• Exclusive

    Hey Guest, unlock an instant 10% bonus discount when you upgrade via the Crypoverse gateway.

  1. lahan

    Bitten Tech's : Tech Hacker Exploitation Course Part #2

    Sales Page : Click Here Download Link : Click Here Password : exploitationcourse Note : This upload only contains 8-14 modules of the titled course, Module 15 is still missing but i will it too in a seperate post soon.
  2. condor226

    Powersploit - Post exploitation Tool

    PowerSploit is a PowerShell Post-Exploitation Framework. Just for education purpose. Enjou :) Link: https://github.com/PowerShellMafia/PowerSploit *** Hidden text: You do not have sufficient rights to view the hidden text. Visit the forum thread! ***
  3. xshadow3773

    WiFi Exploitation Framework

    Link: https://controlc.com/b74eb422
  4. truckerstop

    Exploitation with PowerShell

    Learning about PowerShell exploitation techniques and tools is of vital importance for successfully running red team operations or penetration tests in Windows environments. Download link for the course
  5. diablo0s

    Pluralsight – Exploitation with Kali Linux

    Exploitation with Kali Linux course. Kali Linux provides a powerful set of tools for performing security assessments and penetration tests. This course will teach you how to use some of these tools to exploit vulnerable systems, and ultimately to perform post-exploitation actions. Kali Linux...
  6. Ensiha

    OFFSEC WEB-300: Advanced Web Attacks and Exploitation OSWE

    https://mega.nz/folder/8jVzXbga#qW3HwDv4pBMPFb1ALHl7oQ WEB-300 OSWE Lessons + Videos
  7. tronny

    BlackHat - Android UserLand Fuzzing and Exploitation

    BlackHat - Android UserLand Fuzzing and Exploitation *** Hidden text: You do not have sufficient rights to view the hidden text. Visit the forum thread! ***
  8. tronny

    BlackHat - ASSESSING AND EXPLOITING CONTROL SYSTEM AND IIOT 2020

    BlackHat - ASSESSING AND EXPLOITING CONTROL SYSTEM AND IIOT 2020 *** Hidden text: You do not have sufficient rights to view the hidden text. Visit the forum thread! ***
  9. tronny

    HackSysInc - Windows Kernel Exploitation Fundamentals 2023

    HackSysInc - Windows Kernel Exploitation Fundamentals 2023 *** Hidden text: You do not have sufficient rights to view the hidden text. Visit the forum thread! ***
  10. tronny

    AntisyphonTraining - Modern WebApp PenTesting w Brian King

    AntisyphonTraining - Modern WebApp PenTesting w Brian King *** Hidden text: You do not have sufficient rights to view the hidden text. Visit the forum thread! ***
  11. tronny

    AntisyphonTraining - Windows Post Exploitation, by Kyle Avery

    AntisyphonTraining - Windows Post Exploitation, by Kyle Avery *** Hidden text: You do not have sufficient rights to view the hidden text. Visit the forum thread! ***
  12. gornovskyi

    Windows & Active Directory Exploitation Cheat Sheet and Command Reference

    Hello everyone, here is Windows & Active Directory Exploitation Cheat Sheet and Command Reference by Cas van Cooten. I hope you enjoy it. Link: [https://www.zippyshare.day/4aixLojqe7YM8E7/preview]
  13. carxproveteran

    Ethical Hacking: Network Exploitation Basics

    Ethical Hacking: Network Exploitation Basics Hack Servers and Install a Backdoor What you'll learn Hack into Servers How to do passive renassaince How to setup a Linux/Mac backdoor Use Networking tools *** Hidden text: You do not have sufficient rights to view the hidden text. Visit the forum...
  14. Chiloge

    Ethical Hacking: Network Exploitation Basics

    Ethical Hacking: Network Exploitation Basics Hack Servers and Install a Backdoor*** Hidden text: You do not have sufficient rights to view the hidden text. Visit the forum thread! ***
  15. amieyellow

    OFFSEC WEB-300: Advanced Web Attacks and Exploitation OSWE

    WEB-300 OSWE Lessons + Videos https://mega.nz/folder/8jVzXbga#qW3HwDv4pBMPFb1ALHl7oQ
  16. K

    Course/Tutorial 🌴Drone Hacking- Exploitation and Vulnerabilities🌴

    Link: *** Hidden text: You do not have sufficient rights to view the hidden text. Visit the forum thread! ***
  17. clique

    WEB-300: Advanced Web Attacks and Exploitation Book

    LINK Advanced Web Attacks and exploitation (WEB-300) is an advanced web application security course that teaches the skills needed to conduct white box web app penetration tests. Learners who complete the course and pass the exam earn the OffSec Web Expert (OSWE) certification and will...
  18. tronny

    Udemy - Active Directory Exploitation and Lateral Movement Black-Box

    Udemy - Active Directory Exploitation and Lateral Movement Black-Box 1-2024, by Muhammad Sada *** Hidden text: You do not have sufficient rights to view the hidden text. Visit the forum thread! ***
  19. tronny

    INE - Host & Network Penetration Testing Exploitation 8-2023

    INE - Host & Network Penetration Testing Exploitation 8-2023, by Alexis Ahmed *** Hidden text: You do not have sufficient rights to view the hidden text. Visit the forum thread! ***
  20. tronny

    BHIS - Windows Post Exploitation BootCamp

    BHIS - Windows Post Exploitation BootCamp *** Hidden text: You do not have sufficient rights to view the hidden text. Visit the forum thread! ***
  21. jain

    Bitten Tech Exploitation Course

    https://mega.nz/file/6MNEQDIb#BzTmEeF9uvk_EpCbkd_aq882rBCs3qx5tfvGbEcWcJ4 PASSWORD : exploitationcourse
  22. shccrew

    Multi/Others Exploit Collection (2023)

    Exploit Collection (2023) Download: *** Hidden text: You do not have sufficient rights to view the hidden text. Visit the forum thread! ***
  23. carxproveteran

    Exploitation Cyber Security Course

    Exploitation Cyber Security Course Learn and understand Exploitation In Cyber Security from scratch. A complete beginner's guide. What you'll learn Overcoming Filters Introduction to Solaris Exploitation Advanced Solaris Exploitation OSX Shellcode Fault Injection *** Hidden text: You do not...
  24. carxproveteran

    Ethical Hacking: Network Exploitation Basics

    Ethical Hacking: Network Exploitation Basics Hack Servers and Install a Backdoor What you'll learn Hack into Servers How to do passive renassaince How to setup a Linux/Mac backdoor Use Networking tools *** Hidden text: You do not have sufficient rights to view the hidden text. Visit the forum...
  25. myarena

    Free CISCO Ethical Hacker course

    You can access CISCO's free ethical hacker course at https://skillsforall.com/course/ethical-hacker?courseLang=en-US. You will need to sign up for a free skillsforall account to access the course. This 70-hour intermediate-level course with 34-lab exercises contains the following modules -...
  26. nukemurai turing

    Offensive-Security - AWE - Advanced Windows Exploitation 2.0

    https://teraboxapp.com/s/1qdQywmNUDoUIXtIKKg2baA
  27. davidsnufle

    Others Offensive Internet of Things (IoT) Exploitation

    Link: https://go.linuxia.ir/link/oiote.txt *** Hidden text: You do not have sufficient rights to view the hidden text. Visit the forum thread! ****** Hidden text: You do not have sufficient rights to view the hidden text. Visit the forum thread! ***
  28. anonymous283

    Bitten Tech's : Tech Hacker Exploitation Course Part #2

    Download Link : https://mega.nz/file/6MNEQDIb#BzTmEeF9uvk_EpCbkd_aq882rBCs3qx5tfvGbEcWcJ4 Password : exploitationcourse
  29. sisu13

    PLURALSIGHT - Exploitation with PowerShell

    mega.nz/folder/5fdDxYjC#IKApRuA8HDU6BPL4nP3pEw
  30. franzzen

    List of useful resources for pentesters and hackers

    List of useful resources for pentesters and hackers I present to your attention a list of useful resources, thanks to which you can significantly improve your skill in various aspects of penetration testing and information security: Hacking manuals: ▪️http: //www.ehacking.net/ ▪️http...
  31. carxproveteran

    Ethical Hacking: nmap in depth

    Ethical Hacking: nmap in depth network discovery and exploitation What you'll learn Network sweeping with nmap Enumerate network services Use NSE with nmap Attack network with NSE *** Hidden text: You do not have sufficient rights to view the hidden text. Visit the forum thread! ***
  32. tronny

    EC-Council - Mastering Database Reconnaissance and Skill Exploitation

    EC-Council - Mastering Database Reconnaissance and Skill Exploitation, by Skylar Simmons *** Hidden text: You do not have sufficient rights to view the hidden text. Visit the forum thread! ***
  33. lidl58

    A Guide to Kernel Exploitation Attacking the Core

    A Guide to Kernel Exploitation Attacking the Core *** Hidden text: You do not have sufficient rights to view the hidden text. Visit the forum thread! ***
  34. millonetis

    Kali Exploitation Guide Full Course - 7 days to download

    A really interesting exploitation guide for Kali. https://easyupload.io/jy8sz9
  35. tronny

    Chiron - Computer Network Exploitation

    Chiron - Computer Network Exploitation *** Hidden text: You do not have sufficient rights to view the hidden text. Visit the forum thread! *** Use terabox app in ur android mobile. Then open welfare center, then select daily benefits and watch video. after watching video u will get premium day...
  36. whiteshadow989

    TechHacker Exploitation Course.zip

    Link: *** Hidden text: You do not have sufficient rights to view the hidden text. Visit the forum thread! ****** Hidden text: You do not have sufficient rights to view the hidden text. Visit the forum thread! ***
  37. tronny

    Udemy - Linux Heap Exploitation

    Udemy - Linux Heap Exploitation *** Hidden text: You do not have sufficient rights to view the hidden text. Visit the forum thread! ***
  38. gptchat

    Hacking - The Art of Exploitation

    https://ia800807.us.archive.org/29/items/hacking-the-art-of-exploitation/hacking-the-art-of-exploitation.pdf
  39. DoiXer

    Autopwning: Automated Exploitation for Ethical Hackers

    https://mega.nz/folder/wZhQEZZB#qnl-jbyhAk4Ln9JKb2lNBA
  40. kawbdfawfhj

    Binary/Linux Exploitation Free GitHub Course

    Probably the best I've found on the Internet: https://github.com/nnamon/linux-exploitation-course
  41. kawbdfawfhj

    Python Pickle Module Exploitation

    That's how I exploited a website that was using python pickle and pickletools modules. I wrote this writeup a long time ago and I am now sharing it with you. The website provides 4 store items which can be visited from address/view/product where product is a number from 1 to 4. These 4 items...
  42. tronny

    Windows Post Exploitation, by Kyle Avery

    Windows Post Exploitation, by Kyle Avery *** Hidden text: You do not have sufficient rights to view the hidden text. Visit the forum thread! ***
  43. tronny

    INE - Penetration Testing Exploitation and Post-Exploitation Tactics

    INE - Penetration Testing Exploitation and Post-Exploitation Tactics Bootcamp, by Alexis Ahmed *** Hidden text: You do not have sufficient rights to view the hidden text. Visit the forum thread! ***
  44. Selfesteem

    Advance Exploitation Course + Tools

    Features of This Course - ▪️Make Your Serve FUD - 12 Topics ▪️Convert your Server to mp3,mp4,image ▪️Convert your Server to TXT ▪️Macro Word Exploit ▪️Email spoofing Advance Techniques ▪️Make Your Server Anti Kill ▪️Make Your Own Crypter FUD ▪️Update Your Crypter Stub ▪️FUD Rumpe Generator -...
  45. User3Name

    HACKING: THE ART OF EXPLOITATION

    The goal of this book is to share the art of hacking with everyone. Understanding hacking techniques is often difficult, since it requires both breadth and depth of knowledge. It contains the following topics:: PROGRAMMING NETWORKING SHELLCODE COUNTERMEASURES CRYPTOLOG LINK...
  46. Yawa123

    SQLi/Dork Dork/ Exploitation Scanner

    Download: *** Hidden text: You do not have sufficient rights to view the hidden text. Visit the forum thread! ***
  47. cuthniki

    Others RouterSploit - Exploitation Framework for Embedded Devices

    Link: *** Hidden text: You do not have sufficient rights to view the hidden text. Visit the forum thread! ***
  48. ojihyz288

    PDF: Complete Drone Hacking Guide

    Name: Drone Hacking- Exploitation and Vulnerabilities Pages: 166 Link: *** Hidden text: You do not have sufficient rights to view the hidden text. Visit the forum thread! ***
  49. F0rS3c

    JWT [JSON WEB TOKENS] [EXPLANATION & EXPLOITATION] (0x01)

    WHAT ARE JSON WEB TOKENs AND WHY WE NEED THEM? As we all know, websites uses cookies and sessions to control and maintiain access control and authorization. JWT is also a type of cookies which is used to track the infromation about users. But then you will ask me why we need JWT when we already...
  50. donhoenix

    Browser Exploitation using possible LFI on Safari

    so recently, I was doing some testing and noticed an odd behaviour on safari. while executing arbitrary javascript from a local html file, I was able to open a new finder window, note that this was not an upload window, the same directory containing the executed file was opened (see gif...
Top Bottom