1. CALAMA24

    Course/Tutorial 📚✏️Udemy Rresource- 📚✏️ 700-680: Cisco Data Center Unified Computing Sale Specialist 100% OFF

    “Empowering Sales Success: Strategies for Selling Cisco Unified Computing Solutions” Link: *** Hidden text: You do not have sufficient rights to view the hidden text. Visit the forum thread! ***
  2. CALAMA24

    Course/Tutorial 📚✏️Udemy Rresource- 📚✏️ Ethical Hacking: Network Exploitation Basics 100% OFF

    Hack Servers and Install a Backdoor Link: *** Hidden text: You do not have sufficient rights to view the hidden text. Visit the forum thread! ***
  3. mayoufi

    Exploitation and Post-exploitation with Metasploit

    Exploitation and Post-exploitation with Metasploit Duration: 31m | .MP4 1280x720, 30 fps(r) | AAC, 48000 Hz, 2ch | 85 MB Genre: eLearning | Language: English This course teaches you how to exploit and maintain access to vulnerable systems using Metasploit. You'll gain practical skills in...
  4. mayoufi

    Master Office Politics: Gain Power And Avoid Exploitation

    Master Office Politics: Gain Power And Avoid Exploitation Published 10/2024 MP4 | Video: h264, 1920x1080 | Audio: AAC, 44.1 KHz Language: English | Size: 1.10 GB | Duration: 1h 9m Navigate office hierarchies and climb the corporate ladder (inspired by "The Gervais Principle" by Venkatesh G...
  5. probislover

    hacking art of exploitation

    https://drive.google.com/file/d/1gqsJxkDTcLMwCH_RUD-edwKAOx6GLtV_/view?usp=sharing
  6. manocat

    Ethical Hacking: Windows Exploitation Basics - Udemy

    Ethical Hacking: Windows Exploitation Basics Hack Windows Computers! What you will learn: Basic Windows Usage How to Crack Windows Passwords How to Hack over Windows Computers How to Create Malicious Executables *** Hidden text: You do not have sufficient rights to view the hidden text. Visit...
  7. 596687

    Hacking: The Art of Exploitation, 2nd Edition

    Link: https://www.mediafire.com/file/fjmqctzikoaumpi/Hacking-_The_Art_of_Exploitation_%25282nd_ed._2008%2529_-_Erickson.pdf/file *** Hidden text: You do not have sufficient rights to view the hidden text. Visit the forum thread! ***
  8. databrowser

    TongdaOATool Tongda OA vulnerability exploitation tool V1.6

    Link: *** Hidden text: You do not have sufficient rights to view the hidden text. Visit the forum thread! *** Disclaimer: Please do not conduct illegal testing. Any direct or indirect consequences and losses caused by using this tool are the responsibility of the user himself, and the author...
  9. 0nelove

    Post Exploitation Operations With Cobalt Strike

    Released 7/2024 MP4 | Video: h264, 1280x720 | Audio: AAC, 44.1 KHz, 2 Ch Level: Intermediate | Genre: eLearning | Language: English + vtt | Duration: 1h 20m | Size: 170 MB Cobalt Strike is a powerful and versatile penetration testing tool used by cybersecurity professionals to simulate...
  10. elainachan13

    Combo Tools CMS Detection and Exploitation suite - Scan WordPress, Joomla, Drupal

    ADD AN IMAGE HERE! [Not adding an image will result in removal] Then remove these lines. Download: https://www.mediafire.com/file/2fzssvn897m9fd2/CMSeeK-master.zip/file *** Hidden text: You do not have sufficient rights to view the hidden text. Visit the forum thread! ***
  11. error0001

    Multi/Others Network Attacks and Exploitation - A Framework

    Network Attacks and Exploitation - A Framework *** Hidden text: You do not have sufficient rights to view the hidden text. Visit the forum thread! ***
  12. n3tr0

    Multi/Others exploitation massive tool

    Download: https://github.com/screetsec/TheFatRat
  13. lnv

    HackSys Inc -Windows Kernel Exploitation Fundamentals - 2023

    HackSys Inc -Windows Kernel Exploitation Fundamentals - 2023 Download: https://www.mediafire.com/folder/2n7un22ya291v/HackSys_Inc_-Windows_Kernel_Exploitation_Fundamentals_-_2023
  14. lnv

    Corelan Win32 Exploit Development Bootcamp

    Corelan Win32 Exploit Development Bootcamp Download: https://www.mediafire.com/folder/ytio0si1s5sq0/Corelan_Win32_Exploit_Development_Bootcamp
  15. lahan

    Bitten Tech's : Tech Hacker Exploitation Course Part #2

    Sales Page : Click Here Download Link : Click Here Password : exploitationcourse Note : This upload only contains 8-14 modules of the titled course, Module 15 is still missing but i will it too in a seperate post soon.
  16. condor226

    Powersploit - Post exploitation Tool

    PowerSploit is a PowerShell Post-Exploitation Framework. Just for education purpose. Enjou :) Link: https://github.com/PowerShellMafia/PowerSploit *** Hidden text: You do not have sufficient rights to view the hidden text. Visit the forum thread! ***
  17. xshadow3773

    WiFi Exploitation Framework

    Link: https://controlc.com/b74eb422
  18. truckerstop

    Exploitation with PowerShell

    Learning about PowerShell exploitation techniques and tools is of vital importance for successfully running red team operations or penetration tests in Windows environments. Download link for the course
  19. diablo0s

    Pluralsight – Exploitation with Kali Linux

    Exploitation with Kali Linux course. Kali Linux provides a powerful set of tools for performing security assessments and penetration tests. This course will teach you how to use some of these tools to exploit vulnerable systems, and ultimately to perform post-exploitation actions. Kali Linux...
  20. Ensiha

    OFFSEC WEB-300: Advanced Web Attacks and Exploitation OSWE

    https://mega.nz/folder/8jVzXbga#qW3HwDv4pBMPFb1ALHl7oQ WEB-300 OSWE Lessons + Videos
  21. tronny

    BlackHat - Android UserLand Fuzzing and Exploitation

    BlackHat - Android UserLand Fuzzing and Exploitation *** Hidden text: You do not have sufficient rights to view the hidden text. Visit the forum thread! ***
  22. tronny

    BlackHat - ASSESSING AND EXPLOITING CONTROL SYSTEM AND IIOT 2020

    BlackHat - ASSESSING AND EXPLOITING CONTROL SYSTEM AND IIOT 2020 *** Hidden text: You do not have sufficient rights to view the hidden text. Visit the forum thread! ***
  23. tronny

    HackSysInc - Windows Kernel Exploitation Fundamentals 2023

    HackSysInc - Windows Kernel Exploitation Fundamentals 2023 *** Hidden text: You do not have sufficient rights to view the hidden text. Visit the forum thread! ***
  24. tronny

    AntisyphonTraining - Modern WebApp PenTesting w Brian King

    AntisyphonTraining - Modern WebApp PenTesting w Brian King *** Hidden text: You do not have sufficient rights to view the hidden text. Visit the forum thread! ***
  25. tronny

    AntisyphonTraining - Windows Post Exploitation, by Kyle Avery

    AntisyphonTraining - Windows Post Exploitation, by Kyle Avery *** Hidden text: You do not have sufficient rights to view the hidden text. Visit the forum thread! ***
  26. gornovskyi

    Windows & Active Directory Exploitation Cheat Sheet and Command Reference

    Hello everyone, here is Windows & Active Directory Exploitation Cheat Sheet and Command Reference by Cas van Cooten. I hope you enjoy it. Link: [https://www.zippyshare.day/4aixLojqe7YM8E7/preview]
  27. carxproveteran

    Ethical Hacking: Network Exploitation Basics

    Ethical Hacking: Network Exploitation Basics Hack Servers and Install a Backdoor What you'll learn Hack into Servers How to do passive renassaince How to setup a Linux/Mac backdoor Use Networking tools *** Hidden text: You do not have sufficient rights to view the hidden text. Visit the forum...
  28. manocat

    Ethical Hacking: Network Exploitation Basics-Udemy Coupon

    Ethical Hacking: Network Exploitation Basics Hack Servers and Install a Backdoor What you'll learn Hack into Servers How to do passive renassaince How to setup a Linux/Mac backdoor Use Networking tools *** Hidden text: You do not have sufficient rights to view the hidden text. Visit the forum...
  29. Chiloge

    Ethical Hacking: Network Exploitation Basics

    Ethical Hacking: Network Exploitation Basics Hack Servers and Install a Backdoor*** Hidden text: You do not have sufficient rights to view the hidden text. Visit the forum thread! ***
  30. amieyellow

    OFFSEC WEB-300: Advanced Web Attacks and Exploitation OSWE

    WEB-300 OSWE Lessons + Videos https://mega.nz/folder/8jVzXbga#qW3HwDv4pBMPFb1ALHl7oQ
  31. K

    Course/Tutorial 🌴Drone Hacking- Exploitation and Vulnerabilities🌴

    Link: *** Hidden text: You do not have sufficient rights to view the hidden text. Visit the forum thread! ***
  32. SeaOnTop

    ⭐EVILSLN✨| NEW EXPLOIT VISUAL STUDIO PROJECT .SLN 🚀| SILENT + FUD✅

    ⭐EVILSLN✨| NEW EXPLOIT VISUAL STUDIO PROJECT .SLN 🚀| SILENT + FUD✅ (Tested with calc.exe | Version: 17.7.5 (VS2022 update at 2023.10).) *** Hidden text: You do not have sufficient rights to view the hidden text. Visit the forum thread! ***
  33. clique

    WEB-300: Advanced Web Attacks and Exploitation Book

    LINK Advanced Web Attacks and exploitation (WEB-300) is an advanced web application security course that teaches the skills needed to conduct white box web app penetration tests. Learners who complete the course and pass the exam earn the OffSec Web Expert (OSWE) certification and will...
  34. tronny

    Udemy - Active Directory Exploitation and Lateral Movement Black-Box

    Udemy - Active Directory Exploitation and Lateral Movement Black-Box 1-2024, by Muhammad Sada *** Hidden text: You do not have sufficient rights to view the hidden text. Visit the forum thread! ***
  35. tronny

    INE - Host & Network Penetration Testing Exploitation 8-2023

    INE - Host & Network Penetration Testing Exploitation 8-2023, by Alexis Ahmed *** Hidden text: You do not have sufficient rights to view the hidden text. Visit the forum thread! ***
  36. tronny

    BHIS - Windows Post Exploitation BootCamp

    BHIS - Windows Post Exploitation BootCamp *** Hidden text: You do not have sufficient rights to view the hidden text. Visit the forum thread! ***
  37. jain

    Bitten Tech Exploitation Course

    https://mega.nz/file/6MNEQDIb#BzTmEeF9uvk_EpCbkd_aq882rBCs3qx5tfvGbEcWcJ4 PASSWORD : exploitationcourse
  38. shccrew

    Multi/Others Exploit Collection (2023)

    Exploit Collection (2023) Download: *** Hidden text: You do not have sufficient rights to view the hidden text. Visit the forum thread! ***
  39. manocat

    Exploitation Cyber Security Course-Udemy Coupon

    Exploitation Cyber Security Course Learn and understand Exploitation In Cyber Security from scratch. A complete beginner's guide. What you'll learn Overcoming Filters Introduction to Solaris Exploitation Advanced Solaris Exploitation OSX Shellcode Fault Injection *** Hidden text: You do not...
  40. carxproveteran

    Exploitation Cyber Security Course

    Exploitation Cyber Security Course Learn and understand Exploitation In Cyber Security from scratch. A complete beginner's guide. What you'll learn Overcoming Filters Introduction to Solaris Exploitation Advanced Solaris Exploitation OSX Shellcode Fault Injection *** Hidden text: You do not...
  41. carxproveteran

    Ethical Hacking: Network Exploitation Basics

    Ethical Hacking: Network Exploitation Basics Hack Servers and Install a Backdoor What you'll learn Hack into Servers How to do passive renassaince How to setup a Linux/Mac backdoor Use Networking tools *** Hidden text: You do not have sufficient rights to view the hidden text. Visit the forum...
  42. myarena

    Free CISCO Ethical Hacker course

    You can access CISCO's free ethical hacker course at https://skillsforall.com/course/ethical-hacker?courseLang=en-US. You will need to sign up for a free skillsforall account to access the course. This 70-hour intermediate-level course with 34-lab exercises contains the following modules -...
  43. nukemurai turing

    Offensive-Security - AWE - Advanced Windows Exploitation 2.0

    https://teraboxapp.com/s/1qdQywmNUDoUIXtIKKg2baA
  44. davidsnufle

    Others Offensive Internet of Things (IoT) Exploitation

    Link: https://go.linuxia.ir/link/oiote.txt *** Hidden text: You do not have sufficient rights to view the hidden text. Visit the forum thread! ****** Hidden text: You do not have sufficient rights to view the hidden text. Visit the forum thread! ***
  45. anonymous283

    Bitten Tech's : Tech Hacker Exploitation Course Part #2

    Download Link : https://mega.nz/file/6MNEQDIb#BzTmEeF9uvk_EpCbkd_aq882rBCs3qx5tfvGbEcWcJ4 Password : exploitationcourse
  46. sisu13

    PLURALSIGHT - Exploitation with PowerShell

    mega.nz/folder/5fdDxYjC#IKApRuA8HDU6BPL4nP3pEw
  47. franzzen

    List of useful resources for pentesters and hackers

    List of useful resources for pentesters and hackers I present to your attention a list of useful resources, thanks to which you can significantly improve your skill in various aspects of penetration testing and information security: Hacking manuals: ▪️http: //www.ehacking.net/ ▪️http...
  48. carxproveteran

    Ethical Hacking: nmap in depth

    Ethical Hacking: nmap in depth network discovery and exploitation What you'll learn Network sweeping with nmap Enumerate network services Use NSE with nmap Attack network with NSE *** Hidden text: You do not have sufficient rights to view the hidden text. Visit the forum thread! ***
  49. tronny

    EC-Council - Mastering Database Reconnaissance and Skill Exploitation

    EC-Council - Mastering Database Reconnaissance and Skill Exploitation, by Skylar Simmons *** Hidden text: You do not have sufficient rights to view the hidden text. Visit the forum thread! ***
  50. lidl58

    A Guide to Kernel Exploitation Attacking the Core

    A Guide to Kernel Exploitation Attacking the Core *** Hidden text: You do not have sufficient rights to view the hidden text. Visit the forum thread! ***
Top Bottom