JOIN THE FIRST EVER LIVE WEBINAR BY PENTEST MAGAZINE - SEPTEMBER 30TH
We're extremely happy to invite you to the first ever webinar by PenTest Mag! Hosted by Timothy Hoffman, the talk …
How Simply Browsing The Internet Gives Scammers An Advantage – And What You Can Do About It
Data privacy has become one of the most talked about topics in 2023. According to recent statistics, the data brokering …
Authentication Flood | Wireless Network Attacks [FREE COURSE CONTENT]
This video tutorial presents how to deal with e-mails leading to malicious links. It is a part of our online …
E-Mails Leading to a Malicious Link | Client-Side Exploitation [FREE COURSE VIDEO]
This video tutorial presents how to deal with e-mails leading to malicious links. It is a part of our online …

Bash Introduction for Hackers Part 1
Welcome to Bash Intro for Hackers Part 1! This material was prepared by our instructor Saeed Dehqan for our Wireless …
Brute-Forcing Two-Factor Authentication | Exploiting Authentication and Access Control Mechanisms with Burp Suite [FREE COURSE CONTENT]
In this video tutorial, you will see how to bypass multi-factor authentication with brute-force attacks. It is a part of …
Brute-force attacks with PowerShell [FREE COURSE CONTENT]
In this short tutorial from our PowerShell for Hackers online course Atul Tiwari shows you how to perform a basic …
Authentication Flood | Wireless Network Attacks [FREE COURSE CONTENT]
This video tutorial presents how to deal with e-mails leading to malicious links. It is a part of our online …
Google Dorking [FREE COURSE CONTENT]
In this video from our new Web app attacks and API hacking online course we will see how Google dorking …
Dark Web Search | Practical OSINT and SOCMINT Techniques [FREE COURSE CONTENT]
In this video tutorial, you will see the introduction to Dark Web searching. It is a part of our online …
Introduction to Open-Source Intelligence | OSINT Fundamentals [FREE COURSE CONTENT]
This video tutorial presents the introduction to Open-Source Intelligence (OSINT). It is a part of our online course 'OSINT Fundamentals' …
Bypassing WAFs with WAFNinja [FREE COURSE CONTENT]
In this video from our Bypassing Web Application Firewall course your instructor, Thomas Sermpinis, shows how to install and use a popular WAFNinja …
API brute force attacks [FREE COURSE CONTENT]
In this video from our API Security: Offence and Defence you will learn what an API brute force attack looks …
E-Mails Leading to a Malicious Link | Client-Side Exploitation [FREE COURSE VIDEO]
This video tutorial presents how to deal with e-mails leading to malicious links. It is a part of our online …
Using AutoPWN to get a backdoor | Metasploit Tutorial [FREE COURSE CONTENT
In this video from our Client-side Attacks online course we learn how to set up AutoPWN in Metasploit to generate …
Harvesting email addresses for OSINT [FREE COURSE CONTENT]
In this video from our OSINT for Hackers online course by Atul Tiwari you will learn how to use the …
Fingerprinting WAF with Burp [ FREE COURSE CONTENT]
In this video from our Bypassing Web Application Firewall course your instructor, Thomas Sermpinis, will show you how to fingerprint …
Test Socket | Build a Python Powered Hacking Framework Tutorial [FREE COURSE CONTENT]
This video tutorial is the first step in developing a basic port scanner and adding features. It is a part …
Capture credentials with Wireshark [FREE COURSE CONTENT]
In this video from our ARP Poisoning course we take a look at how we can use Wireshark to capture …
Intercepting Mobile Traffic with Burp Suite - iPhone [FREE COURSE CONTENT]
In this course video by Atul Tiwari from his Mastering Burp Suite course, you will learn how to set up …
2FA Bypass With PowerShell [FREE COURSE CONTENT]
In this video from our PowerShell for Hackers course your instructor, Atul Tiwari, shows how to perform a 2FA bypass …
Improper Error Handling | Penetration testing OWASP Top 10 Vulnerabilities [FREE COURSE CONTENT]
This video tutorial presents how to deal with improper error handling. It is a part of our online course 'Penetration …
Scripting to find named hosts | Golang tutorial [FREE COURSE CONTENT]
Scripting is a crucial skill to make your ethical hacking more streamlined and efficient. In this video from our Pentesting …
Buffer Overflow Shellcode [FREE COURSE CONTENT]
In this video from our Advanced Linux Exploit Development online course instructed by our author and reviewer, Ali Abdollahi, we'll …
How to use the deep web as a force for good: Internet 2.0, Hyperreality and net neutrality
Introduction The deep web houses the dark web’s illegal and provocative material, this paper will attempt to use the deep …
"I've observed a prevailing misconception surrounding the Dark Web" - Interview with Goce Stevanoski
How did you first become aware of the dark web, and what sparked your interest in it? My interest in …
The Social dangers of the dark web
Introduction Using the deep web takes a lot of responsibility, maturity and discipline, as it contains all sorts of malice …
How to protect yourself on the deep web: Tools, evaluation, legality and expectations
This article will provide a comprehensive view in relation to using the deep web. Introduction The deep web can be …

Kismet Wireless: Network Monitoring and Analysis (W72)
Welcome to the In-Depth Course on Kismet Wireless! This comprehensive course is designed to provide you with a deep understanding …
Web Application Penetration Testing (W71)
Enter a short description of the course.
Mastering ChatGPT for Security Applications (W70)
Enter a short description of the course.
Hacking Blockchain based APIs (W69)
Have you ever wondered what the mysterious world of Blockchain is all about? Maybe you have only heard about it in regards to Bitcoin. Blockchain is much more than just a cryptocurrency financial system. With Blockchain, we can push the boundaries of what is possible within the realm of networking and cybersecurity. Join me as we launch a digital adventure into the world of Blockchain based APIs.
