We help you
Learn the Skills to Become an Ethical Hacker.
Access high quality hands-on workshops, tutorials, write-ups and online resources for penetration testers, exploit developers, and security enthusiasts.
Advanced Software
Exploitation Course
Learn how to discover and
exploit software vulnerabilities.
Python for Ethical
Hackers Course
Designed to push your Python
scripting skills to the next level!
Learn at your own pace with
Online Course Material
Our courses are delivered through our modern e-learning platform and they come with tons of content, including videos, text-based lessons, scripts, configuration files, useful resources, practice quizzes, and dozens of exercises.
Practice Each Skill With Dozens of
Hands-on Lab Exercises
In order to consolidate the concepts taught throughout our courses, each lecture is followed by several hands-on lab exercises. To complete these exercises, you will be provided with the instructions to set up a few target virtual machines (VMs).
Access Weekly
Tutorials and videos about IT security
We regularly create short tutorials and how-to videos for you. Do you have a question about a specific tool? Do you want to know how a certain technique works? Then, let us know via Twitter or Facebook and we will try our best to answer your question. 😉
Hands-on Hacking Courses
Intermediate
Python for Ethical Hackers
In this course, you will learn how to be more effective in your job by automating boring, repetitive, and complex tasks using the Python programming language.Highlights:
Learn to code in Python
Understand how to develop customized network reconnaissance tools
Develop custom applications for extracting data from social networks
Learn to automate complex network and Web attacks
Utilize Python to rapidly develop remote exploits
Price: CHF 250
Advanced
Software Exploitation
In this course, you will learn to find software vulnerabilities using a number of tools and techniques, ranging from file format fuzzing to source code auditing, and then craft your own exploits in Python, JavaScript, and Java.Highlights:
Practical software vulnerability discovery
Network protocol and file format fuzzing
Binary analysis techniques and vulnerable patterns identification
Advanced usage of the Grinder Framework, PyKd, and IDA Python
In-depth study of common Windows mitigation bypasses
Price: CHF 1'150
Join Our Newsletter
Stay informed about our new courses, labs and promotional offers, sign-up for our newsletter.
Who are we
About Us
We are a group of IT security professionals who have been working in this space for more than a decade. Together, we have provided comprehensive software security assessment and penetration testing services to companies all over the world. This website is a friendly place to share with the security community what we have learned throughout the years.
Our Learners Work At
Useful Resources
Recommended
Hardware
Recommended
Books
Penetration Testing: A Hands-On Introduction to Hacking by Georgia Weidman
The Hackers Playbook 2 and The Hackers Playbook 3 by Peter Kim
Metasploit: The Penetration Tester’s Guide by David Kennedy, Devon Kearns, Jim O’Gorman and Mati Aharoni
The Web Application Hacker’s Handbook by Dafydd Stuttard & Marcus Pinto
Getting Started
Join our mailing list and be the first to get FREE workshops, how-to tutorials, exclusive access to interviews with industry leaders, and marketing related communications.
Thank you!
Thanks for signing up! Please check your mailbox to confirm your email address.