Using AutoPWN to get a backdoor | Metasploit Tutorial [FREE COURSE CONTENT
In this video from our Client-side Attacks online course we learn how to set up AutoPWN in Metasploit to generate …
Password spraying attacks [FREE COURSE CONTENT]
In this video from our Password Cracking course by Atul Tiwari, we will get acquainted with a nice technique - …
Fuzzing with Metasploit [FREE COURSE CONTENT]
In this free video from our course called The Art of Wi-Fi Fuzzing, we will learn how to perform fuzzing …
Linux Passwords [FREE COURSE CONTENT]
In this short video from our Password Cracking course you will learn how to find Linux passwords. It's a basic …
How GPT Extensions Are Empowering Ethical Hackers in 2024
Disclaimer: This is for educational purposes only. As the cybersecurity landscape grows increasingly complex, ethical hackers are turning to AI-powered …
Building a Simple Python C2C System with GPT Guidance
Disclaimer: This is for educational purposes only. Command-and-Control (C2C) systems are a fascinating and widely misunderstood area of network management …
ChatGPT vs Phishing: Unmasking Automated Mass Phishing Campaigns
Disclaimer: This is for educational purposes only. Phishing scams have plagued email inboxes, text messages, and social media feeds for …
Choosing Your Cyber Ally: ChatGPT vs. WhiteRabbitNeo for Ethical Hackers
Disclaimer: This is for educational purposes only. When it comes to tools for ethical hackers, ChatGPT and WhiteRabbitNeo offer distinct …
Adversarial AI Attacks: Master Offensive Techniques on Image Classifiers (W77)
This hands-on course will teach you how to execute adversarial attacks on image classification models using techniques like : FGSM, BIM, CW, DeepFool, and PGD. You’ll gain practical experience, understand the vulnerabilities of AI systems, and learn how to protect them. Led by AI and cybersecurity expert Hugo Le Belzic, this workshop is ideal for both professionals and enthusiasts looking to deepen their knowledge of AI safety.
Build Ethical Hacking Arsenal with ChatGPT-4o (W76)
AI is all over the news. Politicians are concerned about its potential for Hacking, Phishing and Malware. Is it true? Microsoft has found APTs using ChatGPT already. How good is it? As a Pentester, what are you missing out on? Might AI take over your job? Take this course to stay ahead.
Kubernetes Ethical Hacking (W75)
This course focuses on ethical hacking of Kubernetes, the leading container orchestration platform used by over 50% of organizations. Through simulating attacks, the course aims to identify and exploit vulnerabilities to assess and enhance the system’s security posture.