Example Image with Text
Use this Image with Text block to balance out your text content with a complementary visual to strengthen messaging and help your students connect with your product, course, or coaching. You can introduce yourself with a profile picture and author bio, showcase a student testimonial with their smiling face, or highlight an experience with a screenshot.
Example Text
Use this Text block to tell your course or coaching’s story.
Write anything from one-liners to detailed paragraphs that tell your visitors more about what you’re selling.
This block - along with other blocks that contain text content - supports various text formatting such as header sizes, font styles, alignment, ordered and unordered lists, hyperlinks and colors.
Example Title
Use this block to showcase testimonials, features, categories, or more. Each column has its own individual text field. You can also leave the text blank to have it display nothing and just showcase an image.
Example Title
Use this block to showcase testimonials, features, categories, or more. Each column has its own individual text field. You can also leave the text blank to have it display nothing and just showcase an image.
Example Title
Use this block to showcase testimonials, features, categories, or more. Each column has its own individual text field. You can also leave the text blank to have it display nothing and just showcase an image.
Example Curriculum
- 1.Introduction (6:31)
- 2.Teaser-Section 1 (7:29)
- 3.What is programming_What is Hacking _ Why Learn Them (6:13)
- 4.Lab Over View _ Needed Software (5:41)
- 5.Installing Kali as a virtual Machine (8:31)
- 6.Basic Over View Of Kali Linux (5:10)
- 7.The Terminal _ Linux Commands (10:45)
- 8.Python2 Vs Python 3 _ Writing First Program (9:08)
- 9.Installing _ Using PuthonIDE (9:32)
- 10.Resource - 9.Installing _ Using PuthonIDE (9:32)
- 1.What is MAC Address _ How To Change it (9:08)
- 2.Resource - What is MAC Address _ How To Change it
- 3.Using Python Modules _ Executing System Commands (9:18)
- 4.Implementing a Very Basic Mac Changer (5:16)
- 5.Variables _ Strings (10:12)
- 6.Using Variabled in MAC Changer (4:36)
- 7.Getting Input From The User (6:18)
- 8.Handling User Input (9:40)
- 9.Handling Command-line Arguments (9:44)
- 10.Initialising Variables Based on Command-line Arguments (7:51)
- 11.Functions (9:40)
- 12.Returning Valus From Functions (6:55)
- 13.Decision Making - Theory (6:53)
- 14.Using Conditional Statements in MAC Changer (9:05)
- 1.Introduction _ Teaser (10:11)
- 2.Installing Windows as a Virtual Maching (3:32)
- 3.What isARP _ What its Used For (9:43)
- 4.Designing an Algoithm To Discover Clients Connected To The Same Network (4:00)
- 5.Using Scapy To Create an ARP Request (6:48)
- 6.Combining Frames To BroadcastRequest (9:37)
- 7.Sending_Receiving Packets (6:57)
- 1.Introduction_Teaser (4:39)
- 2.Sniffing Packets Using Scapy (7:20)
- 3.Extracting data From a Specific Layer (6:50)
- 4.Analysing Sniffed Packets & Extracting Fields From Layers (12:21)
- 5.Analysing Fields & Extracting Passwords (0:42)
- 6.Extracting URLs (8:00)
- 7.Capturing Passwords From Any Computer Connected to the Same Network (8:03)
- 1.Introduction_Teaser (1:20)
- 2.Analysing HTTP Responses (6:49)
- 3.Replacing a Substring Using Regex (7:15)
- 4.Decoding HTTP Responses (9:48)
- 5.Modifying HTTP Responses & Injecting Javascript Code in HTML Pages (8:50)
- 6.Refactoring & Housekeeping (8:29)
- 7.Debugging Issues (6:01)
- 8.Using Groups_None-capturing Regex (8:57)
- 1.Introduction_Teaser (1:57)
- 2.Execute System Command Payload (9:40)
- 3.Sending Reports By Email (11:25)
- 4.Filtering Command Output Using Regex (10:07)
- 5.Stealing WiFi Passwords Saved on a Computer (9:34)
- 6.Downloading Files From Program (7:49)
- 7.Writing Files on Disk (11:24)
- 8.Password Recovery Basics (8:19)
- 9.Using all the Above to Steal Saved Passwords Remotely (8:03)
- 10.Interacting With The File System (9:43)
- 1.Introduction_Teaser (3:41)
- 2.Writing a Basic Local Keylogger (9:59)
- 3.Global Variables (8:07)
- 4.Logging Special Keys (6:58)
- 5.Threading & Recursion (10:59)
- 6.OOP - Object Oriented Programming Basics (15:07)
- 7.Constructor Methods & Instance Variables (8:06)
- 8.Logging Key-strikes and Reporting Them By Email (11:58)
- 1.Introduction_Teaser (5:46)
- 2.Client - Server Communication_Connection Types (7:46)
- 3.Learn Python _ Ethical Hacking From Scratch (10:09)
- 4.Sending & Receiving Data Over TCP (5:19)
- 5.Executing System Commands Remotely (10:06)
- 6.Implementing a Server (9:08)
- 7.Implementing Skeleton For Server - Client Communication (6:58)
- 8.Refactoring - Creating a Listener Class (8:13)
- 9.Refactoring - Creating a Backdoor Class (6:23)
- 10.Serialisation - Theory (11:14)
- 1.Introduction-Teaser (3:15)
- 2.Converting Python Programs To Windows Binary Executables (7:12)
- 3.Running Executables Silentely (7:22)
- 4.Installing Windows Pyinstaller on Linux (7:43)
- 5.Packaging Programs For Windows From Linux (8:33)
- 6.Persistence Idea (8:15)
- 7.Running Programs on Startup (14:43)
- 8.Creating a Basic Trojan Using Download & Execute Payload (10:36)
- 9.Creating a Trojan By Embedding Files In Program Code (8:33)
- 10.Bypassing Anti-Virus Programs - Theory (5:22)
- 1.Introduction-Teaser (6:42)
- 2.What is a Website (4:13)
- 3.How to Hack a Website (5:31)
- 4.Sending GET Requests To Web Servers (10:00)
- 5.Discovering Subdomains (11:43)
- 6.Discovering Hidden Paths in Websites (10:54)
- 7.Reading Response Content (6:26)
- 8.Extracting Useful Data From Response (7:08)
- 9.Filtering Rsults (7:10)
- 10.Extracting Unique Links & Storing Them In a List (6:42)
- 11.Recursively Discovering All Paths On a Target Website (9:37)
- 1.Introduction-Teaser (2:35)
- 2.HTTP Requests - POST VS GET (7:05)
- 3.Parsing HTML Code (8:19)
- 4.Extracting HTML Attributes (10:30)
- 5.Posting Forms (10:27)
- 6.Building Basic Structure For Vulnerability Scanner (11:24)
- 7.Using Default Parameters (5:08)
- 8.Sending Requests in a Session (9:16)
- 9.Extracting & Submitting Forms Automatically (10:06)
- 10.Implementing a Method To Run The Scanner (6:08)
- 11.Discovering XSS Vulnerabilities (9:07)
- 12.Exploiting XSS Vulnerabilities (5:08)
- 13.Implementing Code To Discover XSS in Forms (8:15)
- 14.Implementing Code To Discover XSS in Parameters (7:43)
- 15.Automatically Discovering Vulnerabilities Using the Vulnerability Scanner (8:46)
Example Image with Text
Use this Image with Text block to balance out your text content with a complementary visual to strengthen messaging and help your students connect with your product, course, or coaching. You can introduce yourself with a profile picture and author bio, showcase a student testimonial with their smiling face, or highlight an experience with a screenshot.
Example Featured Products
Showcase other available courses, bundles, and coaching products you’re selling with the Featured Products block to provide alternatives to visitors who may not be interested in this specific product.