Welcome! 🎉 We are excited as you are on the journey of the special membership course. Our objective on making this membership was to present all the ideas, new exclusive templates, custom burp extensions, chrome extensions, bash scripts, tools, internship opportunities, live interaction, anything we believe will be helpful for you and your career.


What is the best way to use this course?

This Membership course include access to a resource library, use the library as a repository for useful information, new templates, tools, or other resources that will aid you in learning and practicing.

As this will be members only you will be the first one to get a priority access to it, that is why we believe the word special supports the name of the course.

You also get access to discord student community where you can engage with the Instructor and like-minded peers.


What is included in this course?

This course includes different chapters and lessons inside it which will be the mix of course material like PDFs, videos, yaml templates,burp extensions, chrome extensions, bash scripts etc.

A description of the included lesson types:

Welcome to your resource library!

All About Nuclei - This chapter has the nuclei guide which contains the information from a beginners perspective on limitations of grep and other regex tools and motivation of using nuclei to avoid cumbersome.
It will also help one to understand the foundational working of the tool with simple and easy to write templates (patterns) for identifying Vulnerabilities.

Student will understand each block of template. Its writing process and will learn how to write his/her own templates in a easy and effective manner

Nuclei YAML Templates - This chapter contains the exclusive nuclei templates which are not available in the community repository of nuclei.

These templates will aid the student to hunt Vulnerabilities on programs with fresh templates which aren't available publically or atleast are not in the community repo.

There will be a breakdown of each template to understand how a vulnerability is exploited, its internal working, endpoints, and other parameters. So you know about each one instead of blindly scanning templates.

This will help the student to avoid duplicates and increase chances to identify and report valid vulnerabilities

Automation Bash Scripts - This chapter contains