Payment Options (Indian Students)

Below checkout is only for Indian Students.

Students outside India can pay via Paypal from above Buy $2 Button or at checkout page.

Pay with UPI, Credit & Debit Card

NOTE : You will not see the course onto the dashboard instantly. Enrolment process will take up to 2 hrs from the purchase time.

If you are not able to access after 24 hrs of purchase please write us at [email protected] attaching your transaction id  or reach out to us on WhatsApp for instant support +91-8160206309 / +91 9106147779


Course curriculum

  • 1


    • Introduction

    • Disclaimer

    • Course Future Updates

    • Future Updates

  • 2

    Setting up Environment

    • Burp Suite Proxy Lab Setup

  • 3

    Bugcrowd VRT

    • Bugcrowd VRT 1

    • BugCrowd VRT 2

  • 4

    Subdomain Takeovers

    • What are Subdomains

    • What is DNS

    • Subdomain Enum

    • Fastest Resolver

    • What are DNS Records

    • Sublister

    • Findomain

    • Subfinder

    • Recursive Subdomain Enumeration

    • Can I take over XYZ

    • Can I take over ALL XYZ

    • AWS Live -1

    • AWS Live -2

    • AWS Bugcrowd Report Breakdown

    • Tumblr

    • Shopify

  • 5

    Local File Inclusion

    • What is LFI

    • LFI Exploitation on Lab

    • LFI Exploitation on Live -1

    • LFI Exploitation Live -2

    • LFI Exploitation LFi to RCE

    • LFI vs RFI

  • 6

    SQL Injection

    • SQL Injection Background Concept

    • SQL vs Spreadsheets

    • SQL Database Importance

    • SQL Practical Hands on - First Table

    • SQL Practical Hands on - Queries

    • SQL Practical Hands on - Second Table

    • SQL Practical Hands on - Exercise

    • Truth Table

    • Truth Table Practical

    • SQL Understanding the Logic

    • SQL Query Breakdown

    • SQL Injection Impact & Approach

    • SQLi on Lab-1

    • SQL Query Breakdown payload-2

    • SQLi on Lab-2

    • Burp suite Web Academy

    • SQLi Labs Data Retrieval Lab

    • SQLi Labs Data Retrieval Live

    • SQLi Login Bypass Lab

    • SQLi Login Bypass Live 1

    • SQLMap Installation & Setup

    • SQLMap Exploitation - Live 2

    • SQLMap Exploitation - Live 3

    • Shell Exploitation Techniques

    • SQL : Shell Exploitation - Live 4

  • 7

    HTML Injection

    • What is HTML

    • Understanding HTML

    • HTML

    • HTML Injection - Lab

    • HTML Injection Live-1

  • 8

    Click Jacking

    • Click Jacking Live-1

    • Click Jacking Live-2

    • Click Jacking Live-3

    • Click Jacking Live-4

    • Clickjacking Exploitation

    • Clickjacking Live Target Exploitation

    • Clickjacking Automation Live Target Exploitation

    • Clickjacking - ClickBandit with Burpsuite

  • 9

    Broken Link Hijacking

    • Introduction & Background Concept

    • BLH Exploitation Practical

    • BLH Exploitation Tool

    • BLH Instagram Report Breakdown

    • BLH Exploitation Practical Live

    • BLH Hackerone Report Breakdown

    • BLH Practical Tool Resource

    • BLH Exploitation Practical Extension Tool

  • 10


    • SSRF Introduction & Principle

    • SSRF Practical

    • SSRF Bincatcher Listener

    • SSRF against Server Itself

    • SSRF against another Backend Server

    • SSRF Bypass Protection Blacklist Filter

    • SSRF Bypass Protection Whitelist Filter

    • SSRF Chaining with Open Redirect and Bypass Filter

    • SSRF Exploitation using MPEG - Live

    • SSRF Exploitation JIRA chaining with XSS - Live

    • SSRF Exploitation JIRA chaining with XSS - Live

    • SSRF Exploitation JIRA Automation with Python

    • SSRF Facebook Breakdown

    • SSRF Microstrategy Live -1

    • SSRF PHP Filter Live

    • SSRF PHP Filter Wordpress Config Live

  • 11

    How to start with Bug Bounty Platforms and Reporting

    • BugCrowd ROADMAP

    • Hackerone ROADMAP

    • Open Bug Bounty ROADMAP

    • NCIIPC Govt of India ROADMAP

    • RVDP All Websites ROADMAP

    • Synack ROADMAP

    • Intigriti ROADMAP

  • 12

    Bug Bounty / Penetration Testing Reporting Templates

    • Reporting Templates - We have your back!

  • 13

    Remote Code Execution

    • Apache Unomi RCE Live

  • 14

    Snapshot of Ethical hacking bug bounty V2

    • New Features of Burpsuite Community 2023.7

    • Snapshot of SQL injection


Founder at Hacktify Cyber Security

Shifa Cyclewala

I am Shifa Cyclewala the Founder of Hacktify Cyber Security I am into Cyber Security Training for many years. Students have loved our courses and given 5 ★ Ratings and made Bestseller across Mumbai My students have been in the Top 15 Cyber Security Researchers of India twice in a Row. Apart from training's, I'm a Security researcher and a Mobile Application Developer. I have worked for all the topmost international schools of India as a technical Instructor. I have worked with Software development Companies into their development team ZingHR was the last Organization i worked with. I am Working towards development of Women in Cyber security and • Presented Cyber security awareness sessions in many colleges across Mumbai • Trained more than 1000+ individuals in Cyber Security • Conducted more than 50 workshops panIndia • Invited as Keynote speaker at Rohidas Management Studies, A.E Khalsekar College, DY Patil College, Shah and Anchor Engineering College, KJ Somaiya etc.. • Invited as a Key Speaker at Women in Cyber Security (WCS) and Infosec Girls

Founder at Hacktify Cyber Security

Rohit Gautam

I am Rohit Gautam the CEO & Founder of Hacktify Cyber Security I am into Cyber Security Training for many years. Students have loved my courses and given 5 ★ Ratings and made Bestseller. My students have been in the Top 15 Cyber Security Researchers of India twice in a Row. Apart from training's, I'm a security researcher with special interest in network exploitation and web application security analysis and Red Teaming I have worked for all the topmost banks of India in their VAPT Team. I have worked with ICICI, Kotak, IDFC bank I have also experience working with NSDL and some financial organizations like Edelweiss I have worked on many private projects with NTRO & Govt of India. I was acknowledged with Swag, Hall of Fame, Letter Of Appreciation, and Monetary rewards by Google, Facebook, Conclusion, Seek, Trip Advisor, Riddlr, Hakon, Acorns, Faasos, and many more companies for finding out vulnerabilities in their organization and responsibly reporting it.

Some of our happy students

Placed at KPMG (Security Consultant)

Ronit Bhatt

One of THE BEST courses available to get started in bug bounty hunting. The live website practicals just makes it even more easier to learn and grasp the concepts. !!!! Very well explained and designed.

Placed at Progist (Threat Hunter)

Kartik Adak

One of the best courses for Pentesting & Bug Bounty Hunting, There was always constant support for any doubts and the in depth practicals on live targets made it more easier to understand the fundamentals.

Placed at (Security Consultant)

Pranav Bhandari

Amazing course on bug bounty and ethical hacking. No other course has come up with live practical attacks on Owasp's as I have seen. Yes recommended to other students,professional as well. Awesome :)

Placed at Progist (Security Consultant)

Jerry Nissan

Even a Zero experienced one can understand so clearly. Well and clearly explained. Recommend to a beginner and advance level too


Frequently asked questions

  • How long is the course access?

    You will have access for 365 days.

  • Does this course contain live practicals?

    Yes, we have curated the course content with live simulations of practicals which is 100% inclined practicals with industry standards.

  • Can I get a Internship/Hall of Fame/ Bounty with this course?

    Yes, most of our students who have enrolled the course has been successful and have been acknowledged with many HoF, Bounties, Internships & Jobs. Don't take our words check our Linkedin Handle for student reviews and their acknowledgements -

  • Will I get a certificate?

    Yes you will be awarded with completion certificate at the end of each courses