Files Included :
1 -Personal Introduction.mp4 (28.36 MB)
2 -Introduction to the course.mp4 (62.62 MB)
1 -Installing Kali Linux.mp4 (668.26 MB)
10 -Installing GoBuster.mp4 (56.82 MB)
2 -Installing OWASP ZAP.mp4 (26.59 MB)
3 -Configuring Burpsuite.mp4 (38.25 MB)
4 -Websites we will use.mp4 (34.24 MB)
5 -Installing and Configuring ngrok.mp4 (139.75 MB)
6 -Installing Wappalyzer.mp4 (24.6 MB)
7 -Using Nikto to find Vulnerabilities.mp4 (137.11 MB)
8 -Finding Vulnerable Web Application Ports using Network Mapper.mp4 (86.82 MB)
9 -Using GoBuster.mp4 (66.6 MB)
1 -Understanding Bug Bounties and HackerOne.mp4 (63.55 MB)
10 -Using OWASP ZAP for Auto-Manual Vulnerability Detection (Automatic).mp4 (96.21 MB)
11 -Exploiting Open Redirect Vulnerability (Automatic).mp4 (71.16 MB)
12 -Exploiting Account Takeover Vulnerability (Manual).mp4 (98.09 MB)
13 -Exploiting Stored XSS Vulnerability (Manual).mp4 (114.38 MB)
14 -Exploiting OTP Overflow (Manual).mp4 (55.44 MB)
15 -Exploiting Insecure Direct Object Reference (Manual).mp4 (152.25 MB)
16 -Exploiting XSS Vulnerability (Manual).mp4 (119.68 MB)
17 -Advanced Google Hacking Techniques (Auto-Manual).mp4 (54.82 MB)
18 -Exploiting Local File Inclusion and Directory Transversal (Manual).mp4 (142.87 MB)
19 -Exploiting Remote File Inclusion (Manual).mp4 (164.91 MB)
2 -Exploiting Remote Code Execution Vulnerability (Automatic and AI).mp4 (246.21 MB)
20 -Exploiting Cross Site Request Forgery (Manual).mp4 (126.28 MB)
21 -Exploiting Server Side Request Forgery (Manual).mp4 (204.91 MB)
22 -Advanced GitHub Hacking Techniques (Manual).mp4 (98.42 MB)
23 -Bypassing Web Application Firewalls (Manual).mp4 (248.85 MB)
24 -Exploiting Cross Origin Resource Sharing Vulnerability (Manual).mp4 (133.64 MB)
25 -Exploiting Clickjacking Vulnerability (Manual).mp4 (165.48 MB)
3 -Exploiting SQL Injection Vulnerability (Automatic).mp4 (99.33 MB)
4 -Exploiting Subdomain Takeover Vulnerability (Automatic).mp4 (341.11 MB)
5 -Exploiting Privacy Violation Vulnerability (Automatic).mp4 (134.83 MB)
6 -Using Nuclei Verbose Mode to find Vulnerable Endpoints (Automatic).mp4 (116.22 MB)
7 -Using Katana to find Vulnerable Endpoints (Automatic).mp4 (65.9 MB)
8 -Exploit to bypass Error 403 (Automatic).mp4 (129.13 MB)
9 -Exploiting Missing SRI Vulnerability (Automatic).mp4 (79.86 MB)
1 -Report Writing.mp4 (226.81 MB)
2 -Conclusion.mp4 (29.1 MB)]
ScreenshotRapidgator links are free direct download only for my subscriber, other hosts are free download for free users