testing

  1. Shadow Warrior

    (Mega.nz ) Udemy - Web Security & Bug Bounty Learn Penetration Testing in NEW

    (mega.nz ) udemy - web security & bug bounty learn penetration testing in NEW Topic 1 Introduction To Bug Bounty 2 Our Virtual Lab Setup 3 Website Enumeration & Information Gathering 4 Introduction To Burpsuite 5 HTML Injection 6 Command Injection_Execution 7 Broken...
  2. Shadow Warrior

    [ Udemy-NEW ] | Recon for Ethical Hacking / Penetration Testing & Bug Bounty MEGA

    [ udemy-NEW ] | recon for ethical hacking / penetration testing & bug bounty mega Hidden content
  3. Shadow Warrior

    zSecurity - Website Hacking Penetration Testing & Bug Bounty Hunting

    zSecurity - Website Hacking Penetration Testing & Bug Bounty Hunting Hidden content
  4. Shadow Warrior

    [Tutorial] Website Hacking Penetration Testing & Bug Bounty Hunting

    [Tutorial] Website Hacking Penetration Testing & Bug Bounty Hunting Hidden content
  5. Shadow Warrior

    LEAK - Penetration Testing with Kali Linux (offensive sec 800 usd value)

    LEAK - Penetration Testing with Kali Linux (offensive sec 800 usd value) Penetration Testing with Kali Linux is the foundational course at OffSec ( 800$ value ) Hidden content some of the topics included: DNS Enumeration Forward DNS Lookup Reverse DNS Lookup Zone Transfers Port...
  6. Sauron

    Hacking and Security: The Comprehensive Guide to Penetration Testing and Cybersecurity

    Uncover security vulnerabilities and harden your system against attacks! With this guide you’ll learn to set up a virtual learning environment where you can test out hacking tools, from Kali Linux to hydra and Wireshark. Then with step-by-step instructions you’ll expand your understanding of...
  7. Sauron

    Hacking and Security: The Comprehensive Guide to Penetration Testing and Cybersecurity

    Uncover security vulnerabilities and harden your system against attacks! With this guide you’ll learn to set up a virtual learning environment where you can test out hacking tools, from Kali Linux to hydra and Wireshark. Then with step-by-step instructions you’ll expand your understanding of...
  8. Sauron

    Enterprise Penetration Testing

    Overview Enterprise Penetration Testing and Continuous Monitoring LiveLessons, part of The Art of Hacking video series, provides step-by-step, real-life complex scenarios of performing security assessments (penetration testing) of enterprise networks using internal/external reconnaissance...
  9. Sauron

    Game Testing, 4th Edition: All in One

    An updated version of the bestselling, Game Testing All In One 3/E, this fourth edition serves as your comprehensive handbook to video game testing, guiding you through the essential skills needed to succeed in this exciting field. Whether you are a student seeking to enter the video game...
  10. Sauron

    Penetration Testing Azure for Ethical Hackers

    Penetration Testing Azure for Ethical Hackers Curious about how safe Azure really is? Put your knowledge to work with this practical guide to penetration testing. This book offers a no-faff, hands-on approach to exploring Azure penetration testing methodologies, which will get up and...
  11. LeakGod

    Fundamentals of Software Testing, 2nd Edition

    Software testing has greatly evolved since the first edition of this book. Testers are now required to work in "agile" teams and focus on automating test cases. It has thus been necessary to update this work, in order to provide fundamental knowledge that testers should have to be effective and...
  12. Sauron

    Web Application Security Testing: Testing for Common Attacks

    Web Application Security Testing: Testing for Common Attacks The ability to thoroughly assess and test a web application for common misconfigurations and vulnerabilities will mark you out as a good web application penetration tester. Common attacks and vulnerabilities usually get...
  13. Sauron

    WiFi Penetration Testing for Beginners + Basic WiFi Theory

    This course will cover everything you need to get started on your WiFi hacking journey. I'll show you: • Basic WiFi theory so you have a general understanding of the technology before exploiting it - This includes Wifi releases, bands, a general overview, basic terminology, how encryption works...
  14. LeakGod

    Introduction to Software Testing. A Practical Guide to Testing, Design, Automation, and Execution

    Get started and hit the ground running in the world of software testing. This simple and practical guide teaches you the fundamentals of software testing, with no prior experience required. You will start by learning functional and non-functional software testing. Then you will gain an...
  15. Sauron

    Advanced Penetration Testing with Kali Linux: Unlocking industry-oriented VAPT tactics

    Explore and use the latest VAPT approaches and methodologies to perform comprehensive and effective security assessments Key Features A comprehensive guide to vulnerability assessment and penetration testing (VAPT) for all areas of cybersecurity. Learn everything you need to know about VAPT...
  16. Sauron

    Windows and Linux Penetration Testing from Scratch

    Let’s be honest—security testing can get repetitive. If you’re ready to break out of the routine and embrace the art of penetration testing, this book will help you to distinguish yourself to your clients. This pen testing book is your guide to learning advanced techniques to attack Windows and...
  17. LeakGod

    AI-Assisted Programming: Better Planning, Coding, Testing 2024

    Get practical tips on how to use AI development tools throughout all stages of code creation, including requirements, planning, design, coding, debugging, testing, and documentation. In this book, both new and experienced developers will learn how to use a wide range of tools, from...
  18. ASMODEUS

    Testing Using SQL Injection to Recognize the Vulnerable Point on Web Page

    Web pages vulnerabilities have been exploited since early `90s against user oriented applications such as email, online shopping, and Web banking [1]. Penetration testing is a technique for finding vulnerability or loop holes that exist in web pages which can help for ruling out illegal access...
  19. Top secrets

    Beginner to Expert Guide to Computer Hacking, Basic Security, and Penetration Testing By James Patterson

    :eek:Intro :: I want to thank you and congratulate you for downloading the book, “Hacking: Beginner's Guide to Computer Hacking, Basic Security, and Penetration Testing .”This book will teach you how you can protect yourself from most common hacking attacks -- by knowing...
  20. Sauron

    ETHICAL HACKING AND PENETRATION TESTING GUIDE

    Hidden content
Top