Skocz do zawartości

Aktywacja nowych użytkowników
Zakazane produkcje

  • advertisement_alt
  • advertisement_alt
  • advertisement_alt

Znajdź zawartość

Wyświetlanie wyników dla tagów 'evasion' .



Więcej opcji wyszukiwania

  • Wyszukaj za pomocą tagów

    Wpisz tagi, oddzielając je przecinkami.
  • Wyszukaj przy użyciu nazwy użytkownika

Typ zawartości


Forum

  • DarkSiders
    • Regulamin
    • Dołącz do Ekipy forum jako
    • Ogłoszenia
    • Propozycje i pytania
    • Help
    • Poradniki / Tutoriale
    • Wszystko o nas
  • Poszukiwania / prośby
    • Generowanie linków
    • Szukam
  • DSTeam no Limits (serwery bez limitów!)
  • Download
    • Kolekcje
    • Filmy
    • Muzyka
    • Gry
    • Programy
    • Ebooki
    • GSM
    • Erotyka
    • Inne
  • Hydepark
  • Archiwum
  • UPandDOWN-Lader Tematy

Szukaj wyników w...

Znajdź wyniki, które zawierają...


Data utworzenia

  • Od tej daty

    Do tej daty


Ostatnia aktualizacja

  • Od tej daty

    Do tej daty


Filtruj po ilości...

Dołączył

  • Od tej daty

    Do tej daty


Grupa podstawowa


AIM


MSN


Website URL


ICQ


Yahoo


Jabber


Skype


AIM


MSN


Website URL


ICQ


Yahoo


Jabber


Skype


Gadu Gadu


Skąd


Interests


Interests


Polecający

Znaleziono 3 wyniki

  1. Free Download Pluralsight - Defense Evasion with Meterpreter Duration: 2h 4m | Video: .MP4, 1920x1080 30 fps | Audio: AAC, 32kHz, 2ch | Size: 356 MB Genre: eLearning | Language: English Learning Defense Evasion is a prerequisite for using Metasploit tooling successfully in a secure environment. This course will teach you how to stay under the radar and evade detection even in highly secure environments. The ability to evade defenses is a vital skill for anyone involved in penetration testing or red-teaming engagements in secure environments. In this course, Defense Evasion with Meterpreter, you will learn to customize your Meterpreter tooling to stay under the radar and avoid detection. First, you will explore the inner workings of Metasploit's Meterpreter payloads and how many endpoint security tools work. Next, you will discover how to slip past signature-based detections on disk and in memory. Finally, you will learn how to defeat emulators and heuristic analysis engines as well as network-based security tools. When you are finished with this course, you will have the skills and knowledge required to conduct security assessments successfully in highly secured networks. Homepage https://pluralsight.com/courses/defense-evasion-meterpreter/ Screenshot Rapidgator https://rg.to/file/690d655da0b64823a580853669c4e693/jkvtd.Defense.Evasion.with.Meterpreter.rar.html Fikper Free Download https://fikper.com/TTwg3uEDeT/jkvtd.Defense.Evasion.with.Meterpreter.rar.html No Password - Links are Interchangeable
  2. Free Download Udemy - Antivirus Evasion - Hard Core Published 9/2024 MP4 | Video: h264, 1920x1080 | Audio: AAC, 44.1 KHz Language: English | Size: 1.02 GB | Duration: 1h 56m Learn Hands-On In Cyber-Security How Red Teamers and Threat Actors (APT) Evade Security Mechanisms in the Real World What you'll learn Crafting Undetectable Payloads that Bypasses A fully UpTo date Windows Defender Antivirus using Metasploit Shellcode, C# Codes e.t.c Installing Kali Linux & Windows Virtual Machines Cyber Security Ethical Hacking Requirements A computer with 8GB ram to support 2 VMs running at the same time Basic understanding of operating systems Strong will to learn & creative mindset If you like Hands-On, well this is the course for you, we do Hands-On here Description In today's rapidly evolving threat landscape, malware developers constantly create sophisticated techniques to evade antivirus and endpoint detection solutions. This advanced cybersecurity course focuses on equipping learners with the skills and knowledge necessary to understand and implement evasion tactics, which are crucial for penetration testers, red team members, and cybersecurity professionals tasked with simulating advanced threats.Throughout the course, students will explore the inner workings of antivirus software and how malware is typically detected and blocked. By understanding these mechanisms, learners will dive into the techniques used to bypass detection, such as code obfuscation, encryption, packers, and polymorphism. Real-world case studies and hands-on labs will allow students to practice evasion techniques in a controlled environment, ensuring they develop the skills needed to simulate advanced persistent threats (APTs) and stealthy malware.Key topics include:- Overview of antivirus detection mechanisms (signature-based, behavior-based, heuristic analysis)- Bypassing static and dynamic analysis- Code obfuscation and encryption techniques- Using packers and crypters to evade detection- Polymorphic and metamorphic malware- Advanced persistence techniques and rootkitsBy the end of the course, learners will have a comprehensive understanding of how antivirus solutions operate and the techniques malicious actors use to avoid detection. This knowledge will empower cybersecurity professionals to think like adversaries, strengthening their ability to defend against modern cyber threats through improved detection and response strategies. Ideal for those with a solid foundation in cybersecurity, this course emphasizes ethical use of these techniques to bolster organizational security. Overview Section 1: Course Prelude Lecture 1 Introduction Section 2: Lab Setup & Configuration Lecture 2 Welcome Lecture 3 Installing VMware Pro Lecture 4 Downloading Kali & Windows 11 VM Lecture 5 Setting Up Machines On VMware Lecture 6 Getting Kali The Evader Ready Lecture 7 Getting Windows 11 VM Ready Lecture 8 Installing Visual Studio Section 3: AV Evasion Lecture 9 Installing Sublime & Updating Windows 11 Lecture 10 Powershell Payloads Evading - Mama Don't Play Technique #1 Lecture 11 Powershell Payloads Evading - You Saw Nothing Technique #2 Lecture 12 Powershell Payloads Evading - Bomb In The Mouth Technique #3 Lecture 13 Crafting a Unique Fabricated Shellcode Runner Payload Lecture 14 Obfuscating Shellcode Runner Payload to Evade Detection Section 4: Wrap Up Lecture 15 Wrap Up Red Teamers - Leveling their skills in their world of compromising systems & evading security mechanism,Blue Teamer - Learn how threat actors work or move in the wild, so they can defend better, protect their systems and educate their fellow workers for better security,Any-One - Off course, anyone in the Cyber Security field who just wanna learn or know how threat actors act in the wild Homepage https://www.udemy.com/course/antivirus-evasion-hard-core/ Rapidgator https://rg.to/file/1f089b591df421e2f91009724fe93b07/aplss.Antivirus.Evasion..Hard.Core.part1.rar.html https://rg.to/file/bd50ccd05b4ff4bd0b0ebdc65d2e531b/aplss.Antivirus.Evasion..Hard.Core.part2.rar.html Fikper Free Download https://fikper.com/OYLVN7ZoTK/aplss.Antivirus.Evasion..Hard.Core.part1.rar.html https://fikper.com/ICNEsBpB51/aplss.Antivirus.Evasion..Hard.Core.part2.rar.html No Password - Links are Interchangeable
  3. Jason Hanson - Spy Escape and Evasion (DVDRip) 30xDVDRip | MP4/AVC, ~900 kb/s | 912x512 | Duration: 03:42:53 | English: AAC, 115 kb/s (2 ch) | + PDF Guide | 1,59 Gb Genre: Self-Defense The 4 Hour course is action-packed and full of practical information and skills that you and your family will actually use to help you to AVOID emergency situations by learning how to: Keep yourself safe in airplanes, hotels, and public transportation (cabs & buses) Prepare your home or business to avoid break-in with inexpensive solutions Know if you are being followed and evade surveillance Recognize the signs that a serious event is about to occur Become a human lie detector and know when you are being deceived Use social engineering to get almost anything you want Avoid identity theft Create a 23 piece Safety & Survival Kit to keep in your car and at home â??And then what to do when an emergency does happen. For example you will learn how to: Break out of duct tape, zip ties and handcuffs in under 30 seconds or less Pick a door and padlocks Use simple techniques to scare off a potential and immediate threat Follow a 3 step process to disappear without a trace Create and use an improvised weapon Download From NitroFlare http://www.nitroflare.com/view/F918FB15A9D62D8/Ja.Ha-Sp.Es.Ev.Tr.part01.rar http://www.nitroflare.com/view/8C0FCF2DA1D1FC4/Ja.Ha-Sp.Es.Ev.Tr.part02.rar http://www.nitroflare.com/view/A9236BE4044CCF6/Ja.Ha-Sp.Es.Ev.Tr.part03.rar http://www.nitroflare.com/view/31FED695E1F5885/Ja.Ha-Sp.Es.Ev.Tr.part04.rar http://www.nitroflare.com/view/93BAAFCBEDBF186/Ja.Ha-Sp.Es.Ev.Tr.part05.rar http://www.nitroflare.com/view/160C1B61681F5BA/Ja.Ha-Sp.Es.Ev.Tr.part06.rar http://www.nitroflare.com/view/BF207249AA080A5/Ja.Ha-Sp.Es.Ev.Tr.part07.rar http://www.nitroflare.com/view/0FACDDBDD7EB444/Ja.Ha-Sp.Es.Ev.Tr.part08.rar http://www.nitroflare.com/view/B2E4E36708D1305/Ja.Ha-Sp.Es.Ev.Tr.part09.rar http://www.nitroflare.com/view/EBBCD8D3E8C3946/Ja.Ha-Sp.Es.Ev.Tr.part10.rar http://www.nitroflare.com/view/88B11B6C6596D3C/Ja.Ha-Sp.Es.Ev.Tr.part11.rar http://www.nitroflare.com/view/5C9E88318D08D6B/Ja.Ha-Sp.Es.Ev.Tr.part12.rar http://www.nitroflare.com/view/C113486D74D57A9/Ja.Ha-Sp.Es.Ev.Tr.part13.rar http://www.nitroflare.com/view/832043444FFE1A2/Ja.Ha-Sp.Es.Ev.Tr.part14.rar http://www.nitroflare.com/view/CBF08617393F2F9/Ja.Ha-Sp.Es.Ev.Tr.part15.rar http://www.nitroflare.com/view/CEB18B8113ECB23/Ja.Ha-Sp.Es.Ev.Tr.part16.rar http://www.nitroflare.com/view/9377794EF851C98/Ja.Ha-Sp.Es.Ev.Tr.part17.rar Download From Rapidgator http://rapidgator.net/file/4144e077c118bf5029dace09e78e8794/Ja.Ha-Sp.Es.Ev.Tr.part01.rar.html http://rapidgator.net/file/0fb01caf89907a04b447e1a6cd9588e3/Ja.Ha-Sp.Es.Ev.Tr.part02.rar.html http://rapidgator.net/file/8dce6ee29038dde4cf2e5f740aec8422/Ja.Ha-Sp.Es.Ev.Tr.part03.rar.html http://rapidgator.net/file/1ac9c40f914b21f8ce4347a2ea884730/Ja.Ha-Sp.Es.Ev.Tr.part04.rar.html http://rapidgator.net/file/74b404599ea36a5c991e4f57b71ab0aa/Ja.Ha-Sp.Es.Ev.Tr.part05.rar.html http://rapidgator.net/file/b395fdf330cdde9097d2453c516e4fd1/Ja.Ha-Sp.Es.Ev.Tr.part06.rar.html http://rapidgator.net/file/ebba4610e2b32c63037a92c43775db12/Ja.Ha-Sp.Es.Ev.Tr.part07.rar.html http://rapidgator.net/file/7e819e718d07b973d6d59d86246824f4/Ja.Ha-Sp.Es.Ev.Tr.part08.rar.html http://rapidgator.net/file/da8296cd5342dee053093c2119a1898d/Ja.Ha-Sp.Es.Ev.Tr.part09.rar.html http://rapidgator.net/file/9e8a22960a391739d27cab8807a23e68/Ja.Ha-Sp.Es.Ev.Tr.part10.rar.html http://rapidgator.net/file/b1267f0355dfa176724f5daef594211c/Ja.Ha-Sp.Es.Ev.Tr.part11.rar.html http://rapidgator.net/file/4e7b033fb59dddc8001b6e1f555deaa9/Ja.Ha-Sp.Es.Ev.Tr.part12.rar.html http://rapidgator.net/file/419eb1155b369adbdcc22171728b418b/Ja.Ha-Sp.Es.Ev.Tr.part13.rar.html http://rapidgator.net/file/62032c6f1f8bd4fb19f807b50d2f68c3/Ja.Ha-Sp.Es.Ev.Tr.part14.rar.html http://rapidgator.net/file/73f4662b81df273b97eb2da1427e91ae/Ja.Ha-Sp.Es.Ev.Tr.part15.rar.html http://rapidgator.net/file/c5c943338b42cbd1324e2a0e3c976490/Ja.Ha-Sp.Es.Ev.Tr.part16.rar.html http://rapidgator.net/file/7319b1e72cd22153b083c7be9eb82d82/Ja.Ha-Sp.Es.Ev.Tr.part17.rar.html
×
×
  • Dodaj nową pozycję...

Powiadomienie o plikach cookie

Korzystając z tej witryny, wyrażasz zgodę na nasze Warunki użytkowania.