Login: Password:  Do not remember me

Categories




Video TrainingRed Team Getting Access w Michael Allen



Red Team Getting Access w Michael Allen

Red Team Getting Access w Michael Allen
English | Tutorial | Size: 15.47 GB

Getting a foothold is the first step in a successful breach—be it in the form of user credentials, email access, or code execution on a target system.

      Read more...         

Video TrainingCyberWarfare Live - Certified AWS Cloud Red Team Specialist



CyberWarfare Live - Certified AWS Cloud Red Team Specialist

CyberWarfare Live - Certified AWS Cloud Red Team Specialist[CARTS]
English | Tutorial | Size: Tutorial



      Read more...         

Video TrainingCyberWarfare Live Certified AWS Cloud Red Team Specialist



CyberWarfare Live Certified AWS Cloud Red Team Specialist

CyberWarfare Live Certified AWS Cloud Red Team Specialist
English | Size: 2.5 GB
Category: Tutorial

AWS Cloud Red Team Course provides in-depth view of AWS core services, Identification of mis-configurations and stealthily abusing them in an Enterprise AWS Cloud Environment.

      Read more...         

Video TrainingRed Team Ops [CRTO]



Red Team Ops [CRTO]

Red Team Ops [CRTO]
English | Size: 635.26 MB
Category: Tutorial

Zero Point Security Red Team Ops

      Read more...         

Video TrainingSektor7 - Evasion Windows Red Team Ops



Sektor7 - Evasion Windows Red Team Ops

Sektor7 - Evasion Windows Red Team Ops
English | Size: 19.60 GB
Category: Ethical hacking

Welcome to Windows Evasion course!
In the modern enterprise Windows environment we often encounter lots of obstacles, which try to detect and stop our sneaky tools and techniques.

      Read more...         

Video TrainingUdemy - Active Directory Pentesting Full Course - Red Team Hacking



Udemy - Active Directory Pentesting Full Course - Red Team Hacking

Active Directory Pentesting Full Course - Red Team Hacking
English | Size: 2.9GB
Category: Hacking

Attacking and Hacking Active Directory
Most enterprise networks today are managed using Windows Active Directory and it is imperative for a security professional to understand the threats to the Windows infrastructure.

      Read more...         

Search



Updates




Friend Sites


» TinyDL
» EbookTra
» 0dayHome

Your Link Here ?
(Pagerank 4 or above)