

How to start your career into cyber security.Local Storage Analysis of IPA from the pentesting device.Local Data Storage Of iPhone IPA from IOS device.Build the IPA From Device and IPA Container Analysis.Insecure Data storage Analysis of iOS Applications.
BURP SUITE PROXY SETUP SIMULATOR

BurpSuite Repeater Recipe for Pentesters (PART-5).BurpSuite Intruder for Pentesters (PART-4).BurpSuite Proxy Configuration for Pentesters (PART-3).Burpsuite Common Terminologies for Pentesters (PART-2).BurpSuite Primer for Pentesters (Beginner’s Edition) – Part 1.Powershell Scripts Execute without Powershell.Active Directory privilege escalation cheat sheet.PowerShell Remoting For pentesters Cheatsheet.Pass the hash: A Nightmare still alive!.Herpaderping process– Evading Windows Defender Security.Windows Kernel Exploitation – part 4 | Vulnerabilities.Windows privilege escalation – part 3 | Kernal-Exploits.Windows Privilege escalation – Part 2 | Enumeration.Windows Privilege Escalation Guide – part 1 | Tools.Beginner Friendly Windows Privilege Escalation.Restricted Linux shells escaping techniques – 2.Back To The Future: Unix Wildcards Injection.SUID Executables- Linux Privilege Escalation.Linux Privilege Escalation – SUDO Rights.Linux Privilege Escalation – Tools & Techniques.OSCP SEH based buffer overflow – Part 2.OSCP – Detail Guide to Stack-based buffer Overflow – 9.OSCP – Detail Guide to Stack-based buffer Overflow – 8.OSCP – Detail Guide to Stack-based buffer Overflow – 7.OSCP – Detail Guide to Stack-based buffer Overflow – 6.OSCP – Detail Guide to Stack-based buffer Overflow – 5.OSCP – Detail Guide to Stack-based buffer Overflow – 4.OSCP – Detail Guide to Stack-based buffer Overflow – 3.OSCP – Detail Guide to Stack-based buffer Overflow – 2.OSCP – Detail Guide to Stack-based buffer Overflow – 1.Pivoting & Port forwarding methods – part2.Pivoting and SSH Port forwarding Basics -Part 1.RCE with log poisoning Attack Methodologies.File transfer cheatsheet for pentesters.
