Overview
Syllabus
Subdomain hunting!.
Learn hacking with Hackthissite!.
Best Vulnerability scanners for Kali Linux(and Parrot os)!.
Gathering Email addresses of a particular domain!.
Exploiting CSRF vulnerability!(Account takeover).
Perform Bruteforce attack using Burpsuite!.
Directory and File hunting!.
Directory and File hunting!.
My Udemy course!.
NMAP Tutorial.
Create password wordlists like a pro!!.
Hydra tutorial.
Web parameter tampering attack explained! - [For educational purpose].
Install Kali Linux on Windows 10 | Windows Subsystem for Linux(WSL2).
Best hacking Operating System??.
Best PC or Laptop configuration for Cybersecurity/Bugbounty.
Reflected XSS || Live demo.
Google hacking.
Top 10 Hacking tools.
Virtual Private Network || Best VPN's.
GitHub Recon.
How to view Android application source code??.
Let's Discuss about Passwords!.
Basic recon on Websites/Webservers.
P0wny Shell || Best PHP reverse shell.
Hping3 Tutorial.
Broken Access Control Vulnerability.
Bypassing OTP.
Bypassing OTP || Part-2.
Post Exploitation File Transfers || Penetration Testing.
How I was able to view sensitive details of other users || Bugbounty POC.
How to get started with Bug Bounty hunting??.
Steal cookies by exploiting stored XSS.
Web Application Firewall detection techniques.
Sn1per || An Automated Pentesting Framework.
Taught by
Sathvik Techtuber
Reviews
4.0 rating, based on 2 Class Central reviews
-
The course was well-structured, covering essential aspects of hunting, safety protocols, and practical skills. The instructor demonstrated extensive knowledge and ensured a participative and engaging environment. I found the overall experience enriching and highly recommend the course.
-
I find it really helpful and it's very clear and I wish if you could do more courses about bug bounty hunter