WHY TWITCH?

Our channel on Twitch features Bug Bounty Live Passive Recon Techniques, Interviews, Hacking Tools Demos and Techniques for educational purposes, and more. At the moment we are not streaming but if you do subscribe you will gain access to over 100 live streams with over 1 hour+ each!

 
By subscribing to our Twitch Channel you get to watch unique content. Every Saturday you get to know about the latest and most important hacking tools that are demonstrated in a test environment and showcased in real-life scenarios helping Red Teams improve their skill. Every Sunday you get to know how we perform Live Passive Recon Bug Bounty on HackerOne, and Bugcrowd while updating a special GitHub Repo of our methodology, and integrating new techniques into the process. You can interact with us in real time. Hope to see you there!
 

BY SUBSCRIBING ON OUR TWITCH CHANNEL, YOU WILL FIND THE BELOW CONTENT

 

Episodes

 

  • How do QR Codes work and how hackers use them to generate malicious hidden links.
  • Write your own Code in Python using the Shodan API from your terminal to Automate Scans for Vulnerable Devices.
  • Crack Shadow hashes with JTR and Hashcat tool after getting root access on a Linux System.
  • Advanced brute-force on web forms that transmit data using the GET and POST methods with Patator tool.
  • Advanced Info Gathering, Recon, Data Mining, Footprinting and OSINT Forensic Analysis with Maltego.
  • How to find Advanced Identity Intelligence from a Phone Number using OSINT Tools with PhoneInfoga and Maltego.
  • How to Perform Directory Traversal Attacks, Fuzzing using Wfuzz and DirBuster.
  • No Secret Left Behind: Detecting Custom Secrets on GitHub using advanced techniques and tools for Pentesting and Bug Bounty.
  • How to use OWASP Amass more effectively for Bug Bounty using Advanced Methodologies.
  • Active vs Passive Recon. What are the differences and when to use each one effectively.
  • Write your own Persistent Backdoor and upload it to an Android Device using Kali Linux.
  • Write your Own Subdomain Enumeration Bash Script. The Offensive Security way for better Recon.
  • Top 10 things to do after installing a new Kali Machine.
  • Advanced Enumeration with Various Techniques on Metasploitable 2 on Kali Linux.
  • Advanced Post Exploitation and Cracking Hashes with Metasploit on Linux.
  • CrackMapExec – Owning the network with 1 Liner Powerful Commands and Advanced Post-Exploitation.
  • Website Penetration Testing using Metasploit Framework WMAP plugin and Manual Exploitation.
  • How to perform Manual and Stealthy Phishing Attacks with the Social Engineering Toolkit, Zphisher using Spoofing Techniques.
  • Create your own Kali VPS Server hosted on Google Cloud and more.
  • Capturing HTTPS, Bypassing HSTS traffic & Advanced MITM Attacks using Bettercap.
  • Advanced OSINT Techniques – Including Darknet Web Searches using Spiderfoot.
  • Bug Bounty Techniques to Scan for vulnerable libraries, json files using Intel’s CVE Binary Tool.
  • Browser Exploitation with BeEF Framework | Sophisticated Hacking and Social Engineering Attacks on the Browser.
  • Hacking with Armitage – Metasploit Unleashed.
  • Fuzzing and Advanced bruteforcing techniques with Wfuzz.
  • Finding Vulnerabilities, Exploiting and Hacking Techniques using Metasploit Pro Edition.
  • The Ultimate “All-in-One” Offensive Security Framework for Pentesters and Bug Bounty Hunters: Sn1per – By XeroSecurity.
  • Creating Fully Undetectable Payloads, Backdoors on Android, Windows Bypassing AVs using TheFatRat.
  • Twint – An Advanced Twitter Scraping and OSINT Tool, without using any API Keys.
  • Advanced Recon and Pentesting with Discover tool.

Also get to watch all our Previous Bug Bounty Episodes:

 

  • Live Recon on Twitter’s Bug Bounty Program.
  • Live Recon on Starlink’s Bug Bounty Program.
  • Live Recon on Airbnb’s Bug Bounty Program.
  • Live Recon on Mail.ru’s Bug Bounty Program.
  • Live Recon on Logitech’s Bug Bounty Program.
  • Live Recon on Playstation’s Bug Bounty Program.