riversongs Posted May 27 Report Share Posted May 27 Free Download Ethical Hacking Pentesting & Bug Bounty Hunting V2 2025Last updated 3/2025MP4 | Video: h264, 1920x1080 | Audio: AAC, 44.1 KHzLanguage: English | Size: 4.60 GB | Duration: 10h 20mComplete Practical Course on Ethical Hacking, Penetration Testing and Bug Bounty Hunting with Live Attacks 2025What you'll learnBug Bounty Hunting - LiveTips and Tricks to hunt bugsBreakDown of Hackerone Reports for better understandingInterview Preparation Questions Answers and ApproachWeb Application Penetration Testing - LiveBecome a bug bounty hunters & Hunt on Live WebsitesIntercept requests using a Burpsuite proxyGain full control over target server using SQL Injection AttacksDiscover Vulnerabilities, technologies & services used on target website.Subdomain TakeoversSQLi Interview Questions and AnswersHunt Basic HTML Injection Vulnerabilities on Live EnvironmentsHunt Basic ClickJacking Vulnerabilities on Live EnvironmentsExploit and perform Local File Inclusion (LFI) on Live websitesExploit and perform RemoteFile Inclusion (RFI) on Live websitesExploit and perform Remote Code Execution (RCE) on Live websitesFix and Mitigations against SQLi VulnerabilitiesPractical Tips and Tricks for hunting SQLi LiveBroken Link HijackingFix and Mitigations against RCE VulnerabilitiesInterview Questions and answersBug Bounty - Roadmap for HackeroneBug Bounty - Roadmap for BugcrowdBug Bounty - Roadmap for Open Bug BountyBug Bounty - Roadmap for NCIIPC (Govt of India)Bug Bounty - Roadmap for RVDP All ProgramsReporting TemplatesRequirementsBasic IT SkillsNo Linux, programming or hacking knowledge required.Computer with a minimum of 4GB ram/memory & Internet ConnectionOperating System: Windows / OS X / LinuxDescriptionOverviewSection 1: IntroductionLecture 1 DisclaimerSection 2: Future UpdatesLecture 2 Future UpdatesSection 3: Setting up EnvironmentLecture 3 Burp Suite Proxy Lab SetupSection 4: Subdomain TakeoversLecture 4 What are SubdomainsLecture 5 Subdomain EnumLecture 6 What is DNSLecture 7 Fastest ResolverLecture 8 What are DNS RecordsLecture 9 SublisterLecture 10 FindomainLecture 11 SubfinderLecture 12 Recursive Subdomain EnumerationLecture 13 Can I take over XYZLecture 14 Can I take over ALL XYZLecture 15 AWS Subdomain Takeover Live -1Lecture 16 AWS Subdomain Takeover Live -2Lecture 17 AWS Bugcrowd Report BreakdownLecture 18 Tumblr Subdomain TakeoverLecture 19 Shopify Subdomain TakeoverLecture 20 Cargo Subdomain TakeoverLecture 21 Subzy Tool Automation for Subdomain TakeoversLecture 22 Subjack - Tool for Subdomain TakeoversLecture 23 Subdomain Takeover RevisionSection 5: HTML InjectionLecture 24 What is HTMLLecture 25 Understanding HTMLLecture 26 HTMLLecture 27 HTML Injection - LabLecture 28 HTML Injection Live-1Lecture 29 HTML Injection RevisionSection 6: Click JackingLecture 30 Click Jacking Live-1Lecture 31 Click Jacking Live-2Lecture 32 Click Jacking Live-3Lecture 33 Click Jacking Live-4Lecture 34 Clickjacking ExploitationLecture 35 Clickjacking Live Target ExploitationLecture 36 Clickjacking Automation Live Target ExploitationLecture 37 Clickjacking - ClickBandit with BurpsuiteLecture 38 Clickjacking RevisionSection 7: File Inclusion ExploitationLecture 39 What is LFILecture 40 LFI Exploitation on LabLecture 41 LFI Exploitation Live -1Lecture 42 LFI Exploitation Live -2Lecture 43 LFI Exploitation LFi to RCELecture 44 LFI vs RFILecture 45 File Inclusion Exploitation RevisionSection 8: Broken Link HijackingLecture 46 Introduction & Background ConceptLecture 47 BLH Exploitation PracticalLecture 48 BLH Exploitation ToolLecture 49 BLH Instagram Report BreakdownLecture 50 BLH Exploitation Practical LiveLecture 51 BLH Hackerone Report BreakdownLecture 52 BLH Practical Tool ResourceLecture 53 BLH Exploitation Practical Extension ToolLecture 54 BLH Command InjectionLecture 55 BLH Exploitation Github Repo - LiveLecture 56 Broken Link Hijacking RevisionSection 9: SQL InjectionLecture 57 SQL Injection Background ConceptLecture 58 SQL vs SpreadsheetsLecture 59 SQL Database ImportanceLecture 60 XAMPP Installation & SetupLecture 61 SQL Practical Hands on - First TableLecture 62 SQL Practical Hands on - QueriesLecture 63 SQL Practical Hands on - Second TableLecture 64 SQL Practical Hands on - ExerciseLecture 65 Truth TableLecture 66 Truth Table PracticalLecture 67 SQL Understanding the LogicLecture 68 SQL Query BreakdownLecture 69 SQL Injection Impact & ApproachLecture 70 SQLi on Lab-1Lecture 71 SQL Query Breakdown payload-2Lecture 72 SQLi on Lab-2Lecture 73 Burp suite Web AcademyLecture 74 SQLi Labs Data Retrieval LabLecture 75 SQLi Labs Data Retrieval LiveLecture 76 SQLi Login Bypass LabLecture 77 SQLi Login Bypass Live 1Lecture 78 SQLMap Installation & SetupLecture 79 SQLMap Exploitation - Live 2Lecture 80 SQLMap Exploitation - Live 3Lecture 81 Shell Exploitation TechniquesLecture 82 SQL : Shell Exploitation - Live 4Lecture 83 SQLi RevisionSection 10: SSRFLecture 84 SSRF Introduction & PrincipleLecture 85 SSRF PracticalLecture 86 SSRF Bincatcher ListenerLecture 87 SSRF against Server ItselfLecture 88 SSRF against another Backend ServerLecture 89 SSRF Bypass Protection Blacklist FilterLecture 90 SSRF Bypass Protection Whitelist FilterLecture 91 SSRF Chaining with Open Redirect and Bypass FilterLecture 92 SSRF Exploitation using MPEG - LiveLecture 93 SSRF Exploitation JIRA chaining with XSS - LiveLecture 94 SSRF Exploitation JIRA chaining with XSS - LiveLecture 95 SSRF Exploitation JIRA Automation with PythonLecture 96 SSRF Facebook BreakdownLecture 97 SSRF Microstrategy Live -1Lecture 98 SSRF PHP Filter LiveLecture 99 SSRF PHP Filter Wordpress Config LiveSection 11: Remote Code ExecutionLecture 100 Apache Unomi RCE LiveSection 12: How to start with Bug Bounty Platforms and ReportingLecture 101 BugCrowd ROADMAPLecture 102 Hackerone ROADMAPLecture 103 Open Bug Bounty ROADMAPLecture 104 Synack ROADMAPLecture 105 Intigriti ROADMAPLecture 106 NCIIPC Govt of India ROADMAPLecture 107 RVDP All Websites ROADMAPSection 13: Bug Bounty / Penetration Testing Reporting TemplatesLecture 108 Reporting Templates - We have your back!Section 14: SnapshotLecture 109 Snapshot of Subdomain EnumerationLecture 110 Snapshot of Broken link HijackingSection 15: PortSwigger LabsLecture 111 Solving Portswigger Lab SQL Injection -1Section 16: Learning LFIscanLecture 112 LFIscanSection 17: Mastering Subdomain Enumeration in Penetration TestingLecture 113 Basics and Common Mistakes to Avoid while doing Subdomain EnumerationLecture 114 Subdomain Enumeration StrategiesLecture 115 Learning DOME - A subdomain enumeration toolSection 18: Automating SQL Injection using GhauriLecture 116 Learning GhauriAnybody interested in learning website & web application hacking / penetration testing.,Any Beginner who wants to start with Penetration Testing,Any Beginner who wants to start with Bug Bounty Hunting,Trainer who are willing to start teaching Pentesting,Any Professional who working in Cyber Security and Pentesting,Ethical Hackers who wants to learn How OWASP Works,Beginners in Cyber Security Industry for Analyst Position,SOC person who is working into a corporate environment,Developers who wants to fix vulnerabilities and build secure applicationsHomepagehttps://www.udemy.com/course/penetration-testing-bug-bounty-hunting-level-2-hacktify/Rapidgator Links Downloadhttps://rg.to/file/008acb1f62c65ae7d1b57c3402c51542/nqteg.Ethical.HackingPentesting..Bug.Bounty.Hunting.V2.2025.part4.rar.htmlhttps://rg.to/file/28837b82a6214c8bdc05c5786f92b0d2/nqteg.Ethical.HackingPentesting..Bug.Bounty.Hunting.V2.2025.part3.rar.htmlhttps://rg.to/file/7713960a65992b5be3c575b8695dee6a/nqteg.Ethical.HackingPentesting..Bug.Bounty.Hunting.V2.2025.part1.rar.htmlhttps://rg.to/file/8d6eb10c3a660bb90075e8d7c95eb339/nqteg.Ethical.HackingPentesting..Bug.Bounty.Hunting.V2.2025.part5.rar.htmlhttps://rg.to/file/d5629a6b39754f4b282ec0172f75938d/nqteg.Ethical.HackingPentesting..Bug.Bounty.Hunting.V2.2025.part2.rar.htmlFikper Links Downloadhttps://fikper.com/1frhzqGXpd/nqteg.Ethical.HackingPentesting..Bug.Bounty.Hunting.V2.2025.part4.rar.htmlhttps://fikper.com/3Dp7nEMXgD/nqteg.Ethical.HackingPentesting..Bug.Bounty.Hunting.V2.2025.part1.rar.htmlhttps://fikper.com/7uOhm0EbzJ/nqteg.Ethical.HackingPentesting..Bug.Bounty.Hunting.V2.2025.part2.rar.htmlhttps://fikper.com/egagbnzGvA/nqteg.Ethical.HackingPentesting..Bug.Bounty.Hunting.V2.2025.part3.rar.htmlhttps://fikper.com/lHDeEnLD8N/nqteg.Ethical.HackingPentesting..Bug.Bounty.Hunting.V2.2025.part5.rar.htmlNo Password - Links are Interchangeable Link to comment Share on other sites More sharing options...
Recommended Posts
Please sign in to comment
You will be able to leave a comment after signing in
Sign In Now