Showing 109–117 of 193 results

  • Security , Shop

    Mastering Pentesting using Kali Linux

    Do you want to become a pro with the tools that Kali Linux offers? To perform advanced penetration testing? Learn and practice ways to exploit the vulnerable systems and patch them! Get ready to make the best use of one of the most popular pen-testing tools fancied by hackers around the globe.

    This course will start from scratch and will provide …

  • Security , Shop

    The External Pentest Playbook

    This course focuses on external penetration testing tactics and techniques designed to help you improve your pentest game. Students should take this course if they are interested in:

    • Gaining a better understanding of the external pentest attack methodology and mindset
    • Improving overall pentest skillset and client relations
    • Crushing their next pentest job interview

     

    HOMEPAGE – https://www.anonymz.com/?https://academy.tcm-sec.com/p/external-pentest-playbook

     

    Original Price: $29.99
    Our Price: $5
  • Security , Shop

    Uncle Rat’s Bug Bounty Guide

    My name is uncle rat and i am here to disrupt the teaching industry. I want to make an end to the bland video courses you normally find by providing you with a guided experience designed to bring you from practice platform to bug bounty target.
    Ofcourse i can not promise you a bug, if anyone does you should turn around …

  • Security , Shop

    Hands-on Password Attacks and Security

    Passwords have become the top authentication factor in today’s world. You use it in combination with an email or username to sign into almost any service. Big Corporations like Google, Microsoft, Amazon, and Facebook still widely use passwords as an authentication mechanism today. But how secure are passwords?

    This course focuses on the practical attacks that malicious users use to crack …

  • Security , Shop

    Complete Basic Course Of Android Hacking, Kali Linux, Wifi Hacking & Carding by DedSec (Pack of Four Courses)

    Dedseec basically aims at spreading the knowledge outside YouTube through brief and theoretical posts, screenshots, images and useful links for the readers. This is a page where you can learn all about the latest tips, tricks, tutorials, and hacks regarding various trending topics, apps, devices, etc.

     

    HOMEPAGE – https://www.anonymz.com/?https://www.dedseec.com/shop/

     

    Original Price: $55
    Our Price: $7

     

  • Security , Shop

    The OWASP top 10, mobile top 10 and API 10 demystified

    I am The XSS Rat, also known as Wesley. I created infosec tutorials and courses in a unique way. It’s my opinion that a teacher should be able to bring knowledge in an inspirational way but also make sure that knowledge is retained. This is a very unique challenge requiring out of the box thinking. My courses never just consist of a video or video + …

  • Security , Shop

    Windows Penetration Testing Essentials

    Penetration testing is becoming one of the most important roles in information security with the increased need and importance for companies and organizations to secure their digital infrastructure. Windows plays an integral role in the digital infrastructure of a company, as a result, it is one of the most targeted operating systems by attackers. This has led to an increased …

  • Security , Shop

    Session Hijacking and Prevention Techniques

    Understanding the bare bones of Session, and how it can be broken to gain access to accounts. As an ethical hacker how to identify the design flaws that are being exploited and to be addressed them to secure the system and/or application. With multiple, users/systems interconnected the attack surface is huge and has a high-risk impact, it’s …

  • Security , Shop

    Mastering Database Reconnaissance and Exploitation

    The internet is mostly web applications and most web applications are connected to a database. These databases store everything from usernames and passwords, to credit card numbers, social security numbers, and tons of other sensitive or useful information. In many cases, the ability to compromise a database will soon lead to a much greater system or organization compromise.

    This class is …