Intermediate Bug Bounty Course


  First Section
Available in days
days after you enroll
  Command Injection
Available in days
days after you enroll
  File Upload
Available in days
days after you enroll
  LFI & RFI
Available in days
days after you enroll
  Insecure Deserialization
Available in days
days after you enroll
  JWT Tokens
Available in days
days after you enroll

Note: to follow along with many of the exercises you will need a subscription to HackTheBox