
02
JuneContinuing the validator

02
JuneImplementing the validation of structures and unions

02
JuneImplementing the validation of statements

02
JuneImplementing validation of variables

02
JuneImplementing validation of functions

02
JuneImplementing validator scopes

02
JuneBuilding the foundations

30
MayWhat is semantic validation?

24
MayPromotional Video

29
AugustHow to crack Passwords

29
AugustSQLmap and SQL Ninja Overview

29
AugustNekto Web App hacking Tool

29
AugustDirectory Buster Hacking Tool

29
AugustWeb Application Scanning

29
AugustWebsite& web Application Hacking

29
AugustInstalling a Backdoor

29
AugustInstalling a Keylogger

29
AugustTransfering Files in/out of Victime, Creating Custam Malware+Evaditing Antivirus

29
AugustPrivilege Escalation

29
AugustPost Exploatation Section Overview

29
AugustIntroduction To Cryptography

29
AugustARP Spoofing Overview

29
AugustTaking Advantage of Telenet

29
AugustNMAP Port Scanning ( Discover open ports, OS, Services, Vulnerabilities, etc.)

29
AugustNETcat Overview + SMB/NFSEnumeration
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108