Burp Suite Deep Dive course: [ Ссылка ]
________________________________________________________________________________________________ In this video I give you a pro tip when it comes to bug bounty hunting, and that is isolating unique application behavior. This tip has been inspired from the amazing book of Dafydd Stuttard, which is linked below.
Recon in Cybersecurity course: [ Ссылка ]
Python Basics course: [ Ссылка ]
Python for Pentesters course: [ Ссылка ]
Join me and other cyber-geeks on discord: [ Ссылка ]
Join my SQUAD (for discounts'n'stuff): [ Ссылка ]
Hire me as a penetration tester: [ Ссылка ]
101 Pentesting Training: [ Ссылка ]
101 Cybersecurity Consulting: [ Ссылка ]
Connect with me:
Help me continue creating videos: [ Ссылка ]
Linkedin: [ Ссылка ]
Twitter: [ Ссылка ]
Facebook page: [ Ссылка ]
Facebook group: [ Ссылка ]
Hackthebox: [ Ссылка ]
Tryhackme: [ Ссылка ]
Peerlyst: [ Ссылка ]
Discord: [ Ссылка ]
Books I recommend for Penetration Testing and Ethical Hacking:
1. TJ O'Connor - Violent Python: [ Ссылка ]
2. Dafydd Stuttard - Web App Hacker' s Handbook (2nd Ed): [ Ссылка ]
3. Peter Yaworski - Web Hacking 101: [ Ссылка ]
4. Jon Erickson - Hacking: The Art of Exploitation (2nd Ed):
[ Ссылка ]
5. Peter Kim - The Hacker Playbook 3 (2018): [ Ссылка ]
6. Peter Yaworski - Real-World Bug Hunting: [ Ссылка ]
It helps me tremendously if you support these educational videos:
[ Ссылка ]
My course Developing Ethical Hacking Tools with Python on Cybrary: [ Ссылка ]
If you're a Youtuber, how can you survive without TubeBuddy? [ Ссылка ]
Learn hands-on pentesting (free trial): [ Ссылка ]
Hacker Wearables: [ Ссылка ]
Paperspace credit: [ Ссылка ]
DigitalOcean credit: [ Ссылка ]
Short-clips via: [ Ссылка ]
__________
Whatever type of tests you're doing, only perform them in safe and legal environments and with the appropriate permissions. This video is for educational purposes only.
![](https://i.ytimg.com/vi/ra-4bG26K2k/maxresdefault.jpg)