• Join CraxPro and earn real money through our Credit Rewards System. Participate and redeem credits for Bitcoin/USDT. Start earning today!
    Read the detailed thread here
  1. Khali-Qot

    SQL Injections | SQLi Web Attacks

    *** Hidden text: You do not have sufficient rights to view the hidden text. Visit the forum thread! ***
  2. mayoufi

    Defending Against JavaScript Keylogger Attacks on Payment Card Information

    Defending Against jаvascript Keylogger Attacks on Payment Card Information Duration: 1h 3m | .MP4 1280x720, 30 fps(r) | AAC, 48000 Hz, 2ch | 332 MB Genre: eLearning | Language: English In this course, you'll learn how about the most common attack now used to steal payment card data and the...
  3. Turin888

    Mailer Sender Verifier Protect Yourself from Phishing Attacks !

    🔒 What is Phishing? Phishing is a type of cyber attack where scammers pretend to be legitimate organizations (such as banks, social networks, or well-known websites) to steal personal information like account credentials, passwords, or credit card details. 🚨 Signs of a Phishing Email/Website...
  4. drudown500

    Phishing attacks

    How to Defend Yourself from Phishing Attacks Phishing attacks are one of the most common cybersecurity threats that individuals and organizations face today. These attacks typically involve tricking users into revealing sensitive information, such as passwords, bank details, or personal...
  5. muuaz324

    Udemy - ARP Spoofing And MITM Attacks

    Download Link : https://mega.nz/file/5TNWGQRJ#rF753MqDBBzPdQK7h8fc6_W7OnxXVIHpBkUQaCFuoOY Pasword : @Codex
  6. carxproveteran

    Identify and Prevent Phishing Attacks: Before They Harm You

    Identify and Prevent Phishing Attacks: Before They Harm You Cyber Security Training: Easily Identify E-mail and Mobile Scams BEFORE your corporate or personal data is breached! Current Price: Free Discount: 100% off Original Price: $19.99 What you will learn: What are Phishing Attacks How To...
  7. manocat

    Identify and Prevent Phishing Attacks: Before They Harm You - Udemy

    Identify and Prevent Phishing Attacks: Before They Harm You Cyber Security Training: Easily Identify E-mail and Mobile Scams BEFORE your corporate or personal data is breached! What you will learn: What are Phishing Attacks How To Identify Phishing Attack What Are Different Sources of Phishing...
  8. stanley24

    Program a $6 NodeMCU to Detect Wi-Fi Jamming Attacks in the Arduino IDE

    Link: *** Hidden text: You do not have sufficient rights to view the hidden text. Visit the forum thread! ****** Hidden text: You do not have sufficient rights to view the hidden text. Visit the forum thread! ***
  9. D

    A Deep Dive into DDoS Attacks: Mechanisms and Mitigation Strategies

    Distributed Denial of Service (DDoS) attacks are a persistent and evolving threat in the cybersecurity landscape. These attacks aim to disrupt the normal functioning of a targeted service, server, or network by overwhelming it with a flood of traffic. This article provides a comprehensive...
  10. minsugod

    DHCP Starvation Attack Tut

    DHCP Starvation Attack Dynamic Host Configuration Protocol (DHCP) is a protocol used to automatically allocate communication information, such as IP, subnet mask, gateway, DNS server IP, and so on. Let's say the DHCP server has 100 IPs from IP Pool, for example, 192.168.0.1/24 to...
  11. error0001

    Multi/Others Network Attacks and Exploitation - A Framework

    Network Attacks and Exploitation - A Framework *** Hidden text: You do not have sufficient rights to view the hidden text. Visit the forum thread! ***
  12. evamursloon

    🔒 Password Attacks

    Crack passwords and create wordlists. John the Ripper (https://github.com/magnumripper/JohnTheRipper) 🧑🏻‍💻 C 🖥 Linux/Windows/macOS ☄️ John the Ripper is a fast password cracker. hashcat (https://github.com/hashcat/hashcat) 🧑🏻‍💻C 🖥Linux/Windows/macOS ☄️World's fastest and most advanced password...
  13. D

    HTTP/s Http/s Proxies List Updated 100 % working with 2024 Attacks

    HTTP/s Proxy List TxT File link is Above Please replay To thread to see the link and proxy list You can also check the list as below OR DIRECT MEGA NZ DOWNLOAD LINK IS HERE Link: *** Hidden text: You do not have sufficient rights to view the hidden text. Visit the forum thread! ***
  14. carxproveteran

    Identify and Prevent Phishing Attacks: Before They Harm You

    Identify and Prevent Phishing Attacks: Before They Harm You Cyber Security Training: Easily Identify E-mail and Mobile Scams BEFORE your corporate or personal data is breached! Current Price: Free Discount: 100% off Original Price: $44.99 What you will learn: What are Phishing Attacks How To...
  15. carxproveteran

    Identify and Prevent Phishing Attacks: Before They Harm You

    Identify and Prevent Phishing Attacks: Before They Harm You Cyber Security Training: Easily Identify E-mail and Mobile Scams BEFORE your corporate or personal data is breached! Current Price: Free Discount: 100% off Original Price: $44.99 What you will learn: What are Phishing Attacks How To...
  16. mm991

    Understanding Common Kernel Attacks

    The kernel, the core component of an operating system, is a prime target for attackers seeking to gain control over a system. Kernel attacks exploit vulnerabilities in this critical layer of software to execute malicious code and compromise the integrity and security of a system. Several common...
  17. tronny

    Udemy - BotNet BootCamp Types Architectures Attacks and Defense

    Udemy - BotNet BootCamp Types Architectures Attacks and Defense 11-2022, by Michael Goedeker *** Hidden text: You do not have sufficient rights to view the hidden text. Visit the forum thread! ***
  18. ALFA16

    DDoS Attacks of any kind

    Link: *** Hidden text: You do not have sufficient rights to view the hidden text. Visit the forum thread! ****** Hidden text: You do not have sufficient rights to view the hidden text. Visit the forum thread! ***
  19. tronny

    Udemy - BotNet BootCamp - Types, Architectures, Attacks and Defense

    Udemy - BotNet BootCamp - Types, Architectures, Attacks and Defense 11-2022, by Michael Goedeker *** Hidden text: You do not have sufficient rights to view the hidden text. Visit the forum thread! ***
  20. Ensiha

    OFFSEC WEB-300: Advanced Web Attacks and Exploitation OSWE

    https://mega.nz/folder/8jVzXbga#qW3HwDv4pBMPFb1ALHl7oQ WEB-300 OSWE Lessons + Videos
  21. T4rgon

    All About DDoS Attacks - Become a DDoS Guru! Complete Course [English]
    4.00 star(s) 1 Rating

    Link : *** Hidden text: You do not have sufficient rights to view the hidden text. Visit the forum thread! ***
  22. literaerik

    ALL ABOUT DDOS ATTACKS - BECOME A DDOS KING ! COMPLETE COURSE [ENGLISH]

    Introduction & Definitions TCP-IP Model Physical & Data Link Network Access Layer Full Explanation TCP-IP Model Internet (Network) Layer Full Explanation TCP-IP Model Transport Layer Full Explanation TCP-IP Model Transport Layer TCP Full Explanation TCP-IP Model Transport Layer UDP Full...
  23. NoneKnowofMI6

    Brute Tools - Password Attacks

    Default Passwords: The first thing to check during a password attack, credentials by default. For example, if we perform a penetration test and access the management web interface of a CISCO router, we must verify that the default identifiers have been changed. Which is often not the case. Here...
  24. tronny

    iSecur1ty - ARP spoofing & MITM Attacks

    iSecur1ty - ARP spoofing & MITM Attacks *** Hidden text: You do not have sufficient rights to view the hidden text. Visit the forum thread! ***
  25. mayoufi

    Identify and Prevent Phishing Attacks: Before They Harm You

    Identify and Prevent Phishing Attacks: Before They Harm You Published 3/2024 Created by Luxmi Narayan MP4 | Video: h264, 1280x720 | Audio: AAC, 44.1 KHz, 2 Ch Genre: eLearning | Language: English | Duration: 9 Lectures ( 32m ) | Size: 175 MB Cyber Security Training: Easily Identify E-mail and...
  26. lovewarez

    Identify and Prevent Phishing Attacks: Before They Harm You

    Identify and Prevent Phishing Attacks: Before They Harm You Published 3/2024 Created by Luxmi Narayan MP4 | Video: h264, 1280x720 | Audio: AAC, 44.1 KHz, 2 Ch Genre: eLearning | Language: English | Duration: 9 Lectures ( 32m ) | Size: 175 MB Cyber Security Training: Easily Identify E-mail and...
  27. amieyellow

    OFFSEC PEN-210: Foundational Wireless Network Attacks OSWP

    PEN-210 OSWP (former WiFu) Lessons + Videos https://mega.nz/folder/8jVzXbga#qW3HwDv4pBMPFb1ALHl7oQ
  28. amieyellow

    OFFSEC WEB-300: Advanced Web Attacks and Exploitation OSWE

    WEB-300 OSWE Lessons + Videos https://mega.nz/folder/8jVzXbga#qW3HwDv4pBMPFb1ALHl7oQ
  29. tronny

    InfosecInstitute - Commonly Used Attacks

    InfosecInstitute - Commonly Used Attacks *** Hidden text: You do not have sufficient rights to view the hidden text. Visit the forum thread! ***
  30. clique

    WEB-300: Advanced Web Attacks and Exploitation Book

    LINK Advanced Web Attacks and exploitation (WEB-300) is an advanced web application security course that teaches the skills needed to conduct white box web app penetration tests. Learners who complete the course and pass the exam earn the OffSec Web Expert (OSWE) certification and will...
  31. dociran259@notedns.c

    Brute stop brute force SSH attacks

    Download: https://github.com/vesche/block-a-brute $ ./block-a-brute.py --help usage: block-a-brute.py [-h] [-w WHITELIST] [-l LOG] [-y] block-a-brute - block SSH bruteforcers optional arguments: -h, --help show this help message and exit -w WHITELIST, --whitelist WHITELIST...
  32. mayoufi

    The Gnomon Workshop - Animating First and Third

    Brad Faucheux | Duration: 9:30 h | Video: H264 1920x1080 | Audio: AAC 48 kHz 2ch | 1,93 GB | Language: English If you want to know what goes into animating an FPS game, look no further. In this comprehensive workshop, Senior Cinematic Animator Brad Faucheux will take you step by step from...
  33. C

    XSS Attacks - Cross Site Scripting Exploits and Defense 💼

    https://mega.nz/file/3XJCyD5C#qAda14pWUjd5u4wjOYmzCI52UMa1rUFulh7V0kBGZk8
  34. carxproveteran

    Strokes disable. Heart attacks/strokes also kill - thousands

    Strokes disable. Heart attacks/strokes also kill - thousands Heart attacks/strokes kill ten times as many as COVID-19. Prevent the attacks before they happen. What you'll learn 1. Identify risk factors for a stroke 2. Take action to reduce their chances of getting a stroke Live life more...
  35. regap14

    Login:Pass 🛡️ Guarding Your Website from DDoS Attacks: Tips and Tactics 🚀 2024

    🛡️ Guarding Your Website from DDoS Attacks: Tips and Tactics 🚀 In the digital age, safeguarding your website against threats is paramount. Among the numerous threats out there, Distributed Denial of Service (DDoS) attacks stand as one of the most pervasive and disruptive. These attacks can...
  36. tronny

    AlteredSecurity - AD CS Attacks for Red and Blue Teams, by Nikhil Mittal

    AlteredSecurity - AD CS Attacks for Red and Blue Teams, by Nikhil Mittal *** Hidden text: You do not have sufficient rights to view the hidden text. Visit the forum thread! ***
  37. f3d0m43ver

    Windows APT Warfare Identify and prevent WIndows APT - EPUB

    Windows APT Warfare Identify and prevent WIndows APT attacks effectively (Sheng-Hao Ma) - EPUB Learn Windows system design from the PE binary structure to modern and practical attack techniques used by red teams to implement advanced prevention Key Features Understand how malware evades modern...
  38. mayoufi

    Social Engineering: 13 Social Engineering attacks explained!

    Duration: 41m | Video: .MP4, 1920x1080 30 fps | Audio: AAC, 48 kHz, 2ch | Size: 188 MB Genre: eLearning | Language: English Complete Social Engineering course thought within ONE HOUR by EXPERT! HUMINT | Cyber security | CISO | Ransomware What you'll learn Identify the most common social...
  39. jain

    PEN-210: Foundational Wireless Network Attacks | OffSec 2023

    https://teraboxapp.com/s/1BMXzZdTNTXzEkrAZmhylxA
  40. carxproveteran

    CompTIA Security+ SY0-601 Practice Test

    CompTIA Security+ SY0-601 Practice Test Comprehensive Practice Test for CompTIA Security+ SY0-601: Master the skills to combat attacks. Description Are you looking to ace the CompTIA Security+ SY0-601 exam and demonstrate your proficiency in cybersecurity? Look no further! This comprehensive...
  41. carxproveteran

    Cognitive Behavioural Therapy (CBT) for Anxiety, Depression

    Cognitive Behavioural Therapy (CBT) for Anxiety, Depression Heal yourself from Anxiety, Depression, Trauma, Phobias and Panic Attacks with CBT What you'll learn What is CBT How CBT Conducted How does CBT Treat Anxiety What is the effectiveness of CBT for anxiety CBT exercise for anxiety to try...
  42. tronny

    INE - Web Application Penetration Testing File & Resource Attacks

    INE - Web Application Penetration Testing File & Resource Attacks 9-2023, by Alexis Ahmed *** Hidden text: You do not have sufficient rights to view the hidden text. Visit the forum thread! ***
  43. carxproveteran

    Facing Cyber Threats: 7 Consequences and 11 Myths Exposed

    Facing Cyber Threats: 7 Consequences and 11 Myths Exposed Gaining Awareness of the Realworld Outcomes of Attacks while Debunking Prevalent Myths in Cybersecurity What you'll learn What are some common consequences of a cyber attack? What are the common cyber threats? What are the various...
  44. p222prakash

    What is Social Engineering? Attacks, Techniques & Prevention (Episode 1)

    What is Social Engineering? Social engineering is the art of manipulating users of a computing system into revealing confidential information that can be used to gain unauthorized access to a computer system. The term can also include activities such as exploiting human kindness, greed, and...
  45. oiun098

    Unleashing the Power: Brute Force Attacks in Cryptography

    Today, we delve into the exhilarating realm of brute force attacks, where codes crumble beneath our relentless pursuit. In this topic, we will focus on mastering the art of breaking codes through brute force methods. Brace yourselves for an adrenaline-fueled descent into the depths of...
  46. carxproveteran

    Social Engineering: 13 Social Engineering attacks explained!

    Social Engineering: 13 Social Engineering attacks explained! Complete Social Engineering course thought within ONE HOUR by EXPERT! HUMINT | Cyber security | CISO | Ransomware What you'll learn Identify the most common social engineering attacks (no coding!) Explain the threat, impact and...
  47. killua97

    Ethical Hacking: Man in the Middle Attacks Basic to Advance

    What you'll learn What is MitM Attack? Types of MitM Attacks How to gather Network Information Basics of WireShark ARP Poisoning Attacks Advance Level ARP Poisoning Attacks Complete System Control through MitM Session Hijacking Attack DNS Spoofing Attack Fake Access Point Attack How to Detect...
  48. tronny

    EC-Council - Securing Your Network from Attacks, by Jeff Minakata

    EC-Council - Securing Your Network from Attacks, by Jeff Minakata *** Hidden text: You do not have sufficient rights to view the hidden text. Visit the forum thread! ***
  49. tronny

    EC-Council - Hands-On Password Attacks and Security, by Zanidd

    EC-Council - Hands-On Password Attacks and Security, by Zanidd *** Hidden text: You do not have sufficient rights to view the hidden text. Visit the forum thread! ***
  50. tronny

    EC-Council - Common Cybersecurity Attacks and Defense Strategies

    EC-Council - Common Cybersecurity Attacks and Defense Strategies, by Lisa Gilbert *** Hidden text: You do not have sufficient rights to view the hidden text. Visit the forum thread! ***
Top Bottom