<?xml version="1.0"?>
<oembed><version>1.0</version><provider_name>&#xFF28;&#xFF49;&#xFF44;&#xFF45;&#xFF3A;&#xFF45;&#xFF52;&#xFF4F;&#xFF2F;&#xFF4E;&#xFF45;</provider_name><provider_url>https://hide01.ir</provider_url><title>&#x62F;&#x648;&#x631;&#x647; TCM Security - Practical Web Hacking</title><type>rich</type><width>600</width><height>338</height><html>&lt;blockquote class="wp-embedded-content" data-secret="ZZbw7kMOBP"&gt;&lt;a href="https://hide01.ir/tcm-practical-web-hacking/"&gt;&#x62F;&#x648;&#x631;&#x647; TCM Security &#x2013; Practical Web Hacking&lt;/a&gt;&lt;/blockquote&gt;&lt;iframe sandbox="allow-scripts" security="restricted" src="https://hide01.ir/tcm-practical-web-hacking/embed/#?secret=ZZbw7kMOBP" width="600" height="338" title="&#x201C;&#x62F;&#x648;&#x631;&#x647; TCM Security &#x2013; Practical Web Hacking&#x201D; &#x2014; &#xFF28;&#xFF49;&#xFF44;&#xFF45;&#xFF3A;&#xFF45;&#xFF52;&#xFF4F;&#xFF2F;&#xFF4E;&#xFF45;" data-secret="ZZbw7kMOBP" frameborder="0" marginwidth="0" marginheight="0" scrolling="no" class="wp-embedded-content"&gt;&lt;/iframe&gt;&lt;script type="text/javascript"&gt;
/* &lt;![CDATA[ */
/*! This file is auto-generated */
!function(d,l){"use strict";l.querySelector&amp;&amp;d.addEventListener&amp;&amp;"undefined"!=typeof URL&amp;&amp;(d.wp=d.wp||{},d.wp.receiveEmbedMessage||(d.wp.receiveEmbedMessage=function(e){var t=e.data;if((t||t.secret||t.message||t.value)&amp;&amp;!/[^a-zA-Z0-9]/.test(t.secret)){for(var s,r,n,a=l.querySelectorAll('iframe[data-secret="'+t.secret+'"]'),o=l.querySelectorAll('blockquote[data-secret="'+t.secret+'"]'),c=new RegExp("^https?:$","i"),i=0;i&lt;o.length;i++)o[i].style.display="none";for(i=0;i&lt;a.length;i++)s=a[i],e.source===s.contentWindow&amp;&amp;(s.removeAttribute("style"),"height"===t.message?(1e3&lt;(r=parseInt(t.value,10))?r=1e3:~~r&lt;200&amp;&amp;(r=200),s.height=r):"link"===t.message&amp;&amp;(r=new URL(s.getAttribute("src")),n=new URL(t.value),c.test(n.protocol))&amp;&amp;n.host===r.host&amp;&amp;l.activeElement===s&amp;&amp;(d.top.location.href=t.value))}},d.addEventListener("message",d.wp.receiveEmbedMessage,!1),l.addEventListener("DOMContentLoaded",function(){for(var e,t,s=l.querySelectorAll("iframe.wp-embedded-content"),r=0;r&lt;s.length;r++)(t=(e=s[r]).getAttribute("data-secret"))||(t=Math.random().toString(36).substring(2,12),e.src+="#?secret="+t,e.setAttribute("data-secret",t)),e.contentWindow.postMessage({message:"ready",secret:t},"*")},!1)))}(window,document);
//# sourceURL=https://hide01.ir/wp-includes/js/wp-embed.min.js
/* ]]&gt; */
&lt;/script&gt;
</html><thumbnail_url>https://hide01.ir/wp-content/uploads/2024/08/Practical-Web-Hacking.webp</thumbnail_url><thumbnail_width>800</thumbnail_width><thumbnail_height>500</thumbnail_height><description>Welcome to this course on Practical Web Hacking. This course follows on from the Practical Bug Bounty course and will take you deeper into the world of finding and exploiting vulnerabilities in web applications. It&#x2019;s recommended that you have completed the Practical Bug Bounty course or at least one year&#x2019;s worth of experience in hacking [&hellip;]</description></oembed>
