Airodump-NG Scan Visualizer allows you to filter, sort and visualize Airodump-NG scan data. The tool currently uses the CSV file generated by Airodump-NG with the -w option and can work locally or as a hosted service. A non-exhaustive list of[…]
PCAP2XML is a tool suite which takes 802.11 PCAP trace files as input and can convert them into XML or SQLITE representations. This allows a pentester to run arbitrary queries on the packet header fields. Please watch the introduction video[…]
In this section we will be posting Pentesting Challenges from multiple topics such as Web App, Network, Shellcoding, Metasploit, Mobile Apps, Reversing and Exploit Development.
We will be hosting interesting web application security challenges in this section for our students to try out. Challenges will be categorized into Beginner, Intermediate and Advanced Levels. We will either allow you to download Virtual Machines or point you[…]
This course will cover the basics of using GDB on Linux – x86, x86_64 and ARM based platforms.
In this course we will learn how to create Wi-Fi Pentesting tools – sniffer and packet injectors using Python. We will look at both using libraries like scapy and working with raw sockets. This course is ideal for students who[…]
All of us have heard about or used Hacker Gadgets like the WiFi Pineapple, Minipwner, Pwn Plug, R00tabaga etc. They are fantastic to use for demos, in social engineering tasks, explaining security implications in a fun way to non security[…]
This course focuses on the iOS platform and application security and is ideal for pentesters, researchers and the casual iOS enthusiast who would like to dive deep and understand how to analyze and systematically audit applications on this platform using[…]
This course will cover USB in detail with an emphasis on understanding USB Mass Storage devices (also known as flash drives or thumb drives).By the end of this course students will know how to sniff USB traffic using open source[…]
In this course, we will look at how to exploit Simple Buffer Overflows on Win32 systems. This is an introductory course and starts from the very basics of exploitation and is beginner friendly. We will be taking over 10+ real[…]
|--Although you should be able to work out who I am, I don't really care, as I can work out who you are. So beware of leaving footprints.--|