This post is by a banned member (MiNdFuCkErY_1337skid) - Unhide
OP 02 May, 2020 - 02:29 PM
Reply
Code:
[b][b][img]https://i.imgur.com/SRbqijV.jpg[/img]
Penetration Testing Professional[/b]
Section: System Security
Module 1 : Architecture Fundamentals
Module 2 : Assemblers, Debuggers and Tools Arsenal
Module 3 : Buffer Overflow
Module 4 : Shellcoding
Module 5 : Cryptography and Password Cracking
Module 6 : Malware
Section: Network Security
Module 1 : Information Gathering
Module 2 : Scanning
Module 3 : Enumeration
Module 4 : Sniffing & MITM
Module 5 : Vulnerability Assessment & Exploitation
Module 6 : Post Exploitation
Module 7 : Anonymity
Module 8 : Social Engineering
Section: PowerShell for Pentesters
Module 1 : Introduction
Module 2 : PowerShell Fundamentals
Module 3 : Offensive PowerShell
Section: Linux Exploitation
Module 1 : Introduction
Module 2 : Information Gathering
Module 3 : Exploitation Over the Network
Module 4 : Post Exploitation
Section: Web Application Security
Module 1 : Introduction
Module 2 : Information Gathering
Module 3 : Cross site scripting
Module 4 : SQL Injection
Module 5 : Other Common Web Attacks
Section: WiFi Security
Module 1 : Prerequisites
Module 2 : Environment setup
Module 3 : Wireless Standards and Networks
Module 4 : Discover Wi-Fi Networks
Module 5 : Traffic Analysis
Module 6 : Attacking Wi-Fi Networks
Module 7 : Wi-Fi as an attack vector
Section: Ruby for Pentesters and Metasploit
Module 1 : Ruby Basic: Installation and Fundamentals
Module 2 : Ruby Basic: Control structures
Module 3 : Ruby Basic: Methods, Variables and Scope
Module 4 : Ruby Advanced: Classes, Modules and Exceptions
Module 5 : Ruby Advanced: Pentester prerequisites
Module 6 : Ruby for Pentesters: Input / Output
Module 7 : Ruby for Pentesters: Network and OS interaction
Module 8 : Ruby for Pentesters: The Web
Module 9 : Ruby for Pentesters: Exploitation with Ruby
Module 10 : Ruby for Pentesters: Metasploit[/b]
Hidden Content
You must
register or
login to view this content.
LIKE+REP IF YOU WANT ME TO BE A CONTRIBUTOR
DONATE BTC -
1HdbjkNwgK24XHJKw8ggB2ZL7GNC6W7z9V
This post is by a banned member (Anonymous22) - Unhide
02 May, 2020 - 03:00 PM
Reply
This post is by a banned member (S107) - Unhide
02 May, 2020 - 05:10 PM
Reply
This post is by a banned member (Emow77) - Unhide
03 May, 2020 - 12:30 AM
Reply
(02 May, 2020 - 02:29 PM)MiNdFuCkErY_1337skid Wrote: Show MoreCode:
[b][b][img]https://i.imgur.com/SRbqijV.jpg[/img]
Penetration Testing Professional[/b]
Section: System Security
Module 1 : Architecture Fundamentals
Module 2 : Assemblers, Debuggers and Tools Arsenal
Module 3 : Buffer Overflow
Module 4 : Shellcoding
Module 5 : Cryptography and Password Cracking
Module 6 : Malware
Section: Network Security
Module 1 : Information Gathering
Module 2 : Scanning
Module 3 : Enumeration
Module 4 : Sniffing & MITM
Module 5 : Vulnerability Assessment & Exploitation
Module 6 : Post Exploitation
Module 7 : Anonymity
Module 8 : Social Engineering
Section: PowerShell for Pentesters
Module 1 : Introduction
Module 2 : PowerShell Fundamentals
Module 3 : Offensive PowerShell
Section: Linux Exploitation
Module 1 : Introduction
Module 2 : Information Gathering
Module 3 : Exploitation Over the Network
Module 4 : Post Exploitation
Section: Web Application Security
Module 1 : Introduction
Module 2 : Information Gathering
Module 3 : Cross site scripting
Module 4 : SQL Injection
Module 5 : Other Common Web Attacks
Section: WiFi Security
Module 1 : Prerequisites
Module 2 : Environment setup
Module 3 : Wireless Standards and Networks
Module 4 : Discover Wi-Fi Networks
Module 5 : Traffic Analysis
Module 6 : Attacking Wi-Fi Networks
Module 7 : Wi-Fi as an attack vector
Section: Ruby for Pentesters and Metasploit
Module 1 : Ruby Basic: Installation and Fundamentals
Module 2 : Ruby Basic: Control structures
Module 3 : Ruby Basic: Methods, Variables and Scope
Module 4 : Ruby Advanced: Classes, Modules and Exceptions
Module 5 : Ruby Advanced: Pentester prerequisites
Module 6 : Ruby for Pentesters: Input / Output
Module 7 : Ruby for Pentesters: Network and OS interaction
Module 8 : Ruby for Pentesters: The Web
Module 9 : Ruby for Pentesters: Exploitation with Ruby
Module 10 : Ruby for Pentesters: Metasploit[/b]
THanks for the info!
This post is by a banned member (lionducap) - Unhide
08 May, 2020 - 06:49 PM
Reply
if thats working im shitting in my pants
This post is by a banned member (meaculpa) - Unhide
08 May, 2020 - 11:53 PM
Reply
great share, should be a nice one to work through !
This post is by a banned member (T3RR0R) - Unhide
09 May, 2020 - 03:33 AM
Reply
This post is by a banned member (sinistergeek) - Unhide
23 May, 2020 - 08:33 PM
Reply
let's see the share !! THank YOU