Skip to Content
Responsible shruti kapoor
Last Update 24/03/2025
Completion Time 1 day 5 hours 34 minutes
Members 14
    • Rimberio Cybersecurity
    • Introduction DAY 1
      10 xp
    • Web Application part 2
    • Web Application (practical by tarun sir)
    • Preview
    • HTML,JS BASICS VULNERABLE FORM SQLI.mp4
    • web application vuln form ,js,xampp
    • vuln code part 3
    • LINKS FOR WEB DEV BASICS
    • Secure code form
    • Preview
    • Directory Traversal part 2
    • Directory traversal part 3
    • Cheeze ctf lfi
    • chheze ctf lfi 2
    • Authentication flaw 1
    • Authentication flaw 2
    • JWT
    • JWT2
    • WORKING OF JWT AND SOURCE CODE
    • BURP PRO INSTALLATION BY SUNIL
    • Lab solve info disclosure
    • OS command injection part1
    • SQHELL full solve
    • OS injection source code
    • SQl injection
    • sqli manual approach
    • DC1 SOLVE
    • live POC
    • INFORMATION DISCLOSURE
    • Authentication based flaws
    • sqli in depth
    • XXE PART 1
    • XXE concept
    • XXE Practical
    • XXE IN HINDI
    • clickjacking
    • XSS 1
    • BUSINESS LOGIC VULNERABILITY LAB
    • SOP and CORS
    • CSRF
    • XSS 2