Главная
Study mode:
on
You
History
Saved
In progress
0 courses
compleat
0 courses
#Art & Design
#Adobe
#ChatGPT
#GitHub
#Metasploit
#Meterpreter
Showing:
106
courses
Sort by Relevancy
Highest rated
Lowest rated
Most recently added
Joseph Delgadillo
Ethical Hacking Tutorials
3
rewiews
Learn ethical hacking techniques, from beginner to advanced, covering Python, Metasploit, Kali Linux, and system hacking. Gain practical skills to become a proficient ethical hacker.
Add to list
6
Lesons
18 hours
On-Demand
Free-Video
Complete Metasploit Tutorial from Basics
1
rewiews
Comprehensive guide to Metasploit: from installation to advanced penetration testing. Learn to exploit Windows 10 and Metasploitable machines using Kali Linux and essential tools like Nmap and Zenmap.
Add to list
10
Lesons
1 hour 30 minutes
On-Demand
Free-Video
HackerSploit
Metasploit for Beginners - The Basics - Modules, Exploits & Payloads
3
rewiews
Learn Metasploit basics for penetration testing: explore modules, exploits, and payloads to enhance your cybersecurity skills and understand vulnerabilities.
Add to list
8
Lesons
23 minutes
On-Demand
Free-Video
Cyber Mentor
Pentesting for N00bs - Blue
0
rewiews
Learn to exploit the MS17-010 vulnerability using Metasploit and AutoBlue, covering scanning, exploitation, payload types, and post-exploitation techniques in a hands-on penetration testing tutorial.
Add to list
10
Lesons
30 minutes
On-Demand
Free-Video
Cyber Mentor
Zero to Hero - MS17-010-EternalBlue, GPP-cPasswords, and Kerberoasting
0
rewiews
Comprehensive tutorial on exploiting MS17-010, GPP/cPasswords, and Kerberoasting, followed by an extensive Q&A session covering various cybersecurity topics and career advice for aspiring pentesters.
Add to list
43
Lesons
1 hour 33 minutes
On-Demand
Free-Video
Cyber Mentor
NTLM Relay, Token Impersonation, Pass the Hash, PsExec, and More
0
rewiews
Explore advanced Active Directory exploitation techniques including NTLM relay, token impersonation, and pass-the-hash attacks. Learn practical skills for penetration testing and network security.
Add to list
31
Lesons
2 hours 8 minutes
On-Demand
Free-Video
Cyber Mentor
Zero to Hero Pentesting - Exploitation, Shells, and Some Credential Stuffing
0
rewiews
Comprehensive tutorial on exploitation techniques, including reverse shells, credential stuffing, and live hacking demonstrations. Includes Q&A session covering various cybersecurity career topics and personal insights.
Add to list
74
Lesons
2 hours 48 minutes
On-Demand
Free-Video
Cyber Mentor
Zero to Hero Pentesting - Scanning Tools and Tactics
0
rewiews
Comprehensive tutorial on penetration testing tools and techniques, covering Nmap, Nessus, Metasploit, and BurpSuite. Includes practical demonstrations, Q&A session, and industry insights for aspiring cybersecurity professionals.
Add to list
59
Lesons
3 hours 8 minutes
On-Demand
Free-Video
HackerSploit
How to Create Your Own Pentesting Distribution
0
rewiews
Learn to build a custom penetration testing distribution using open-source frameworks like PenTesters Framework and BlackArch repos. Covers tool installation on various Linux distributions.
Add to list
5
Lesons
47 minutes
On-Demand
Free-Video
Joseph Delgadillo
Complete Metasploit System Hacking Tutorial
0
rewiews
Comprehensive tutorial on Metasploit for ethical hacking, covering various attack techniques, payloads, and exploits. Learn to use Meterpreter, perform privilege escalation, and execute remote attacks on different systems.
Add to list
20
Lesons
4 hours 15 minutes
On-Demand
Free-Video
David Bombal
Metasploit
0
rewiews
Aprende a acceder a servidores Windows y Linux usando Metasploit con demostraciones prácticas y consejos de automatización. Ideal para entusiastas de la ciberseguridad.
Add to list
46
Lesons
34 minutes
On-Demand
Free-Video
David Bombal
Hacking with Daniel Lowrie
0
rewiews
Explore cybersecurity fundamentals and hacking techniques with expert guidance, covering SQL injection, Metasploit, password security, and Burp Suite for practical skills development.
Add to list
7
Lesons
4 hours 30 minutes
On-Demand
Free-Video
David Bombal
Cybersecurity and Hacking with Neal Bridges
0
rewiews
Explore ethical hacking and cybersecurity careers with ex-NSA hacker Neal Bridges. Learn about red and blue teams, essential skills, tools, and strategies for landing your first job in the field.
Add to list
22
Lesons
12 hours
On-Demand
Free-Video
Learn Metasploit From Basics for Beginners
0
rewiews
Master Metasploit from scratch: Create undetectable payloads, exploit systems remotely, and learn advanced techniques. Gain practical skills in ethical hacking with hands-on tutorials for beginners.
Add to list
30
Lesons
3 hours 30 minutes
On-Demand
Free-Video
Metasploit for Network Security
0
rewiews
Learn to identify, test, and secure networks using the open-source Metasploit framework. Covers introduction, tools, exploits, FTP login, Metasploitable setup, and payloads.
Add to list
6
Lesons
30 minutes
On-Demand
Free-Video
Practical Exploitation with Mubix
0
rewiews
Comprehensive cybersecurity series covering exploitation techniques, Metasploit framework, and penetration testing. Learn practical skills for ethical hacking, network security, and vulnerability assessment from expert Mubix.
Add to list
56
Lesons
10 hours
On-Demand
Free-Video
Metasploit Framework
0
rewiews
Learn to use Metasploit Framework for ethical hacking, including port scanning, vulnerability assessment, and exploitation techniques in Kali Linux.
Add to list
12
Lesons
1 hour 30 minutes
On-Demand
Free-Video
Metasploit Framework Training for Beginners
0
rewiews
Learn automated penetration testing, Windows privilege escalation, antivirus testing, vulnerability scanning, and firewall evasion using Metasploit Framework and related tools.
Add to list
7
Lesons
3 hours 30 minutes
On-Demand
Free-Video
Meterpreter and Metasploit Development
0
rewiews
Dive into advanced Meterpreter and Metasploit techniques, including extension unloading, exploit porting, Kiwi extension updates, pivoting strategies, and creating stealthy Windows threads.
Add to list
10
Lesons
1 day 2 hours
On-Demand
Free-Video
Kali Linux Hacking Tutorials
0
rewiews
Learn ethical hacking techniques using Kali Linux, covering network scanning, password cracking, Android exploitation, and remote access tools for cybersecurity professionals.
Add to list
26
Lesons
5 hours
On-Demand
Free-Video
Kali Linux
0
rewiews
Explore Kali Linux: Learn essential commands, tools, and security practices. Gain hands-on experience with ethical hacking techniques and system administration skills.
Add to list
47
Lesons
8 hours
On-Demand
Free-Video
Metasploit
0
rewiews
Learn Metasploit for ethical hacking: modules, exploits, payloads, information gathering, web server hacking, privilege escalation, and more. Hands-on tutorials for beginners to advanced users.
Add to list
12
Lesons
2 hours 30 minutes
On-Demand
Free-Video
Metasploit
0
rewiews
Learn Metasploit fundamentals, including installation, database management, payloads, encoders, and Meterpreter. Gain hands-on experience with information gathering and scanning techniques.
Add to list
13
Lesons
1 hour 30 minutes
On-Demand
Free-Video
SecurityTube Metasploit Framework Expert Community Edition
0
rewiews
Comprehensive training on Metasploit Framework, covering advanced techniques and strategies for penetration testing and ethical hacking. Gain expertise in this powerful cybersecurity tool.
Add to list
24
Lesons
6 hours
On-Demand
Free-Video
Metasploit
0
rewiews
Learn to use Metasploit for ethical hacking: database setup, modules, MSFVenom, encoders, port scanning, SMB enumeration, exploits, Meterpreter, and post-exploitation techniques.
Add to list
11
Lesons
1 hour 30 minutes
On-Demand
Free-Video
Metasploit Hacking Tutorials for Beginners
0
rewiews
Comprehensive tutorial on Metasploit for ethical hacking, covering system vulnerabilities, payload creation, privilege escalation, and exploiting various platforms including Windows, Android, and iOS.
Add to list
20
Lesons
4 hours 30 minutes
On-Demand
Free-Video
Linode
Windows Privilege Escalation Techniques - Red Team Series
0
rewiews
Learn advanced Windows privilege escalation techniques, including UAC bypass, kernel exploits, and token impersonation. Enhance your red team skills with practical demonstrations and in-depth explanations.
Add to list
12
Lesons
46 minutes
On-Demand
Free-Video
Linode
Windows Red Team Credential Access Techniques - Red Team Series
0
rewiews
Explore advanced credential access techniques for Windows red teaming, including mimikatz usage, password dumping, and token impersonation. Gain practical skills in exploiting vulnerabilities and enhancing your cybersecurity expertise.
Add to list
31
Lesons
41 minutes
On-Demand
Free-Video
Kali Linux
0
rewiews
Comprehensive Kali Linux training covering installation, tools, and ethical hacking techniques. Learn network scanning, information gathering, and penetration testing using popular tools like Metasploit and Burp Suite.
Add to list
22
Lesons
9 hours
On-Demand
Free-Video
Metasploit Tutorials In Hindi
0
rewiews
Learn Metasploit fundamentals, file structure, modules, and payload concepts for ethical hacking. Covers installation, keywords, and practical payload generation techniques.
Add to list
7
Lesons
2 hours 30 minutes
On-Demand
Free-Video
Metasploit Course Urdu/Hindi
0
rewiews
Comprehensive Urdu/Hindi guide to Metasploit, covering exploits, payloads, scanners, and custom exploit creation. Learn essential penetration testing skills step-by-step.
Add to list
10
Lesons
1 hour 30 minutes
On-Demand
Free-Video
Metasploit: Penetration Testing Software Arabic
0
rewiews
تعلم استخدام برنامج Metasploit لاختبار الاختراق باللغة العربية. سلسلة محاضرات شاملة تغطي جوانب متعددة من هذه الأداة القوية في مجال الأمن السيبراني.
Add to list
18
Lesons
6 hours
On-Demand
Free-Video
Metasploit Framework
0
rewiews
Комплексное обучение этичному хакингу с использованием Metasploit Framework. Изучение методов сканирования, эксплуатации уязвимостей и повышения привилегий в различных системах.
Add to list
63
Lesons
11 hours
On-Demand
Free-Video
Metasploit Arabic Course
0
rewiews
دورة شاملة باللغة العربية لتعلم استخدام Metasploit، أداة قوية لاختبار الاختراق واكتشاف الثغرات الأمنية في الأنظمة والشبكات.
Add to list
17
Lesons
6 hours
On-Demand
Free-Video
SecurityFWD
Hackers Demonstrate a Ransomware Attack
0
rewiews
Comprehensive demonstration of a ransomware attack, covering setup, exploitation techniques, data theft, and defense strategies. Includes discussions on hacking tools, ethics, and cybersecurity career insights.
Add to list
25
Lesons
1 hour 10 minutes
On-Demand
Free-Video
CAE in Cybersecurity Community
Armitage and Metasploit for Penetration Testing - From Information Collecting to Post Exploitation
0
rewiews
Comprehensive overview of Armitage and Metasploit for penetration testing, covering information gathering, exploitation, and post-exploitation techniques through live demonstrations and practical examples.
Add to list
20
Lesons
54 minutes
On-Demand
Free-Video
Bill Buchanan OBE
Introduction to Metasploit - Network Exploitation Lab
0
rewiews
Learn essential Metasploit techniques for network security, including scanning, exploiting vulnerabilities, and establishing reverse shells in this hands-on lab.
Add to list
12
Lesons
28 minutes
On-Demand
Free-Video
Kali Linux: Backtrack Linux Reborn - OISF 2013
0
rewiews
Explore Kali Linux, the evolution of BackTrack, featuring improved infrastructure, Metasploit integration, and ARM support. Learn about its development, new features, and community-driven enhancements.
Add to list
23
Lesons
49 minutes
On-Demand
Free-Video
BNAT Hijacking: Repairing Broken Communication Channels - Lecture
0
rewiews
Explore BNAT hijacking techniques to repair broken communication channels, with practical examples, tools, and demonstrations for network security professionals.
Add to list
25
Lesons
43 minutes
On-Demand
Free-Video
DNS Reconnaissance Techniques - Derbycon 2012
0
rewiews
Explore DNS reconnaissance techniques, including zone transfers, reverse lookups, and cache snooping. Learn to enumerate domains, parse data, and integrate findings with Metasploit for enhanced security assessments.
Add to list
18
Lesons
40 minutes
On-Demand
Free-Video
Introduction to Metasploit
0
rewiews
Learn essential Metasploit techniques for penetration testing and ethical hacking. Explore powerful tools and strategies to identify vulnerabilities and enhance cybersecurity skills.
Add to list
1
Lesons
1 hour 6 minutes
On-Demand
Free-Video
Assessing and Pen-Testing IPv6 Networks
0
rewiews
Comprehensive guide to assessing and penetration testing IPv6 networks, covering protocols, addressing, reconnaissance tools, and exploitation techniques.
Add to list
21
Lesons
1 hour 3 minutes
On-Demand
Free-Video
HackerSploit
Steel Mountain Walkthrough - Manual Windows Exploitation
0
rewiews
Gain initial foothold and elevate privileges on Windows target by exploiting Unquoted Service Paths manually and with Metasploit. Learn practical techniques for Windows penetration testing.
Add to list
1
Lesons
52 minutes
On-Demand
Free-Video
Satish C J
Metasploit for Detecting Null Sessions and Exploiting Samba Server (SMB)
0
rewiews
Explore SMB protocol, enumerate vulnerable Linux machines, and exploit Samba servers using Metasploit Framework's samba_symlink_traversal module. Gain insights into SMB security risks.
Add to list
1
Lesons
24 minutes
On-Demand
Free-Video
NorthSec
Finding and Exploiting Critical Vulnerabilities in RPC Services - NorthSec 2023
0
rewiews
Comprehensive walkthrough of finding, exploiting, and reporting critical vulnerabilities in an RPC service, covering reverse engineering, authentication bypass, and coordinated disclosure.
Add to list
1
Lesons
28 minutes
On-Demand
Free-Video
Satish C J
Metasploit Auxiliary Modules Demo - TCP Port Scanners, FTP Login, SSH Version, and SSH Login
0
rewiews
Explore Metasploit Auxiliary modules, including TCP port scanners, FTP login, and SSH tools. Learn practical techniques for network reconnaissance and vulnerability assessment.
Add to list
1
Lesons
27 minutes
On-Demand
Free-Video
Satish C J
Ethical Hacking: Using Metasploit to Crack Passwords
0
rewiews
Explore ethical password cracking using Metasploit. Learn to create dictionaries, launch attacks, and understand techniques for responsible penetration testing and system security enhancement.
Add to list
1
Lesons
17 minutes
On-Demand
Free-Video
Satish C J
Metasploit Framework Introduction - Modules in Metasploit
0
rewiews
Explore Metasploit's core modules: Auxiliary, Exploit, Payload, Encoder, Evasion, and Post-Exploitation. Learn their functions and applications in penetration testing.
Add to list
1
Lesons
15 minutes
On-Demand
Free-Video
Conf42
Runtime Kubernetes Security: Threat Detection with Falcosidekick
0
rewiews
Explore runtime Kubernetes security and threat detection using Falcosidekick. Learn practical scenarios, UI demonstrations, and testing techniques for enhanced cluster protection.
Add to list
9
Lesons
23 minutes
On-Demand
Free-Video
Recon Conference
Teaching Old Shellcode New Tricks
0
rewiews
Explore advanced techniques to bypass security measures and enhance Metasploit x86 shellcode, incorporating automation for improved effectiveness in various deployment scenarios.
Add to list
1
Lesons
35 minutes
On-Demand
Free-Video
WEareTROOPERS
Metasploit Hardware Bridge Hacking
0
rewiews
Explore hardware hacking techniques using Metasploit's Hardware Bridge, enabling IoT device exploitation and automotive system penetration testing.
Add to list
1
Lesons
48 minutes
On-Demand
Free-Video
44CON Information Security Conference
Meterpreter Internals
0
rewiews
Dive deep into Meterpreter's inner workings, exploring its lifecycle, Reflective DLL Injection, and migration techniques. Gain technical insights into this powerful Metasploit payload for Windows systems.
Add to list
28
Lesons
56 minutes
On-Demand
Free-Video
44CON Information Security Conference
Meterpreter - Understanding the New Shiny
0
rewiews
Explore Meterpreter's evolution, new features, and advanced techniques for red team engagements. Learn about stageless payloads, transport modification, and persistence to enhance network penetration capabilities.
Add to list
17
Lesons
1 hour 21 minutes
On-Demand
Free-Video
BSidesLV
Is That a Penguin in My Windows?
0
rewiews
Explore Windows Subsystem for Linux: architecture, processes, system calls, and security implications. Learn about cross-process access and Linux-Windows interactions.
Add to list
18
Lesons
40 minutes
On-Demand
Free-Video
DefCamp
Implementing Continuous Offense to Measure and Monitor Cybersecurity Defenses - DefCamp - 2019
0
rewiews
Explore continuous offense techniques to assess and enhance cybersecurity defenses. Learn about breach simulation tools, vulnerability assessment, and practical strategies for improving network security.
Add to list
34
Lesons
34 minutes
On-Demand
Free-Video
Pen Test War Stories - Why My Job Is So Easy and How You Can Make It Harder
0
rewiews
Discover common penetration testing vulnerabilities and learn effective remediation strategies to enhance your organization's cybersecurity posture.
Add to list
25
Lesons
49 minutes
On-Demand
Free-Video
Modern Evasion Techniques
0
rewiews
Explore modern evasion techniques for cybersecurity, including Metasploit tips, email controls, Apache ModRewrite, and PowerShell, with practical demonstrations and expert insights.
Add to list
17
Lesons
46 minutes
On-Demand
Free-Video
Bash Can Get Uglier - Using Bashfuscator to Generate Bash Obfuscation
0
rewiews
Explore advanced Bash obfuscation techniques using Bashfuscator, from basic methods to complex strategies like subshells and parameter expansions, enhancing your scripting skills.
Add to list
19
Lesons
26 minutes
On-Demand
Free-Video
Introducing DeepBlueCLI v2 Now Available in PowerShell and Python
0
rewiews
Explore DeepBlueCLI v2's enhanced features for Windows malware detection, including PowerShell and Python implementations, regex improvements, and automated whitelisting techniques.
Add to list
49
Lesons
52 minutes
On-Demand
Free-Video
VMware Escapology - How to Houdini The Hypervisor
0
rewiews
Explore VMware architecture, vulnerabilities, and escape techniques. Learn about backdoors, PCI, HDFS, and Host Open exploits. Includes live demo and Metasploit module discussion.
Add to list
14
Lesons
47 minutes
On-Demand
Free-Video
Practical Techniques for AV Bypass
0
rewiews
Explore practical techniques for bypassing antivirus software, covering various scenarios, tools, and programming languages to enhance your cybersecurity skills.
Add to list
33
Lesons
1 hour 5 minutes
On-Demand
Free-Video
Designing and Implementing a Universal Meterpreter Payload
0
rewiews
Explore universal Meterpreter payload design and implementation for embedded exploitation, covering system detection, compatibility layers, and event loops. Learn to build custom payloads for various platforms.
Add to list
60
Lesons
52 minutes
On-Demand
Free-Video
Weaponizing Splunk - Using Blue Team Tools for Evil
0
rewiews
Explore how Splunk, a popular security tool, can be exploited for malicious purposes. Learn about vulnerabilities, attack surfaces, and practical demonstrations of potential threats.
Add to list
24
Lesons
32 minutes
On-Demand
Free-Video
RSA Conference
Hacking Exposed - LIVE - Bypassing NextGen
0
rewiews
Live demonstrations of cutting-edge hacking techniques bypassing NextGen solutions, with insights on defensive strategies and audience participation in attack technique discussions.
Add to list
32
Lesons
52 minutes
On-Demand
Free-Video
Learning Mainframe Hacking - Where the Hell Did All My Free Time Go
0
rewiews
Explore mainframe hacking techniques, from initial denial to acceptance, and learn about tools like Metasploit and shell types for effective penetration testing on legacy systems.
Add to list
13
Lesons
27 minutes
On-Demand
Free-Video
Give Me Your Data - Obtaining Sensitive Data Without Breaking In
0
rewiews
Learn techniques for legally obtaining sensitive data, exploring data loss prevention, hardware analysis, and social media investigations with cybersecurity expert Dave Chronister.
Add to list
13
Lesons
53 minutes
On-Demand
Free-Video
Powershell and Windows Throw the Best Shell Parties
0
rewiews
Explore Windows shell parties with PowerShell, learning combat techniques, configuration, and leveraging PowerShell for enhanced system interaction and security testing.
Add to list
15
Lesons
21 minutes
On-Demand
Free-Video
Introduction to Metasploit Post Exploitation Modules
0
rewiews
Explore Metasploit post-exploitation modules: structure, development, and integration. Learn to create effective modules, manage data, and contribute to the framework.
Add to list
24
Lesons
39 minutes
On-Demand
Free-Video
Hack In The Box Security Conference
How Adversary Emulation Can Enhance Blue Team Performance
0
rewiews
Explore adversary emulation to enhance blue team performance, addressing cybersecurity expert shortages and evolving attack methods. Learn to design attack playbooks and test security products effectively.
Add to list
31
Lesons
41 minutes
On-Demand
Free-Video
Black Hat
Industrial Control Systems - Pentesting PLCs 101
0
rewiews
Hands-on workshop exploring penetration testing techniques for industrial control systems, focusing on PLCs. Learn to identify vulnerabilities and attack Siemens and Schneider devices.
Add to list
11
Lesons
51 minutes
On-Demand
Free-Video
Black Hat
Even The LastPass Will Be Stolen, Deal With It!
0
rewiews
Uncover vulnerabilities in LastPass password manager, including methods to steal master passwords, bypass 2FA, and access encrypted vaults, highlighting the importance of robust security measures.
Add to list
1
Lesons
53 minutes
On-Demand
Free-Video
Metasploit Town Hall
0
rewiews
Metasploit experts discuss latest developments, answer questions, and share insights on the popular penetration testing framework in this informative town hall session.
Add to list
1
Lesons
49 minutes
On-Demand
Free-Video
Operating in the Shadows
0
rewiews
Explore stealthy cybersecurity techniques, evading detection methods, and understanding evolving security controls to enhance operational effectiveness in challenging environments.
Add to list
23
Lesons
52 minutes
On-Demand
Free-Video
media.ccc.de
Purple Dome - Kein Schwein greift mich an
0
rewiews
Simulationsumgebung für Hacking-Angriffe: Testen von Sicherheitssystemen, Beobachtung von Reaktionen und Verbesserung der Systemhärtung mit Purple Dome.
Add to list
1
Lesons
33 minutes
On-Demand
Free-Video
Black Hat
XML Out-of-Band Data Retrieval
0
rewiews
Explore innovative XML out-of-band data retrieval techniques for accessing files and resources from victim's machines, even with normal output from vulnerable applications.
Add to list
31
Lesons
30 minutes
On-Demand
Free-Video
Black Hat
Mainframes - The Past Will Come Back to Haunt You
0
rewiews
Unveiling mainframe security: Learn configuration, access methods, and potential vulnerabilities in this eye-opening talk for IT security professionals unfamiliar with mainframe systems.
Add to list
49
Lesons
59 minutes
On-Demand
Free-Video
The Dirty Little Secrets They Didn't Teach You In Pentesting Class
0
rewiews
Uncover advanced penetration testing techniques, from domain admin strategies to post-exploitation tactics. Learn covert persistence methods and efficient data discovery for enhanced cybersecurity assessments.
Add to list
25
Lesons
58 minutes
On-Demand
Free-Video
Win32 Exploit Development With Mona and Metasploit
0
rewiews
Learn advanced Win32 exploit development techniques using Mona and Metasploit, covering vulnerability exploitation, debugging plugins, and protection bypass methods.
Add to list
22
Lesons
58 minutes
On-Demand
Free-Video
Intro to Scanning - Nmap, Hping, Amap, TCPDump, Metasploit, etc.
0
rewiews
Learn essential network scanning tools like Nmap, Hping, Amap, TCPDump, and Metasploit for cybersecurity. Gain practical skills in network analysis and vulnerability assessment.
Add to list
1
Lesons
1 hour 4 minutes
On-Demand
Free-Video
Antipwny - A Windows Based IDS IPS for Metasploit
0
rewiews
Explore a Windows-based IDS/IPS for Metasploit, enhancing network security and threat detection capabilities through innovative defense mechanisms.
Add to list
1
Lesons
26 minutes
On-Demand
Free-Video
Intro to Metasploit Class at IU Southeast
0
rewiews
Learn essential techniques for penetration testing and ethical hacking using Metasploit, covering installation, exploitation, and post-exploitation strategies for network security assessment.
Add to list
1
Lesons
2 hours 27 minutes
On-Demand
Free-Video
Macro Malware Lives - Putting the Sexy Back into MS Office Document Macros
0
rewiews
Explore advanced macro techniques in MS Office for payload delivery, including PowerShell integration, obfuscation methods, and automation strategies for enhanced effectiveness.
Add to list
17
Lesons
35 minutes
On-Demand
Free-Video
Check Your Privileges - Futzing with File Shares for Low Hanging Fruit
0
rewiews
Explore SMB/CIFS vulnerabilities, bad defaults, and privilege escalation techniques in Windows networks. Learn practical security tweaks and tools for identifying and mitigating common file share risks.
Add to list
17
Lesons
44 minutes
On-Demand
Free-Video
The Dark Side of PowerShell
0
rewiews
Explore PowerShell's dark side: offensive techniques, persistence, and defense strategies. Learn to leverage and protect against powerful scripting capabilities in cybersecurity.
Add to list
18
Lesons
40 minutes
On-Demand
Free-Video
Finding Low Hanging Fruit with Kali
0
rewiews
Explore Kali Linux for identifying and exploiting common security vulnerabilities, including unnecessary services, weak passwords, and web-based admin interfaces.
Add to list
13
Lesons
51 minutes
On-Demand
Free-Video
Metasploit Windows Kernel Exploitation
0
rewiews
Explore Windows kernel exploitation using Metasploit, covering vulnerability classes, mitigation techniques, and reliable code execution methods for advanced security professionals.
Add to list
25
Lesons
51 minutes
On-Demand
Free-Video
Tactical Diversion Driven Defense
0
rewiews
Explore tactical diversion-driven defense strategies, including deception warfare, honeypots, and social engineering techniques to enhance network security and thwart potential threats.
Add to list
30
Lesons
24 minutes
On-Demand
Free-Video
Red Team Madness - Or How I Learned To Stop Worrying and Expect Pentester Mistakes
0
rewiews
Explore red team tactics, pentester mistakes, and effective defensive strategies. Learn to detect and respond to various attack techniques, from encrypted drives to brute force attempts.
Add to list
33
Lesons
46 minutes
On-Demand
Free-Video
Red Team Madness - Or How I Learned To Stop Worrying and Expect Pentester Mistakes
0
rewiews
Explore red team tactics, pentester mistakes, and effective blue team strategies. Learn to detect and respond to various attack techniques, from reconnaissance to pass-the-hash attacks.
Add to list
71
Lesons
57 minutes
On-Demand
Free-Video
So You Want to Be a Pentester
0
rewiews
Explore pentesting essentials: tools, strategies, and ethical considerations. Learn from real-world case studies and gain insights into professional penetration testing practices.
Add to list
41
Lesons
55 minutes
On-Demand
Free-Video
Metasploit Intro
0
rewiews
Comprehensive introduction to Metasploit, covering essential techniques and tools for penetration testing and ethical hacking. Ideal for cybersecurity enthusiasts and professionals.
Add to list
1
Lesons
44 minutes
On-Demand
Free-Video
Metasploit Scanning and Pivoting Pwrcycle
0
rewiews
Explore advanced Metasploit techniques for network scanning and pivoting, enhancing your penetration testing skills and understanding of cybersecurity vulnerabilities.
Add to list
1
Lesons
52 minutes
On-Demand
Free-Video
Metasploit Fuzzing and Exploit Development
0
rewiews
Learn advanced Metasploit techniques for fuzzing and exploit development, covering overflows, stack manipulation, and shellcode creation. Gain practical skills inspired by Derbycon's founding.
Add to list
11
Lesons
57 minutes
On-Demand
Free-Video
Meterpreter and Post Exploitation
0
rewiews
Explore advanced Meterpreter techniques and post-exploitation strategies for ethical hacking and penetration testing. Gain insights into sophisticated cybersecurity practices.
Add to list
1
Lesons
54 minutes
On-Demand
Free-Video
Metasploit Townhall
0
rewiews
Explore Metasploit's latest developments and future plans with key team members in this informative townhall discussion from DerbyCon 2016.
Add to list
1
Lesons
44 minutes
On-Demand
Free-Video
A Year in the Empire
0
rewiews
Explore Empire's evolution, new features, and design decisions in this comprehensive overview of the popular post-exploitation framework's development and community impact.
Add to list
37
Lesons
50 minutes
On-Demand
Free-Video
Intro to Kali
0
rewiews
Explore Kali Linux essentials, from passive reconnaissance to active exploitation, covering Google hacking, exploit databases, and Metasploit usage for ethical hacking and cybersecurity.
Add to list
15
Lesons
1 hour 3 minutes
On-Demand
Free-Video
Attackers Perspective - A Technical Demonstration of an Email Phishing Attack
0
rewiews
Explore email phishing attacks from an attacker's perspective, covering reconnaissance, tools, payload delivery, and network enumeration techniques for improved cybersecurity awareness.
Add to list
16
Lesons
44 minutes
On-Demand
Free-Video
Honey I Stole Your C2 Server - A Dive into Attacker Infrastructure
0
rewiews
Explore attacker infrastructure through a Mandiant investigation, covering Metasploit indicators, command and control, encoding, and insights into attacker techniques and tools.
Add to list
30
Lesons
31 minutes
On-Demand
Free-Video
Metasploit Townhall
0
rewiews
Explore Metasploit's latest developments, including Railgun, packet encryption, and REST API, with insights from experts on scalability, automation, and new database models.
Add to list
13
Lesons
42 minutes
On-Demand
Free-Video
load more...