Skip to main content


Initial Access

Different Techniques to gain Initial Access to the Target System.

  • Weaponization Introduces how to Build Custom Payloads (HTA - VBA etc.) to get Initial Access.
  • Password Attacks Introduces the Fundamental Techniques to Perform a Successful Password Attack. This Module Includes Password Profiling - Offline/Online Attacks - Password Spraying.
  • Phishing Fundamentals of what Phishing is and how to use it to our Advantage.
Post Compromise

Different Techniques after gaining Initial Foothold on the Network.