COURSE AUTHOR –
Juravlea Nicolae
1. Create Undetectable Backdoors for Windows.
2. Create Evil Files that look and function like normal files.
3. Create a Fake Login Page and use it to Steal Login Information.
4. How to Exploit Browsers with BeEF Framework.
5. Gain Full Control over the Target Machine using Evil Files.
6. Perform the Attacks Outside the Local Network.
7. How to Create a Phishing Email.
8. Learn Different Techniques to Protect Yourself.