01 - OWASP Top 10
02 - Application exploits, part 1
03 - SQL injection demo
04 - Labtainers lab SQL injection
05 - Application exploits, part 2
06 - Application exploits, part 3
07 - Cross-site scripting demo
08 - Labtainers lab Cross-site scripting
09 - Labtainers lab Cross-site request forgery
10 - Code vulnerabilities
11 - API attacks and attack resources
12 - Privilege escalation Linux
13 - Privilege escalation Windows
14 - Miscellaneous privilege escalation
15 - Miscellaneous local host vulnerabilities