Day-1 Intro

Day-2 Choosing a BBP

Day-3 OWASP Top 10, Broken Web Application & Metasploitable

Day-4 Burp

Day-5 Live Recon For Gathering All Information

Day-6 Shodan

Day-7 Subdomain Finding

Day-8 Directory Bruteforce, Screenshot, More Subdomains

Day-9 Setup AWS Cloud

Day-10 Subdomain Takeover

Day-11 Cheaper VPS/Cloud, How To Setup Digital Ocean

Day-12 - Sensitive Data From Java Script Files, Live Recon

Day-13 - GitHub Recon & Sensitive Data Exposure

Day-14 - Finding Misconfigured AWS s3 Bucket

Day-15 - Scanning Targets For Open Ports & Services

Day-16 - Nmap For Bug Bounty

Day-17 - Nmap Advanced For Bug Bounty

Day-18 - XSS/Cross Site Scripting Vulnerability

Day-19 - Finding XSS Automated and Manual Way