Created by Chang Tan
Last updated 10/2021
Download Link: https://mega.nz/file/e9dUEbaS#cqs8rh9Jhb12xKMVOknmk2MTEK3HBZGrGFgCsLMj3KI
Tools and Sources are included.
Pass: Downloadforfree
Original Link: https://www.udemy.com/course/introduction-to-exploitzero-day-discovery-and-development/#instructor-1
Last updated 10/2021
What you'll learn
- Fuzzing
- Buffer Overflow Attacks
- Pivoting From One Compromised Windows Machine To Another Box Using RPivot
- How To Offensively Pass Reverse Shells From A Cloud Server To Your Local Home PC Using SSH Tunneling
- Concealing Your Remote Reconnaissance, Scanning, And Crawling Using Tor-over-VPN
- How To Attack A Corporate Ethernet LAN From A Wi-Fi Hotspot Using Proxy ARP Daemons
- Introduction to Egghunters for situations of limited buffer space
- ROP-Chaining to defeat Data Execution Prevention
- Reverse and Bind Shells
- Post Exploitation
- VMWare Hypervisors
- Kali Linux
- Exploit Development
- Debugging Crashed Applications
- edb (Evan's Debugger)
- gdb (GNU Debugger)
- Immunity Debugger
- Netwide Assembly (NASM)
- Metasploit
- Encoding
- Pivoting
- Proxies and Transparent Proxifiers (Proxychains)
- Tunneling
- SSH
- Kernel-based Virtual Machine
- QEMU
- Virtual Private Networks
- IT & Software
- Network & Security
- Hijacking Execution
Download Link: https://mega.nz/file/e9dUEbaS#cqs8rh9Jhb12xKMVOknmk2MTEK3HBZGrGFgCsLMj3KI
Tools and Sources are included.
Pass: Downloadforfree
Original Link: https://www.udemy.com/course/introduction-to-exploitzero-day-discovery-and-development/#instructor-1