The Penetration Tester
The Penetration Tester

Sunday • April 30th 2023 • 2:07:59 pm

The Penetration Tester

Sunday • April 30th 2023 • 2:07:59 pm

4 Most Difficult IT Security Certifications

DevSecOps : What, Why and How

Who Stole the NSA's Top Secret Hacking Tools?🎙Darknet Diaries Ep. 53: Shadow Brokers

This Hacker Makes $160K a Day ⁠— After He Got Out of Federal Prison🎙Darknet Diaries Ep. 60: dawgyg


James Kettle - Browser-Powered Desync Attacks: A New Frontier in HTTP Request Smuggling

BiC Village - Ochuan Marshall - The Last Log4J Talk You Ever Need

Jacob Baines - Do Not Trust the ASA, Trojans

Melvin Langvik - Taking a Dump In The Cloud

Black Hat

Keynote - Our Kryptonite: A Defendable Internet

Confidence in Chaos: Strategies for World-Class Security Operations

Real-World Detection Evasion Techniques in the Cloud

{JS-ON: Security-OFF}: Abusing JSON-Based SQL Queries

Keynote - Cybersecurity: The Next Generation


Panel Session | Elements Of A Successful Security Strategy: A Comprehensive Approach

The Silent Spy Among Us: Modern Attacks Against Smart Intercoms by Vera Mens | Nullcon Berlin 2023

Keynote | Server Side Prototype Pollution: Blackbox Detection Without The DoS by Gareth Heyes

Raining CVEs On WordPress Plugins With Semgrep by Shreya Pohekar & Sheeraz Ali | Nullcon Goa 2022

Scale Hacking To Secure Your Cloud And Beyond by Anand Prakash | Nullcon Goa 2022


What Is Ethical Hacking? | Ethical Hacking In 8 Minutes | Ethical Hacking Explanation | Simplilearn

Ethical Hacking In 2 Minutes | What Is Ethical Hacking? | Ethical Hacking Explained | Simplilearn

What is an Ethical Hacker and What Do They Do?


Introduction to Hacking | How to Start Hacking

How To Become A Hacker In 2023 | Step By Step Guide For Beginners (Neat tool listing)

OWASP Web Application Penetration Testing

Full Course

Full Ethical Hacking Course - Network Penetration Testing for Beginners (2019)

Ethical Hacking 101: Web App Penetration Testing - a full course for beginners

Session Hijacking

Difference between cookies, session and tokens

Ethical Hacking - What is Session Hijacking

Ethical Hacking Course: Module 11 - Session Hijacking Theory

Ethical Hacking: Module 11, Session Hijacking Lab Session

How Hackers Hijack Your Cookies? Use HttpOnly!

Web App Pentesting - HTTP Cookies & Sessions


Top 7 Highest Paid Cyber Security Certifications: Highest Paid Certifications in Cyber Security 2022

Certified Ethical Hacker (CEH)

Free CEH v12 10 Hours Complete Course(Part-1)

Free CEH v12 10 Hours Complete Course (Part-2)

CompTIA PenTest+

CompTIA PenTest+ Full Course - FREE (11 Hours) PT0-002

CompTIA Pentesting+ Part 1

CompTIA PenTesting + Part 2

CompTIA PenTesting + Part 3

CompTIA PenTesting + Part 4


CompTIA PenTesting+ Part 6

CompTIA Pen Testing + Vulnerability Scan Analysis Part 7

CompTIA PenTesting + Password Cracking part 8

CompTIA Pen Testing + Penetration testing wired Network Part 9

CompTIA PenTesting Attacking Wireless Networks Part 10

CompTIA Pen Testing +Linux Exploits part 11

CompTIA Pen testing + Windows Exploits Part 12

CompTIA Pen testing + Mobile Devices Part 13

CompTIA Pen testing + Mobile Devices Part 14

CompTIA PenTesting+ Application Testing Part 15

GIAC Penetration Tester (GPEN)

GIAC Penetration Tester GPEN Practice Questions

Offensive Security Certified Professional (OSCP)

OffSec Live | Walkthrough of a PEN-200 AD Set


Full Tutorial on HackTheBox Setup (Cybersecurity Like a Pro)

TryHackMe Getting Started Tutorial


HackThisSite Basic Challenge 1

HackThisSite Basic Challenge 2

HackThisSite Basic Challenge 3

HackThisSite Basic Challenge 4

HackThisSite Basic Challenge 5

HackThisSite Basic Challenge 6

HackThisSite Basic Challenge 7

HackThisSite Basic Mission 8

HackThisSite Basic Mission 9

HackThisSite Basic Mission 10

HackThisSite Basic Mission 11

Goat Juice

Hacking the OWASP WebGoat - by Omar Santos

Hacking the OWASP Juice Shop Part 1 - by Omar Santos

Hacking the OWASP Juice Shop Part 2 - by Omar Santos

Pentesting OWASP Juice Shop - Part 1

Pentesting OWASP Juice Shop - Part 2

Pentesting OWASP Juice Shop - Part 3

Pentesting OWASP Juice Shop - Part 4

Pentesting OWASP Juice Shop - Part 5


Scammers Who Scam Scammers, Hackers Who Hack Hackers: Exploring a Sub-economy on Cybercrime Forums

How to Build a Product that Scales into a Company

Harvard CS50 – Full Computer Science University Course (24 hours)

DEF CON 30 - Winn Schwartau - My First Hack Was in 1958

Artwork Credit