- Broken Access Control Vulnerabilities 5
- Lecture1.108 min
- Lecture1.207 min
- Lecture1.309 min
- Lecture1.410 min
- Lecture1.508 min
- Directory / Path Traversal Vulnerabilities 6
- Lecture2.110 min
- Lecture2.205 min
- Lecture2.304 min
- Lecture2.404 min
- Lecture2.505 min
- Lecture2.606 min
- XSS Vulnerabilities (Reflected & Stored) 4
- Lecture3.105 min
- Lecture3.211 min
- Lecture3.307 min
- Lecture3.411 min
- Dom Based XSS Vulnerabilities 5
- Lecture4.106 min
- Lecture4.205 min
- Lecture4.304 min
- Lecture4.404 min
- Lecture4.503 min
- XSS - Bypassing Encoding & Escaping 4
- Lecture5.107 min
- Lecture5.206 min
- Lecture5.307 min
- Lecture5.411 min
- XSS - Bypassing CSP (Content Security Policy) 3
- Lecture6.107 min
- Lecture6.207 min
- Lecture6.307 min
- SQL Injection Vulnerabilities 5
- Lecture7.108 min
- Lecture7.207 min
- Lecture7.305 min
- Lecture7.408 min
- Lecture7.507 min
- Blind SQL Injection Vulnerabilities 4
- Lecture8.106 min
- Lecture8.210 min
- Lecture8.308 min
- Lecture8.408 min
- Time-Based Blind SQL Injection Vulnerabilities 3
- Lecture9.110 min
- Lecture9.211 min
- Lecture9.310 min
- SSRF (Server-side Request Forgery) Basics 5
- Lecture10.107 min
- Lecture10.205 min
- Lecture10.306 min
- Lecture10.406 min
- Lecture10.508 min
- SSRF - Bypassing Filteration 3
- Lecture11.108 min
- Lecture11.210 min
- Lecture11.306 min
- Weaponising the Cloud! 5
- Lecture12.107 min
- Lecture12.211 min
- Lecture12.305 min
- Lecture12.410 min
- Lecture12.508 min
- Hacking Browsers Through the Cloud with BeEF 6
- Lecture13.109 min
- Lecture13.209 min
- Lecture13.306 min
- Lecture13.407 min
- Lecture13.509 min
- Lecture13.610 min
- Configuring DNS & Enabling HTTPS on Cloud Servers 6
- Lecture14.109 min
- Lecture14.207 min
- Lecture14.306 min
- Lecture14.408 min
- Lecture14.512 min
- Lecture14.605 min
- Phishing & Bypassing Two Factor Authentication With EvilGinx2 6
- Lecture15.107 min
- Lecture15.205 min
- Lecture15.309 min
- Lecture15.419 min
- Lecture15.506 min
- Lecture15.611 min
- Remotely Accessing the Desktop of Cloud Servers 4
- Lecture16.105 min
- Lecture16.210 min
- Lecture16.306 min
- Lecture16.403 min
- BitB - Browser In The Browser Attack - Phishing and Bypassing 2FA 4
- Lecture17.106 min
- Lecture17.208 min
- Lecture17.305 min
- Lecture17.410 min
- Mobile BitB - Phishing and Bypassing 2FA on Mobiles 4
- Lecture18.109 min
- Lecture18.209 min
- Lecture18.307 min
- Lecture18.407 min
- Multi-Session BitB - Phishing & Bypassing 2FA on Multiple Devices 3
- Lecture19.109 min
- Lecture19.207 min
- Lecture19.309 min
- Advanced Malware Delivery 5
- Lecture20.107 min
- Lecture20.206 min
- Lecture20.308 min
- Lecture20.403 min
- Lecture20.507 min
- Introduction to C2 (Command & Control) Servers 4
- Lecture21.107 min
- Lecture21.206 min
- Lecture21.306 min
- Lecture21.404 min
- C2 Servers - Botnets With GitHub 3
- Lecture22.107 min
- Lecture22.205 min
- Lecture22.304 min
- C2 Servers - Hacking Windows Through Discord 3
- Lecture23.106 min
- Lecture23.204 min
- Lecture23.309 min
- C2 Servers - Windows Post Exploitation Through Discord 4
- Lecture24.106 min
- Lecture24.207 min
- Lecture24.306 min
- Lecture24.404 min
- C2 Servers - Empire & StarKiller 6
- Lecture25.106 min
- Lecture25.205 min
- Lecture25.306 min
- Lecture25.410 min
- Lecture25.507 min
- Lecture25.605 min
- C2 Servers - Post Exploitation With StarKiller 6
- Lecture26.108 min
- Lecture26.207 min
- Lecture26.306 min
- Lecture26.405 min
- Lecture26.505 min
- Lecture26.608 min
- C2 Servers - Hacking Apple Mac OS & Linux 3
- Lecture27.106 min
- Lecture27.212 min
- Lecture27.311 min
- Hacking With AI 5
- Lecture28.110 min
- Lecture28.207 min
- Lecture28.310 min
- Lecture28.405 min
- Lecture28.506 min
- Hacking With AI - Custom Instructions 2
- Lecture29.106 min
- Lecture29.205 min
- Hacking With AI - Retrieval-Augmented Generation (RAG) 5
- Lecture30.110 min
- Lecture30.207 min
- Lecture30.308 min
- Lecture30.405 min
- Lecture30.503 min
- Hacking With AI - Making Hacking Programs 4
- Lecture31.106 min
- Lecture31.206 min
- Lecture31.308 min
- Lecture31.407 min
- Hacking With AI - Making Malware - Backdoors 4
- Lecture32.105 min
- Lecture32.206 min
- Lecture32.307 min
- Lecture32.406 min
- Hacking With AI - Making Malware - WiFi Stealer 2
- Lecture33.106 min
- Lecture33.208 min
- Hacking with AI - Making Malware - Trojans 3
- Lecture34.108 min
- Lecture34.209 min
- Lecture34.307 min
- Hacking with AI - Making Malware - Keyloggers 4
- Lecture35.105 min
- Lecture35.208 min
- Lecture35.304 min
- Lecture35.408 min
- Hacking with AI - Making Malware - Advanced Backdoors 5
- Lecture36.107 min
- Lecture36.207 min
- Lecture36.306 min
- Lecture36.406 min
- Lecture36.505 min
- Hacking with AI - Making Malware - Advanced Trojans 2
- Lecture37.108 min
- Lecture37.208 min
- Hacking with AI - Bypassing Anti-Virus 2
- Lecture38.112 min
- Lecture38.212 min
- Hacking with AI - Hacking Web Browsers 7
- Lecture39.103 min
- Lecture39.209 min
- Lecture39.312 min
- Lecture39.406 min
- Lecture39.509 min
- Lecture39.605 min
- Lecture39.708 min
- Hacking with AI - Jailbreaking AI Thinking Mode 1
- Lecture40.110 min
- Hacking with AI Agents 6
- Lecture41.105 min
- Lecture41.205 min
- Lecture41.309 min
- Lecture41.408 min
- Lecture41.506 min
- Lecture41.611 min
- Hacking with AI Agents - Hacking Using Natural Language 3
- Lecture42.109 min
- Lecture42.208 min
- Lecture42.307 min
- Hacking with AI Agents - Web Browser Control 4
- Lecture43.1
- Lecture43.2
- Lecture43.3
- Lecture43.4
- Hacking with AI Agents - Web Browser Control - Browser-use 2
- Lecture44.1
- Lecture44.2
- OSINT with AI Agents 5
- Lecture45.1
- Lecture45.2
- Lecture45.3
- Lecture45.4
- Lecture45.5
- Bug Bounty Hunting with AI Agents 2
- Lecture46.1
- Lecture46.2
- Communicating with AI Models Like a Pro 3
- Lecture47.1
- Lecture47.2
- Lecture47.3
- Next-level Linux Terminal with Agents and AI Capabilities 3
- Lecture48.1
- Lecture48.2
- Lecture48.3
- 🆕 Accessing Paid AI Models For Free! 2
- Lecture49.1
- Lecture49.2
- 🆕 AI Agentic Framework for Hacking [Vibe Hacking] 3
- Lecture50.1
- Lecture50.2
- Lecture50.3
This content is protected, please login and enroll course to view this content!