Curating warez scene history.
  • Anonymous
  • 2024-11-25 06:34:09
  • Unknown

RELEASE >

ReScene version pyReScene Auto 0.7 LBWx File size CRC
Download
14,378
Stored files
126 4BC852A2
560 71A98C2A
RAR-files
lbwx-cfdfbtbp.rar 350,000,000 29EC9A12
lbwx-cfdfbtbp.r00 350,000,000 F84DEE4F
lbwx-cfdfbtbp.r01 350,000,000 93DE644C
lbwx-cfdfbtbp.r02 350,000,000 03B83502
lbwx-cfdfbtbp.r03 350,000,000 FBC2A059
lbwx-cfdfbtbp.r04 350,000,000 10E9D576
lbwx-cfdfbtbp.r05 350,000,000 1382D672
lbwx-cfdfbtbp.r06 350,000,000 6E4F36EF
lbwx-cfdfbtbp.r07 350,000,000 D5E7CD82
lbwx-cfdfbtbp.r08 350,000,000 53BA6E05
lbwx-cfdfbtbp.r09 350,000,000 D19A55A3
lbwx-cfdfbtbp.r10 350,000,000 AB2D2EB3
lbwx-cfdfbtbp.r11 350,000,000 5008047A
lbwx-cfdfbtbp.r12 350,000,000 254B2B5D
lbwx-cfdfbtbp.r13 350,000,000 56F92E11
lbwx-cfdfbtbp.r14 350,000,000 A5D47133
lbwx-cfdfbtbp.r15 350,000,000 EF39FFE9
lbwx-cfdfbtbp.r16 350,000,000 4E9E7362
lbwx-cfdfbtbp.r17 350,000,000 21D605B8
lbwx-cfdfbtbp.r18 249,669,972 B6C9E1EB

Total size: 6,899,669,972
Archived files
Chapter_2-Cybersecurity_Comprehensive_Security_Practices_for_Developers\4. Introduction to Cybersecurity p.1 - Overview of current cyber threat landscape.mp4 [19c168cc62566bc] 69,458,609 925904C9
Chapter_2-Cybersecurity_Comprehensive_Security_Practices_for_Developers\5. Introduction to Cybersecurity p.2 - Case Studies, Threat Analysis Models & More.mp4 [6bef9d11efbe0d7b] 185,596,716 B685C311
Chapter_2-Cybersecurity_Comprehensive_Security_Practices_for_Developers\6. Introduction to Cybersecurity p.3 - Security Controls, SDD, SOC.mp4 [692939fe65b57521] 269,726,121 B70DE538
Chapter_3-OWASP_Top_10_2021\10. Cryptography Failures (Practical Examples, SQL Injections, TLSSSL, HTTPS).mp4 [b740e5711ab9b98b] 152,276,827 126DF0CA
Chapter_3-OWASP_Top_10_2021\11. Cryptography Failures (Examples, Password Encryption, Hashing, Salting).mp4 [ed6308a50d6e5ade] 169,280,098 2E6F3F95
Chapter_3-OWASP_Top_10_2021\12. Injection (Overview, Fuzzing, CWEs, Impact, Injection Types, Command Injection).mp4 [c6f10786aa3419cf] 123,949,743 6757AD1F
Chapter_3-OWASP_Top_10_2021\13. Injection (Cross Site Scripting, Types of XSS, SQL, JPA, NoSQL Injections).mp4 [80a23e1683a0e1f0] 140,256,141 E4F047ED
Chapter_3-OWASP_Top_10_2021\14. Injection (XPath Injection, Log Injection, Input Validation).mp4 [7f1e9a6ba5c6d03] 99,773,848 E5A3AA83
Chapter_3-OWASP_Top_10_2021\15. Insecure Design (Overivew, CWEs, Shift Left Security, Threat Modeling Manifesto).mp4 [1d66f81893830294] 114,247,419 22B5D4AB
Chapter_3-OWASP_Top_10_2021\16. Insecure Design (Secure Design Process, Security Controls, Metrics, Examples).mp4 [f4b239d125db3201] 145,394,560 9A4325E0
Chapter_3-OWASP_Top_10_2021\17. Security Misconfiguration (Overview, CWEs, Types, Real-life attacks).mp4 [6eef4f82b8c5d545] 111,456,604 E700C2BC
Chapter_3-OWASP_Top_10_2021\18. Security Misconfiguration (Hardening, Zero Trust, Defense in Depth, Practice).mp4 [b93e92c4ca634082] 214,839,398 32022476
Chapter_3-OWASP_Top_10_2021\19. Vulnerable & Outdated Components.mp4 [b395a195519de274] 197,100,833 6E5ADFA8
Chapter_3-OWASP_Top_10_2021\20. Identification & Authentication Failures.mp4 [969da9b788fd5ad1] 227,380,843 8A8E3B0D
Chapter_3-OWASP_Top_10_2021\21. Software & Data Integrity Failures.mp4 [9022f4f8943adcd] 117,075,425 9EFC03A8
Chapter_3-OWASP_Top_10_2021\22. Security Logging & Monitoring Failures.mp4 [868484dedc765a96] 149,911,703 A283B0EC
Chapter_3-OWASP_Top_10_2021\23. Server-Side Request Forgery (SSRF).mp4 [4a3b36d0d925545d] 137,396,090 9D4096FA
Chapter_3-OWASP_Top_10_2021\7. OWASP Top 10 Overview.mp4 [90f5501108650c44] 132,840,751 2CF0FAA8
Chapter_3-OWASP_Top_10_2021\8. Broken Access Control.mp4 [8a89750c44220948] 340,855,697 3810B3FF
Chapter_3-OWASP_Top_10_2021\9. Cryptography Failures (Theory, Sensitive Data, Data Breach, Types of Failures).mp4 [83c44dfd1bc2fa73] 104,346,831 C5D32AD3
Chapter_4-OWASP_API_Top_10_2023\25. API12023 Broken Object Level Authorization - Part 1.mp4 [754618272c12b6a7] 190,590,888 465FE2F2
Chapter_4-OWASP_API_Top_10_2023\26. API12023 Broken Object Level Authorization - Part 2 (Practice).mp4 [5af84ee5e2508011] 88,361,964 33FDD1C0
Chapter_4-OWASP_API_Top_10_2023\27. API12023 Broken Object Level Authorization - Part 3 (Zero-Trust, UUIDs).mp4 [63d95fd9e2d14864] 249,709,770 66C27F74
Chapter_4-OWASP_API_Top_10_2023\28. API22023 Broken Authentication - Part 1 (Basics, Impact, Types of Attacks).mp4 [55614b5e6b634252] 187,476,943 E764CA9F
Chapter_4-OWASP_API_Top_10_2023\29. API22023 Broken Authentication - Part 2 (Case Studies, OAuth, OpenID).mp4 [246be691c1a8c787] 216,167,164 61EE5065
Chapter_4-OWASP_API_Top_10_2023\30. API22023 Broken Authentication - P.3 - (Practice, JWT Tokens, Timing Attacks).mp4 [8d92f73d3820db90] 276,464,037 9C43BF62
Chapter_4-OWASP_API_Top_10_2023\31. API32023 Broken Object Property Level Authorization - Part 1.mp4 [1775600191ca5869] 198,073,029 C4AB6F97
Chapter_4-OWASP_API_Top_10_2023\32. API32023 Broken Object Property Level Authorization - Part 2 (Practice).mp4 [f6cc904eab0e2b9] 194,445,537 65511FE2
Chapter_4-OWASP_API_Top_10_2023\33. API42023 Unrestricted Resource Consumption - Part 1.mp4 [ede342eabfe1305b] 275,776,305 6E68A182
Chapter_4-OWASP_API_Top_10_2023\34. API42023 Unrestricted Resource Consumption - Part 2 (Practice).mp4 [8b85cd74977a30bf] 104,274,375 879E8066
Chapter_4-OWASP_API_Top_10_2023\35. API52023 Broken Function Level Authorization - Part 1.mp4 [2d682d755bf08186] 185,679,711 A38F50CE
Chapter_4-OWASP_API_Top_10_2023\36. API52023 Broken Function Level Authorization - Part 2 (Practice).mp4 [5f0c282e27ee1fc7] 82,141,356 73B611B8
Chapter_4-OWASP_API_Top_10_2023\37. API62023 Unrestricted Access to Sensitive Business Flows - Part 1.mp4 [a388f8028719b416] 221,776,349 A6FDDE0F
Chapter_4-OWASP_API_Top_10_2023\38. API62023 Unrestricted Access to Sensitive Business Flows - Part 2.mp4 [4b924ce34b5c35eb] 259,473,819 F80D638A
Chapter_4-OWASP_API_Top_10_2023\39. API62023 Unrestricted Access to Sensitive Business Flows - Part 3 (Practice).mp4 [648a25395551121f] 100,421,541 EAAD1DB5
Chapter_4-OWASP_API_Top_10_2023\42. API92023 Improper Inventory Management - Part 1.mp4 [cbd2b03f25f5ab43] 257,652,210 79DE6D2C
Chapter_4-OWASP_API_Top_10_2023\43. API92023 Improper Inventory Management - Part 2 (Practice).mp4 [fe2037db8a5f80a5] 95,229,900 8AB3CD8D
Chapter_4-OWASP_API_Top_10_2023\44. API102023 Unsafe Consumption of APIs - Part 1.mp4 [c5ae51a86f1c66f2] 309,150,959 45F4E64B
Chapter_4-OWASP_API_Top_10_2023\45. API102023 Unsafe Consumption of APIs - Part 2 (Practice).mp4 [34601119e8f9b32] 117,148,079 A0E2DF72
Chapter_5-Bonus_Section\46. Bonus lesson.mp4 [5f2e15e269d5eaff] 32,507,044 C58FF66A
Chapter_1-Introduction\1. Communication plan.mp4 [75716baa14c03caf] 53,975,370 88419AEC
Chapter_2-Cybersecurity_Comprehensive_Security_Practices_for_Developers 0 00000000
Chapter_3-OWASP_Top_10_2021 0 00000000
Chapter_4-OWASP_API_Top_10_2023 0 00000000
Chapter_5-Bonus_Section 0 00000000
Chapter_1-Introduction 0 00000000

Total size: 6,899,660,607
RAR Recovery
Not Present
Labels UNKNOWN