Course Catalog
Python for Pentesters
This course will teach you Python scripting and its application to problems in computer and network security. This course is ideal for penetration testers, security enthusiasts and network administrat...
View Details
Windows Process Injection for Red-Blue Teams
In this course, we will understand the basics of Windows processes, virtual memory and different techniques to enumerate processes. Then we will look at the fundamentals of process injection and tr...
View Details
x86 Assembly Language and Shellcoding on Linux
This course focuses on teaching the basics of 32-bit assembly language for the Intel Architecture (IA-32) family of processors on the Linux platform and applying it to Infosec. Once we are through wit...
View Details
x86_64 Assembly Language and Shellcoding on Linux
This course focuses on teaching the basics of 64-bit assembly language for the x86_64 family of processors on the Linux platform and applying it to Infosec. Once we are through with the basics, we wil...
View Details
Javascript for Pentesters
In this course, we will be learning how to use Javascript for Pentesting.
View Details
Linux Forensics
This course will familiarize students with all aspects of Linux forensics. By the end of this course students will be able to perform live analysis, capture volatile data, make images of media, ana...
View Details
Pentesting with Metasploit
This course is ideal for penetration testers, security enthusiasts and network administrators.
A non-exhaustive list of topics to be taught includes:
- Metasploit Basics and Fram...
View Details
Wi-Fi Security and Pentesting
This course is ideal for penetration testers, security enthusiasts and network administrators.
A non-exhaustive list of topics to be taught includes:
- Bypassing WLAN Authe...
View Details
Exploiting Simple Buffer Overflows on Win32
In this course, we will look at how to exploit Simple Buffer Overflows on Win32 systems. This is an introductory course and starts from the very basics of exploitation and is beginner friendly. We wil...
View Details
USB Forensics and Pentesting
This course will cover USB in detail with an emphasis on understanding USB Mass Storage devices (also known as flash drives or thumb drives).By the end of this course students will know how to snif...
View Details
Pentesting iOS Applications
This course focuses on the iOS platform and application security and is ideal for pentesters, researchers and the casual iOS enthusiast who would like to dive deep and understand how to analyze and sy...
View Details
Make your own Hacker Gadget
All of us have heard about or used Hacker Gadgets like the WiFi Pineapple, Minipwner, Pwn Plug, R00tabaga etc. They are fantastic to use for demos, in social engineering tasks, explaining security imp...
View Details
Scripting Wi-Fi Pentesting Tools in Python
In this course we will learn how to create Wi-Fi Pentesting tools - sniffer and packet injectors using Python. We will look at both using libraries like scapy and working with raw sockets.
This ...
View Details
GNU Debugger Megaprimer
This course will cover the basics of using GDB on Linux - x86, x86_64 and ARM based platforms.
View Details
WAP Challenges
We will be hosting interesting web application security challenges in this section for our students to try out. Challenges will be categorized into Beginner, Intermediate and Advanced Levels. We will ...
View Details
Pentesting Challenges
In this section we will be posting Pentesting Challenges from multiple topics such as Web App, Network, Shellcoding, Metasploit, Mobile Apps, Reversing and Exploit Development.
View Details
Windows System Programming: Fundamentals
Windows System Programming: Fundamentals course will take you through the basics of getting started with system programming on Windows.
A non-exhaustive list of topics covered include...
View Details
PCAP to XML and SQLITE
PCAP2XML is a tool suite which takes 802.11 PCAP trace files as input and can convert them into XML or SQLITE representations. This allows a pentester to run arbitrary queries on the packet header fie...
View Details
Airodump-NG Scan Visualizer
Airodump-NG Scan Visualizer allows you to filter, sort and visualize Airodump-NG scan data. The tool currently uses the CSV file generated by Airodump-NG with the -w option and can work locally or as ...
View Details
Web Application Pentesting
A beginner friendly introduction to Web Application Security with starts from the very basics of the HTTP protocol and then takes on more advanced topics.
View Details
Network Pentesting
A non-exhaustive set of topics covered include:
- Pentesting Routers
- Attacking SSH with Metasploit, Nmap, Medusa, Hydra, Ncrack
- SNMP attacks
- Bypassing Fir...
View Details
Powershell for Pentesters
The PowerShell For Penetration Testers (PFPT) is an online course designed for teaching PowerShell to penetration testers, system administrators and other security professionals. You will be able to u...
View Details
Windows Forensics
This course will familiarize students with all aspects of Windows forensics.By the end of this course students will be able to perform live analysis, capture volatile data, make images of medi...
View Details
Data Science and Machine Learning for Infosec
The age of intelligent machines is here! We are now seeing Machine Learning disrupting every technological field including computer security. As more and more security products use Machine Learning, i...
View Details
WinDbg Fundamentals: User Mode
In this course you will learn the fundamentals of using WinDgb for user mode debugging.
View Details
WinDbg Fundamentals: Kernel Mode
In this course, you will learn the fundamentals of using WinDgb for kernel mode debugging.
View Details
Abusing SQL Server Trusts in a Windows Domain
MS SQL Server is widely used in enterprise networks. Due to its use by third party applications, support for legacy applications and use as a database, SQL Server is a ...
View Details
Embedded/IoT Linux for Red-Blue Teams
This course is a deep dive into Embedded/IoT firmware where we will start from the very basics - understand the multistage boot process, the kernel and root filesystem, how to build them with a cus...
View Details
OSINT: Fun with Open Source Intelligence
A good primer on OSINT, this course explains what Open Source Intelligence is and also covers types of OSINT sources, ethics and grey areas, useful tools available for ...
View Details
Pandas for Pentesters
We are now living in a Big Data world - billions of devices communicating over millions of networks and generating petabytes of data, both at rest and in transit! Security professionals now encounter ...
View Details
Wi-Fi Monitoring for Red-Blue Teams
This course focuses on the tools, techniques and procedures to monitor 802.11ac/n networks. We will be learning about both USB and Access Point hardware, pros and cons, and scalable architectures. ...
View Details
Windows API Exploitation Recipes: Processes, Tokens and Memory RW
In today's secured environments, it is almost impossible for Red-Blue Teams to emulate modern adversarial tactics, techniques and procedures using publicly available 3rd party pentesting products. Pow...
View Details
Hacker Project: SMS Controlled Pentest Bot
In this Hacker Project we will learn how to create an SMS controlled Pentesting Bot! This bot will be able to run nmap scans on your command from anywhere in the world :)
Key concepts you w...
View Details
Traffic Analysis: TSHARK Unleashed
Most of us have used Wireshark either academically or professionally for traffic analysis. Its a great tool for microscopic analysis of what is happening in the network...
View Details
Memcache Reconnaissance for Red-Blue Teams
Reconnaissance the first and probably most important step of pentesting and red-blue teaming exercises. A well done recon can help prioritize which systems to go behind first and to dedicate more t...
View Details
WMI Attacks and Defense
Windows Management Instrumentation (WMI) has been used by Windows administrators for various system management operations since Windows NT. As WMI is often used to automate administrative tasks, it...
View Details
Reverse Engineering Linux 32-bit Applications
This course will familiarize students with all aspects of reverse engineering (reversing) Linux 32-bit applications for the purposes of locating flaws and developing ex...
View Details
Reverse Engineering Win32 Applications
This course will familiarize students with all aspects of reverse engineering (reversing) Windows 32-bit applications for the purposes of locating flaws and developing ...
View Details
VoIP Traffic Analysis
Today, all enterprises, large and small depend on VoIP to provide voice communication both internally and externally to the company. Most organizations even have dedicated Voice VLANs and/or physic...
View Details
ARM Assembly
ARM processors now power billions of mobile and IoT devices today! Understanding the basics of ARM assembly provides the foundation for diving deep into ARM exploitation and reverse engineering. This ...
View Details
Windows System Programming: Processes and Threads
This course focuses on threads and processes. We will learn everything about processes, jobs, and threads. At the end of the course, we will look at creating multiple threads applications with windows...
View Details
Windows System Programming: Security
In this course, we will start with fundamentals concepts in windows security, followed by learning how to work with security ids and access tokens. And finally, we will look at how to secure kernel ob...
View Details
Windows Kernel Programming: Processes and Threads Monitoring
In this course, we will start with general kernel programming techniques and then take a look at various notifications supported by the kernel. In the last module, we will cover how to build a process...
View Details
Windows Kernel Programming: Fundamentals
In this course, we will learn the fundamentals of Windows kernel programming. We will start with I/O systems and learn how to write simple device drivers. We will also take a look at the I/O request p...
View Details
Windows System Programming: Memory Management
This course focuses on the fundamentals of memory management. We will learn how to use windows API to interact with and manipulate memory. Once we have covered the fundamentals, we will look at memory...
View Details
Ongoing Courses Let the Games Begin!
Linux Rootkits for Red-Blue Teams
Linux dominates the Server, Embedded and now the Internet of Things (IoT) device market. In recent times, embedded systems and IoT devices in particular have been the w...
View Details
DevSecOps: Insecure Docker Registry
Many organizations deploy private registry servers in their internal/external application development/deployment environment. Unfortunately, most often, these servers are not securely deployed. In th...
View Details
Reverse Engineering for ARM Platforms
This course will familiarize students with all aspects of writing Assembly code on the ARM platforms. By the end of this course students will be able to understand and ...
View Details
iOS Penetration Testing: The Basics
In this course, we will look at the basics of iOS Penetration Testing
View Details