Jump to content
YOUR-AD-HERE
HOSTING
TOOLS

Search the Community

Showing results for tags 'learning'.

  • Search By Tags

    Type tags separated by commas.
  • Search By Author

Content Type


Forums

  • Staff Control
    • Staff Announcements
  • General doubts | News
    • General doubts
    • News
  • Hacking | Remote Administration | Bugs & Exploits
    • Hacking
    • Remote Administration
    • Bugs & Exploits
  • Programming | Web | SEO | Prefabricated applications
    • General Programming
    • Web Programming
    • Prefabricated Applications
    • SEO
  • Pentesting Zone
    • Pentesting Accounts
    • Reverse Engineering
  • Security & Anonymity
    • Security
    • Wireless Security
    • Web Security
    • Anonymity
  • Operating Systems | Hardware | Programs
    • Operating systems
    • Hardware
    • PC programs
    • iOS
    • Android
  • Graphic Design
    • Graphic Design
  • vBCms Comments
  • live stream tv
    • live stream tv
  • Marketplace
    • Sell
    • Services
    • Request
  • Pentesting Premium
    • Pentesting Accounts
  • Modders Section
    • Source Codes
    • Manuals | Videos
    • Tools
    • Others
  • PRIV8-Section
    • Exploits
    • Accounts|Dumps
    • Crypter|Binder|Bots
    • Tutorials|Videos
    • Cracked Tools
    • Make Money
    • More Tools
    • Databeses
    • Ebooks
  • Pentesting Zone PRIV8
    • Pentesting Accounts
    • Reverse Engineering
    • Cracker Preview Area
  • Carding Zone PRIV8
    • Carding
    • Phishing
    • Defacing
    • Doxing
    • Special User Premium Preview Area
  • Recycle Bin
    • Recycle
  • Null3D's Nulled Group

Product Groups

  • PRIV8
  • Advertising
  • Access Basic
  • Seller
  • Services

Categories

  • Files
  • Online Book
  • Services

Categories

  • Hacking

Find results in...

Find results that contain...


Date Created

  • Start

    End


Last Updated

  • Start

    End


Filter by number of...

Joined

  • Start

    End


Group


About Me

Found 19 results

  1. Hello. I am a newcomer in the hacking branch of computer science. I know a bit of coding, such as C++ and JavaScript. But I want to expand my knowledge now. Mostly inspired by my Cousin who does ethical hacking for a living. I wish to learn more about hacking, ethical or unethical (hope it doesn't go into unethical), so I can at least connect with/understand my cousin whenever he goes on rambles about coding/hacking at Christmas dinner. Where can I learn hacking in my free time? Thinking about doing this as a hobby. I also wish to learn hacking for free, I would like to know any forums or websites I can learn from.
  2. Practice Questions for Beginners ( For bug bounty Competition/Cyber security ) PicoCTF-Writeup For the sole purpose of proving people did stuff. On a side note... these are the writeups for the few questions we managed to complete. Side note x2: I don't think my team mates are going to add to this anymore but I'm going to also add in the questions that got solved after pico ended and be sad about the simplicity of some of them cough milk. Everything before this commit was solved before pico ended (if it matters) If you'd like to try some of these problems yourself, head on over to PicoGym! For all binary exploitation problems in this writeup, you can find a more detailed explanation here Questions General Skills Cryptography Web Exploitation Forensics Reverse Engineering Binary Exploitation Answers to the Questions : [Hidden Content]
  3. Basic knowledge to get you started What you’ll learn Linux Basic operation Daily use commands Shell Scripting What is expected from you in the IT industry Requirements Start from Scratch Description In this course, you will get to know about basic commands in Linux such as ls, mv, split, tail, head, etc. We will also learn about shell scripts such as loops and how to think about them. New lectures will be added as time progress. This course will get you familiar with all the Unix basics that you need to keep up with current IT standards. This course is structured in such a way that will keep you interested. It will be a miniature course but it would contain all the information that you will need. The first 2 Sections will teach you all the tools necessary to use the command line and start writing your shell scripts4. Learn how to use the command line Be able to write your Shell scripts Automate tasks using Shell scripts Make decisions by using if-else statements Make decisions based on strings, variables, or files How to use arithmetic expressions How to loop through files and folders with for and while loops Learn how to use functions How to deal with variables” scope Create Shell Scripts that solve a real-world problem By the end of the course,, you’ll be writing your Shell Scripts, in particular, you will learn how to: Use the command line Automate tasks using Shell Scripts Create and use variables in your scripts Make decisions by using if-else statements Make decisions based on strings, variables, or files Use arithmetic expressions Loop through files and folders with “for” and “while” loops Use functions Deal with variables’ scope Create Shell Scripts that solve real-world problems and much more… Who this course is for: A beginner who wants to be familiar with IT Linux jobs [Hidden Content] [Hidden Content]
  4. Beginner Learning Materials on Reverse Engineering Video Games Here is a compiled list based on personally recommended learning materials to help people with the process of learning how to reverse engineer video games. I hope it will help others spend more time learning and less time searching. Majority of the collected resources here will be focused on reversing PC games on the Microsoft Windows operating system with x86 assembly in mind over x64 as it is easier to learn. Reversing engineering video games is more often than not related to "game hacking", they come and go together so don't be surprised if some of the learning materials come from such sites/sources. [Hidden Content]
  5. Description Bitcoin is a form of money that only exists online. It’s making headlines around the world, but many people don’t really understand how bitcoin and other cryptocurrencies work. In this course, Tom Geller demystifies bitcoin, revealing the promise and perils of the crypto economy. First, Tom explains what bitcoin is, how it creates an unchangeable ledger, how it compares to traditional money, and how to contextualize the energy expended in keeping bitcoin secure. Next, he explains how to get started by creating a cryptocurrency wallet, buying and selling cryptocurrency, and protecting your transactions. He discusses other top cryptocurrencies and the full-featured programming languages behind some cryptocurrency networks, then explains how derivative assets such as NFTs figure into the landscape. Finally, Tom covers how to track a cryptocurrency payment’s passage precisely, examines threats to cryptocurrency, and goes over connecting with others in cryptocurrency communities. [hide][Hidden Content]]
  6. A machine learning malware analysis framework for Android apps. DroidDetective is a Python tool for analysing Android applications (APKs) for potential malware related behaviour and configurations. When provided with a path to an application (APK file) Droid Detective will make a prediction (using it's ML model) of if the application is malicious. Features and qualities of Droid Detective include: Analysing which of ~330 permissions are specified in the application's AndroidManifest.xml file. Analysing the number of standard and proprietary permissions in use in the application's AndroidManifest.xml file. Using a RandomForest machine learning classifier, trained off the above data, from ~14 malware families and ~100 Google Play Store applications. [hide][Hidden Content]]
  7. Learning Local SEO by Sherry Bonelli Do you need to increase visibility for your business? In this course, instructor Sherry Bonelli shows you how to achieve higher local visibility. Sherry explains the difference between local SEO (search engine optimization) and general SEO and teaches you the local SEO strategies that have the most impact on local search results. She teaches you about how to target keywords and how to leverage Google My Business (GMB) for higher search rankings. Sherry shows you how you can get and manage reviews for higher rankings, create a website that’s friendly to searches as well as users, and build greater trust for your website and brand. While Sherry references Google throughout this course, you can leverage her tips to increase your visibility, no matter the search engine your customers use. [Hidden Content] [Hidden Content]
  8. Description THIS COURSE IS FREQUENTLY UPDATED. LAST UPDATED IN NOVEMBER 2020 *** This Course purchase includes video lectures, practice files, quizzes, & assignments, 1-on-1 instructor support, LIFETIME access and a 100%MONEY-BACK GUARANTEE*** Please note that this course will be continuously getting updated with more videos to keep you up to date on Windows PowerShell. You may see here a lot of production ready automation scripts very soon. Please encourage by enrolling and providing your honest reviews & ratings. You can also demand a lecture on a specific topic of PowerShell which comes under scope of this course. The course is designed to help IT Professionals in starting with Windows PowerShell scripting. You might not find an extremely advanced PowerShell topic in the lectures. Here, prime focus is on the IT professionals who want to learn PowerShell scripting but are hesitating due to less or no knowledge of programming. Topics which may not be Windows PowerShell concepts but are important for developing PowerShell understanding are included which comes as bonus. The course is intend to make people think in terms of automating small daily tasks using PowerShell and improve work efficiency and then gradually move towards complex logical tasks. Once you have completed this course, you will be should be able to fully control even the modules which are not part of our discussion. Important Content: PowerShell Automation Solution for File Purging PowerShell Automation for Scheduled Service restarts Windows Task Scheduler and scheduling PowerShell scripts to run PowerShell Basic Fundamentals PowerShell Programming basics for Absolute Beginners File Handling in PowerShell Scripting PowerShell for Daily life Automation All of the basic concepts of PowerShell have been explained in simple terminology. You will start falling for PowerShell, that is a promise. so Lets start this scripting journey Who this course is for: Students/IT Professionals who desire to automate their or team’s day to day life manual work System Administrator (Beginners ) Aspirants seeking carrier in IT Automation Anyone who want to get basic understanding of coding/scripting Requirements Desire to Automate manual tasks PC/Laptop installed with Windows OS. You should be able to use PC/laptop comfortably. Some basic understanding of command line (Win CMD/Unix Shell) will help quickly picking up [Hidden Content] [hide][Hidden Content]]
  9. Rocket LMS is an online course marketplace with a pile of features that helps you to run your online education business easily. This product helps instructors and students to get in touch together and share knowledge. Instructors will be able to create unlimited video courses, live classes, text courses, projects, quizzes, files, etc and students will be able to use the educational material and increase their skill level. Rocket LMS is based on real business needs, cultural differences, advanced user researches so the product covers your business requirements efficiently. Download Link [hide][Hidden Content]]
  10. VulWebaju is a script that automates to set up your pentesting environment for learning purposes. This script will help you to install common vulnerable applications. Vulnerable webapps that you can install DVWA Owasp Juice Shop Web goat Nodegoat Damm Vulnerable GraphQL Rails Goat OAuth 2.0 Application Xeelab DVWP XSSLab TiredAPI Vulnerable Nginx SSRF Vulnerable Lab Note: This script is only tested in Ubuntu. You can also use it in multiple cloud providers(EC2, Google Compute Engine, Azure virtual machines, DigitalOcean Droplets). [hide][Hidden Content]]
  11. GyoiThon is a growing penetration test tool using Machine Learning. It identifies the software installed on the web server (OS, Middleware, Framework, CMS, etc…) based on the learning data. After that, it executes valid exploits for the identified software using Metasploit. Finally, it generates reports of scan results. It executes the above processing automatically. [hide][Hidden Content]]
  12. i need a machine learning course
  13. I need machine learning using matlab courses
  14. Deep Exploit Fully automatic penetration test tool using Machine Learning. Deep Exploit is fully automated penetration tool linked with Metasploit. Deep Exploit has two exploitation modes. Intelligence mode Deep Exploit identifies the status of all opened ports on the target server and executes the exploit at pinpoint based on past experience (trained result). Brute force mode Deep Exploit executes exploits using all combinations of “exploit module”, “target” and “payload” corresponding to a user’s indicated product name and port number. Deep Exploit’s key features are following. Efficiently execute exploit. If “intelligence mode”, Deep Exploit can execute exploits at pinpoint (minimum 1 attempt). If “Brute force mode”, Deep Exploit can execute exploits thoroughly corresponding to user’s indicated product name and port number. Deep penetration. If Deep Exploit succeeds the exploit to the target server, it further executes the exploit to other internal servers. Operation is very easy. Your only operation is to input one command. It is very easy!! Self-learning. Deep Exploit doesn’t need the “learning data”. Deep Exploit can learn how to method of exploitation by itself (uses reinforcement learning). Learning time is very fast. Deep Exploit uses distributed learning by multi-agents. So, we adopted an advanced machine learning model called A3C. Current Deep Exploit’s version is a beta. But, it can automatically execute following actions: Intelligence gathering. Threat Modeling. Vulnerability analysis. Exploitation. Post-Exploitation. Reporting. [HIDE][Hidden Content]]
  15. ▪️ Digishock 2.0: Machine Learning for Beginners (No Coding) ▫️ The ultimate machine learning course of 2019 This mind-blowing course takes the huge leap from Digishock 1.0 and is for anyone who want to get introduced with Machine Learning and Deep Learning without learning code. This practical hands-on course involves hands-on exercises with numerous tricks and techniques of analytics, advanced predictive concepts to work on to ensure that all are familiarized with the discipline of machine-learning, deep-learning, big data, analytics etc. The USP of the course is that there is no kind of technical knowledge required whatsoever for students who will participate in this course. Enroll now in this mind-blowing machine learning course and be amazed by the technology taught. Who is this course for? Beginners or newbies who are curious about Data Science and machine learning Anyone who has an interest or wants to explore new technologies in machine learning without code Digital Marketers who want to enter into a new field in Machine Learning [Hidden Content]
  16. 4 downloads

    [COURSE] LEARNING TOR AND THE DARKWEB MP4 | Video: AVC 1280x720 | Audio: AAC 48 kHz 2ch | Duration: 1 Hour | 132.3 MB Genre: eLearning | Language: English The dark web-a bastion of encrypted websites that can be visited and hosted anonymously-is home to criminals and privacy-minded citizens alike. In this course, learn about the social and technical underpinnings of the dark web, as well as how you can access and host websites that are hidden from prying eyes. Instructor Mike Chapple provides some history on the dark web and the Tor Browser, the basic software needed to access the dark web and browse the internet anonymously. ━━━━━━━━━━━━━━━━━━━━━ You can download these books and guides for free if you are a PRIV8 user
    $110 PRIV8
  17. View File [COURSE] LEARNING TOR AND THE DARKWEB [COURSE] LEARNING TOR AND THE DARKWEB MP4 | Video: AVC 1280x720 | Audio: AAC 48 kHz 2ch | Duration: 1 Hour | 132.3 MB Genre: eLearning | Language: English The dark web-a bastion of encrypted websites that can be visited and hosted anonymously-is home to criminals and privacy-minded citizens alike. In this course, learn about the social and technical underpinnings of the dark web, as well as how you can access and host websites that are hidden from prying eyes. Instructor Mike Chapple provides some history on the dark web and the Tor Browser, the basic software needed to access the dark web and browse the internet anonymously. ━━━━━━━━━━━━━━━━━━━━━ You can download these books and guides for free if you are a PRIV8 user Submitter dEEpEst Submitted 05/07/19 Category Libro Online Password ********  
  18. Learning with Texts version 1.6.2 suffers from a remote SQL injection vulnerability. View the full article
  19. Wisetail Learning Ecosystem (LE) versions up to 4.11.6 suffer from multiple insecure direct object reference vulnerabilities that allow an attacker to download files and get access to the non-purchased course quiz test via a modified id parameter. View the full article
×
×
  • Create New...

Important Information

We have placed cookies on your device to help make this website better. You can adjust your cookie settings, otherwise we'll assume you're okay to continue.