Amaaaazing resource! As a self trained web sec tester sometimes I find that there are random missing spots in my knowledge (angular for eg.), and that sometimes burp academy drops the ball a little bit on ensuring these things are explained from the ground up. Your vid and explanation style are literally perfect for the way I learn and provide sooooo much detail all the way from no knowledge to completing a lab. You seriously thought of every relevant detail and your level of explanation comes across better than many lecturers I've had, your videos are seriously underrated and if the rest of your channel is anything like this Im sure there is SO much learning and information people (especially beginners) in the security space could gain from your channel. I don't usually comment but I felt like I had to just to let you know how *effective* and high quality your vids are, and to say keep up the good work, I seriously respect your dedication to making IT sec knowledge more accessible, and also just to thank you, you saved my ass on this lab 😭 Sorry for the paragraphs, hope the algorithm treats you well!
Bro, your videos are my favourite solutions for portswigger as you not only gives the solution but also explain in detail why. This is much much better than just giving the solution.
Best explanation for the lab I found till now. Thank you for the details. Hopefully you will release the next video "Reflected XSS with AngularJS sandbox escape and CSP" soon.
Another gem. Thanks for all the effort you put into your videos. Have you considered making a Udemy bug bounty training? I wouldn't mind paying for your work!
Amaaaazing resource!
As a self trained web sec tester sometimes I find that there are random missing spots in my knowledge (angular for eg.), and that sometimes burp academy drops the ball a little bit on ensuring these things are explained from the ground up.
Your vid and explanation style are literally perfect for the way I learn and provide sooooo much detail all the way from no knowledge to completing a lab.
You seriously thought of every relevant detail and your level of explanation comes across better than many lecturers I've had, your videos are seriously underrated and if the rest of your channel is anything like this Im sure there is SO much learning and information people (especially beginners) in the security space could gain from your channel.
I don't usually comment but I felt like I had to just to let you know how *effective* and high quality your vids are, and to say keep up the good work, I seriously respect your dedication to making IT sec knowledge more accessible, and also just to thank you, you saved my ass on this lab 😭
Sorry for the paragraphs, hope the algorithm treats you well!
Bro, your videos are my favourite solutions for portswigger as you not only gives the solution but also explain in detail why. This is much much better than just giving the solution.
What a beautiful explanation! Completely explained to the full and in depth!!!
Best explanation for the lab I found till now.
Thank you for the details.
Hopefully you will release the next video "Reflected XSS with AngularJS sandbox escape and CSP" soon.
Don't worry, will finish the playlist
thank you so much, your detailed explanations is what keeps me from bashing my head, you're an excellent tutor!
Amazing tutor, bro. Thank you very much and keep up the great work 🤩🥰
Man I really love your videos! Your description of a solution is so comprehensive! Thank you for your efforts you are really good teacher!
0% Music
0% Naked Women
0% Alcohol
100% Great Explanation
Thanks for the detailed explanations. \o/
Another gem. Thanks for all the effort you put into your videos. Have you considered making a Udemy bug bounty training? I wouldn't mind paying for your work!
Thanks for explanation 🙏 I honestly can’t understand how you know all this stuff and how can a regular human being know something like this 😅
How did you know the version of angular this lab using is 1.4.4 ????
Thanks for the sharing, Mr. z3nsh3ll
Please make more videos
🙏👏
super
This exploit work in Chrome but not in firefox