Example Image with Text
Use this Image with Text block to balance out your text content with a complementary visual to strengthen messaging and help your students connect with your product, course, or coaching. You can introduce yourself with a profile picture and author bio, showcase a student testimonial with their smiling face, or highlight an experience with a screenshot.
Example Text
Use this Text block to tell your course or coaching’s story.
Write anything from one-liners to detailed paragraphs that tell your visitors more about what you’re selling.
This block - along with other blocks that contain text content - supports various text formatting such as header sizes, font styles, alignment, ordered and unordered lists, hyperlinks and colors.
Example Title
Use this block to showcase testimonials, features, categories, or more. Each column has its own individual text field. You can also leave the text blank to have it display nothing and just showcase an image.
Example Title
Use this block to showcase testimonials, features, categories, or more. Each column has its own individual text field. You can also leave the text blank to have it display nothing and just showcase an image.
Example Title
Use this block to showcase testimonials, features, categories, or more. Each column has its own individual text field. You can also leave the text blank to have it display nothing and just showcase an image.
Example Curriculum
- 1.Disclaimer (0:38)
- 2.Basic linux Commands (11:30)
- 3.Kali Linux Latest Version (3:41)
- 4.Gather Email Info - Maltego tool (3:18)
- 5. Discovering Domain info Emails associated with Target (2:01)
- 6.Gathering a Information about a Person (4:25)
- 7. Email Spoofing (2:10)
- 8.Website cloning- Social Engineering Tool (7:09)
- 9.Web Jacking Attack (7:06)
- 10.Mass Mailer Attack - Social Engineering part 1 (3:39)
- 11.Mass Mailer Attack - Social Engineering part 2 (3:26)
- 1.HTA Attack Method on HTTPS - Social Engineering part 1 (3:27)
- 2.HTA Attack Method on HTTPS - Social Engineering part 2 (2:50)
- 3.Making a malicious USB - Social Engineering toolkit (3:40)
- 4.Create a Payload and Listener -Social Engineering Toolkit (7:15)
- 5. Windows Reverse_TCP VNC DLL - Social Engineering (2:53)
- 6.Windows Shell Reverse_TCP - Social Engineering (2:36)
- 7.Powershell Shellcode Injector - Social Engineering (3:54)
- 8.Installation of Veil Evasion (1:57)
- 9.Create Backdoor in windows - Veil Evasion (4:39)
- 10.Veil-Evasion BYPASS Anti Virus with Encrypted Payload (4:15)
- 11. Installing Powershell Empire (1:48)
- 12. Create Backdoor Undetected by All anti- Virus - Empire (6:01)
- 13.Using Bashcode Linux Hacking- Empire (3:42)
- 14.Automatically Execute Commands when reverse Shell Executed (3:11)
- 15. Installing FatRat (3:20)
- 16.Generating Backdoor for Linux - FatRat (4:12)
- 17.Hack Android with FatRat (5:14)
- 18.Backdooring to Original apk - FatRat (6:59)
Example Image with Text
Use this Image with Text block to balance out your text content with a complementary visual to strengthen messaging and help your students connect with your product, course, or coaching. You can introduce yourself with a profile picture and author bio, showcase a student testimonial with their smiling face, or highlight an experience with a screenshot.
Example Featured Products
Showcase other available courses, bundles, and coaching products you’re selling with the Featured Products block to provide alternatives to visitors who may not be interested in this specific product.