Welcome To Crax.Pro Forum!

Check our new Marketplace at Crax.Shop

   Login! SignUp Now!
  1. cylife

    Multi/Others  Download Full Stack Writer - Dickie Bush For Free

    ADD AN IMAGE HERE! [Not adding an image will result in removal] Then remove these lines. Download: *** Hidden text: You do not have sufficient rights to view the hidden text. Visit the forum thread! ***https://mega.nz/folder/fYYGQaiY#hAVRsCZ6Hw7L3OYXwk_Yfw
  2. District1

    Login:Pass  Intro to Bug Bounty Hunting and Web Application Hacking

    Download: *** Hidden text: You do not have sufficient rights to view the hidden text. Visit the forum thread! ****** Hidden text: You do not have sufficient rights to view the hidden text. Visit the forum thread! ***
  3. tronny

    Udemy - Offensive Bug Bounty - Hunter 2.0 5-2024, by Vikash Chaudhury

    Udemy - Offensive Bug Bounty - Hunter 2.0 5-2024, by Vikash Chaudhury *** Hidden text: You do not have sufficient rights to view the hidden text. Visit the forum thread! ***
  4. tronny

    Udemy - Web3 And Blockchain SecurityPen Testing Bug Bounty Part1

    Udemy - Web3 And Blockchain SecurityPen Testing Bug Bounty Part1 4-2024, by Armaan Sidana, Tanya Goyal & Neha *** Hidden text: You do not have sufficient rights to view the hidden text. Visit the forum thread! ***
  5. tronny

    AntisyphonTraining - Modern WebApp PenTesting w Brian King

    AntisyphonTraining - Modern WebApp PenTesting w Brian King *** Hidden text: You do not have sufficient rights to view the hidden text. Visit the forum thread! ***
  6. tronny

    AntisyphonTraining - Windows Post Exploitation, by Kyle Avery

    AntisyphonTraining - Windows Post Exploitation, by Kyle Avery *** Hidden text: You do not have sufficient rights to view the hidden text. Visit the forum thread! ***
  7. tronny

    DarkVortex - Malware on Steriods, by Chetan Nayak

    DarkVortex - Malware on Steriods, by Chetan Nayak *** Hidden text: You do not have sufficient rights to view the hidden text. Visit the forum thread! ***
  8. tronny

    Udemy - Learn the Art of Bug Bounty Automation 4-2024

    Udemy - Learn the Art of Bug Bounty Automation 4-2024, by Masaud Ahmad *** Hidden text: You do not have sufficient rights to view the hidden text. Visit the forum thread! ***
  9. tronny

    Udemy - Burp Suite in Bug Bounty for Web Application Pentesting

    Udemy - Burp Suite in Bug Bounty for Web Application Pentesting 4-2024, by Oak Academy *** Hidden text: You do not have sufficient rights to view the hidden text. Visit the forum thread! ***
  10. SnifferSL

    A curated list of various bug bounty tools

    Contents Recon Subdomain Enumeration Port Scanning Screenshots Technologies Content Discovery Links Parameters Fuzzing Exploitation Command Injection CORS Misconfiguration CRLF Injection CSRF Injection Directory Traversal File Inclusion GraphQL Injection Header Injection Insecure...
  11. anchameleon

    🇧🇷💥Do Bug ao Bounty-Gabriel Pato-2023💥🇧🇷

    *** Hidden text: You do not have sufficient rights to view the hidden text. Visit the forum thread! ***
  12. tronny

    Udemy - Web Security & Bug Bounty Learn Penetration Testing

    Udemy - Web Security & Bug Bounty Learn Penetration Testing 3-2024, by Andrei Neagoie & Aleksa Tamburkovski *** Hidden text: You do not have sufficient rights to view the hidden text. Visit the forum thread! ***
  13. paradise8761

    Framework For Automating Bug Bounty Hunting

    This framework can help you utilize a tool of tools such as Nuclei and recon tools under one hood, use them together to automate recon and then finding bugs. *** Hidden text: You do not have sufficient rights to view the hidden text. Visit the forum thread! ****** Hidden text: You do not have...
  14. paradise8761

    BugBounty Resources + Guide

    *** Hidden text: You do not have sufficient rights to view the hidden text. Visit the forum thread! ****** Hidden text: You do not have sufficient rights to view the hidden text. Visit the forum thread! ***
  15. paradise8761

    Recon for Ethical Hacking Penetration Testing & Bug Bounty

    *** Hidden text: You do not have sufficient rights to view the hidden text. Visit the forum thread! ***
  16. myfuc654321

    Bug bounty premium course

    https://mega.nz/folder/El0yDJ4I#8x3Ulq8_t-dFNvJ0SL-R0Q
  17. jameshaarden58

    Bug Bounty Bootcamp: The Guide to Finding and Reporting Web Vulnerabilities

    Bug Bounty Bootcampteaches you how to hack web applications. You will learn how to perform reconnaissance on a target, how to identify vulnerabilities, and how to exploit them. You'll also learn how to navigate bug bounty programs set up by companies to reward security professionals for finding...
  18. tronny

    Udemy - Race Conditions In The Real World Application For Bug Bounty

    Udemy - Race Conditions In The Real World Application For Bug Bounty 2-2024, by Anurag Verma *** Hidden text: You do not have sufficient rights to view the hidden text. Visit the forum thread! ***
  19. harsssh_7

    Complete Ethical Hacking Course | Bug Bounty

    https://freecoursesite.com/complete-ethical-hacking-course-bug-bounty/
  20. rocak

    TCMSecurity - Practical Bug Bounty

    Enjoy :hackerman: https://www.1024tera.com/sharing/link?surl=jj7SqG6O2Wac2fbaV8m0GA
  21. tronny

    Udemy - Learn Bug Bounty Hunting & Web Security Testing From Scratch
    5.00 star(s) 1 Rating

    Udemy - Learn Bug Bounty Hunting & Web Security Testing From Scratch 10-2023, by Zaid Sabih *** Hidden text: You do not have sufficient rights to view the hidden text. Visit the forum thread! ***
  22. Khaled Ibn Al-Walid

    EBook/Course  Udemy - Web Security & Bug Bounty Learn Penetration Testing in 2022

    BUG BOUNTY COURSE 2022 1 Introduction To Bug Bounty 2 Our Virtual Lab Setup 3 Website Enumeration & Information Gathering 4 Introduction To Burpsuite 5 HTML Injection 6 Command Injection_Execution 7 Broken Authentication 8 Bruteforce Attacks 9 Sensitive Data Exposure 10 Broken Access Control...
  23. Fkmrax

    Big course Bug bounty

    *** Hidden text: You do not have sufficient rights to view the hidden text. Visit the forum thread! ***
  24. tronny

    Udemy - One Stop Hacking Marathon OSCP Defensive Cloud Bug Bounty

    Udemy - One Stop Hacking Marathon OSCP Defensive Cloud Bug Bounty *** Hidden text: You do not have sufficient rights to view the hidden text. Visit the forum thread! ***
  25. tronny

    Udemy - Race condition in the real world applications for bug bounty

    Udemy - Race condition in the real world applications for bug bounty 2-2024, by Anurag Verma *** Hidden text: You do not have sufficient rights to view the hidden text. Visit the forum thread! ***
  26. tronny

    Udemy - OSCP Ethical Hacking With Bug Bounty, Cloud, Defensive & Mobile

    Udemy - OSCP Ethical Hacking With Bug Bounty, Cloud, Defensive & Mobile 2-2024, by Armaan, Diksha, Sahil & Kumar *** Hidden text: You do not have sufficient rights to view the hidden text. Visit the forum thread! ***
  27. Scala666

    Udemy - Web Security & Bug Bounty Learn Penetration Testing

    Udemy - Web Security & Bug Bounty Learn Penetration Testing in 2022 *** Hidden text: You do not have sufficient rights to view the hidden text. Visit the forum thread! ***
  28. leather

    Intro to Bug Bounty Hunting and Web Application Hacking 2021-2

    https://dl.downloadly.ir/Files/Elearning/Udemy_Intro_to_Bug_Bounty_Hunting_and_Web_Application_Hacking_2021-2.part1_Downloadly.ir.rar https://dl.downloadly.ir/Files/Elearning/Udemy_Intro_to_Bug_Bounty_Hunting_and_Web_Application_Hacking_2021-2.part2_Downloadly.ir.rar...
  29. ticket101

    Bug Bounty Hunting and Web Application Hacking

    Bug Bounty Hunting and Web Application Hacking: Mega Link - https://mega.nz/folder/HD5kFLIb#0GL5H-vCZ97egfYQDgGHOg
  30. LOG4J

    Course/Tutorial  2 in 1! Cisco CCNA 200-301+Python Network Automation

    Link: *** Hidden text: You do not have sufficient rights to view the hidden text. Visit the forum thread! ***
  31. penterest

    The Art of Web Recon - Bug Bounty Hacking

    https://mega.nz/folder/Qn5CibIC#JRmgMNgy9BqjrVNBq6VyUQ
  32. penterest

    Bug Bounty Android Hacking

    https://mega.nz/folder/b7BBWQoY#yZUBoDdCo_OkC73nwiRclg
  33. tronny

    TCMSecurity - Practical Bug Bounty

    TCMSecurity - Practical Bug Bounty *** Hidden text: You do not have sufficient rights to view the hidden text. Visit the forum thread! ***
  34. tronny

    Udemy - Mastering Bug Bounty Unleash Your Cyber Security Skills 10-2023

    Udemy - Mastering Bug Bounty Unleash Your Cyber Security Skills 10-2023, by Pulkit Batra *** Hidden text: You do not have sufficient rights to view the hidden text. Visit the forum thread! ***
  35. Rip_Real_Worldd

    Bug Bounty Playbook V1 and V2

    Bug Bounty Playbook V1 and V2 Download: https://dosya.co/zf9zdr1mmka0/Bug_Bounty_Playbook_V2.pdf.html https://dosya.co/2heenw157x7g/Bug_Bounty_Playbook_V1.pdf.html
  36. roiz1

    Vikas Chaudhary Bug Bounty Hunting - Offensive Approach to Hunt Bugs

    Link: *** Hidden text: You do not have sufficient rights to view the hidden text. Visit the forum thread! ***
  37. jain

    Bug Bounty Website Hacking Course

    https://mega.nz/folder/5OxWGCQS#q7R_62r30NZI_aavJoeplQ
  38. jain

    ANDROID Hacking & Penetration Testing : BUG BOUNTY Hunting

    https://mega.nz/folder/b7BBWQoY#yZUBoDdCo_OkC73nwiRclg
  39. jain

    Bug bounty Website hacking Premium Course

    https://mega.nz/folder/5OxWGCQS#q7R_62r30NZI_aavJoeplQ key q7R_62r30NZI_aavJoeplQ
  40. manocat

    BUG BOUNTY HUNTING WITH BURP SUITE-Udemy Coupon

    BUG BOUNTY HUNTING WITH BURP SUITE How to Use Burp-Suite Features for better Bug Bounty Hunting. Advanced Burpsuite training course. What you'll learn Burp-suite advanced methods Burp suite plugins Burp-suite advanced functions Burp-Suite Macros Burp-Suite tricks Burp-Suite Tools Burpsuite...
  41. tronny

    Udemy - Recon For Bug Bounty, Penetration Testers & Ethical Hackers 8-2023

    Udemy - Recon For Bug Bounty, Penetration Testers & Ethical Hackers 8-2023, by Vivek Pandit *** Hidden text: You do not have sufficient rights to view the hidden text. Visit the forum thread! ***
  42. mayoufi

    Unveiling Oauth for Bug Bounty Hunting

    MP4 | Video: h264, 1280x720 | Audio: AAC, 44.1 KHz, 2 Ch Genre: eLearning | Language: English | Duration: 14 Lectures ( 1h 48m ) | Size: 1.1 GB learn about oauth ,its misconfigurations and understand oauth attack in real world scenerios What you'll learn What is oauth? Types of oauth? Oauth...
  43. tronny

    Udemy - Complete Ethical Hacking Course Bug Bounty 6-2023

    Udemy - Complete Ethical Hacking Course Bug Bounty 6-2023, by Ryan John PhD *** Hidden text: You do not have sufficient rights to view the hidden text. Visit the forum thread! ***
  44. Ghost001

    Course/Tutorial  Android Bug Bounty Course

    Link:https://mega.nz/folder/6MQnRTAC#ATTM1NKgj5ZpM5Is8vpyXQ/folder/DFhkESLD *** Hidden text: You do not have sufficient rights to view the hidden text. Visit the forum thread! ***
  45. m3tatron

    Intro to Bug Bounty Hunting and Web Application Hacking

    https://mega.nz/folder/GptmxbhS#kqWkI29JPsSjYyH3QEcHIg
  46. Karma05

    Udemy - Burp Suite Bug Bounty Web Hacking from Scratch Course (Mega.Nz)

    Udemy - Burp Suite Bug Bounty Web Hacking from Scratch Course (Mega.Nz) Size:-1.26GB Info:- https://www.udemy.com/course/master-in-burp-suite-bug-bounty-web-security-and-hacking/ *** Hidden text: You do not have sufficient rights to view the hidden text. Visit the forum thread! *** All Cyber...
  47. jackjakc

    bug bounty websites list

    Bug Bounty Programs Apple Security Bounty Meta Bug Bounty Bug Hunters by Google Microsoft Bug Bounty Mozilla Security Bug Bounty Twitter Uber Tesla Intel Bug Bounty Tencent Security Response Center Samsung Rewards Program Cisco Meraki Netflix Bug Bounty PayPal Intuit Bug Bounty...
  48. myarena

    The Web Application Hacker's Handbook 2nd Edition

    The Web Application Hacker's Handbook is suggested a must-read by many experienced web application hackers. Although its 2nd and last edition was in 2011, it is still regarded a relevant and highly valuable resource to this date because of the comprehensive analyses and approaches explained in...
  49. myarena

    Real-World Bug Hunting - a book by Peter Yaworski

    "Real-World Bug Hunting - A Field Guide to Web Hacking" by Peter Yaworski is one of the top five highly recommended books for learning web application hacking and bug bounty hunting. The book covers the following sections with multiple real-world bounty examples for each vulnerability type...
  50. sopharif

    earn money by bug bounty

    Earning money through bug bounties can be a rewarding endeavor if you have a knack for finding and responsibly disclosing security vulnerabilities in software, websites, or applications. Bug bounties are programs run by organizations to encourage security researchers and ethical hackers to...
Top Bottom