LEARNING FOR LIFE

Get Yourself a Better Life! Free eLearning Download

  • Technical
    • Internet & Networking
    • Security & Hacking
    • AI | Artificial intelligence
    • OS & Server
    • WEB/HTML/CSS/AJAX
    • Database & SQL
    • Programming
    • Perl & PHP
    • .Net & Java
    • Mobile Development
    • C/C++/C#
    • Game Development
    • Unix & Linux
    • MAC OS X
    • Windows
    • OFFICE
    • Operation Systems
    • Hardware
  • Graphic & Media
    • Photography
    • 3D
    • Adobe Product Training
    • Art & Drawing & Painting
    • Film & Film Making
    • Game Designing
    • Music Training
    • Tutorials for designer
  • Business
    • Business & Investing
    • Writing & Affiliate
    • Marketing
    • Sales
    • Economics & Finances
    • Seo & Site Traffic
    • Stock & ForEX
  • Life Stype
    • Self Improvement | MP
    • Mindset | NLP
    • Fashion / Clothing / Grooming
    • Seduction
    • Fighting / Martial Arts
    • Food / Drink / Cooking
    • Health / Fitness / Massage
    • Languages / Accents
    • Magic / Illusions / Tricks
    • Psychology / Body Language
  • Engineering & Science
    • Cultures & History
    • Electrical & Architecture
    • Mathematics & Physics
    • Medical
  • Entertainment
    • Comic
    • Manga
    • Novel
    • Magazine
  • PC Game
    • Mac Game
    • Xbox Game
    • Play Station Game

PluralSight – Post Exploitation With Meterpreter

23/04/2021 Learning for Life Leave a Comment

PluralSight – Post Exploitation With Meterpreter Bookware-KNiSO
English | Size: 248.27 MB
Category: Tutorial

In a penetration test, escalating your privileges and exfiltrating data are some of the most important tasks of the assessment. This course will teach you how to use the Meterpreter tool for post-exploitation tasks [Read more…]

Internet & Networking BOOKWARE, Exploitation, KNiSO, Meterpreter, Pluralsight, Post

SANS SEC642 Advanced Web App Penetration Testing, Ethical Hacking, and Exploitation Techniques

06/02/2020 Learning for Life Leave a Comment

SANS SEC642: Advanced Web App Penetration Testing, Ethical Hacking, and Exploitation Techniques 2015
English | Size: 3.56 GB
Category: CBT


Can Your Web Apps Withstand the Onslaught of Modern Advanced Attack Techniques?
[Read more…]

Security & Hacking 2015, Advanced, Ethical Hacking, Exploitation, Penetration Testing, Sans, SEC642, Techniques, Web App

Windows API Exploitation Recipes Processes, Tokens and Memory RW

15/04/2019 Learning for Life Leave a Comment

Windows API Exploitation Recipes Processes, Tokens and Memory RW
English | Size: 2.11 GB
Category: CBTs


In today’s secured environments, it is almost impossible for Red-Blue Teams to emulate modern adversarial tactics, techniques and procedures using publicly available 3rd party pentesting products. Powerful adversaries typically develop custom code to ensure stealth and undetectability for as long as possible. This course uses a recipe approach to teach Red-Blue teams to do exactly this. In this module, we will specifically look at different techniques to query Process Listing using a variety of Windows APIs. We will also go in-depth into Windows Tokens, different fields and how to get this programmatically. Finally, we will understand how to read-write process memory. [Read more…]

Windows API, Exploitation, Processes, Recipes, Windows

Windows API Exploitation Recipes Processes, Tokens and Memory RW Course Videos

19/02/2019 Learning for Life Leave a Comment

Windows API Exploitation Recipes Processes, Tokens and Memory RW Course Videos
English | Size: 2.1 GB
Category: CBTs


In today’s secured environments, it is almost impossible for Red-Blue Teams to emulate modern adversarial tactics, techniques and procedures using publicly available 3rd party pentesting products. Powerful adversaries typically develop custom code to ensure stealth and undetectability for as long as possible. This course uses a recipe approach to teach Red-Blue teams to do exactly this. In this module, we will specifically look at different techniques to query Process Listing using a variety of Windows APIs. We will also go in-depth into Windows Tokens, different fields and how to get this programmatically. Finally, we will understand how to read-write process memory. [Read more…]

Windows API, Exploitation, Processes, Recipes, Windows

Offensive Security Advanced Windows Exploitation 2 0

25/01/2018 Learning for Life Leave a Comment

Offensive-Security-Advanced Windows Exploitation 2 0
English | Size: 377.83 MB
Category: CBTs


Module 01 – Egghunters
Module 02 – Bypassing NX (update : bypassing DEP)
Module 03 – Custom Shellcode Creation
Module 04 – Venetian Shellcode
Module 05 – Kernel Drivers Exploitation [Read more…]

Internet & Networking Advanced, Exploitation, Offensive, Security, Windows

Offensive Internet of Things (IoT) Exploitation

01/05/2017 Learning for Life Leave a Comment

Offensive Internet of Things (IoT) Exploitation
English | Size: 5.02 GB
Category: CBTs


Offensive Internet of Things (IoT) Exploitation is an in-depth course in IoT security and teaches you how to pentest and exploit the so-called “smart” devices. This online class is taught using practical, real world examples on how to to analyze and pentest hardware, firmware, software components, network communication, mobile apps used to control devices and their radio communication protocols.
[Read more…]

Internet & Networking Exploitation, Internet of Things, IoT, Offensive

Pluralsight – Exploitation – Evading Detection and Bypassing Countermeasures

04/04/2017 Learning for Life Leave a Comment

Pluralsight – Exploitation – Evading Detection and Bypassing Countermeasures
English | Size: 569.65 MB
Category: Tutorial


This course addresses one of the most commonly overlooked areas of the pen testing process, evasion and countermeasure bypass. This course shows you how to remain undetected and penetrate deeper into systems and networks for maximum effectiveness.

You have been provided with a fairly open scope and not many limitations other than the fact that the customer is expecting results. Generally, this means to show your value, you need to have some hacked data along with a set of security remediation recommendations without tipping off the Globomantics customer’s security operations team. In this course, Exploitation: Evading Detection and Bypassing Countermeasures, you’ll learn how to go undetected and penetrate deeper into systems and networks for maximum effectiveness. [Read more…]

Sales Bypassing, Detection, Evading, Exploitation, Pluralsight

Internet of Things Exploitation

16/02/2017 Learning for Life Leave a Comment

Internet of Things Exploitation
English | Size: 4.22 GB
Category: Tutorial


This is the same training given by Aditya Gupta at Black Hat.
Extract and analyze device firmwares
Debugging and Disassembling binaries
Exploitation with UART, SPI and JTAGs
Firmware Dumping
[Read more…]

Internet & Networking Exploitation, Internet, Things

OpSecX.com – Node.js Security Pentesting and Exploitation – NJS

25/12/2016 Learning for Life Leave a Comment

OpSecX.com – Node.js Security Pentesting and Exploitation – NJS
English | Size:912.51 MB
Category: Programming


Node.js® is a platform built on Chrome’s JavaScript runtime for easily building fast, scalable network applications. This new technology is widely getting adopted in various organisations. Like any platform, Node.js has it’s on set of features that developers blindly use without much thought on security. [Read more…]

Programming Exploitation, Node.js, OpSecX.com, Pentesting, Security

Pentester Academy – Android Security and Exploitation for Pentesters

11/08/2016 Learning for Life 1 Comment

Pentester Academy – Android Security and Exploitation for Pentesters

English | Size: 3.00 GB (3,226,409,716 Bytes)
Category: CBTs


Android Security and Exploitation for Pentesters is a course intended for people who want to get started into Android Security, or even who are a bit familiar with the Android security space but want to learn more about Android Application Security. This is a hands-on course where you will get to reverse applications, find security vulnerabilities, perform debugging and API hooking, use tools like Androguard and Drozer, and a lot more.
[Read more…]

Security & Hacking Android, Exploitation, Pentester Academy, Pentesters, Security

  • « Previous Page
  • 1
  • 2
  • 3
  • 4
  • 5
  • Next Page »
  • SQL for Beginners: Learn SQL using MySQL and Database Design | Udemy
  • Best WebRTC Course – Very Informative – 2025 | Udemy
  • Data Visualization with Matplotlib and Seaborn
  • Drawing Basics and Beyond – Sorie Kim
  • Gracious Films – The Rubber-Keyed Wonder (2024)

Meta

  • Log in
  • Entries feed
  • Comments feed
  • WordPress.org

2019 2020 2021 2022 2023 2024 Advanced AWS Azure BBC Beginners BitBook BOOKWARE Certified Cisco Cloud Comic Complete Course Data Design eBook Fundamentals Guide Hybrid iLEARN Introduction JavaScript Learn Learning LinkedIn Linux Lynda Masterclass Microsoft Packt Pluralsight Programming Python Security Skillshare Training Udemy Using XQZT

Copyright © 2025 · Equilibre on Genesis Framework · WordPress · Log in