Search the Community

Showing results for tags 'learn'.

The search index is currently processing. Current results may not be complete.


More search options

  • Search By Tags

    Type tags separated by commas.
  • Search By Author

Content Type


Forums

  • General doubts | News
    • General doubts
    • News
  • Hacking | Remote Administration | Bugs & Exploits
    • Hacking
    • Remote Administration
    • Bugs & Exploits
  • Programming | Web | SEO | Prefabricated applications
    • General Programming
    • Web Programming
    • Prefabricated Applications
    • SEO
  • Cracking Zone
  • Security & Anonymity
  • Operating Systems | Hardware | Programs
  • Graphic Design
  • vBCms Comments
  • live stream tv
  • Marketplace
  • Premium Accounts
  • Modders Section
  • PRIV8-Section
  • Cracking Zone PRIV8
  • Carding Zone PRIV8

Blogs

There are no results to display.

There are no results to display.


Find results in...

Find results that contain...


Date Created

  • Start

    End


Last Updated

  • Start

    End


Filter by number of...

Joined

  • Start

    End


Group


About Me


Location


Interests


Occupation


TeamViewer


Twitter


Facebook


Youtube


Google+


Tox

Found 15 results

  1. Udemy Learn Kali Linux and Hack Android Mobile devices Penetration Testing Setup Your Lab Finding Your Way Around Kali Important Tools Exploitation Hacking Android devices Social Engineering Hacking using Android devices Remote attacks On Android Download: [Hidden Content] Pass: [Hidden Content]
  2. [hide] Learn A to Z Android Oreo Build 25+ Apps Course : Type :- Paid ( Download Free ) ɪɴᴛʀᴏᴅᴜᴄᴛɪᴏɴ :-
  3. Complete C# Unity Developer 3D: Learn to Code Making Games Game development & design. Learn C# using Unity Engine. Your first 3D Unity games for web, Mac & PC. This is the long-awaited sequel to the Complete Unity Developer - one of the most popular e-learning courses on the internet! Completely re-worked from scratch with brand-new projects and our latest teaching techniques. You will benefit from the fact we have already taught over 350,000 students programming and game development, many shipping commercial games as a result. Unity is an incredible 3D package used for making video games, architectural and medical imaging and more. The challenge is that it's big and complicated to use, especially for complete beginners to coding and game development. We make learning to code easy and fun by leading you step-by-step through the process of creating exciting games. The projects in the course use a mix of Unity 2017, 2018 and 2019. All sections are 100% compatible with the newer Unity 2019 software updates. This course has full professional-produced English closed-captions. If you're reading this you probably already have everything you need to get started. Unity is a free download. With regular access to an internet connection you'll be able to engage in our thriving community. Even if you have no experience with coding, or with 3D packages, we will guide you through everything from first principles. Starting slow, then building on what you learn, you'll soon have a very solid working knowledge of Unity. Don't take our word for it, please see the amazing reviews students have taken the time to write. We are proud to be transforming lives, and equipping 1000s of people with valuable new skills. We would love you to become one of them now. The course is project-based, so you will not just be learning dry programming concepts, but applying them immediately to real indie games as you go. All the project files will be included, as well as additional references and resources - you'll never get stuck. There are "talking heads", powerful diagrams, quality screencasts and more. For each demo game you build you will follow this process... Be challenged to build the entire game yourself. Be shown step-by step how to build it. Be challenged to apply, and re-apply your knowledge regularly. Prefer to focus on 2D? Check-out our Complete Unity Developer 2D course. Want something a little more advanced? Check-out our epic Unity RPG course. Want to get certified, get a job, or learn environment art - we've got you covered. The green leaf logo is your sign of quality. You will get full lifetime access for a single one-off fee. The creators are qualified and experienced coders and avid gamers, so are able to explain complex concepts clearly, as well as entertain along the way. What this course DOESN'T cover... Here are some things we will not be covering in detail... Art asset creation (assets provided but not made on-screen). Advanced performance optimization. Editor plugins or modifications. Physics engine modification. Anyone who wants to learn to create games: Unity 3D is a fantastic platform which enables you to make production-quality games. Furthermore these games can be created for Windows, MacOS, iOS (even iOS 9), Android and Web from a single source! Note: access to this course comes with an optional, free community site where you can share games and connect with 1000s of other students. Dive in now, you won't be disappointed! Source: [Hidden Content] Download: [Hidden Content] *Note: The file is not mine, I did not upload it to that web page, you can download it and create a mirror to share it here.
  4. dEEpEst

    Learn HTML5 and CSS3

    HTML and CSS are the basic programming languages for web development and design. They are beneficial to learn for developers, marketers, and people in many other disciplines. Learning HTML can be used for situations like formatting a blog or email, working with a CMS, embedding external content on your site, and creating usable content. Cascading Style Sheets or CSS are an important way to control how your Web pages look. CSS can control the fonts, text, colors, backgrounds, margins, and layout. But it can be very difficult to learn CSS, and some people would rather not learn it. By learning CSS you can modify pre-built templates so that they have your colors and styles. Thus you'll have a customized website without a lot of effort. Knowing how to modify the CSS will save you money when you find small problems that you can fix yourself. And as you practice, you'll be able to fix bigger and bigger problems. CSS gives you the opportunity to create sites that look very different from page to page, without a lot of extensive coding. This course going to cover: HTML Basic Tags. CSS - Selectors. CSS - Units & Color codes. CSS - Margin, Padding and Border. CSS - Display, Box-sizing & Positioning. CSS - Font Styling. CSS - Flexbox. CSS - Grid. CSS - Background Properties. CSS - Gradients. CSS - Transform, Transitions and Animations. Bonus - SASS. [Hidden Content]
  5. Complete Kali Linux Tutorial,Complete penetration testing training,Learn Hacking Created by Vishal Patel English What Will I Learn? Footprinting,Scanning,Enumeration,System Hacking,Trojan and Backdoors,Viruses and worms,Denial-of-service,Sniffing,Session Hijacking,Wireless Hacking,Firewall,IDS,Honeypots,Buffer Overflows,Penetration Testing,Cryptography Requirements Basic IT Skill Internet Users You will gain a comprehensive understanding of vulnerability assessment and the tools used in this process. What kind of security measures do you take to protect your facilities, equipment, resources, personnel, and property from damage caused by unauthorized access? In this course, Physical Security, these are questions that we will be answering. Footprinting is the gathering of information related to a particular computer and its users and systems. Reconnaissance is an exploration that is conducted to gain information. Network scanning is the scanning of public or private networks to find out which systems are running, their IP addresses, and which services they are running. In Port Scanning, you will learn how ports can be scanned, how a hacker can break into your network through the ports, and the countermeasures you can take to protect your device or network. Banner grabbing is a technique used to grab information about computer systems on a network and the services running its open ports. In this course you will be introduced to enumeration and the many different uses it has in computer systems. This course will include demos on the different tools and uses of enumeration. In this course you will be learning the fundamentals of Linux. We will be pairing this course with demos with a more in-depth look into some of the fundamentals and tools of Linux. Pentesting is an attack on a system in hopes of finding security weaknesses. In the course Configuring Linux for Pentesting, you will be learning the steps to configure Linux for pentesting and tools used for pentesting on a Linux system. Whenever we login to a computer system, we provide information to identify ourselves. We refer to this as authentication. Ensure that you know everything involved in securing a Windows system against attack. During this course you’ll get into Windows passwords — how they’re created, how they’re stored, and different methods used to crack them. You will take a good look at spyware, the activities it performs, different types of spyware, and the countermeasures needed in order to prevent hackers from utilizing these types of techniques against your company. You will also spend time studying different types of keyloggers. There are three different types of keyloggers that we see used in today’s environments: hardware, software, and kernel/driver keyloggers. Covering Tracks will be going over various ways that attackers have at their disposal to cover any tracks that may lead to their unwanted eviction, or worse yet, to an audit trail that would lead directly back to them. Trojans and Backdoors is the course where our software is going to be going undercover. You will discover what viruses and worms are and how they can infect computers and systems. Sniffers is our course where we take a look at Network Sniffing. Social engineering is the art of extorting employees for information. Become familiar with the following concepts: denial-of-service, distributed denial-of-service, and how the denial-of-service and distributed denial-of-service attacks take place. In the course Session Hijacking, you will learn details about session hijacking, well-known techniques employed by aggressors, the steps involved in session hijacking, various types of session hijacking, tools for hijacking sessions, ways you can protect yourselves from session hijacking, and how pentesting can be used to identify vulnerabilities. Hacking Web and Application Servers, is a course that will give you a good idea about vulnerabilities and attacks available for web servers and web applications. In our course our course Advanced Exploitation Techniques, you will learn what advanced exploitation techniques are and how you can use them in your penetration testing. Who is the target audience? Anyone want to learn how to hack IT Professionals Engineers IT Students Computer Known Network Engineers Internet Users Size: 2.34 GB [torrent file] [HIDE][Hidden Content]]
  6. Udemy Learn Kali Linux and Hack Android Mobile devices Penetration Testing Setup Your Lab Finding Your Way Around Kali Important Tools Exploitation Hacking Android devices Social Engineering Hacking using Android devices Remote attacks On Android [Hidden Content]
  7. Lo que aprenderás 45+ Lectures to teach you how to use your android device to hack into other computers & networks Root and unlock your Android device (For nexus devices only) Spy on computers wirelessly (ARP Spoofing) or by connecting to them using the USB cable (BadUSB Attack) Gain full control over Windows/OSX/Linux devices as soon as you connect your Android device to them Bypass OSX/Windows login screens Create a fake access point with internet connection & spy on clients Install NetHunter on your Android Device (For nexus devices only) Gain full control over any computer in the same network using a number of methdos Install other apps needed for penetration testing Install Kali Linux as a virtual machine inside windows or OSX Discover all wifi networks around you and gather information about them Prepare your Android device to be used to crack Wi-Fi passwords (WEP/WPA/WPA2) Discover devices in the same network & their OS, open ports, running services ...etc Carry out a number of man-in-the-middle attacks Analyse packet files using Wireshark Setup your android device to execute OS commands as soon as connected to a target computer Combine a number of methods to represent real life senarios Secure yourself against the discussed attacks [Hidden Content] [HIDE][Hidden Content]]
  8. Web Security Dojo Web Security Dojo is a virtual machine that provides the tools, targets, and documentation to learn and practice web application security testing. A preconfigured, stand-alone training environment ideal for classroom and conferences. No Internet required to use. Ideal for those interested in getting hands-on practice for ethical hacking, penetration testing, bug bounties, and capture the flag (CTF). A single OVA file will import into VirtualBox and VMware. There is also an Ansible script for those brave souls that want to transform their stock Ubuntu into a virtual dojo. Bow to your sensei! Features vulnerable web applications common web security testing tools popular industry web application security guidelines walk-throughs of several targets (no peeking ahead) no Internet-connect required to use username: dojo password: dojo To install Dojo you first install and run VirtualBox 5 or later, then “Import Appliance” using the Dojo’s OVF file. We have PDF or YouTube for instructions for Virtualbox. The OVA should also be able to be imported and used in various VMware tools, but we do not support this directly at this time. [HIDE][Hidden Content]]
  9. Complete Cyber Security Course - Learn From Scratch Learn WiFi Hacking, Sniffing, Session Hijacking, Denial Of Service Attack, Buffer Overflow and much more! What you will learn Basics Of Cyber Security Installing VM Setting Up Kali Linux Setting Up Windows Machine Powering Up Powershell Becoming Anonymous Online Using Tor and Tails Tor Relays, Bridges, and Obfsproxy Tor Hidden Services and much more! Learn About Cyber Attacks Scanning Networks Cracking WiFi Network Sniffers and SSID, MAC spoofing Session Hijacking DOS - Cyber Attack Hacking Using Buffer Overflow Requirements A computer or Mac with an internet connection Description Welcome to my course "Complete Cyber Security Course - Learn From Scratch". By using this comprehensive course you will learn the basics of Cyber Security, Some of the advanced methods of Cyber attacks and much more.In this course i will assume that you have no prior knowledge about Cyber Security and by the end of the course you will be at advanced level. Learn to launch cyber attacks like a professional hacker. This course will guide you step by step so that you will learn basics and theory of every part. In this complete Cyber Security course you will learn, Basics Of Cyber Security Setting Up The Lab Anonymity Learn To Launch Cyber Attacks In every part first you shall learn the basics and theory then we will cover the main topics. Who is this course for? Anybody who want to learn about Cyber Security Anybody who want to learn about Ethical Hacking Anybody who want to learn about Certified Ethical Hacking Download: [HIDE][Hidden Content]]
  10. Learn Website Hacking / Penetration Testing From Scratch Learn Website Hacking / Penetration Testing From Scratch Free Udemy Course *ONLINE* Full course name: "Learn Website Hacking / Penetration Testing From Scratch" [HIDE][Hidden Content]]
  11. Version 1.0.0

    3 downloads

    Learn Wi-Fi Password Penetration Testing (WEP/WPA/WPA2) 22 Tutorial Videos __________________________________ You can download them for free if you are a PRIV8 user

    $100.00 PRIV8

  12. View File Learn Wi-Fi Password Penetration Testing (WEP/WPA/WPA2) Learn Wi-Fi Password Penetration Testing (WEP/WPA/WPA2) 22 Tutorial Videos __________________________________ You can download them for free if you are a PRIV8 user Submitter dEEpEst Submitted 05/05/19 Category Libro Online Password ********  
  13. COMBOLIST [USER/PASS] PROXYLESS [NO] BOTS [200] [HIDE][Hidden Content]]
  14. Have a good overview of the Java programming language Install Android Studio and setup the environment Debug an Android Application Create a signed APK file to submit to the Google Play Store Use Explicit and Implicit Intents Make use of Fragments Create a Custom List View Create the Android Actionbar Create a custom Toast Use Shared Preferences, Files and SQLite Use the AsyncTask class Handle Android 6 Permissions Save data in an online database (MBAAS - Backendless) and do User management [Hidden Content]