PentesterAcademy All Courses


Cookies

28
Rep
1,363
Likes

Administrator
 
Posts: 2,162
Likes: 1,363
Joined: Jul 29, 2019
Credits: 2,571

  • Rich
  • Gift Upgrade
  • Youtube
  • GFX Guru
  • Liked
  • Gold Membership Award
  • Facebook
  • Discord
  • Rich Bitch
  • Legend
  • Leak God
  • Genius
  • Legendary Membership Award
  • Legalize it
  • Bronze Tutorial

Staff Team
Offline
[Image: labsbanner-1.png]


PentesterAcademy All Courses - Free Download


Course Catalog


Python for Pentesters
This course will teach you Python scripting and its application to problems in computer and network security. This course is ideal for penetration testers, security enthusiasts and network administrat...

Attacking and Defending Active Directory
The importance of Active Directory in an enterprise cannot be stressed enough. Used by more than 90% of Fortune 1000 companies, the all-pervasive AD is the focal point ..

x86 Assembly Language and Shellcoding on Linux
This course focuses on teaching the basics of 32-bit assembly language for the Intel Architecture (IA-32) family of processors on the Linux platform and applying it to Infosec. Once we are through wit...

x86_64 Assembly Language and Shellcoding on Linux
This course focuses on teaching the basics of 64-bit assembly language for the x86_64 family of processors on the Linux platform and applying it to Infosec. Once we are through with the basics, we wil...

Javascript for Pentesters
In this course, we will be learning how to use Javascript for Pentesting.

Linux Forensics
This course will familiarize students with all aspects of Linux forensics. By the end of this course students will be able to perform live analysis, capture volatile data, make images of media, ana...

Pentesting with Metasploit
This course is ideal for penetration testers, security enthusiasts and network administrators.
A non-exhaustive list of topics to be taught includes:
Metasploit Basics and Fram...

Wi-Fi Security and Pentesting
This course is ideal for penetration testers, security enthusiasts and network administrators.
A non-exhaustive list of topics to be taught includes:
Bypassing WLAN Authe...

Exploiting Simple Buffer Overflows on Win32
In this course, we will look at how to exploit Simple Buffer Overflows on Win32 systems. This is an introductory course and starts from the very basics of exploitation and is beginner friendly. We wil...

USB Forensics and Pentesting
This course will cover USB in detail with an emphasis on understanding USB Mass Storage devices (also known as flash drives or thumb drives).By the end of this course students will know how to snif...

Pentesting iOS Applications
This course focuses on the iOS platform and application security and is ideal for pentesters, researchers and the casual iOS enthusiast who would like to dive deep and understand how to analyze and sy...

Make your own Hacker Gadget
All of us have heard about or used Hacker Gadgets like the WiFi Pineapple, Minipwner, Pwn Plug, R00tabaga etc. They are fantastic to use for demos, in social engineering tasks, explaining security imp...

Scripting Wi-Fi Pentesting Tools in Python
In this course we will learn how to create Wi-Fi Pentesting tools - sniffer and packet injectors using Python. We will look at both using libraries like scapy and working with raw sockets.

GNU Debugger Megaprimer
This course will cover the basics of using GDB on Linux - x86, x86_64 and ARM based platforms.

WAP Challenges
We will be hosting interesting web application security challenges in this section for our students to try out. Challenges will be categorized into Beginner, Intermediate and Advanced Levels. We will ...

Pentesting Challenges
In this section we will be posting Pentesting Challenges from multiple topics such as Web App, Network, Shellcoding, Metasploit, Mobile Apps, Reversing and Exploit Development.

PCAP to XML and SQLITE
PCAP2XML is a tool suite which takes 802.11 PCAP trace files as input and can convert them into XML or SQLITE representations. This allows a pentester to run arbitrary queries on the packet header fie...

Airodump-NG Scan Visualizer
Airodump-NG Scan Visualizer allows you to filter, sort and visualize Airodump-NG scan data. The tool currently uses the CSV file generated by Airodump-NG with the -w option and can work locally or as ...

Web Application Pentesting
A beginner friendly introduction to Web Application Security with starts from the very basics of the HTTP protocol and then takes on more advanced topics.

Network Pentesting
A non-exhaustive set of topics covered include:

Pentesting Routers
Attacking SSH with Metasploit, Nmap, Medusa, Hydra, Ncrack
SNMP attacks
Bypassing Fir...

Powershell for Pentesters
The PowerShell For Penetration Testers (PFPT) is an online course designed for teaching PowerShell to penetration testers, system administrators and other security professionals. You will be able to u...

Windows Forensics
This course will familiarize students with all aspects of Windows forensics.By the end of this course students will be able to perform live analysis, capture volatile data, make images of medi...

Data Science and Machine Learning for Infosec
The age of intelligent machines is here! We are now seeing Machine Learning disrupting every technological field including computer security. As more and more security products use Machine Learning, i...

Abusing SQL Server Trusts in a Windows Domain
MS SQL Server is widely used in enterprise networks. Due to its use by third party applications, support for legacy applications and use as a database, SQL Server is a ...

Embedded/IoT Linux for Red-Blue Teams
This course is a deep dive into Embedded/IoT firmware where we will start from the very basics - understand the multistage boot process, the kernel and root filesystem, how to build them with a cus...

OSINT: Fun with Open Source Intelligence
A good primer on OSINT, this course explains what Open Source Intelligence is and also covers types of OSINT sources, ethics and grey areas, useful tools available for ..

Pandas for Pentesters
We are now living in a Big Data world - billions of devices communicating over millions of networks and generating petabytes of data, both at rest and in transit! Security professionals now encounter ...

Wi-Fi Monitoring for Red-Blue Teams
This course focuses on the tools, techniques and procedures to monitor 802.11ac/n networks. We will be learning about both USB and Access Point hardware, pros and cons, and scalable architectures. ...

Windows API Exploitation Recipes: Processes, Tokens and Memory RW
In today's secured environments, it is almost impossible for Red-Blue Teams to emulate modern adversarial tactics, techniques and procedures using publicly available 3rd party pentesting products. Pow...

Hacker Project: SMS Controlled Pentest Bot
In this Hacker Project we will learn how to create an SMS controlled Pentesting Bot! This bot will be able to run nmap scans on your command from anywhere in the world
[Image: smile.png]


Key concepts you w...

Getting started with Pentesting using the Raspberry Pi
In this short class you will learn the basics of how to use the affordable Raspberry Pi as a penetration testing platform running Kali Linux. Starting with the basics of what hardware to acquire and ...

Traffic Analysis: TSHARK Unleashed
Most of us have used Wireshark either academically or professionally for traffic analysis. Its a great tool for microscopic analysis of what is happening in the network...

WMI Attacks and Defense
Windows Management Instrumentation (WMI) has been used by Windows administrators for various system management operations since Windows NT. As WMI is often used to automate administrative tasks, it...

Reverse Engineering Linux 32-bit Applications
This course will familiarize students with all aspects of reverse engineering (reversing) Linux 32-bit applications for the purposes of locating flaws and developing ex...

Reverse Engineering Win32 Applications
This course will familiarize students with all aspects of reverse engineering (reversing) Windows 32-bit applications for the purposes of locating flaws and developing ...

VoIP Traffic Analysis
Today, all enterprises, large and small depend on VoIP to provide voice communication both internally and externally to the company. Most organizations even have dedicated Voice VLANs and/or physic...

Windows Red Team Lab
This is a companion course for our Windows Red Team Lab. It does however touch upon interesting concepts you can learn whe...

ARM Assembly
ARM processors now power billions of mobile and IoT devices today! Understanding the basics of ARM assembly provides the foundation for diving deep into ARM exploitation and reverse engineering. This ...

Ongoing Courses
Let the Games Begin!

Linux Rootkits for Red-Blue Teams
Linux dominates the Server, Embedded and now the Internet of Things (IoT) device market. In recent times, embedded systems and IoT devices in particular have been the w...

Reconnaissance for Red-Blue Teams
Reconnaissance the first and probably most important step of pentesting and red-blue teaming exercises. A well done recon can help prioritize which systems to go behind first and to dedicate more t...

DevSecOps: Insecure Docker Registry
Many organizations deploy private registry servers in their internal/external application development/deployment environment. Unfortunately, most often, these servers are not securely deployed. In th...

Reverse Engineering for ARM Platforms
This course will familiarize students with all aspects of writing Assembly code on the ARM platforms. By the end of this course students will be able to understand and ...


Hidden content
You need to reply or upgrade your account in order to see the additional content.
 

size_t

0
Rep
0
Likes

Eleaks Member
 
Posts: 1
Likes: 0
Joined: Aug 4, 2020
Credits: 1


Offline
You're amazing, thanks alot :)