Malware Analysis Masterclass Workbook
Workbook with 15 real malware samples (disarmed) for analysis: static analysis, dynamic analysis, unpacking, C2 extraction.
Professional offensive security tools & exploit frameworks
Workbook with 15 real malware samples (disarmed) for analysis: static analysis, dynamic analysis, unpacking, C2 extraction.
Complete Red Team operations playbook: planning, infrastructure setup, initial access, post-exploitation, reporting. With real templates.
VM with 20 configured Linux privilege escalation vectors: SUID, capabilities, cron, sudo misconfig, kernel exploits, Docker escape.
Hands-on cloud pentesting workshop for AWS/Azure/GCP: IAM abuse, metadata exploitation, serverless attacks, cross-account pivoting.
Complete exploit development course: from fuzzing to working exploit. Covers x86, x64, Windows, and Linux. 30 hands-on exercises.
OSCP-style simulated exam: 5 machines (2 Linux, 2 Windows, 1 AD set) with 24h time limit. Includes report template and solutions.
5 real APT threat emulation scenarios: APT29, FIN7, Lazarus, APT28, Conti. Includes TTPs, IOCs, and detection rules.
Curated collection of 50+ Flipper Zero payloads: Sub-GHz replay, NFC cloning, RFID emulation, IR bruteforce, BadUSB scripts.
30 DuckyScript scripts for Hak5 USB Rubber Ducky and compatibles: credential exfiltration, reverse shells, persistence, recon.
Practical guide with scripts for identifying and exploiting UART and JTAG interfaces on IoT devices: obtain root shell, dump firmware.
8 custom modules for WiFi Pineapple Mark VII: advanced evil portal, handshake hunter, client profiler, auto-recon, DNS spoof.
Python scripts for IoT firmware extraction and analysis: dump via SPI/I2C, unpacking, secrets hunting, emulation with QEMU.