Menú

Mostrar Mensajes

Esta sección te permite ver todos los mensajes escritos por este usuario. Ten en cuenta que sólo puedes ver los mensajes escritos en zonas a las que tienes acceso en este momento.

Mostrar Mensajes Menú

Mensajes - maiman

#1
ASM / Re:Linux Assembly Expert
Diciembre 13, 2018, 05:48:42 PM
No tienes permitido ver los links. Registrarse o Entrar a mi cuenta
No tienes permitido ver los links. Registrarse o Entrar a mi cuenta
Open Security Training Videos (todo  bajado okok)
Course Content:
                      SIZE: 1.85GiB

Assembly Language Primer for Hackers Series (Linux)(!)

1. Assembly Primer for Hackers (Part 1) System Organization
2. Assembly Primer for Hackers (Part 2) Virtual Memory Organization
3. Assembly Primer for Hackers (Part 3) GDB Usage Primer
4. Assembly Primer for Hackers (Part 4) Hello World
5. Assembly Primer for Hackers (Part 5) Data Types
6. Assembly Primer for Hackers (Part 6) Moving Data
7. Assembly Primer for Hackers (Part 7) Working with Strings
8. Assembly Primer for Hackers (Part 8) Unconditional Branching
9. Assembly Primer for Hackers (Part 9) Conditional Branching
10. Assembly Primer for Hackers (Part 10) Functions
11. Assembly Primer for Hackers (Part 11) Functions Stack

Buffer Overflow Primer for Hackers Series(!)

1. Buffer Overflow Primer Part 1 (Smashing the Stack)
2. Buffer Overflow Primer Part 2 (Writing Exit Shellcode)
3. Buffer Overflow Primer Part 3 (Executing Shellcode)
4. Buffer Overflow Primer Part 4 (Disassembling Execve)
5. Buffer Overflow Primer Part 5 (Shellcode for Execve)
6. Buffer Overflow Primer Part 6 (Exploiting a Program)
7. Buffer Overflow Primer Part 7 (Exploiting a Program Demo)
8. Buffer Overflow Primer Part 8 (Return to Libc Theory)
9. Buffer Overflow Primer Part 9 (Return to Libc Demo)

Format String Vulnerability Series(!)

1. Format String Vulnerabilities Primer (Part 1 The Basics)
2. Format String Vulnerabilities Primer (Part 2 Understanding Format Functions)
3. Format String Vulnerabilities Primer (Part 3 Crashing the Program)
4. Format String Vulnerabilities Primer (Part 4 Viewing the Stack)

Metasploit Megaprimer Series (!)

1. Metasploit Megaprimer Part 1 (Exploitation Basics and need for Metasploit) Tutorial
2. Metasploit Megaprimer Part 2 (Getting Started with Metasploit)  Tutorial
3. Metasploit Megaprimer Part 3 (Meterpreter Basics and using Stdapi) Tutorial
4. Metasploit Megaprimer Part 4 (Meterpreter Extensions Stdapi and Priv) Tutorial
5. Metasploit Megaprimer Part 5 (Understanding Windows Tokens and Meterpreter Incognito) Tutorial
6. Metasploit Megaprimer Part 6 (Espia and Sniffer Extensions with Meterpreter Scripts) Tutorial
7. Metasploit Megaprimer Part 7 (Metasploit Database Integration and Automating Exploitation) Tutorial
8. Metasploit Megaprimer Part 8 (Post Exploitation Kung Fu) Tutorial
9. Metasploit Megaprimer Part 9 (Post Exploitation Privilege Escalation) Tutorial
10. Metasploit Megaprimer Part 10 (Post Exploitation Log Deletion and AV Killing) Tutorial
11. Metasploit Megaprimer Part 11 (Post Exploitation and Stealing Data) Tutorial
12. Metasploit Megaprimer Part 12 (Post Exploitation Backdoors and Rootkits) Tutorial
13. Metasploit Megaprimer Part 13 (Post Exploitation Pivoting and Port Forwarding) Tutorial
14. Metasploit Megaprimer Part 14 (Backdooring Executables) Tutorial
15. Metasploit Megaprimer Part 15 (Auxiliary Modules) Tutorial
16. Metasploit Megaprimer Part 16 (Pass the Hash Attack) Tutorial
17. Metasploit Megaprimer Part 17 (Scenario Based Hacking) Tutorial

    (falta)! 

18-Metasploit Megaprimer Part 18 (Railgun Adding Functions)
19-Metasploit Megaprimer Part 19 (Railgun Adding New Dlls)
20-Metasploit Megaprimer Part 19a (Railgun Adding New Dlls On Windows 7)
21-Metasploit Megaprimer Part 20 (Resource Scripts)
22-Metasploit Megaprimer Part 21 (Database Support)
23-Metasploit Megaprimer Part 22 (Using Plugins)
24-Metasploit Megaprimer Part 23 (Meterpreter Api Basics)
25-Metasploit Megaprimer Part 24 (Meterpreter Scripting Migrate Clone)
26-Metasploit Megaprimer Part 25 (Meterpreter Scripting Process Name Search)

Windows Assembly Language Primer (!)

1. Windows Assembly Language Primer Part 1 (Processor Modes)
2. Windows Assembly Language Primer for Hackers Part 2 (Protected Mode Assembly)
3. Windows Assembly Language Primer for Hackers Part 3 (Win32 ASM using MASM32)
4. Windows Assembly Language Primer for Hackers Part 4 (MASM Data Types)
5. Windows Assembly Language Primer for Hackers Part 5 (Procedures)
6. Windows Assembly Language Primer for Hackers Part 6 (Macros)
7. Windows Assembly Language Primer for Hackers Part 7 (Program Control using JMP)
8. Windows Assembly Language Primer for Hackers Part 8 (Decision Directives)
9. Windows Assembly Language Primer for Hackers Part 9 (Loops)

Scenario Based Hacking(!)

1. Scenario Based Hacking Part 1 (No Patches, No AV, Direct Access)
2. Scenario Based Hacking Part 2a (No Patches, No AV, Behind NAT)
3. Scenario Based Hacking Part 3 (OS Patched, No AV, Behind NAT)
4. Scenario Based Hacking Part 4 (OS and Software Patched, No AV, Behind NAT)

Router Hacking Series(!)

1. Router Hacking Part 1 (The Basics)
2. Router Hacking Part 2 (Service Enumeration, Fingerprinting and Default Accounts)
3. Router Hacking Part 3 (Brute forcing and Dictionary Attacks with Hydra)
4. Router Hacking Part 4 (SNMP Attacks using SNMPCheck)
5. Router Hacking Part 5 (SNMP Attacks using SNMPEnum)
6. Router Hacking Part 6 (Dictionary Attack using Metasploit on SNMP)
Este curso cómo se llama o de dónde lo bajaste?

Enviado desde mi Moto E (4) Plus mediante Tapatalk

1- No tienes permitido ver los links. Registrarse o Entrar a mi cuenta  (PenAcad-1)
2- No tienes permitido ver los links. Registrarse o Entrar a mi cuenta (PenAcad-2)
#2
ASM / Re:Linux Assembly Expert
Octubre 29, 2018, 11:04:12 PM
Open Security Training Videos (todo  bajado okok)
Course Content:
                      SIZE: 1.85GiB

Assembly Language Primer for Hackers Series (Linux)(!)

1. Assembly Primer for Hackers (Part 1) System Organization
2. Assembly Primer for Hackers (Part 2) Virtual Memory Organization
3. Assembly Primer for Hackers (Part 3) GDB Usage Primer
4. Assembly Primer for Hackers (Part 4) Hello World
5. Assembly Primer for Hackers (Part 5) Data Types
6. Assembly Primer for Hackers (Part 6) Moving Data
7. Assembly Primer for Hackers (Part 7) Working with Strings
8. Assembly Primer for Hackers (Part 8) Unconditional Branching
9. Assembly Primer for Hackers (Part 9) Conditional Branching
10. Assembly Primer for Hackers (Part 10) Functions
11. Assembly Primer for Hackers (Part 11) Functions Stack

Buffer Overflow Primer for Hackers Series(!)

1. Buffer Overflow Primer Part 1 (Smashing the Stack)
2. Buffer Overflow Primer Part 2 (Writing Exit Shellcode)
3. Buffer Overflow Primer Part 3 (Executing Shellcode)
4. Buffer Overflow Primer Part 4 (Disassembling Execve)
5. Buffer Overflow Primer Part 5 (Shellcode for Execve)
6. Buffer Overflow Primer Part 6 (Exploiting a Program)
7. Buffer Overflow Primer Part 7 (Exploiting a Program Demo)
8. Buffer Overflow Primer Part 8 (Return to Libc Theory)
9. Buffer Overflow Primer Part 9 (Return to Libc Demo)

Format String Vulnerability Series(!)

1. Format String Vulnerabilities Primer (Part 1 The Basics)
2. Format String Vulnerabilities Primer (Part 2 Understanding Format Functions)
3. Format String Vulnerabilities Primer (Part 3 Crashing the Program)
4. Format String Vulnerabilities Primer (Part 4 Viewing the Stack)

Metasploit Megaprimer Series (!)

1. Metasploit Megaprimer Part 1 (Exploitation Basics and need for Metasploit) Tutorial
2. Metasploit Megaprimer Part 2 (Getting Started with Metasploit)  Tutorial
3. Metasploit Megaprimer Part 3 (Meterpreter Basics and using Stdapi) Tutorial
4. Metasploit Megaprimer Part 4 (Meterpreter Extensions Stdapi and Priv) Tutorial
5. Metasploit Megaprimer Part 5 (Understanding Windows Tokens and Meterpreter Incognito) Tutorial
6. Metasploit Megaprimer Part 6 (Espia and Sniffer Extensions with Meterpreter Scripts) Tutorial
7. Metasploit Megaprimer Part 7 (Metasploit Database Integration and Automating Exploitation) Tutorial
8. Metasploit Megaprimer Part 8 (Post Exploitation Kung Fu) Tutorial
9. Metasploit Megaprimer Part 9 (Post Exploitation Privilege Escalation) Tutorial
10. Metasploit Megaprimer Part 10 (Post Exploitation Log Deletion and AV Killing) Tutorial
11. Metasploit Megaprimer Part 11 (Post Exploitation and Stealing Data) Tutorial
12. Metasploit Megaprimer Part 12 (Post Exploitation Backdoors and Rootkits) Tutorial
13. Metasploit Megaprimer Part 13 (Post Exploitation Pivoting and Port Forwarding) Tutorial
14. Metasploit Megaprimer Part 14 (Backdooring Executables) Tutorial
15. Metasploit Megaprimer Part 15 (Auxiliary Modules) Tutorial
16. Metasploit Megaprimer Part 16 (Pass the Hash Attack) Tutorial
17. Metasploit Megaprimer Part 17 (Scenario Based Hacking) Tutorial

    (falta)! 

18-Metasploit Megaprimer Part 18 (Railgun Adding Functions)
19-Metasploit Megaprimer Part 19 (Railgun Adding New Dlls)
20-Metasploit Megaprimer Part 19a (Railgun Adding New Dlls On Windows 7)
21-Metasploit Megaprimer Part 20 (Resource Scripts)
22-Metasploit Megaprimer Part 21 (Database Support)
23-Metasploit Megaprimer Part 22 (Using Plugins)
24-Metasploit Megaprimer Part 23 (Meterpreter Api Basics)
25-Metasploit Megaprimer Part 24 (Meterpreter Scripting Migrate Clone)
26-Metasploit Megaprimer Part 25 (Meterpreter Scripting Process Name Search)

Windows Assembly Language Primer (!)

1. Windows Assembly Language Primer Part 1 (Processor Modes)
2. Windows Assembly Language Primer for Hackers Part 2 (Protected Mode Assembly)
3. Windows Assembly Language Primer for Hackers Part 3 (Win32 ASM using MASM32)
4. Windows Assembly Language Primer for Hackers Part 4 (MASM Data Types)
5. Windows Assembly Language Primer for Hackers Part 5 (Procedures)
6. Windows Assembly Language Primer for Hackers Part 6 (Macros)
7. Windows Assembly Language Primer for Hackers Part 7 (Program Control using JMP)
8. Windows Assembly Language Primer for Hackers Part 8 (Decision Directives)
9. Windows Assembly Language Primer for Hackers Part 9 (Loops)

Scenario Based Hacking(!)

1. Scenario Based Hacking Part 1 (No Patches, No AV, Direct Access)
2. Scenario Based Hacking Part 2a (No Patches, No AV, Behind NAT)
3. Scenario Based Hacking Part 3 (OS Patched, No AV, Behind NAT)
4. Scenario Based Hacking Part 4 (OS and Software Patched, No AV, Behind NAT)

Router Hacking Series(!)

1. Router Hacking Part 1 (The Basics)
2. Router Hacking Part 2 (Service Enumeration, Fingerprinting and Default Accounts)
3. Router Hacking Part 3 (Brute forcing and Dictionary Attacks with Hydra)
4. Router Hacking Part 4 (SNMP Attacks using SNMPCheck)
5. Router Hacking Part 5 (SNMP Attacks using SNMPEnum)
6. Router Hacking Part 6 (Dictionary Attack using Metasploit on SNMP)