Jump to content

xerty

Member
  • Posts

    456
  • Joined

  • Last visited

  • Days Won

    67

Everything posted by xerty

  1. Login Page: [Protected content] [Protected content]
  2. [Protected content]
  3. Download: [Protected content]
  4. THE BEST FREE PROXIES CHECKER IN THE COMMUNITY, PRESENTING YOU UNFX PROXY CHECKER! Download: [Protected content]
  5. Download:[Protected content] VirusTotal:[Protected content]
  6. Download: [Protected content] VirusTotal: [Protected content]
  7. eMAPT – Mobile Application Penetration Testing Professional course Android & Mobile App Pentesting Android Architectures Setting up a Testing Environment Android Build Process Reversing APKs Device Rooting Android Application Fundamentals Network Traffic Device and Data Security Tapjacking Static Code Analysis Dynamic Code Analysis iOS & Mobile App Pentesting iOS Architecture Device Jailbreaking Setting up a Testing Environment iOS Build Process Reversing iOS Apps iOS Application Fundamentals iOS Testing Fundamentals Network Traffic Device Administration Dynamic Analysis RAR PASSWORD: [Protected content] Download: [Protected content] [Protected content]
  8. eWPT course content – Web Application Penetration Testing Professional Web Application Penetration Testing Penetration Testing Process Introduction Information Gathering Cross Site Scripting SQL Injections Authentication and Authorization Session Security Flash HTML5 File and Resource Attacks Other Attacks Web Services XPath Penetration Testing Content Management Systems Penetration Testing NoSQL Databases RAR PASSWORD: [Protected content] Download: [Protected content] [Protected content]
  9. eCRE – Reverse Engineering Professional course Reverse Engineering Foundations The Necessary Theory: Part 1 The Necessary Theory: Part 2 The Necessary Theory: Part 3 VA/RVA/OFFSET and PE File Format Practical Reverse Engineering String References and Basic Patching Exploring the Stack Algorithm Reversing Windows Registry Manipulation File Manipulation Anti-Reversing Tricks: Part 1 Anti-Reversing Tricks: Part 2 Anti-Reversing Tricks: Part 3 Code Obfuscation Analyzing Packers and Manual Unpacking Debugging Multi-Thread Applications RAR PASSWORD: [Protected content] Download: [Protected content] [Protected content]
  10. eJPT - Penetration Testing Student course Penetration Testing Prerequisites Introduction Networking Web Applications Penetration Testing Penetration Testing: Preliminary Skills & Programming Introduction to Programming C++ Python Command Line Scripting Penetration Testing Basics Information Gathering Footprinting & Scanning Vulnerability Assessment Web Attacks System Attacks Network Attacks RAR PASSWORD: [Protected content] Download: [Protected content]
  11. Course prerequisites Completion of the eJPT course Course details Course Level: Beginner Time: 18 hours and 48 minutes Includes: 6 videos 19 laboratories | 31 slides Teacher: Lukasz Mikula Content of eCXD – Exploit Development Student course Linux Exploit Development Linux Stack Smashing Linux Exploit Countermeasures & Bypasses Linux Return Oriented Programming Linux Shellcoding Linux Advanced Exploitation Windows Exploit Development Windows Stack Smashing Windows SEH-based Overflows Windows Egghunting Unicode Buffer Overflows Windows Shellcoding Windows Return Oriented Programming Download: [Protected content] Password RAR: [Protected content]
  12. HOW TO DOWNLOAD AND INSTALL VOICEMOD PRO V2.6.0.7 Extract the downloaded files, The password to extract will always be: SkkoL Run VoicemodSetup_2.6.0.7.exe and install the software Copy VoicemodDesktop.exe from the Crack folder into your installation directory, and replace the previous file You now have the full version of Voicemod Pro v2.6.0.7 installed on your PC DOWNLOAD: [Protected content]
×
×
  • Create New...