Example Image with Text
Use this Image with Text block to balance out your text content with a complementary visual to strengthen messaging and help your students connect with your product, course, or coaching. You can introduce yourself with a profile picture and author bio, showcase a student testimonial with their smiling face, or highlight an experience with a screenshot.
Example Text
Use this Text block to tell your course or coaching’s story.
Write anything from one-liners to detailed paragraphs that tell your visitors more about what you’re selling.
This block - along with other blocks that contain text content - supports various text formatting such as header sizes, font styles, alignment, ordered and unordered lists, hyperlinks and colors.
Example Title
Use this block to showcase testimonials, features, categories, or more. Each column has its own individual text field. You can also leave the text blank to have it display nothing and just showcase an image.
Example Title
Use this block to showcase testimonials, features, categories, or more. Each column has its own individual text field. You can also leave the text blank to have it display nothing and just showcase an image.
Example Title
Use this block to showcase testimonials, features, categories, or more. Each column has its own individual text field. You can also leave the text blank to have it display nothing and just showcase an image.
Example Curriculum
- 1.Pre-connection Attacks Overview (1:54)
- 2.Spoofing Mac Address Manually (3:24)
- 3.Targeting 5 GHz Networks (6:43)
- 4.Deauthenticating a Client From Protected WiFi Networks (6:54)
- 5.Deauthenticating Multiple Clients From Protected WiFi Networks (7:50)
- 6.Deauthenticating All Clients From Protected WiFi Network (6:04)
- Pre-Connection-Attacks
- 1.Sniffing Captive Portal Login Information In Monitor Mode (9:59)
- 1.1.Gaining-Access-Captive-Portals
- 2.Sniffing Captive Portal Login Information Using ARP Spoofing (8:55)
- 3.Creating a Fake Captive Portal - Introduction (4:18)
- 4.Creating Login Page - Cloning a Login Page (7:17)
- 5.Creating Login Page - Fixing Relative Links (6:53)
- 6.Creating Login Page - Adding Form Tag (7:44)
- 7.Creating Login Page - Adding Submit Button (6:44)
- 8.Preparing Computer To Run Fake Captive Portal (7:57)
- 9.Starting The Fake Captive Portal (11:57)
- 10.Redirecting Requests To Captive Portal Login Page (12:19)
- 11.Generating Fake SSL Certificate (5:54)
- 12.Enabling SSLHTTPS On Webserver (7:50)
- 13.Sniffing Analysing Login Credentials (6:03)
- 1.Advanced Wordlist Attacks - Introduction (1:39)
- 1.1.Gaining-Access-Advanced-Wordlist-Attacks
- 2.Saving Aircrack-ng Cracking Progress (9:44)
- 3.Using Huge Wordlists With Aircrack-ng Without Wasting Storage (7:35)
- 4.Cracking WPAWPA2 Much Faster Using GPU - Part 1 (7:19)
- 5.Cracking WPAWPA2 Much Faster Using GPU - Part 2 (10:39)
- 1.Post Connection Attacks Overview (4:22)
- 1.1.Post-Connection
- 2.Ettercap - Basic Overview (7:09)
- 3.Ettercap - ARP Spoofing Sniffing Sensitive Data Such As Usernames Passwords (9:51)
- 4.Setting Up SSLstrip Manually To Bypass HTTPS Sniff Data From HTTPS Websites (12:44)
- 5.Automatically ARP Poisoning New Clients (6:53)
- 6.DNS Spoofing Using Ettercap (5:30)
- 7.Bypassing Router-Side Security Poisoning Target Without Triggering Alarms (9:17)
- 1.MITMproxy - What is It How To Install It (3:47)
- 1.1.Post-Connection-Analysing-Data-Flows
- 2.Using MITMproxy In Explicit Mode (7:12)
- 3.Analysing _Filtering Highlighting_ Flows (5:13)
- 4.Intercepting Network Flows (4:51)
- 5.Modifying Responses Injecting Javascript Manually (8:45)
- 6.Intercepting Modifying Responses In Transparent Mode (7:31)
- 7.Editing Responses Injecting BeEFs Code On The Fly (9:16)
- 8.Editing Responses Automatically Based On Regex (9:13)
- 9.Bonus - Stealing Login Info Using Fake Login Prompt (7:12)
- 10.Bonus - Hacking Windows 10 Using A Fake Update (4:41)
- 1.What Do Mean By MITM Scripts (6:14)
- 1.1.Post-Connection-Writing-Custom-Scripts
- 2.Capturing Printing RequestsResponses (8:30)
- 3.Filtering Flows Extracting Useful Data (9:25)
- 4.Using Conditions To Execute Code On Useful Flows (9:48)
- 5.Generating Custom HTTP Responses (8:35)
- 6.Testing Script Locally (8:29)
- 7.Generating Trojans - Installing The Trojan Factory (6:16)
- 8.Generating Trojans - Converting Any File _egimage_ To a Trojan (10:15)
- 9.Using Variables More Complex Conditions (8:42)
- 10.Converting Downloads To Trojans On The Fly (10:10)
- 11.Configuring The Trojan Factorys MITMproxy Script (7:32)
- 12.Using The Trojan Factory MITMproxy Script (7:48)
Example Image with Text
Use this Image with Text block to balance out your text content with a complementary visual to strengthen messaging and help your students connect with your product, course, or coaching. You can introduce yourself with a profile picture and author bio, showcase a student testimonial with their smiling face, or highlight an experience with a screenshot.
Example Featured Products
Showcase other available courses, bundles, and coaching products you’re selling with the Featured Products block to provide alternatives to visitors who may not be interested in this specific product.