Example Image with Text
Use this Image with Text block to balance out your text content with a complementary visual to strengthen messaging and help your students connect with your product, course, or coaching. You can introduce yourself with a profile picture and author bio, showcase a student testimonial with their smiling face, or highlight an experience with a screenshot.
Example Text
Use this Text block to tell your course or coaching’s story.
Write anything from one-liners to detailed paragraphs that tell your visitors more about what you’re selling.
This block - along with other blocks that contain text content - supports various text formatting such as header sizes, font styles, alignment, ordered and unordered lists, hyperlinks and colors.
Example Title
Use this block to showcase testimonials, features, categories, or more. Each column has its own individual text field. You can also leave the text blank to have it display nothing and just showcase an image.
Example Title
Use this block to showcase testimonials, features, categories, or more. Each column has its own individual text field. You can also leave the text blank to have it display nothing and just showcase an image.
Example Title
Use this block to showcase testimonials, features, categories, or more. Each column has its own individual text field. You can also leave the text blank to have it display nothing and just showcase an image.
Example Curriculum
- 1. Installing Hacker & Victim Machine in Virtual Box (20:07)
- 10. Crack WPA with Wordlist (7:07)
- 11. Man In The Middle Framework ARP Spoof (5:47)
- 12. ARP Spoofing and Capturing Packets with MITMF (9:40)
- 13. MITMF Plugins (13:50)
- 14. Inject Keylogger and take Screenshots with MITMF (6:31)
- 15. Wireshark and MITMF Together to Hijack HTTP requests (13:30)
- 16. Installing and configuring Veil Framework (7:30)
- 17. Custom Payload with Veil (11:50)
- 18. Making Backdoor Reverse_HTTPS with Veil (10:46)
- 19. Configuring Listener with msfconsole (16:12)
- 2. Linux Commands (25:01)
- 20. Veil in action to get Connection from Client (12:24)
- 21. Introduction to Beef Framework (12:04)
- 22. Beef & MITMF in action to exploit Client Browser (9:59)
- 3. apt-get command (11:12)
- 4. chmod command (11:56)
- 5. Networking Basics Before Hacking (7:07)
- 6. Information Gathering (16:36)
- 7. Airmon-ng Change Default mode of adapter to monitor mode (9:31)
- 8. Change Managed Mode to Monitor Mode Manual Method (8:00)
- 9. Crack WPA airodump-ng and crunch (21:09)
- 1. Start Python Crash Course Command, Statement & Scripts (3:19)
- 10. File Handling with Python (7:21)
- 11. Data Structure Lists (15:55)
- 12. Strings and inbuilt_methods (14:44)
- 13. Data Structure Dictionary (9:41)
- 14. Data Structure Tuples (11:17)
- 15. Object Oriented Programming (18:08)
- 16. Python Inheritance (9:09)
- 17. List Comprehension (4:43)
- 2. Keywords and types (6:53)
- 3. Variables in Python (13:24)
- 4. Formatting your text (10:16)
- 5. Operators, Operands and Logic (14:29)
- 6. Flow Controls Conditionals (8:55)
- 7. Flow Controls Looping (17:32)
- 8. User Defined and Lambda Functions (14:09)
- 9. Scope and Packing, Unpacking Arguments (8:34)
- 1. Scripts for running commands on Clients (6:03)
- 10. Packaging technique to bypass Antiviruses (11:54)
- 11. Convert Backdoor to Trojans (7:43)
- 2. WIFI Password of Client with Delivery Method to Gmail (15:51)
- 3. Downloading files Script (10:30)
- 4. Beelogger Modify your Keylogger (26:54)
- 5. Making Advance Keylogger (17:54)
- 6. Deliver Keylogger and Observe Keylogs (8:58)
- 7. Implementation of Download file feature in Client (22:27)
- 8. LaZagne Capture Password with Our Malware (14:59)
- 9. Packaging of Python File in Linux (16:47)
- 1. Threading with Python (15:15)
- 10. Send Message to Client From Backdoor (14:14)
- 11. Open Web Browser of Windows Machine from Backdoor (6:46)
- 12. Take Screenshots from Backdoor (34:00)
- 13. Lock Client using Backdoor (5:47)
- 14. Hijack Command Shell of Client Server Side (24:27)
- 15. Hijack Command Shell of Client Client Side (16:54)
- 16. Test Backdoor with Antiviruses (7:25)
- 2. Backdoor and Socket Programming (12:37)
- 3. Send and Recieve Data Between Server & Client (10:48)
- 4. Start Advance Payloads making Listener Kali Linux (24:25)
- 5. Run Multiple Threads with threading module (12:30)
- 6. List all connections (23:17)
- 7. Client Sandboxie, Mutex and VMs (20:03)
- 8. Connect to Server and List Connections (20:21)
- 9. Interact with connection (18:22)
- 1. Variables and its types Local & Global (10:12)
- 10. JS HTML DOM (8:58)
- 11. JS Challenge HACK THIS SITE mission 1-3 (16:07)
- 12. JS Challenge HACK THIS SITE mission 4 (7:45)
- 13. JS Challenge HACK THIS SITE mission 5-6 (8:07)
- 14. JS Obfuscation Challenge, Mission 7 (10:38)
- 2. Comments in JS (4:52)
- 3. Data Types (7:22)
- 4. Conditionals (10:40)
- 5. Looping (12:20)
- 6. User-Defined Functions (9:50)
- 7. let and const (8:19)
- 8. JS Objects (12:17)
- 9. JS Events (10:33)
- 1. Introduction to XSS (7:22)
- 10. Exploitation of XSS URL Redirection (5:32)
- 11. Advance Payload Part 1 (17:57)
- 12. Advance Payload Part 2 (11:49)
- 2. Types of XSS with Examples (9:55)
- 3. Learn to build XSS payloads (28:03)
- 4. XSS-gameSpot for Payloads (15:37)
- 5. XSS on test Website (8:27)
- 6. Load Lines of Payload with Intruder (14:49)
- 7. XSS hunting on Live Website 1 (4:29)
- 8. XSS hunting on Live Website 2 (11:34)
- 9. Phising with XSS attacks (8:41)
Example Image with Text
Use this Image with Text block to balance out your text content with a complementary visual to strengthen messaging and help your students connect with your product, course, or coaching. You can introduce yourself with a profile picture and author bio, showcase a student testimonial with their smiling face, or highlight an experience with a screenshot.
Example Featured Products
Showcase other available courses, bundles, and coaching products you’re selling with the Featured Products block to provide alternatives to visitors who may not be interested in this specific product.