-
Similar Content
-
By itsMe
Hidden Content
Give reaction to this post to see the hidden content. What you'll learn
WordPress Core Architecture
How to find Vulnerabilities in WordPress Sites
How Hacker Exploit Vulnerabilities in WordPress
How to Increase Security of WordPress Sites
How to Defend Against WordPress Attacks
This course includes:
1.5 hours on-demand video
14 downloadable resources
Full lifetime access
Access on mobile and TV
Certificate of completion
Requirements
Basic Ethical Hacking Knowledge
Basic knowledge of websites and web applications
Knowledge of PHP Language
Description
Did you know that more than 30% of websites on internet are based on WordPress and more than 42% of online shopping sites are using WordPress as E-commerce solution.
WordPress is robust and powerful open source website creation tool. In this course we are going to see the vulnerabilities in WordPress based sites We will start this course by looking into the core architecture of WordPress like How WordPress works? How themes work in WordPress? What are plugins and how to create plugins? Then will looking into information gathering phase of WordPress. We will see how to do version detection and how to gather user information. We will also try to find vulnerabilities in WordPress themes and plugins.
After that we will see how to exploit these vulnerabilities and gain access to WordPress site. We will also try and gain access to complete server using WordPress site. Then Will see how to write malware code and exploit WordPress site on different levels. After looking into WordPress vulnerabilities we will see how to secure WordPress sites. We will provide you step by step information to secure your new WordPress site as well as existing WordPress sites.
Who this course is for:
Web developers interested in WordPress Security
Ethical Hackers who wants to learn about WordPress Security
People who wants to Secure their own or company WordPress site
Hidden Content
Give reaction to this post to see the hidden content.
Hidden Content
Give reaction to this post to see the hidden content. -
By itsMe
Hidden Content
Give reaction to this post to see the hidden content. What you'll learn
Introduction to Blockchain
Decentralization
Immutability
Anonymity
Cryptography
Benefits of Blockchain
Disadvantages of Blockchain
General Data Protection Regulation (GDPR)
Transactions on the Blockchain
Electronic Cash
Smart Contracts
Blockchain 2.0
e-Estonia
Banking the Unbanked
Cryptocurrencies
Public and Private Keys
Cryptocurrency Wallets
Creation of Personal Token/Coin
Main Cryptocurrencies
Bitcoin (BTC), Ethereum (ETH) and others
Ethereum Blockchain
SegWit
Smart Contracts
Symmetrical Cryptography
Asymmetrical Cryptography
Hashing
Multisig- Multi Signature Cryptography
Hybrid Cryptography
What are ITOs/ICOs
Phishing and Fake ICOs
Transactions, Hash Function and Hash Value
Merkle Tree
Mining Bitcoin
Proof of Work (PoW)
Proof of Stake (PoS)
Delegated Proof of Stake (DPoS)
Proof of Authority (PoA)
Proof of Burn (PoB)
Directed Acyclic Graph
Byzantine Fault Tolerance
Proof of Space/Capacity
Proof of Activity
Proof of Elapsed Time
This course includes:
3.5 hours on-demand video
3 downloadable resources
Full lifetime access
Access on mobile and TV
Certificate of completion
Requirements
Though having some previous knowledge is advantage, this course made for absolute beginners
Description
Blockchain is the word on everyone’s lips these days.
Of course, blockchain is best known as the engine, or software, behind digital currency - otherwise known as cryptocurrency. Blockchain technology is used by millions of people daily for the use of payments, transfers and transactions.
But blockchain isn’t only about sending and receiving money! Far from it. It is important to understand about the use of blockchain as you will ultimately become the beneficiary of all its benefits, and if you were not aware of all those benefits, now is the time to start learning.
This online course will cover the basics of blockchain and cryptocurrencies:
Everything about what blockchain means, how was it created, why it matters, what it consists of, what makes it unique and useful, and why you should care. It also explains everything about cryptocurrencies, how they work, and why are they so volatile using some of the most popular ones in the market such as Bitcoin, Ethereum, Ripple and many others.
Furthermore, this course explores implications of different blockchains such as smart contracts, how they function, what are the advantages, and cryptography which makes them so secure.
After getting grounding on cryptocurrency and blockchain, the next time there is a conversation about these topics, you can actively participate in them. You should fully understand what cryptocurrencies and smart contracts are, the meaning of the words “miner” and “FIAT”, and you will not be dragged into scams.
Who this course is for:
Everyone with interest in cryptocurrencies, blockchain, implications and how does it all work providing endless possibilities.
Hidden Content
Give reaction to this post to see the hidden content.
Hidden Content
Give reaction to this post to see the hidden content. -
By itsMe
Hidden Content
Give reaction to this post to see the hidden content. What you'll learn
Debug programs with Cheat Engine
Reverse engineer programs
Solve CrackMe challenges
Disassemble programs into assembly code
Setting breakpoints and stepping through code
Modify program behaviour
Hacking and patching process memory
Code Injection
Writing Trainers (Loaders)
Lua Scripting to hack memory
Assembly scripting to do byte patching
and more...
This course includes:
2.5 hours on-demand video
10 downloadable resources
Full lifetime access
Access on mobile and TV
Certificate of completion
Requirements
Windows PC
Some Assembly or Lua background would help, but not mandatory
Description
If you had always wanted to learn how use hack a program's memory, to reverse engineer and debug software, then this is the course for you.This course is an introduction to Reverse Engineering for anyone who wants to get started in this field. It is suitable for software developers who want to learn how software works internally and also for reverse engineers who want to fix bugs where the source code is not available. Traditionally, we use tools like x64dbg, OllyDbg for reverse engineering and debugging. Howevever, those tools have their limitations as they rely on file patching to modify program behaviour. But what if the files could not be patched. Here Cheat Engine shines. Cheat Engine is a memory hacking tool. It is used by Gamers to hack games in order to cheat. Cheat Engine's main strength is its memory scanning, code injection, or process patching. This course will equip you with the knowledge and skill to use Cheat Engine in addition to whatever other tools you might already be familiar. It is also suitable for absolute beginners with no knowledge of reversing, as I will take you from zero to hero.
In this course we will learn Cheat Engine by hacking CrackMe challenges. A CrackMe is a small program designed to test a programmer's reverse engineering skills.
What you will learn
How to disassemble programs into assembly code
Dynamic Analysis
Setting breakpoints and stepping through code
Modify program behaviour
Patching process memory
Locating address to do memory patching
Writing custom Memory Hackers (trainers) using Cheat Engine to hack and patch memory
Creating Lua Scripts for process patching
Break and Trace
Cone Injection
Direct Memory Patching
and more...
Prerequisites:
Knowledge of Assembly would be helpful but not compulsory
Windows PC
Who this course is for:
Beginners to Reverse Engineering
Game Hackers who want to try their hand at hacking windows programs
Programmers with want to learn debugging
Students who want to know how programs work internally
Anyone interested in learning how to hack and patch process memory
Hidden Content
Give reaction to this post to see the hidden content.
Hidden Content
Give reaction to this post to see the hidden content. -
By itsMe
Hidden Content
Give reaction to this post to see the hidden content. PHP malware scanner
Traversing directories for files with php extensions and testing files against text or regexp rules, the rules-based on self-gathered samples and publicly available malwares/webshells. The goal is to find infected files and fight against kiddies, because too easy to bypass rules.
Changelog v1.0.9
README update with new -r flag
Hidden Content
Give reaction to this post to see the hidden content.
-