Beginner (16) Docker for Pentesting (1) Enumeration (2) Information gathering (3) Intermediate (16) Introduction (1) Linux Exploitation (2) Linux Post Exploitation (4) Metasploit Framework (2) Networking tools and utilities (3) PWP (32) Parrot OS Basics (5) Vulnerability Assessment (2) Windows Basics (2) Windows Exploitation (2) Windows Post Exploitation (3)

 Beginner (16)

Metasploit Framework 7.1
Windows Basics 3.2
Windows Basics 3.1
Parrot OS Basics 1.1
Parrot OS Basics 1.5
Parrot OS basics 1.4
Parrot OS basics 1.3
Parrot OS Basics 1.2
Networking tools and utilities 2.3
Networking tools and utilities 2.2
Networking tools and utilities 2.1
Introduction to Pentesting With Parrot
Information gathering with parrot 5.3
Information gathering with parrot 5.2
Information gathering with parrot 5.1
Docker For Pentesting 4.0

 Docker for Pentesting (1)

Docker For Pentesting 4.0

 Enumeration (2)

Enumeration is the key to success 6.2
Enumeration is the key to success 6.1

 Information gathering (3)

Information gathering with parrot 5.3
Information gathering with parrot 5.2
Information gathering with parrot 5.1

 Intermediate (16)

Windows Post Exploitation 12.3
Windows Post Exploitation 12.2
Windows Post Exploitation 12.1
Windows Exploitation 11.2
Windows Exploitation 11.1
Linux Post Exploitation 10.4
Linux Post Exploitation 10.3
Linux Post Exploitation 10.2
Linux Post Exploitation 10.1
Linux Exploitation 9.2
Linux Exploitation 9.1
Vulnerability Assessment 8.2
Vulnerability Assessment 8.1
Metasploit Framework 7.2
Enumeration is the key to success 6.2
Enumeration is the key to success 6.1

 Introduction (1)

Introduction to Pentesting With Parrot

 Linux Exploitation (2)

Linux Exploitation 9.2
Linux Exploitation 9.1

 Linux Post Exploitation (4)

Linux Post Exploitation 10.4
Linux Post Exploitation 10.3
Linux Post Exploitation 10.2
Linux Post Exploitation 10.1

 Metasploit Framework (2)

Metasploit Framework 7.2
Metasploit Framework 7.1

 Networking tools and utilities (3)

Networking tools and utilities 2.3
Networking tools and utilities 2.2
Networking tools and utilities 2.1

 PWP (32)

Windows Post Exploitation 12.3
Windows Post Exploitation 12.2
Windows Post Exploitation 12.1
Windows Exploitation 11.2
Windows Exploitation 11.1
Linux Post Exploitation 10.4
Linux Post Exploitation 10.3
Linux Post Exploitation 10.2
Linux Post Exploitation 10.1
Linux Exploitation 9.2
Linux Exploitation 9.1
Vulnerability Assessment 8.2
Vulnerability Assessment 8.1
Metasploit Framework 7.2
Metasploit Framework 7.1
Enumeration is the key to success 6.2
Enumeration is the key to success 6.1
Windows Basics 3.2
Windows Basics 3.1
Parrot OS Basics 1.1
Parrot OS Basics 1.5
Parrot OS basics 1.4
Parrot OS basics 1.3
Parrot OS Basics 1.2
Networking tools and utilities 2.3
Networking tools and utilities 2.2
Networking tools and utilities 2.1
Introduction to Pentesting With Parrot
Information gathering with parrot 5.3
Information gathering with parrot 5.2
Information gathering with parrot 5.1
Docker For Pentesting 4.0

 Parrot OS Basics (5)

Parrot OS Basics 1.1
Parrot OS Basics 1.5
Parrot OS basics 1.4
Parrot OS basics 1.3
Parrot OS Basics 1.2

 Vulnerability Assessment (2)

Vulnerability Assessment 8.2
Vulnerability Assessment 8.1

 Windows Basics (2)

Windows Basics 3.2
Windows Basics 3.1

 Windows Exploitation (2)

Windows Exploitation 11.2
Windows Exploitation 11.1

 Windows Post Exploitation (3)

Windows Post Exploitation 12.3
Windows Post Exploitation 12.2
Windows Post Exploitation 12.1