Choose your pricing plan

  • Ethical Hacking

    8000₹
    Perfect for Beginners who are looking for weekly classes
    Valid for 5 weeks
    • Basics of Ethical Hacking
    • Module 1: Intro to Ethical Hacking
    • Module 2: Recon - Footprinting, Scanning and Enumeration
    • Module 3: Vulnerability Assessment and Penetration Testing
    • Module 4: Social Engineering and System Hacking
    • Module 5: Malware Threats
    • Module 6: Session, Cookie, IDS, IPS, Firewall and Honeypots
    • Module 7: Web Server and Application
    • Module 8: Wireless Network and Mobile Hacking
    • Module 9: IoT and Cloud Hacking
    • Module 10: Cryptography
  • Bug Bounty

    15000₹
    Perfect for one who wants to earn bounty through bugs
    Valid for 10 weeks
    • Learn Attacks that can get you Bounty
    • Module 1: Introduction
    • Module 2: Basic terminologies and Burp Suite
    • Module 3: Information Gathering
    • Module 4: SPF, DMARC and DKIM records (Mail Protection)
    • Module 5: URL Redirection
    • Module 6: Rate Limiting
    • Module 7: XSS(Cross Site Scripting)
    • Module 8: CSRF(Cross Site Request Forgery)
    • Module 9: CORS(Cross Origin Resource Sharing)
    • Module 10: IDOR(Insecure Direct Object Referencing)
    • Module 11: Host Header Injection
    • Module 12: Parameter Tampering
    • Module 13: RFI and LFI(Remote and Local File Inclusion)
    • Module 14: SSRF
    • Module 15: Sub Domain Takeover
    • Module 16: SQL Injection
    • Module 17: File Uploading
    • Module 18: XXE (XML External Entity)
    • Module 19: Source Code Review
    • Module 20: GitHub Recon
  • Android App Hacking

    10000₹
    Perfect for who wants to learn Android Application Hacking
    Valid for 5 weeks
    • Prerequisite: Knowledge about Android, Mobile Phones & OS
    • Module 1: Introduction to Android
    • Module 2: Setting up Environment for Penetration Testing
    • Module 3: Understand Android Manifest File
    • Module 4: Insecure Authorization & Authentication
    • Module 5: Insecure Data Storage
    • Module 6: Insufficient Cryptography
    • Module 7: Poor Code Quality
    • Module 8: Exploiting Debuggable Apps & Developer Backdoors
    • Module 9: Insecure Communication
    • Module 10: Client Side Injection & Improper Session Handling