exploitation

  1. protectaccount

    Pentester Academy – Offensive Internet of Things IoT Exploitation

    01-Introduction to IoT Security 02-Mapping Attack surface and previous vulnerabilities 03-Firmware analysis – Identifying hardcoded secrets 04-Emulating firmware binary 05-Backdooring a firmware – 1 09-Using Burp for IoT Web app security 10-Exploiting Command Injection – Part 1 12-CSRF and...
  2. protectaccount

    Windows Kernel Exploitation Foundation | HackSys

    Dive into the core of Windows Kernel with our foundational training, setting the stage for advanced exploitation techniques This is a beginner-friendly course that aims to teach you the fundamentals of kernel exploitation, including how to find and exploit common bugs in Windows kernel mode...
  3. protectaccount

    Exploitation and Post-exploitation with Metasploit

    In today’s crazy world of threats, understanding how to exploit and leverage vulnerabilities is crucial for effective penetration testing. In this course, Exploitation and Post-exploitation with Metasploit, you’ll learn how to exploit known vulnerabilities using the Metasploit Framework and...
  4. SudoDragon

    Ethical Hacking: Windows Exploitation Basics

    YOU NEED AN ACCOUNT TO UNLOCK THIS DOWNLOAD. CLICK HERE TO SIGN UP! Name: Ethical Hacking - Windows Exploitation Basics Language: English Download: Hidden content
  5. NinjaNet

    The art of exploitation [PDF]

    Attention this direct URL disable your javascript before you proceed to stay safe otherwise you can do it without disable javascript just a tip for your privacy Hidden content
Top