Showing 181–189 of 193 results

  • Security , Shop

    Antivirus Evasion Course By DedSec (In Hindi)

    Course Topic

    1. Introduction of AVS Crypters & Virus
    2. Bypass AVS Runtime using Based64 Technique
    3. Signature Cloning Bypassing Runtime
    4. Bypass Windows Defender For Lifetime
    5. Make your Stub Clean
    6. Manually Encrypting Virus using Algorithm
    7. Using Different Algorithm For Cleaning Virus
    8. Making FUD Virus Using C# And HEX
    9. Code Your Own Crypter
    10. Android Botnet

     

    HOMEPAGE – https://www.dedseec.com/product/antivirus-evasion-professional-course/

     

    Original Price: 2000
    Our Price: 370
  • Security , Shop

    Advance Of Black Hat Hacking Course By DedSec (In Hindi)

    Course Topic

    1. Advance WIFI Hacking
    2. Android Hacking
    3. Android Screen Lock Cracking
    4. Attack and down All Wifi networks In Your Area
    5. Basic of Linux Operating System
    6. BeFF Over WAN Attack
    7. Black Hat Mailing
    8. Bug Bunty English
    9. Carding
    10. CCTV Camera Hacking
    11. Crack any software
    12. Dos And DDOS Attacks
    13. Email Bombing
    14. Email Hunting
    15. Hacking With Wireshark
    16. Information Gathering
    17. Making Money Online
    18. MITM Attack …
  • Security , Shop

    Reverse Engineering Course – The Hacks Behind Cracking By DedSec (In Hindi)

    Description:

    In this Reverse Engineering training course, expert  DedSec will teach you about common software vulnerabilities and how to find them, as well as how the vulnerabilities differ between various operating systems. This course is designed for beginners who are looking to get started in RE.You will start by learning about reversing compiled Windows applications,Once you have completed this …

  • Security , Shop

    eLearnSecurity – Mobile Application Security and Penetration Testing v2

    Course at a glance

    • Start from iOS and Android architectures basics
    • Exposes Android and iOS vulnerabilities in-depth
    • Covers mobile OSs security mechanisms and implementations
    • Covers Mobile applications reverse engineering
    • In depth mobile applications static and dynamic analysis
    • Practice on real world mobile applications
    • Build your own home lab on mobile application security
    • Provides you the skills necessary to peform Penetration tests of mobile applications
    • Covers: APKTool, …
  • Security , Shop

    Open-Source Intelligence (OSINT) Fundamentals

    Description

    This course focuses on Open Source Intelligence (OSINT) tactics and techniques designed to help you improve your investigative game. Students should take this course if they are interested in:

    • Gaining a better understanding of OSINT techniques
    • Improving investigative skillset
    • Improving overall research methodology

       

      HOMEPAGE – https://academy.tcm-sec.com/p/osint-fundamentals

       

      Original Price: $30
      Our Price: $5
    • Security , Shop

      eLearnSecurity – Web Application Penetration Testing v3

      Course at a glance

      • Start from the very basics, all the way to advanced post-exploitation activities
      • Wide coverage of OWASP’s TOP 10
      • Master Burp Suite
      • In-depth Web application analysis, information gathering and enumeration
      • XSS & SQL Injection
      • Session related vulnerabilities
      • LFI/RFI
      • HTML5 attacks
      • Pentesting Content Management Systems (CMS)
      • Pentesting NoSQL databases and NoSQL-related APIs / NoSQL injections
      • Start from Web …
    • Security , Shop

      eLearnSecurity – Practical Web Defense

      Course at a glance

      • Close the gap between Web application attack and defense
      • Mitigation advices for multiple platforms and languages
      • The most comprehensive and practical coverage of the OWASP Testing Guide
      • Comprehensively aligned to OWASP methodologies, tools and tests
      • Covers and goes beyond OWASP TOP 10
      • Detailed techniques and methodology to simplify defense of web applications
      • No boring theory: practice oriented curriculum
    • Security , Shop

      Exploit Development Student

      If you are looking for the most practical way into the exploit development and software security world look no further. The Exploit Development Student Learning Path provides not only the fundamentals of Windows and Linux exploit development but also covers advanced Windows and Linux exploit development techniques, as well as anti-exploit mechanism bypasses.

      Course at a glance

      • Based on techniques professional …
    • Security , Shop

      [PentesterAcademy] Wi-Fi Monitoring for Red-Blue Teams

      This course focuses on the tools, techniques and procedures to monitor 802.11ac/n networks. We will be learning about both USB and Access Point hardware, pros and cons, and scalable architectures. We will be looking at different hardware for monitoring ranging in price from $40 to $350 and above, both USB and Access Point solutions.

       

      A non-exhaustive list of topics to be …