Bug Bounty
Offered By: YouTube
Course Description
Overview
Syllabus
The Plan - Finding a program - Bug Bounty - Ep - 01.
Scope Review and Bug Hunting Using Github Dorks - Bug Bounty - Ep - 02.
Recon 01 - Recon Infrastructure Map Setting up VPS + Assetfinder + Subfinder - Bug Bounty - Ep - 03.
Amass Setup and Tutorial.
Collecting Subdomains - Part 2 | Automating the process | First Steps to your personal Recon Toolkit.
Collecting Subdomains - Part 1 | Amass | Subfinder | Assetfinder | Findomain.
Recon - Scan them all | Port Scanning ft. nmap + Short Videos Announcement.
XSS CSP Bypass - BugPoC Challenge.
Kali on Windows WSL for Pentester & Bug Bounty Hunter | Local Recon | Hacking Machine | No VPS / VM.
Local Recon Machine - Kali on Windows ft. WSL | Final Part - Pt.2 | Recon on a live site.
Automate your Bug Hunting using Nuclei | Writing our own nuclei template | Be The H.A.C.R. - Ep. 18.
XXE - What Why & How | XXE on Twitter | $10k Bounty | XML External Entity.
Automating IDORS with Autorize - Common API Bugs Pt. 2 - IDORs & Access Control Issues.
Hacking Oauth Applications - Pt. 1.
Flawed CSRF Protection - State Param - Hacking Oauth Pt . 2 | Live Demo on Medium.com.
Free Automated Recon Using Github Actions | Ft. Project Discovery.
Taught by
Hacking Simplified
Related Courses
Certified Ethical Hacking (v12)LearnKartS via Coursera An Introduction to Ethical Hacking with Kali Linux
Packt via Coursera Getting Started in Port Scanning Using Nmap and Kali Linux
Packt via Coursera Intermediate Ethical Hacking Hands-on Training
Packt via Coursera Intermediate Ethical Hacking Techniques
Packt via Coursera