Example Image with Text


Use this Image with Text block to balance out your text content with a complementary visual to strengthen messaging and help your students connect with your product, course, or coaching. You can introduce yourself with a profile picture and author bio, showcase a student testimonial with their smiling face, or highlight an experience with a screenshot.

Example Text


Use this Text block to tell your course or coaching’s story.

Write anything from one-liners to detailed paragraphs that tell your visitors more about what you’re selling. 

This block - along with other blocks that contain text content - supports various text formatting such as header sizes, font styles, alignment, ordered and unordered lists, hyperlinks and colors.

Example Title

Use this block to showcase testimonials, features, categories, or more. Each column has its own individual text field. You can also leave the text blank to have it display nothing and just showcase an image.

Example Title

Use this block to showcase testimonials, features, categories, or more. Each column has its own individual text field. You can also leave the text blank to have it display nothing and just showcase an image.

Example Title

Use this block to showcase testimonials, features, categories, or more. Each column has its own individual text field. You can also leave the text blank to have it display nothing and just showcase an image.

Example Curriculum

  1. Installing The Tools
Available in days
days after you enroll
  2. Building EXE and DLL and Examining PE Structure
Available in days
days after you enroll
  3.Embedding Shellcode Payloads in EXE files
Available in days
days after you enroll
  4. Generating Shellcodes Using Metasploit in Kali Linux
Available in days
days after you enroll
  5.Embedding Shellcode Payload in .RSRC Section and Analyzing with xdbg
Available in days
days after you enroll
  6.Testing Unpacked Dumped Shellcode Payload Using Hexeditor and a C Program
Available in days
days after you enroll
  7. Base64 Encoding of Shellcode Payload
Available in days
days after you enroll
  8. Reverse Engineering Base64 Encoded Payloads
Available in days
days after you enroll
  9. XOR Encryption of Payload
Available in days
days after you enroll
  10. Reverse Engineering XOR Encryption
Available in days
days after you enroll
  11. AES Encryption of Payload
Available in days
days after you enroll
  12. Reverse Engineering AES Encryption Using CryptDecrypt
Available in days
days after you enroll
  13. Testing Shellcode Using Shellcode Runner
Available in days
days after you enroll
  14. Obfuscating Functions Using GetProcAddress and XOR Encryption
Available in days
days after you enroll
  15. Reverse Engineering Function Obfuscation
Available in days
days after you enroll
  16. Trojan Engineering Using Code Caves
Available in days
days after you enroll
  17. Reverse Engineering Code Cave Trojans
Available in days
days after you enroll
  18. Process Injection
Available in days
days after you enroll
  19. Detecting Process Injection and Reverse Engineering it
Available in days
days after you enroll
  20. Testing Process Injection Shellcode with ShellcodeRunnerInjected
Available in days
days after you enroll
  21. DLL Injection
Available in days
days after you enroll
  22.Detecting and Reverse Engineering DLL Injection
Available in days
days after you enroll
  23. Creating a Stealth Trojan
Available in days
days after you enroll
  24. Lab Project _ Creating a Trojan with Encrypted Payload and Injection Capability
Available in days
days after you enroll
  25. Reverse Engineering the Lab Project Trojan
Available in days
days after you enroll
  26. Anti Virus Evasion
Available in days
days after you enroll
  27.PE Header Export Directory Structure
Available in days
days after you enroll
  28. PE Header Import Directory and IAT Structure
Available in days
days after you enroll
  29. Advanced Function Obfuscation
Available in days
days after you enroll
  30. Thread Context Injection
Available in days
days after you enroll
  31. Map-View Code Injection
Available in days
days after you enroll
  32. APC (Asynchronous Procedure Call) Injection
Available in days
days after you enroll
  33. Early Bird APC Injection
Available in days
days after you enroll
  34. Reflective Loading Trojans
Available in days
days after you enroll
  35.Heaven's Gate Cross Injections
Available in days
days after you enroll
  36. API Hooking Using the Detours Library
Available in days
days after you enroll
  37. Hooking the IAT (Import Address Table)
Available in days
days after you enroll
  38.API Hooking using Inline Patch Hooking
Available in days
days after you enroll
  39. Multiple Processes Control
Available in days
days after you enroll
  40. Lab Project Password Sniffer Trojan
Available in days
days after you enroll

This course is closed for enrollment.

Example Image with Text


Use this Image with Text block to balance out your text content with a complementary visual to strengthen messaging and help your students connect with your product, course, or coaching. You can introduce yourself with a profile picture and author bio, showcase a student testimonial with their smiling face, or highlight an experience with a screenshot.