• 🌙 Community Spirit

    Ramadan Mubarak! To honor this month, Crax has paused NSFW categories. Wishing you peace and growth!

penetration testing

  1. protectaccount

    IT & Software Industrial Embedded Systems Hardware Penetration Testing

    Step into the world of hardware penetration testing – where technology meets curiosity! If you’re experienced in traditional penetration testing, this course will open new doors, equipping you with the specialized techniques to target industrial embedded systems. Industrial devices present...
  2. NIZO

    Method/Tut AI PENETRATION TESTING AGENTS (OPEN-SOURCE)

    *** Hidden text: You do not have sufficient rights to view the hidden text. Visit the forum thread! ***
  3. protectaccount

    Udemy Learn Ethical Hacking & Penetration Testing

    Welcome to Learn Ethical Hacking & Penetration Testing! This course will teach you the techniques used by professional penetration testers and ethical hackers world wide. By the end of it, you will have the skills to hack systems and networks in the same ways that a “black-hat” would, as well...
  4. protectaccount

    Udemy Practical Penetration testing skills hands on labs

    Cybersecurity professionals use a variety of tactics to ensure the safety of sensitive information. Penetration testing is one way they evaluate the computer systems they monitor. Penetration testing is a series of processes and techniques that simulate a real cyberattack. The ultimate goal is...
  5. protectaccount

    Udemy The Ultimate Wireless Penetration Testing Training Course

    In this course Martin walks students through a step-by-step methodology on how to uncover find and exploit wireless vulnerabilities. The theoretical lectures are being complimented with the relevant lab exercises to reinforce the knowledge. Martin is not just inserting the payload or uses...
  6. protectaccount

    Udemy Understanding Penetration Testing for Beginners – Hands On

    Dive into the dynamic world of Penetration Testing, Security Testing, and Ethical Hacking, even with no prior experience. This course is your gateway to understanding the critical aspects of cybersecurity, giving you the tools and confidence to launch your career as a Junior Security Expert...
  7. protectaccount

    Udemy Master Penetration Testing and Ethical Hacking: From A to Z

    Unlock the world of cybersecurity with our comprehensive “Master Penetration Testing and Ethical Hacking” course, designed to take you from a complete novice to a skilled ethical hacker. In today’s digital landscape, safeguarding sensitive data and systems is paramount, and ethical hackers play...
  8. protectaccount

    Udemy Offensive Penetration Testing (OSCP) Cert Prep

    As a pentester, you need to understand the inner workings of many different types of cyberattacks. The more you know about an attacker’s chosen tools and techniques, the better odds you’ll have to successfully stop them. Join ethical hacker Clint Kehr as he guides you through the basic concepts...
  9. protectaccount

    Udemy Ethical Hacking And Penetration Testing Crash Course

    In today’s digital world, cybersecurity is more important than ever. Ethical hackers play a vital role in identifying and fixing security vulnerabilities before malicious actors can exploit them. Our comprehensive Master Penetration Testing and Ethical Hacking Crash Course is designed to take...
  10. protectaccount

    Udemy Mastering thick client application penetration testing

    This course introduces students to the penetration testing concepts associated with Thick Client Applications. This is an entry level to intermediate level course and we encourage you to take this course if you are interested to learn Thick Client Application Security. This course uses a...
  11. NIZO

    Method/Tut ⭐️⚡ETHICAL HACKING RECON FOR PENETRATION TESTING & BUG BOUNTIES⚡⭐️

    *** Hidden text: You do not have sufficient rights to view the hidden text. Visit the forum thread! ***
  12. hexakat

    IT & Software Hacking_ Computer Hacking, Security Testing,Penetration Testing, and Basic Security.pdf

    Link: *** Hidden text: You do not have sufficient rights to view the hidden text. Visit the forum thread! ***
  13. protectaccount

    Udemy Foundations of Network Penetration Testing

    Ready to dive into the exciting world of ethical hacking and network penetration testing? Whether you’re aiming for a career in cybersecurity or simply want to understand how attackers compromise networks (so you can better defend them!), this course provides the essential foundation you need...
  14. EarlHickey

    Vulnerability scanner with automated penetration testing

    Link: *** Hidden text: You do not have sufficient rights to view the hidden text. Visit the forum thread! ***
  15. Saphyking

    The Basics of Hacking and Penetration Testing by Patrick Engebretson

    Link:https://mega.nz/file/XgZ3zLTL#nfq9ChIPQLbPdnOZHB1aKL0v48WE1IOWTvHbp28GoFs
  16. Saphyking

    Script The Basics of Hacking and Penetration Testing by Patrick Engebretson

    Download:https://mega.nz/file/XgZ3zLTL#nfq9ChIPQLbPdnOZHB1aKL0v48WE1IOWTvHbp28GoFs
  17. Saphyking

    The Hacker Playbook 3 Practical Guide To Penetration Testing (Peter Kim)

    Link:https://mega.nz/file/7gRgiJTD#DCNtG57evb-obBtBKTS57rjxc0-9CwSOq1ALET6jbWo
  18. protectaccount

    Book HacKTheBox Certified Penetration Testing Specialist Final V5

    Link: *** Hidden text: You do not have sufficient rights to view the hidden text. Visit the forum thread! ****** Hidden text: You do not have sufficient rights to view the hidden text. Visit the forum thread! ***
  19. hack0_bin

    Tyrant is a malicious tool used for penetration testing and remote control persistence.

    Tyrant is a malicious tool used for penetration testing and remote control persistence. Tyrant is a malicious tool used for penetration testing and remote control persistence, featuring the following capabilities: Reverse Shell: Allows an attacker to initiate a shell session with the...
  20. EarlHickey

    Open-source AI agents for penetration testing

    Link: *** Hidden text: You do not have sufficient rights to view the hidden text. Visit the forum thread! ***
  21. DANIEX

    Web Application Hacking and Penetration Testing

    Link: *** Hidden text: You do not have sufficient rights to view the hidden text. Visit the forum thread! ***
  22. hack0_bin

    HydraPWK2 penetration testing iso

    It is a Linux distribution that is an alternative to Kali Linux. Hydra (previously named by BlackTrack) is an Opensource project developed and founded by @me-joe for purposes oriented to the realm of industry. Link: *** Hidden text: You do not have sufficient rights to view the hidden text...
  23. EarlHickey

    Recon for Ethical Hacking Penetration Testing & Bug Bounty

    Link: *** Hidden text: You do not have sufficient rights to view the hidden text. Visit the forum thread! ***
  24. nobita1122

    Website Hacking & Penetration Testing Tools Download For Free

    What you’ll learn Complete website hacking Install Latest Kali Linux 2020 & how to interact with the terminal Terminal and Linux commands Hack into websites and servers SQL injection – Manual & Automation Cross site scripting Database exploitation Penetration testing tool – OWASP ZAP...
  25. nobita1122

    Web Application Hacking and Penetration Testing

    What you’ll learn Web Application Hacking and Penetration Testing Web penetration testing and ethical hacking are covered in this class. Creating and setting up a lab environment for pen tests. Understanding website flaws and general attacks. Web application firewalls and safe coding...
  26. Legend@

    mastering Kali Linux Advanced Penetration Testing

    Link: *** Hidden text: You do not have sufficient rights to view the hidden text. Visit the forum thread! *** *** Hidden text: You do not have sufficient rights to view the hidden text. Visit the forum thread! ***
  27. Legend@

    Docker for Penetration Testing

    Link: *** Hidden text: You do not have sufficient rights to view the hidden text. Visit the forum thread! *** *** Hidden text: You do not have sufficient rights to view the hidden text. Visit the forum thread! ***
  28. Legend@

    Configuring the Terminal for Penetration Testing

    Link: *** Hidden text: You do not have sufficient rights to view the hidden text. Visit the forum thread! *** *** Hidden text: You do not have sufficient rights to view the hidden text. Visit the forum thread! ***
  29. W

    IT & Software HTB Certified Penetration Testing Specialist (HTB CPTS) Exam Report

    HACK THE BOX Web Penetration Tester Exam Report *** Hidden text: You do not have sufficient rights to view the hidden text. Visit the forum thread! ***
  30. B

    Certification Web Application Penetration Testing Professional by Alexis Ahmed | eWPTv2

    Link: *** Hidden text: You do not have sufficient rights to view the hidden text. Visit the forum thread! ***
  31. EarlHickey

    Tools and Techniques for Penetration Testing

    Link: *** Hidden text: You do not have sufficient rights to view the hidden text. Visit the forum thread! ***
  32. EarlHickey

    Penetration Testing and Network Defense

    Link: *** Hidden text: You do not have sufficient rights to view the hidden text. Visit the forum thread! ***
  33. Naruto Uzamaki

    User:Pass Download Ethical Hacking / Penetration Testing & Bug Bounty Hunting For Free

    Author: Rohit Gautam Complete Practical Course on Ethical Hacking, Penetration Testing and Bug Bounty Hunting with Live Attacks What you’ll learn Bug Bounty Hunting - Live Tips and Tricks to hunt bugs BreakDown of Hackerone Reports for better understanding Interview Preparation Questions...
  34. Au66y

    IT & Software PEN-200 course: Penetration Testing with Kali Linux

    Link: *** Hidden text: You do not have sufficient rights to view the hidden text. Visit the forum thread! ***
  35. Au66y

    IT & Software Penetration Testing Professional (eCPPT) course

    Link: *** Hidden text: You do not have sufficient rights to view the hidden text. Visit the forum thread! ***
  36. ujang

    Login:Pass Ebook oscp for Penetration testing

    https://anonymfile.com/y6yNX/penetration-testing-with-kali-linux-2014.pdf Download: *** Hidden text: You do not have sufficient rights to view the hidden text. Visit the forum thread! ***
  37. welcombackbabyca

    5 Common SQL Database Penetration Testing Tools

    SQL injection is one of the most prevalent web application vulnerabilities. Attackers exploit these vulnerabilities to gain unauthorized access to sensitive data, manipulate data, or even take control of an entire database. Penetration testing tools are invaluable in identifying and mitigating...
  38. EarlHickey

    WiFi Penetration Testing for Beginners

    Link: *** Hidden text: You do not have sufficient rights to view the hidden text. Visit the forum thread! ***
  39. morpheuss1514

    Understanding the Basics of Penetration Testing

    Link: *** Hidden text: You do not have sufficient rights to view the hidden text. Visit the forum thread! ****** Hidden text: You do not have sufficient rights to view the hidden text. Visit the forum thread! ***
  40. EarlHickey

    Wireless Penetration Testing Cheat Sheet

    Link: *** Hidden text: You do not have sufficient rights to view the hidden text. Visit the forum thread! ***
  41. alioman45

    The Importance of Penetration Testing in Cybersecurity

    **Introduction** Penetration testing (pen testing) is a critical practice in cybersecurity that helps organizations identify vulnerabilities before they can be exploited by malicious hackers. This thread will explain what penetration testing is, its types, benefits, and best practices. **What is...
  42. Deadpool

    Red Team Tactics: Penetration Testing and Social Engineering

    Link: *** Hidden text: You do not have sufficient rights to view the hidden text. Visit the forum thread! ***
  43. Khali-Qot

    WiFi Penetration Testing for Beginners + Basic WiFi Theory

    *** Hidden text: You do not have sufficient rights to view the hidden text. Visit the forum thread! ***
  44. baladia

    Advanced Windows Active Directory Penetration Testing

    Advanced Windows Active Directory Penetration Testing Published 10/2024 MP4 | Video: h264, 1280x720 | Audio: AAC, 44.1 KHz, 2 Ch Genre: eLearning | Language: English | Duration: 123 Lectures ( 7h 29m ) | Size: 3.3 GB Horn Your Internal Windows AD Pentesting Skills What you'll learn Overview...
  45. 0

    Penetration Testing Bootcamp: Beginner To Advanced Hacker

    Penetration Testing Bootcamp: Beginner To Advanced Hacker Published 10/2024 MP4 | Video: h264, 1920x1080 | Audio: AAC, 44.1 KHz Language: English | Size: 2.20 GB | Duration: 4h 28m "A Step-by-Step Guide to Mastering Offensive Security Skills" What you'll learn Linux server and services...
  46. mayoufi

    Web Security/Penetration Testing for Beginners

    Web Security/Penetration Testing for Beginners MP4 | Video: AVC 1280x720 | Audio: AAC 44KHz 2ch | Duration: 7 Hours | 1.01 GB Genre: eLearning | Language: English This course will take your skill set to next level as a Penetration Tester with Web security Knowledge Course lectures are...
  47. baladia

    Industrial Embedded Systems Hardware Penetration Testing

    Published 10/2024 Created by Marcel Rick-Cen MP4 | Video: h264, 1280x720 | Audio: AAC, 44.1 KHz, 2 Ch Genre: eLearning | Language: English | Duration: 128 Lectures ( 4h 18m ) | Size: 2.76 GB Unlock offensive hardware security skills with tools and tactics tailored for the ICS/OT and IIoT...
  48. rassskov

    Course/Tutorial Website Hacking / Penetration Testing LEAKED

    Link: *** Hidden text: You do not have sufficient rights to view the hidden text. Visit the forum thread! ***
  49. preman

    TCM pratical website penetration testing course 2024

    Hi guys, Meet me preman, Here for add your knowledge about penetration testing. DOWNLOAD NO ADS
  50. Anonymous12_AS

    TCM Security Academy - Mobile Application Penetration Testing

    **This course focuses on Android and iOS Mobile Application Penetration testing. The course will demonstrate common techniques to extract sensitive data from Android and iOS Application such as API Keys, stored secrets, and firebase databases, and provide a solid foundation for continuing a...
Top Bottom