Java deserialization and arbitrary file upload, and learn how attackers can exploit ERP systems for financial gain.
Add to list
1
Lesons
59 minutes
On-Demand
Free-Video
OWASP Foundation
Differences Between Web Application Scanning Tools When Scanning for XSS and SQLi
0
rewiews
Investigates differences between web application scanning tools for XSS and SQLi, addressing challenges in modern web architectures and suggesting improvements for effective vulnerability detection.
Add to list
21
Lesons
40 minutes
On-Demand
Free-Video
OWASP Foundation
Bug Hunting on the Dark Side
0
rewiews
Explore bug hunting techniques in dark web applications, focusing on real-world examples, cryptography, and common vulnerabilities to enhance your cybersecurity skills.
Add to list
36
Lesons
39 minutes
On-Demand
Free-Video
OWASP Foundation
Mantra OS - Because the World is Cruel
0
rewiews
Explore Mantra OS's penetration testing tools for web application security, including DDoS, SQL injection, and man-in-the-middle attacks. Learn practical methodologies and risk mitigation strategies.
Add to list
9
Lesons
17 minutes
On-Demand
Free-Video
media.ccc.de
Select Code Execution From Using SQLite
0
rewiews
Exploración de vulnerabilidades en SQLite para lograr ejecución de código remoto mediante técnicas innovadoras como Query Hijacking y Query Oriented Programming, demostrando escenarios de ataque en servidores y iOS.
Add to list
33
Lesons
47 minutes
On-Demand
Free-Video
LASCON
Implementing AppSensor in ModSecurity
0
rewiews
Explore advanced web application security techniques using AppSensor and ModSecurity, focusing on detection points, SQL injection prevention, and innovative defense strategies.
Add to list
11
Lesons
43 minutes
On-Demand
Free-Video
LASCON
Be Mean to Your Code - Rugged Development & You
0
rewiews
Pragmatic approaches and tools for ruggedizing your development lifecycle, from code commit to running system. Learn solutions for secure, resilient applications in fast-paced environments.
Add to list
21
Lesons
46 minutes
On-Demand
Free-Video
LASCON
Riding the Magical Code Injection Rainbow
0
rewiews
Explore advanced exploitation techniques for SQL injection, XPath injection, cross-site scripting, and shell command injection using the Magical Code Injection Rainbow framework for configurable vulnerable applications.
Add to list
12
Lesons
43 minutes
On-Demand
Free-Video
OWASP Foundation
Security Vulnerabilities Decomposition - Another Way to Look at Vulnerabilities
0
rewiews
Explore security vulnerabilities decomposition, focusing on SQL injection, secure data handling, and design patterns for payment gateways and single sign-on. Learn practical security controls for secure development.
Add to list
27
Lesons
41 minutes
On-Demand
Free-Video
OWASP Foundation
Injecting Security Controls in Software Applications
0
rewiews
Explore techniques for integrating security controls into software development, focusing on real-world examples, actionable advice, and verification methods to build more secure applications.
Add to list
7
Lesons
32 minutes
On-Demand
Free-Video
Security BSides San Francisco
When Bandit Strikes - Defend Your Python Code
0
rewiews
Discover and defend against common security flaws in Python code using Bandit. Learn customization, CI pipeline integration, and extension techniques for enhanced code security.
Add to list
21
Lesons
26 minutes
On-Demand
Free-Video
nullcon
Injecting Security Into Web Apps With Runtime Patching And Context Learning
0
rewiews
Explore advanced web application security techniques using Runtime Application Self Protection (RASP) to prevent code injections and other vulnerabilities through dynamic analysis and patching.
Add to list
17
Lesons
55 minutes
On-Demand
Free-Video
Full Steam Ahead Serverless Hacking 101
0
rewiews
Explore serverless hacking techniques, including environment setup, demonstrations, and common vulnerabilities like SQL injection and cross-site scripting in this comprehensive tutorial.
Add to list
11
Lesons
51 minutes
On-Demand
Free-Video
nullcon
macOS Security Features Bypasses by Example
0
rewiews
Explore macOS security features, vulnerabilities, and bypass techniques with a Microsoft security expert. Gain insights into SIP, TCC, and potential exploit avenues for researchers and professionals.
Add to list
15
Lesons
48 minutes
On-Demand
Free-Video
Black Hat
Give Me a SQL Injection, I Shall PWN IIS and SQL Server
0
rewiews
Explore SQL injection vulnerabilities in IIS and SQL Server, uncovering unexpected attack vectors and their implications for Microsoft's ecosystem security.
Add to list
27
Lesons
36 minutes
On-Demand
Free-Video
Kaspersky
Web Applications Bug Hunting - Fundamentals
0
rewiews
Explore web application security fundamentals, attack vectors, and tools for bug hunting. Learn key concepts to kickstart your career in application security.
Add to list
21
Lesons
54 minutes
On-Demand
Free-Video
Security BSides San Francisco
Bye-Bye False Positives - Using AI to Improve Detection
0
rewiews
Explore AI-based injection detection using neural networks to reduce false positives in security solutions. Learn about architecture, implementation, and real-world applications.
Add to list
12
Lesons
23 minutes
On-Demand
Free-Video
Black Hat
AutoSpear - Towards Automatically Bypassing and Inspecting Web Application Firewalls
0
rewiews
Explore techniques for automatically bypassing and inspecting web application firewalls, examining vulnerabilities in WAF-as-a-service solutions and cloud security services.
Add to list
1
Lesons
35 minutes
On-Demand
Free-Video
Black Hat
Blended Web and Database Attacks on Real-Time, In-Memory Platforms
0
rewiews
Explore innovative attack vectors on real-time, in-memory platforms, blending web and database vulnerabilities. Learn about new SQL injection techniques, server-side JavaScript exploits, and R-based attacks in SAP HANA.
Add to list
24
Lesons
56 minutes
On-Demand
Free-Video
Black Hat
Going Auth The Rails On A Crazy Train
0
rewiews
Explore common authentication and authorization pitfalls in Rails applications, and learn about a new dynamic analysis tool for penetration testing and securing large-scale Rails projects.
Add to list
1
Lesons
59 minutes
On-Demand
Free-Video
NahamSec
Breaking Into Cloud Wallets - Hacking Crypto Web Apps
0
rewiews
Explore cloud wallet vulnerabilities and crypto web app hacking techniques in this talk by @samwcyo, covering blind XSS, SQL injection, and account takeovers in the cryptocurrency ecosystem.
Add to list
21
Lesons
35 minutes
On-Demand
Free-Video
PHP UK Conference
Facebook's Approach to Common Web Vulnerabilities
0
rewiews
Explore Facebook's strategies for combating web vulnerabilities, including XSS, CSRF, and SQL injection, through security libraries, automated detection, and lint rules.
Add to list
11
Lesons
55 minutes
On-Demand
Free-Video
Black Hat
Hackproofing Oracle EBusiness Suite
0
rewiews
Explore vulnerabilities in Oracle eBusiness Suite and learn effective strategies to secure systems against potential attacks, including remote code execution and SQL injection.
Add to list
24
Lesons
50 minutes
On-Demand
Free-Video
Black Hat
Web Application Firewalls - Analysis of Detection Logic
0
rewiews
Explores detection logic in Web Application Firewalls, focusing on regular expressions. Analyzes security flaws in popular WAFs and introduces tools for identifying vulnerabilities in regex patterns.
Add to list
1
Lesons
40 minutes
On-Demand
Free-Video
PHP UK Conference
Web Security And You
0
rewiews
Comprehensive overview of web security vulnerabilities, including XSS, CSRF, and SQL injection, with code examples and practical solutions for protecting websites.
Add to list
1
Lesons
1 hour 4 minutes
On-Demand
Free-Video
44CON Information Security Conference
Hunting Asynchronous Vulnerabilities
0
rewiews
Explore techniques for uncovering hidden vulnerabilities in backend systems using exploit-induced callbacks. Learn to detect and exploit asynchronous issues across various technologies and platforms.
Add to list
1
Lesons
33 minutes
On-Demand
Free-Video
44CON Information Security Conference
Kill All Humans - Bugs - Machine Learning to the Rescue of Code Review
0
rewiews
Explore machine learning techniques for efficient security code reviews, reducing false positives and automating vulnerability classification in large-scale applications.
Add to list
1
Lesons
51 minutes
On-Demand
Free-Video
load more...