Udemy – How Hackers Create Undetectable Malware and Viruses

Udemy – How Hackers Create Undetectable Malware and Viruses
English | Size: 277.64 MB
Category: CBTs

You are about to learn how hackers create undetectable malware.Skilled hackers are not using of the shelf products to create malware. They are using sophisticated methods to create malware and viruses that are undetectable my most popular antivirus solutions.You will learm how to install Python and Pip as well as how to install the Veil Framework.You will also learn how to install Metasploit and add the final touches to the Veil Framework.Finally you will be able to create your very own payload with Veil and learn how to encrypt the payload.You will be shown how the payload can be installed on a Windows 10 machine and how it will evade detection by the latest antivirus software.
[Read more…]

David Kadavy – Design for Hackers

David Kadavy – Design for Hackers
English | Size: 557.66 MB
Category: Tutorial

Face it: the old “Frankendesign” approach isn’t working
We’ve all been there: you’re staring at a blank canvas, and suddenly everything is still. You can’t make a single move.

Meanwhile, visions of perfection float in your head, darting in and out of your consciousness. You can’t seem to grab them before they slip away. Even if you could, you fear you couldn’t make them reality.
[Read more…]

PBS Nova – Memory Hackers

PBS Nova – Memory Hackers
English | Size: 1.065 GB
Category: Everything Else

Memory is the glue that binds our mental lives. Without it, we’d be prisoners of the present, unable to use the lessons of the past to change our future. From our first kiss to where we put our keys, memory represents who we are and how we learn and navigate the world. But how does it work? Neuroscientists using cutting-edge techniques are exploring the precise molecular mechanisms of memory. By studying a range of individuals ranging-from an 11-year-old whiz-kid who remembers every detail of his life to a woman who had memories implanted-scientists have uncovered a provocative idea. For much of human history, memory has been seen as a tape recorder that faithfully registers information and replays intact. But now, researchers are discovering that memory is far more malleable, always being written and rewritten, not just by us but by others. We are discovering the precise mechanisms that can explain and even control our memories. The question is-are we ready? [Read more…]

WordPress Security Secure Your Site Against Hackers! by Stone River eLearning

WordPress Security : Secure Your Site Against Hackers! by Stone River eLearning
English | Size: 1.75 GB
Category: CBTs

Fact: over 30,000 websites are hacked everyday. Fact: cybercrime costs the global economy over $450 billion. Fact: over 1.5 million WordPress sites were hacked in a single day this year due to a single vulnerability. Don’t think website security isn’t important. Cyber-criminals are out there using sophisticated software to scan the internet for any type of vulnerable website. Hackers don’t care if your website is big, small, a non-profit, or profit making. A hacked website is worth money to them as they can either extort money from a website owner, or place links or code on the site to support some other type of criminal activity. Online security is of paramount importance to every human being on this planet. This course is for everybody. There is very little use of technical terminology or advanced online procedures. Anyone with basic computer skills can protect any WordPress website by following this course. The course starts with the two biggest causes of hacks on websites and shows you the simple and non-technical ways to protect yourself. The two biggest causes of hacks on WordPress websites are: easily guessed or stolen usernames and password out of date software [Read more…]

Pluralsight – Security for Hackers and Developers – Exploit Development

Pluralsight – Security for Hackers and Developers – Exploit Development
English | Size: 428.15 MB
Category: Tutorial

Developers are busy, but understanding how to exploit software will help you properly prioritize security critical bugs. This course will teach you basic exploits, shellcoding, and return-oriented programming (ROP).

With developers so overloaded, why should you prioritize security fixes? Because hackers are probably writing exploits against your product right now. You need to learn what that process entails to enable a deeper appreciation for the serious defenses needed. [Read more…]

How Hackers Infiltrate Victim’s Computers Using Trojans

How Hackers Infiltrate Victim’s Computers Using Trojans
English | Size: 93.61 MB
Category: Tutorial

What you will get?
– Learn what Trojans are
– Discover the types of Trojans available
– Recognise the tell tale signs of Trojan infection
– Learn about remote administrative tools (RAT)
– How hackers create stubs
– How hackers bind these stubs to other normal files
– See how Trojans infect users computers
– Discover the complete control hackers have
[Read more…]

Pluralsight – Security for Hackers and Developers – Reverse Engineering

Pluralsight – Security for Hackers and Developers – Reverse Engineering
English | Size: 302.47 MB
Category: Tutorial

In this course, you will learn to reverse engineer. That will allow you to protect intellectual property, find vulnerabilities, and pull apart malware. Join me in making the world a little safer.
In the prior courses we learned there are 4 main techniques to secure code: design review, static analysis, manual audit, and dynamic (fuzz) testing. But, once the code is fielded, hackers will begin researching exploits against it.
[Read more…]

PluralSight – Security for Hackers and Developers [Fuzzing]

PluralSight – Security for Hackers and Developers [Fuzzing]
English | Size: 313.40 MB
Category: CBTs

Bugs in software costs the economy billions of dollars each year. In this course, Security for Hackers and Developers: Fuzzing, you are going to turn the tide by learning how to find and fix critical bugs quicker. Hackers have long used a technique called fuzzing to find bugs and software makers must do the same. First, you’ll learn about mutation and generation fuzzing.
[Read more…]

Crackers and Hackers

Crackers and Hackers

Title: Crackers and Hackers
Video Format: MP4
File Size: 2.57 GB
More info
[Read more…]

Crackers and Hackers

Crackers and Hackers

Title: Crackers and Hackers
Video Format: MP4
File Size: 2.57 GB
More info
[Read more…]