Python is a powerful and versatile programming language.
For this course, THS has teamed up with s0lst1ce to bring you python from the bare basics all the way to learning how to create different programs and using them to do things such as grabbing HTTP pages and Bruteforcing SSH.
Of course there are also the "getting-to-know-Python" scripts, like flipping coins, rolling dice and creating a working Tic-Tac-Toe computer game!
This course was created with an emphasis on Security with some fun thrown in.
This course covers everything from basic beginner to advanced topics using the Metasploit Framework. This is an essential tool for every pentester and security enthusiast. This course is packed with over 10 hours of video. Once the course is completed, a certification can be issued after passing a written and hands on test (Please note: hands on test will not be "back in action" until early Feb 2019).
certified wireless attack specialist (formerly cwsp)
**Contact GalaxyNinja to purchase this course***SQL Injection (SQLi) has been a common and popular web attack method for many hackers since the early 2000′s. It was estimated recently that 70 percent of the internet is still vulnerable to this type of attack. It is primarily used to compromise databases which contain usernames, passwords, credit card and other sensitive information. It is because of these attacks, that thousands and thousands of internet users have had their email accounts hacked, become victims of identity theft, and more. These attacks have gained popularity in recent years due to the activities of hacker groups such as “Anonymous”, “Lulz Sec”, and others. To see the latest wiki report, click here. Top-Hat-Sec decided to release its own course in learning some of the skills preformed in SQL injection attacks. There are hundreds of techniques however this course outlines what Top-Hat-Sec believes to be the best and most effective way to preform SQL Injection. SQL Injection can be patched. Not every website, or database will be vulnerable. The purpose of this course shows how these vulnerabilities are attacked. Any network administrator or database admin should be educated in this area. Top-Hat-Sec believes that if an individual or company is going to store information in a database, especially when the database contains sensitive information, it is the duty of that individual or company to protect that information from black-hat hackers. This course does not focus on how to patch these vulnerabilities. This is done through script filtering and should be handled by an experienced developer and/or administrator familiar with SQL injection patching. Each database is different, therefore the filter used will most probably need to be customized for the particular needs of the database or website.
*T-shirt is 1336 design in L to 3XL only. Quantity is limited.
THS Reversing Mini-Series
You must download ollydbg to follow along with the video series as a minimum however I recommend all of the following programs.