• Earn real money by being active: Hello Guest, earn real money by simply being active on the forum — post quality content, get reactions, and help the community. Once you reach the minimum credit amount, you’ll be able to withdraw your balance directly. Learn how it works.

techniques

  1. dEEpEst

    SEC510: Cloud Security Controls and Mitigations 4GB 2025

    SEC510: Cloud Security Controls and Mitigations Today's organizations depend on complex, multicloud environments which must support hundreds of different services across multiple clouds. These services are often insecure by default and require substantially different methods to protect...
  2. dEEpEst

    Top 5 Tools & Techniques for Penetration Testing 2025-01-10

    About Course This course introduces the top five tools for penetration testing and bug bounties, providing practical knowledge for the information security industry. Participants will learn how to effectively use these tools in real-world scenarios. Course curriculum Nmap - The Network Mapper...
  3. itsMe

    RedTeam Tools - Tools and Techniques for Red Team / Penetration Testing

    Collection of 100+ tools and resources that can be useful for red teaming activities. Some of the tools may be specifically designed for red teaming, while others are more general-purpose and can be adapted for use in a red teaming context. Warning The materials in this repository are for...
  4. itsMe

    Python Penetration Testing Essentials: Techniques For Ethical Hacking With Python

    This book gives you the skills you need to use Python for penetration testing, with the help of detailed code examples. This book has been updated for Python 3.6.3 and Kali Linux 2018.1. Key Features     Detect and avoid various attack types that put the privacy of a system at risk    ...
  5. itsMe

    Phyton Mastering Advanced Python : Obfuscation Techniques

    Hide the code like a genius Description My name is Adnane Arrassen I have more than a half decade of experience in python programming and freelancing and I will be your teacher! In this course, you will learn advanced techniques for obfuscating Python code to make it more difficult to reverse...
  6. itsMe

    Linux Linux System Programming Techniques & Concepts

    For Developers - Build Linux Programmable Libraries, Makefiles, Memory Management, Compilation & Linking, C Programming Description There are already innumerable courses/tutorials on the internet/Udemy which teach almost every aspect of C programming language. All those courses sound the...
  7. itsMe

    PELoader: implement various shellcode injection techniques

    PELoader implement various shellcode injection techniques, and use libpeconv library to load encrypted PE files instead of injecting shellcode into remote thread. Following techniques were implemented:     Module Stomping (LoadLibrary)     Module Stomping (NtMapViewOfSection)     Transacted...
  8. dEEpEst

    What are password cracking techniques ?

    What are password cracking techniques ? Password crackers use two primary methods to identify correct passwords: brute-force and dictionary attacks. However, there are plenty of other password cracking methods, including the following: Brute force : This attack runs through combinations of...
  9. itsMe

    HostHunter v1.6 - discovering hostnames using OSINT techniques

    HostHunter A tool to efficiently discover and extract hostnames over a large set of target IP addresses. HostHunter utilizes simple OSINT techniques. It generates a CSV file containing the results of the reconnaissance. Features      Works with Python3      Extracts information from SSL/TLS...
  10. itsMe

    SEO TRAINING: Best SEO Techniques to Drive Traffic in 2021

    What you'll learn     *** NEW ***: Digital Insights From Top Women In Technology For 2021 And Beyond     It is 2021 - Find Out What You Need to Know TODAY! Effective SEO Strategies, You Can Not Afford to Ignore!     The Latest and BEST Actionable, Straightforward SEO Techniques for ON PAGE and...
  11. itsMe

    Top 5 Tools & Techniques for Ethical Hacking/Pentesting 2020

    What you'll learn     Ethical Hacking Techniques     Penetration Testing Techniques     Bug Bounty Techniques     Nmap     Burp Suite     Dirsearch     Google Hacking Database     Google Dorks     Github Recon     Shodan     Censys     HTTP Requests     XML to CSV for Recon     Decoy Scans...
  12. itsMe

    Practical Bug Bounty Techniques - Complete Course

    https://www.udemy.com/course/practical-bug-bounty-techniques-complete-course/ Descripción In this Course you will get hands on techniques in Bug Bounties which lot of hackers do on day to day life as full time or part time bug bounty hunter and will be covered from Basic to Advanced level more...
  13. itsMe

    GoPurple: shell code injection techniques

    This project is a simple collection of various shellcode injection techniques, aiming to streamline the process of endpoint detection evaluation, besides challenging myself to get into the Golang world. Hidden content
  14. dEEpEst

    Advanced Decision Making: Proven Techniques for Your Success

    Do you want to feel more confident with your decision making? When you look back over recent decisions in your life, studies or career, do you get a strong sense you could have done better? This course teaches a step-by-step, evidence-backed system for better decision making. There is no...
  15. dEEpEst

    ​​Top 10 Common Hacking Techniques All Beginners Should Know About

    Hidden content
Back
Top