- Broken Access Control Vulnerabilities 5
- Lecture1.108 min
- Lecture1.207 min
- Lecture1.309 min
- Lecture1.410 min
- Lecture1.508 min
- Directory / Path Traversal Vulnerabilities 6
- Lecture2.110 min
- Lecture2.205 min
- Lecture2.304 min
- Lecture2.404 min
- Lecture2.505 min
- Lecture2.606 min
- XSS Vulnerabilities (Reflected & Stored) 4
- Lecture3.105 min
- Lecture3.211 min
- Lecture3.307 min
- Lecture3.411 min
- Dom Based XSS Vulnerabilities 5
- Lecture4.106 min
- Lecture4.205 min
- Lecture4.304 min
- Lecture4.404 min
- Lecture4.503 min
- XSS - Bypassing Encoding & Escaping 4
- Lecture5.107 min
- Lecture5.206 min
- Lecture5.307 min
- Lecture5.411 min
- XSS - Bypassing CSP (Content Security Policy) 3
- Lecture6.107 min
- Lecture6.207 min
- Lecture6.307 min
- SQL Injection Vulnerabilities 5
- Lecture7.108 min
- Lecture7.207 min
- Lecture7.305 min
- Lecture7.408 min
- Lecture7.507 min
- Blind SQL Injection Vulnerabilities 4
- Lecture8.106 min
- Lecture8.210 min
- Lecture8.308 min
- Lecture8.408 min
- Time-Based Blind SQL Injection Vulnerabilities 3
- Lecture9.110 min
- Lecture9.211 min
- Lecture9.310 min
- SSRF (Server-side Request Forgery) Basics 5
- Lecture10.107 min
- Lecture10.205 min
- Lecture10.306 min
- Lecture10.406 min
- Lecture10.508 min
- SSRF - Bypassing Filteration 3
- Lecture11.108 min
- Lecture11.210 min
- Lecture11.306 min
- Weaponising the Cloud! 5
- Lecture12.107 min
- Lecture12.211 min
- Lecture12.305 min
- Lecture12.410 min
- Lecture12.508 min
- Hacking Browsers Through the Cloud with BeEF 6
- Lecture13.109 min
- Lecture13.209 min
- Lecture13.306 min
- Lecture13.407 min
- Lecture13.509 min
- Lecture13.610 min
- Configuring DNS & Enabling HTTPS on Cloud Servers 6
- Lecture14.109 min
- Lecture14.207 min
- Lecture14.306 min
- Lecture14.408 min
- Lecture14.512 min
- Lecture14.605 min
- Phishing & Bypassing Two Factor Authentication With EvilGinx2 6
- Lecture15.107 min
- Lecture15.205 min
- Lecture15.309 min
- Lecture15.419 min
- Lecture15.506 min
- Lecture15.611 min
- Remotely Accessing the Desktop of Cloud Servers 4
- Lecture16.105 min
- Lecture16.210 min
- Lecture16.306 min
- Lecture16.403 min
- BitB - Browser In The Browser Attack - Phishing and Bypassing 2FA 4
- Lecture17.106 min
- Lecture17.208 min
- Lecture17.305 min
- Lecture17.410 min
- Mobile BitB - Phishing and Bypassing 2FA on Mobiles 4
- Lecture18.109 min
- Lecture18.209 min
- Lecture18.307 min
- Lecture18.407 min
- Multi-Session BitB - Phishing & Bypassing 2FA on Multiple Devices 3
- Lecture19.109 min
- Lecture19.207 min
- Lecture19.309 min
- Advanced Malware Delivery 5
- Lecture20.107 min
- Lecture20.206 min
- Lecture20.308 min
- Lecture20.403 min
- Lecture20.507 min
- Introduction to C2 (Command & Control) Servers 4
- Lecture21.107 min
- Lecture21.206 min
- Lecture21.306 min
- Lecture21.404 min
- C2 Servers - Botnets With GitHub 3
- Lecture22.107 min
- Lecture22.205 min
- Lecture22.304 min
- C2 Servers - Hacking Windows Through Discord 3
- Lecture23.106 min
- Lecture23.204 min
- Lecture23.309 min
- C2 Servers - Windows Post Exploitation Through Discord 4
- Lecture24.106 min
- Lecture24.207 min
- Lecture24.306 min
- Lecture24.404 min
- C2 Servers - Empire & StarKiller 6
- Lecture25.106 min
- Lecture25.205 min
- Lecture25.306 min
- Lecture25.410 min
- Lecture25.507 min
- Lecture25.605 min
- C2 Servers - Post Exploitation With StarKiller 6
- Lecture26.108 min
- Lecture26.207 min
- Lecture26.306 min
- Lecture26.405 min
- Lecture26.505 min
- Lecture26.608 min
- C2 Servers - Hacking Apple Mac OS & Linux 3
- Lecture27.106 min
- Lecture27.212 min
- Lecture27.311 min
- Hacking With AI 5
- Lecture28.110 min
- Lecture28.207 min
- Lecture28.310 min
- Lecture28.405 min
- Lecture28.506 min
- Hacking With AI - Custom Instructions 2
- Lecture29.106 min
- Lecture29.205 min
- Hacking With AI - Retrieval-Augmented Generation (RAG) 5
- Lecture30.110 min
- Lecture30.207 min
- Lecture30.308 min
- Lecture30.405 min
- Lecture30.503 min
- Hacking With AI - Making Hacking Programs 4
- Lecture31.106 min
- Lecture31.206 min
- Lecture31.308 min
- Lecture31.407 min
- Hacking With AI - Making Malware - Backdoors 4
- Lecture32.105 min
- Lecture32.206 min
- Lecture32.307 min
- Lecture32.406 min
- Hacking With AI - Making Malware - WiFi Stealer 2
- Lecture33.106 min
- Lecture33.208 min
- Hacking with AI - Making Malware - Trojans 3
- Lecture34.108 min
- Lecture34.209 min
- Lecture34.307 min
- Hacking with AI - Making Malware - Keyloggers 4
- Lecture35.105 min
- Lecture35.208 min
- Lecture35.304 min
- Lecture35.408 min
- Hacking with AI - Making Malware - Advanced Backdoors 5
- Lecture36.107 min
- Lecture36.207 min
- Lecture36.306 min
- Lecture36.406 min
- Lecture36.505 min
- Hacking with AI - Making Malware - Advanced Trojans 2
- Lecture37.108 min
- Lecture37.208 min
- Hacking with AI - Bypassing Anti-Virus 2
- Lecture38.112 min
- Lecture38.212 min
- Hacking with AI - Hacking Web Browsers 7
- Lecture39.103 min
- Lecture39.209 min
- Lecture39.312 min
- Lecture39.406 min
- Lecture39.509 min
- Lecture39.605 min
- Lecture39.708 min
- Hacking with AI - Jailbreaking AI Thinking Mode 1
- Lecture40.110 min
- Hacking with AI Agents 6
- Lecture41.105 min
- Lecture41.205 min
- Lecture41.309 min
- Lecture41.408 min
- Lecture41.506 min
- Lecture41.611 min
- Hacking with AI Agents - Hacking Using Natural Language 3
- Lecture42.109 min
- Lecture42.208 min
- Lecture42.307 min
- Hacking with AI Agents - Web Browser Control 4
- Lecture43.1
- Lecture43.2
- Lecture43.3
- Lecture43.4
- Hacking with AI Agents - Web Browser Control - Browser-use 2
- Lecture44.1
- Lecture44.2
- OSINT with AI Agents 5
- Lecture45.1
- Lecture45.2
- Lecture45.3
- Lecture45.4
- Lecture45.5
- Bug Bounty Hunting with AI Agents 2
- Lecture46.1
- Lecture46.2
- Communicating with AI Models Like a Pro 3
- Lecture47.1
- Lecture47.2
- Lecture47.3
- Next-level Linux Terminal with Agents and AI Capabilities 3
- Lecture48.1
- Lecture48.2
- Lecture48.3
- 🆕 Accessing Paid AI Models For Free! 2
- Lecture49.1
- Lecture49.2
- 🆕 AI Agentic Framework for Hacking [Vibe Hacking] 3
- Lecture50.1
- Lecture50.2
- Lecture50.3
This content is protected, please login and enroll course to view this content!
Leave A Reply Cancel reply
You must be logged in to post a comment.
1 Comment
i got this error
Error : wine: failed to open “/root/.wine/drive_c/users/root/AppData/Local/Programs/Python/Python38-32/Scripts/pyinstaller.exe”:c0000135
i try many times but it not working , also try to put github token and github repo in github file and build it as zaid course by oyinstaller but didnt got the connection or pull request
can you help please