This is a sample guest message. Register a free account today to become a member! Once signed in, you'll be able to participate on this site by adding your own topics and posts, as well as connect with other members through your own private inbox!
PentesterAcademy - Offensive Internet of Things (IoT) Exploitation
English | Tutorial | Size: 5.18 GB
Offensive Internet of Things (IoT) Exploitation is an in-depth course in IoT security and teaches you how to pentest and exploit the so-called "smart" devices. This online class is taught using...
Pentester Academy - Abusing SQL Server Trusts in a Windows Domain
English | Tutorial | Size: 2.2GB
MS SQL Server is widely used in enterprise networks. Due to its use by third party applications, support for legacy applications and use as a database, SQL Server is a treasure trove for attackers...
Pentester Academy - Windows Kernel Programming - Fundamentals
English | Tutorial | Size: 779.56 MB
In this course, we will learn the fundamentals of Windows kernel programming. We will start with I/O systems and learn how to write simple device drivers. We will also take a look at the I/O...
Pentester Academy - Powershell for Pentesters
English | Tutorial | Size: 1.82 GB
The PowerShell For Penetration Testers (PFPT) is an online course designed for teaching PowerShell to penetration testers, system administrators and other security professionals. You will be able to use and write...
Did you know that you can become an editor and share content? You must send message to
Prohibitive. Get free editor membership now.
This site uses cookies to help personalise content, tailor your experience and to keep you logged in if you register.
By continuing to use this site, you are consenting to our use of cookies.