Example Image with Text
Use this Image with Text block to balance out your text content with a complementary visual to strengthen messaging and help your students connect with your product, course, or coaching. You can introduce yourself with a profile picture and author bio, showcase a student testimonial with their smiling face, or highlight an experience with a screenshot.
Example Text
Use this Text block to tell your course or coaching’s story.
Write anything from one-liners to detailed paragraphs that tell your visitors more about what you’re selling.
This block - along with other blocks that contain text content - supports various text formatting such as header sizes, font styles, alignment, ordered and unordered lists, hyperlinks and colors.
Example Title
Use this block to showcase testimonials, features, categories, or more. Each column has its own individual text field. You can also leave the text blank to have it display nothing and just showcase an image.
Example Title
Use this block to showcase testimonials, features, categories, or more. Each column has its own individual text field. You can also leave the text blank to have it display nothing and just showcase an image.
Example Title
Use this block to showcase testimonials, features, categories, or more. Each column has its own individual text field. You can also leave the text blank to have it display nothing and just showcase an image.
Example Curriculum
- 1.Introduction (6:31)
- 2.Teaser (7:29)
- 3.What is programming_What is Hacking _ Why Learn Them (6:13)
- 4.Lab Over View _ Needed Software (5:41)
- 5. Installing Kali as a virtual Machine (8:31)
- 7.The Terminal _ Linux Commands (10:45)
- 6.Basic Over View Of Kali Linux (5:10)
- 8.Python2 Vs Python 3 _ Writing First Program (9:08)
- 9.Installing _ Using PuthonIDE (9:32)
- 10 - What is MAC Address _ How To Change it (9:08)
- 11-Using Python Modules _ Executing System Commands (9:18)
- 12.Implementing a Very Basic Mac Changer (5:16)
- 13.Variables _ Strings (10:12)
- 14.Using Variabled in MAC Changer (4:36)
- 15.Getting Input From The User (6:18)
- 16.Handling User Input (9:40)
- 17. Handling Command-line Arguments (9:44)
- 18. Initialising Variables Based on Command-line Arguments (7:51)
- 19.Functions (9:40)
- 20.Returning Valus From Functions (6:55)
- 21.Decision Making - Theory (6:53)
- 22.Using Conditional Statements in MAC Changer (9:05)
- 33.Using Scapy To Create an ARP Request (6:48)
- 34. Combining Frames To BroadcastRequest (9:37)
- 35. Sending & Receiving Packets (6:57)
- 36. Lists (8:20)
- 37. Iterating Over Lists & Analysing Packet (10:09)
- 38. Using Escape Characters To Enhance Program Output (6:29)
- 39. Dictionaries (9:37)
- 40. Improving the Program Using a List of Dictionaries (8:55)
- 41. Iterating Over Nested Data Structures (7:18)
- 42. Python 3 Compatibility (6:55)
- 43.What is ARP Spoofing (6:20)
- 44. Redirecting the Flow of Packets in a Network Using arpspoof (5:08)
- 45. Creating an ARP Response (7:11)
- 46.Sending ARP Responses (5:34)
- 47. Extracting MAC Address From Responses (6:59)
- 48. Loops (8:53)
- 49. More on Loops & Counters (7:56)
- 50. Dynamic Printing (6:54)
- 51. Handling Exceptions (5:16)
- 52. Implementing a Restore Function (11:55)
- 53. Restoring ARP Tables When an Exception Occures (5:33)
- 54. Introduction & Teaser (4:39)
- 55. Sniffing Packets Using Scapy (7:20)
- 56. Extracting data From a Specific Layer (6:50)
- 57. Analysing Sniffed Packets & Extracting Fields From Layers (12:21)
- 58. Analysing Fields & Extracting Passwords (0:42)
- 59. Extracting URLs (8:00)
- 60.Capturing Passwords From Any Computer Connected to the Same (8:03)
- 74. Introduction & Teaser (1:20)
- 75. Analysing HTTP Responses (6:49)
- 76. Replacing a Substring Using Regex (7:15)
- 77. Decoding HTTP Responses (9:48)
- 78. Modifying HTTP Responses & Injecting Javascript Code in HTML Pages (8:50)
- 79. Refactoring & Housekeeping (8:29)
- 80. Debugging Issues (6:01)
- 81. Using Groups & None-capturing Regex (8:57)
- 82. Recalculating Content Length (11:38)
- 83. BeEF Overview & Basic Hook Method (6:39)
- 84. Hooking Computers Using code_injector (5:37)
- 85. Basic BeEF Commands (4:24)
- 86. Delivering Malware Using BeEF (5:41)
- 87. How to Bypass HTTPS (10:49)
- 88. Bypassing HTTPS & Sniffing Login Credentials (8:04)
- 89. Replacing Downloads on HTTPS Pages (10:56)
- 90. Injecting Code in HTTPS Pages (8:35)
- 94. Introduction & Teaser (1:57)
- 95. Execute System Command Payload (9:40)
- 96. Sending Reports By Email (11:25)
- 97. Filtering Command Output Using Regex (10:07)
- 98. Stealing WiFi Passwords Saved on a Computer (9:34)
- 99. Downloading Files From Program (7:49)
- 100. Writing Files on Disk (11:24)
- 101. Password Recovery Basics (8:19)
- 102. Using all the Above to Steal Saved Passwords Remotely (8:03)
- 103. Interacting With The File System (9:43)
- 104. Introduction & Teaser (3:41)
- 105. Writing a Basic Local Keylogger (9:59)
- 106. Global Variables (8:07)
- 107. Logging Special Keys (6:58)
- 108. Threading & Recursion (10:59)
- 109. OOP - Object Oriented Programming Basics (15:07)
- 110. Constructor Methods & Instance Variables (8:06)
- 111. Logging Key-strikes and Reporting Them By Email (11:58)
- 112. Introduction & Teaser (5:46)
- 113. Client - Server Communication & Connection Types (7:46)
- 114.Learn Python _ Ethical Hacking From Scratch (10:09)
- 115. Sending & Receiving Data Over TCP (5:19)
- 116. Executing System Commands Remotely (10:06)
- 117. Implementing a Server (9:08)
- 118. Implementing Skeleton For Server - Client Communication (6:58)
- 119. Refactoring - Creating a Listener Class (8:13)
- 120. Refactoring - Creating a Backdoor Class (6:23)
- 121. Serialisation - Theory (11:14)
- 122. Serialisation - Implementing Reliable Methods (7:55)
- 123. Serialisation - Reliably Sending & Receiving Data (6:20)
- 124. Sending Commands as List & Implementing Exit Command (8:16)
- 125. Interacting With the File System - Implementing cd Command (9:24)
- 126. Reading Files (7:30)
- 127. Writing Files (6:52)
- 128. Downloading Files From Hacked Computer (7:54)
- 129. Implementing Upload Functionality in Listener (7:53)
- 130. Implementing Upload Functionality in Backdoor (6:12)
- 131. Handling Unknown Exceptions (9:37)
- 132. Using the Backdoor to Hack Windows, Linux & OS X (4:18)
- 133. Introduction & Teaser (3:15)
- 134. Converting Python Programs To Windows Binary Executables (7:12)
- 135. Running Executables Silentely (7:22)
- 136. Installing Windows Pyinstaller on Linux (7:43)
- 137. Packaging Programs For Windows From Linux (8:33)
- 138. Persistence Idea (8:15)
- 139. Running Programs on Startup (14:43)
- 140. Creating a Basic Trojan Using Download & Execute Payload (10:36)
- 141. Creating a Trojan By Embedding Files In Program Code (8:33)
- 142. Bypassing Anti-Virus Programs - Theory (5:22)
- 143. Bypassing Anti-Virus Programs - Practical (9:04)
- 144. Adding an Icon to Generated Executables (5:14)
- 145. Spoofing File Extension (9:35)
- 146. Converting Python Programs To OS X Executables (8:41)
- 147. Converting Python Programs to Linux Executables (7:23)
- 148. Introduction & Teaser (6:42)
- 149. What is a Website (4:13)
- 150. How to Hack a Website (5:31)
- 151. Sending GET Requests To Web Servers (10:00)
- 152. Discovering Subdomains (11:43)
- 153. Discovering Hidden Paths in Websites (10:54)
- 154. Reading Response Content (6:26)
- 155. Extracting Useful Data From Response (7:08)
- 156. Filtering Rsults (7:10)
- 157. Extracting Unique Links & Storing Them In a List (6:42)
- 158. Recursively Discovering All Paths On a Target Website (9:37)
- 161. Introduction & Teaser (2:35)
- 162. HTTP Requests - POST VS GET (7:05)
- 163. Parsing HTML Code (8:19)
- 164. Extracting HTML Attributes (10:30)
- 165. Posting Forms (10:27)
- 166. Building Basic Structure For Vulnerability Scanner (11:24)
- 167. Using Default Parameters (5:08)
- 168. Sending Requests in a Session (9:16)
- 169. Extracting & Submitting Forms Automatically (10:06)
- 170. Implementing a Method To Run The Scanner (6:08)
- 171. Discovering XSS Vulnerabilities (9:07)
- 172. Exploiting XSS Vulnerabilities (5:08)
- 173. Implementing Code To Discover XSS in Forms (8:15)
- 174. Implementing Code To Discover XSS in Parameters (7:43)
- 175. Automatically Discovering Vulnerabilities Using the Vulnerability Scanner (8:46)
Example Image with Text
Use this Image with Text block to balance out your text content with a complementary visual to strengthen messaging and help your students connect with your product, course, or coaching. You can introduce yourself with a profile picture and author bio, showcase a student testimonial with their smiling face, or highlight an experience with a screenshot.
Example Featured Products
Showcase other available courses, bundles, and coaching products you’re selling with the Featured Products block to provide alternatives to visitors who may not be interested in this specific product.