Navigation X
ALERT
Click here to register with a few steps and explore all our cool stuff we have to offer!



   7532

Penetration Testing Professional (PTP) Version 5 | elearnsecurity

by none786 - 12 April, 2020 - 12:59 PM
This post is by a banned member (kakiyo3281) - Unhide
2
Posts
0
Threads
4 Years of service
#33
(12 April, 2020 - 12:59 PM)none786 Wrote: Show More
[/b]
Penetration Testing Professional

Section: System Security

Module 1 : Architecture Fundamentals
Module 2 : Assemblers, Debuggers and Tools Arsenal
Module 3 : Buffer Overflow
Module 4 : Shellcoding
Module 5 : Cryptography and Password Cracking
Module 6 : Malware

Section: Network Security

Module 1 : Information Gathering
Module 2 : Scanning
Module 3 : Enumeration
Module 4 : Sniffing & MITM
Module 5 : Vulnerability Assessment & Exploitation
Module 6 : Post Exploitation
Module 7 : Anonymity
Module 8 : Social Engineering

Section: PowerShell for Pentesters

Module 1 : Introduction
Module 2 : PowerShell Fundamentals
Module 3 : Offensive PowerShell
Section: Linux Exploitation

Module 1 : Introduction
Module 2 : Information Gathering
Module 3 : Exploitation Over the Network
Module 4 : Post Exploitation

Section: Web Application Security

Module 1 : Introduction
Module 2 : Information Gathering
Module 3 : Cross site scripting
Module 4 : SQL Injection
Module 5 : Other Common Web Attacks

Section: WiFi Security

Module 1 : Prerequisites
Module 2 : Environment setup
Module 3 : Wireless Standards and Networks
Module 4 : Discover Wi-Fi Networks
Module 5 : Traffic Analysis
Module 6 : Attacking Wi-Fi Networks
Module 7 : Wi-Fi as an attack vector

Section: Ruby for Pentesters and Metasploit

Module 1 : Ruby Basic: Installation and Fundamentals
Module 2 : Ruby Basic: Control structures
Module 3 : Ruby Basic: Methods, Variables and Scope
Module 4 : Ruby Advanced: Classes, Modules and Exceptions
Module 5 : Ruby Advanced: Pentester prerequisites
Module 6 : Ruby for Pentesters: Input / Output
Module 7 : Ruby for Pentesters: Network and OS interaction
Module 8 : Ruby for Pentesters: The Web
Module 9 : Ruby for Pentesters: Exploitation with Ruby
Module 10 : Ruby for Pentesters: Metasploit


Download Link :

Good stuff. Thanks
This post is by a banned member (trilolis) - Unhide
trilolis  
Registered
9
Posts
0
Threads
4 Years of service
#34
(12 April, 2020 - 12:59 PM)none786 Wrote: Show More
[/b]
Penetration Testing Professional

Section: System Security

Module 1 : Architecture Fundamentals
Module 2 : Assemblers, Debuggers and Tools Arsenal
Module 3 : Buffer Overflow
Module 4 : Shellcoding
Module 5 : Cryptography and Password Cracking
Module 6 : Malware

Section: Network Security

Module 1 : Information Gathering
Module 2 : Scanning
Module 3 : Enumeration
Module 4 : Sniffing & MITM
Module 5 : Vulnerability Assessment & Exploitation
Module 6 : Post Exploitation
Module 7 : Anonymity
Module 8 : Social Engineering

Section: PowerShell for Pentesters

Module 1 : Introduction
Module 2 : PowerShell Fundamentals
Module 3 : Offensive PowerShell
Section: Linux Exploitation

Module 1 : Introduction
Module 2 : Information Gathering
Module 3 : Exploitation Over the Network
Module 4 : Post Exploitation

Section: Web Application Security

Module 1 : Introduction
Module 2 : Information Gathering
Module 3 : Cross site scripting
Module 4 : SQL Injection
Module 5 : Other Common Web Attacks

Section: WiFi Security

Module 1 : Prerequisites
Module 2 : Environment setup
Module 3 : Wireless Standards and Networks
Module 4 : Discover Wi-Fi Networks
Module 5 : Traffic Analysis
Module 6 : Attacking Wi-Fi Networks
Module 7 : Wi-Fi as an attack vector

Section: Ruby for Pentesters and Metasploit

Module 1 : Ruby Basic: Installation and Fundamentals
Module 2 : Ruby Basic: Control structures
Module 3 : Ruby Basic: Methods, Variables and Scope
Module 4 : Ruby Advanced: Classes, Modules and Exceptions
Module 5 : Ruby Advanced: Pentester prerequisites
Module 6 : Ruby for Pentesters: Input / Output
Module 7 : Ruby for Pentesters: Network and OS interaction
Module 8 : Ruby for Pentesters: The Web
Module 9 : Ruby for Pentesters: Exploitation with Ruby
Module 10 : Ruby for Pentesters: Metasploit


Download Link :

amazing material mate, nice
This post is by a banned member (JohnGit) - Unhide
JohnGit  
Registered
23
Posts
0
Threads
4 Years of service
#35
Works great, glad its here !
This post is by a banned member (bigducky2) - Unhide
bigducky2  
Registered
33
Posts
0
Threads
4 Years of service
#36
you are the man
This post is by a banned member (gangstayogi) - Unhide
4
Posts
0
Threads
4 Years of service
#37
damn, this is what I've been looking for
This post is by a banned member (dipplow) - Unhide
dipplow  
Registered
21
Posts
0
Threads
4 Years of service
#38
here we go
This post is by a banned member (a7akosomk) - Unhide
a7akosomk  
Registered
5
Posts
0
Threads
4 Years of service
#39
ty htyuu
This post is by a banned member (rakun13) - Unhide
rakun13  
Registered
52
Posts
0
Threads
4 Years of service
#40
(12 April, 2020 - 12:59 PM)none786 Wrote: Show More
[/b]
Penetration Testing Professional

Section: System Security

Module 1 : Architecture Fundamentals
Module 2 : Assemblers, Debuggers and Tools Arsenal
Module 3 : Buffer Overflow
Module 4 : Shellcoding
Module 5 : Cryptography and Password Cracking
Module 6 : Malware

Section: Network Security

Module 1 : Information Gathering
Module 2 : Scanning
Module 3 : Enumeration
Module 4 : Sniffing & MITM
Module 5 : Vulnerability Assessment & Exploitation
Module 6 : Post Exploitation
Module 7 : Anonymity
Module 8 : Social Engineering

Section: PowerShell for Pentesters

Module 1 : Introduction
Module 2 : PowerShell Fundamentals
Module 3 : Offensive PowerShell
Section: Linux Exploitation

Module 1 : Introduction
Module 2 : Information Gathering
Module 3 : Exploitation Over the Network
Module 4 : Post Exploitation

Section: Web Application Security

Module 1 : Introduction
Module 2 : Information Gathering
Module 3 : Cross site scripting
Module 4 : SQL Injection
Module 5 : Other Common Web Attacks

Section: WiFi Security

Module 1 : Prerequisites
Module 2 : Environment setup
Module 3 : Wireless Standards and Networks
Module 4 : Discover Wi-Fi Networks
Module 5 : Traffic Analysis
Module 6 : Attacking Wi-Fi Networks
Module 7 : Wi-Fi as an attack vector

Section: Ruby for Pentesters and Metasploit

Module 1 : Ruby Basic: Installation and Fundamentals
Module 2 : Ruby Basic: Control structures
Module 3 : Ruby Basic: Methods, Variables and Scope
Module 4 : Ruby Advanced: Classes, Modules and Exceptions
Module 5 : Ruby Advanced: Pentester prerequisites
Module 6 : Ruby for Pentesters: Input / Output
Module 7 : Ruby for Pentesters: Network and OS interaction
Module 8 : Ruby for Pentesters: The Web
Module 9 : Ruby for Pentesters: Exploitation with Ruby
Module 10 : Ruby for Pentesters: Metasploit


Download Link :

Let's see

Create an account or sign in to comment
You need to be a member in order to leave a comment
Create an account
Sign up for a new account in our community. It's easy!
or
Sign in
Already have an account? Sign in here.


Forum Jump:


Users browsing this thread: 21 Guest(s)