Available in
days
days
after you enroll
Available in
days
days
after you enroll
- What is a Virtual Machine? (6:03)
- Why Linux? (3:13)
- Downloading Virtual Box & Kali Linux (4:31)
- Important - New Kali Linux Categories (1:25)
- Note: Kali Linux Updates All The Time!
- Creating Our First Virtual Machine (8:45)
- Installing Kali Linux Operating System (11:57)
- Update 1 - New & Old Versions of Kali Linux (6:59)
- Networking Basics
- Full Screen Mode & Network Settings (12:05)
- Note: Getting Familiar With Kali Linux!
- 5 Stages Of A Penetration Test (7:35)
Available in
days
days
after you enroll
Available in
days
days
after you enroll
- What is Information Gathering? (4:40)
- Obtaining IP Address, Physical Address Using Whois Tool (9:57)
- Whatweb Stealthy Scan (8:21)
- Aggressive Website Technology Discovering on IP Range (9:50)
- Note: Same Tools Different Results!
- Gathering Emails Using theHarvester & Hunter.io (9:59)
- How To Download Tools Online (10:34)
- Finding Usernames With Sherlock (7:49)
- Bonus - Email Scraper Tool In Python 3 (6:35)
Available in
days
days
after you enroll
- Theory Behind Scanning (7:19)
- TCP & UDP (4:21)
- Installing Vulnerable Virtual Machine (6:01)
- Netdiscover (6:01)
- Performing First Nmap Scan (8:52)
- Different Nmap Scan Types (10:41)
- ZTM Nmap Cheatsheet
- Discovering Target Operating System (6:00)
- Detecting Version Of Service Running On An Open Port (7:13)
- Filtering Port Range & Output Of Scan Results (11:54)
- What is a Firewall/IDS? (2:29)
- Using Decoys and Packet Fragmentation (12:25)
- Security Evasion Nmap Options (5:28)
- Note: Time To Switch Things Up!
Available in
days
days
after you enroll
Available in
days
days
after you enroll
Available in
days
days
after you enroll
- What is Exploitation? (7:08)
- What is a Vulnerability? (5:24)
- Reverse Shells, Bind Shells ... (2:42)
- Metasploit Framework Structure (13:53)
- Msfconsole Basic Commands (16:53)
- Our First Exploit - vsftp 2.3.4 Exploitation (9:12)
- Misconfigurations Happen - Bindshell Exploitation (4:41)
- Information Disclosure - Telnet Exploit (4:06)
- Software Vulnerability - Samba Exploitation (9:22)
- Attacking SSH - Bruteforce Attack (11:56)
- Exploitation Challenge - 5 Different Exploits (17:52)
- Explaining Windows 7 Setup (8:46)
- Eternal Blue Attack - Windows 7 Exploitation (12:33)
- DoublePulsar Attack - Windows Exploit (15:04)
- BlueKeep Vulnerability - Windows Exploit (9:35)
- Note: We Can Also Target Routers!
- Update 2 - Routersploit (6:25)
- Update 3 - Router Default Credentials (7:02)
Available in
days
days
after you enroll
Available in
days
days
after you enroll
- Generating Basic Payload With Msfvenom (11:30)
- Advance Msfvenom Usage Part 1 (9:48)
- Advance Msfvenom Usage Part 2 (7:30)
- Generating Powershell Payload Using Veil (14:36)
- TheFatRat Payload Creation (7:43)
- Note: My Payloads Are Getting Detected By An Antivirus!
- Hexeditor & Antiviruses (7:09)
- Making Our Payload Open An Image (8:10)
Available in
days
days
after you enroll
Available in
days
days
after you enroll
- What Are We Creating? (2:47)
- Connecting Server And Backdoor (10:22)
- Processing Instructional Commands (6:27)
- Sending and Receiving Data (6:23)
- Executing Commands And Compiling The Program (12:08)
- Changing Directory Inside Of Our Backdoor (6:02)
- Uploading & Downloading Files (10:59)
- Testing All The Commands (8:55)
- Note: You Can Continue Building Onto This Project!
- Exercise: Imposter Syndrome (2:55)
Available in
days
days
after you enroll
- Website Penetration Testing Theory (11:37)
- HTTP Request & Response (4:03)
- Information Gathering & Dirb Tool (8:10)
- Burpsuite Configuration (7:57)
- ShellShock Exploitation (15:51)
- Command Injection Exploitation (11:55)
- Getting Meterpreter Shell With Command Execution (9:18)
- Reflected XSS & Cookie Stealing (16:16)
- Stored XSS (9:06)
- HTML Injection (7:12)
- SQL Injection (21:32)
- CSRF Vulnerability (12:49)
- Hydra Bruteforce Attack Example 1 (10:56)
- Hydra Bruteforce Attack Example 2 (7:06)
- Burpsuite Intruder (7:34)
Available in
days
days
after you enroll
Available in
days
days
after you enroll
Available in
days
days
after you enroll
Available in
days
days
after you enroll
Available in
days
days
after you enroll
Available in
days
days
after you enroll
Available in
days
days
after you enroll
Available in
days
days
after you enroll
- Learning Python (2:05)
- Python Data Types (4:46)
- How To Succeed
- Numbers (11:09)
- Math Functions (4:29)
- DEVELOPER FUNDAMENTALS: I (4:07)
- Operator Precedence (3:10)
- Exercise: Operator Precedence
- Optional: bin() and complex (4:02)
- Variables (13:12)
- Expressions vs Statements (1:36)
- Augmented Assignment Operator (2:49)
- Strings (5:29)
- String Concatenation (1:16)
- Type Conversion (3:03)
- Escape Sequences (4:23)
- Formatted Strings (8:23)
- String Indexes (8:57)
- Immutability (3:13)
- Built-In Functions + Methods (10:03)
- Booleans (3:21)
- Exercise: Type Conversion (8:22)
- DEVELOPER FUNDAMENTALS: II (4:42)
- Exercise: Password Checker (7:21)
- Lists (5:01)
- List Slicing (7:48)
- Matrix (4:11)
- List Methods (10:28)
- List Methods 2 (4:24)
- List Methods 3 (4:52)
- Common List Patterns (5:57)
- List Unpacking (2:40)
- None (1:51)
- Dictionaries (6:20)
- DEVELOPER FUNDAMENTALS: III (2:40)
- Dictionary Keys (3:37)
- Dictionary Methods (4:37)
- Dictionary Methods 2 (7:04)
- Tuples (4:46)
- Tuples 2 (3:14)
- Sets (7:24)
- Sets 2 (8:45)
- Breaking The Flow (2:34)
- Conditional Logic (13:17)
- Indentation In Python (4:38)
- Truthy vs Falsey (5:17)
- Ternary Operator (4:14)
- Short Circuiting (4:02)
- Logical Operators (6:56)
- Exercise: Logical Operators (7:47)
- is vs == (7:36)
- For Loops (7:01)
- Iterables (6:43)
- Exercise: Tricky Counter (3:23)
- range() (5:38)
- enumerate() (4:37)
- While Loops (6:28)
- While Loops 2 (5:49)
- break, continue, pass (4:15)
- Our First GUI (8:48)
- DEVELOPER FUNDAMENTALS: IV (6:34)
- Exercise: Find Duplicates (3:54)
- Functions (7:41)
- Parameters and Arguments (4:24)
- Default Parameters and Keyword Arguments (5:40)
- return (13:11)
- Methods vs Functions (4:33)
- Docstrings (3:47)
- Clean Code (4:38)
- *args and **kwargs (7:56)
- Exercise: Functions (4:18)
- Scope (3:37)
- Scope Rules (6:55)
- global Keyword (6:13)
- nonlocal Keyword (3:21)
- Why Do We Need Scope? (3:38)
- Modules in Python (11:47)
- Quick Note: Upcoming Videos
- Optional: PyCharm (8:19)
- Packages in Python (10:45)
- Different Ways To Import (7:03)
Available in
days
days
after you enroll
Available in
days
days
after you enroll