vk9-sec.com Open in urlscan Pro
2a02:4780:b:744:0:1eb1:95ff:1  Public Scan

Submitted URL: http://vk9-sec.com/
Effective URL: https://vk9-sec.com/
Submission: On April 04 via api from US — Scanned from DE

Form analysis 1 forms found in the DOM

GET https://vk9-sec.com/

<form role="search" method="get" class="et_pb_searchform" action="https://vk9-sec.com/">
  <div>
    <label class="screen-reader-text" for="s">Search for:</label>
    <input type="text" name="s" placeholder="" class="et_pb_s">
    <input type="hidden" name="et_pb_searchform_submit" value="et_search_proccess">
    <input type="hidden" name="et_pb_include_posts" value="yes">
    <input type="hidden" name="et_pb_include_pages" value="yes">
    <input type="submit" value="Search" class="et_pb_searchsubmit" style="">
  </div>
</form>

Text Content

VK9 SECURITY

 * Home
 * Udemy Courses
 * Red Team
   * Anonymity
     * Anonymity
   * Information Gathering
     * Active Gathering
     * Passive Gathering
   * Exploitation
     * Android Exploitation
     * Linux Exploitation
     * Windows Exploitation
     * Network
     * Application
       * Web Exploitation
   * Post-Exploitation
     * Linux Post-Exploitation
     * WIndows Post-Exploitation
     * Cleaning Tracks
   * Red Team Operations
   * Reporting
   * Tools
 * Blue-Team
   * Threat Hunt
   * Incident Response
   * OS
     * Linux OS
       * Linux Management
       * Linux Commands
       * Linux Misc
     * Windows OS
       * Windows Commands
       * Windows Misc
       * Windows Management
   * Device Configuration
 * Labs
   * Labs
 * About Us

 * Home
 * Udemy Courses
 * Red Team
   * Anonymity
     * Anonymity
   * Information Gathering
     * Active Gathering
     * Passive Gathering
   * Exploitation
     * Android Exploitation
     * Linux Exploitation
     * Windows Exploitation
     * Network
     * Application
       * Web Exploitation
   * Post-Exploitation
     * Linux Post-Exploitation
     * WIndows Post-Exploitation
     * Cleaning Tracks
   * Red Team Operations
   * Reporting
   * Tools
 * Blue-Team
   * Threat Hunt
   * Incident Response
   * OS
     * Linux OS
       * Linux Management
       * Linux Commands
       * Linux Misc
     * Windows OS
       * Windows Commands
       * Windows Misc
       * Windows Management
   * Device Configuration
 * Labs
   * Labs
 * About Us

Search for:

FREE COURSE!!

While the course is created, for a limited time only, you can enroll in “Learn
Python Hacking (from Zero to Hero)” for FREE using the coupon code “PYTHONSEC”.

Don’t miss out on this incredible opportunity to future-proof your career and
become a Python Security virtuoso!.

Click Here

Vk9 Security






Udemy Python Course FREE!

Don’t miss out on this incredible opportunity to to learn for free Python
Security programming using the coupon code “PYTHONSEC”   

This first Udemy course is focused on mastering Python hacking, how to manually
build tools that hackers use, more than 15 hours for free.

Note: Over 85% of the course is completed. This offer will be active until the
course is completed 100%.

Click –>HERE<– to get more info

X