{"version":"1.0","provider_name":"\uff28\uff49\uff44\uff45\uff3a\uff45\uff52\uff4f\uff2f\uff4e\uff45","provider_url":"https:\/\/hide01.ir","title":"\u062f\u0648\u0631\u0647 SEC660: Advanced Penetration Testing, Exploit Writing, and Ethical Hacking","type":"rich","width":600,"height":338,"html":"<blockquote class=\"wp-embedded-content\" data-secret=\"46xslWK90Y\"><a href=\"https:\/\/hide01.ir\/advanced-penetration-testing-exploit-writing-and-ethical-hacking\/\">\u062f\u0648\u0631\u0647 SEC660: Advanced Penetration Testing, Exploit Writing, and Ethical Hacking<\/a><\/blockquote><iframe sandbox=\"allow-scripts\" security=\"restricted\" src=\"https:\/\/hide01.ir\/advanced-penetration-testing-exploit-writing-and-ethical-hacking\/embed\/#?secret=46xslWK90Y\" width=\"600\" height=\"338\" title=\"&#8220;\u062f\u0648\u0631\u0647 SEC660: Advanced Penetration Testing, Exploit Writing, and Ethical Hacking&#8221; &#8212; \uff28\uff49\uff44\uff45\uff3a\uff45\uff52\uff4f\uff2f\uff4e\uff45\" data-secret=\"46xslWK90Y\" frameborder=\"0\" marginwidth=\"0\" marginheight=\"0\" scrolling=\"no\" class=\"wp-embedded-content\"><\/iframe><script type=\"text\/javascript\">\n\/* <![CDATA[ *\/\n\/*! This file is auto-generated *\/\n!function(d,l){\"use strict\";l.querySelector&&d.addEventListener&&\"undefined\"!=typeof URL&&(d.wp=d.wp||{},d.wp.receiveEmbedMessage||(d.wp.receiveEmbedMessage=function(e){var t=e.data;if((t||t.secret||t.message||t.value)&&!\/[^a-zA-Z0-9]\/.test(t.secret)){for(var s,r,n,a=l.querySelectorAll('iframe[data-secret=\"'+t.secret+'\"]'),o=l.querySelectorAll('blockquote[data-secret=\"'+t.secret+'\"]'),c=new RegExp(\"^https?:$\",\"i\"),i=0;i<o.length;i++)o[i].style.display=\"none\";for(i=0;i<a.length;i++)s=a[i],e.source===s.contentWindow&&(s.removeAttribute(\"style\"),\"height\"===t.message?(1e3<(r=parseInt(t.value,10))?r=1e3:~~r<200&&(r=200),s.height=r):\"link\"===t.message&&(r=new URL(s.getAttribute(\"src\")),n=new URL(t.value),c.test(n.protocol))&&n.host===r.host&&l.activeElement===s&&(d.top.location.href=t.value))}},d.addEventListener(\"message\",d.wp.receiveEmbedMessage,!1),l.addEventListener(\"DOMContentLoaded\",function(){for(var e,t,s=l.querySelectorAll(\"iframe.wp-embedded-content\"),r=0;r<s.length;r++)(t=(e=s[r]).getAttribute(\"data-secret\"))||(t=Math.random().toString(36).substring(2,12),e.src+=\"#?secret=\"+t,e.setAttribute(\"data-secret\",t)),e.contentWindow.postMessage({message:\"ready\",secret:t},\"*\")},!1)))}(window,document);\n\/\/# sourceURL=https:\/\/hide01.ir\/wp-includes\/js\/wp-embed.min.js\n\/* ]]> *\/\n<\/script>\n","thumbnail_url":"https:\/\/hide01.ir\/wp-content\/uploads\/2024\/02\/sec660-hide01.ir_.jpg","thumbnail_width":1024,"thumbnail_height":1024,"description":"This course is designed for seasoned penetration testers and cybersecurity professionals looking to elevate their skills in offensive security. It focuses on advanced exploitation techniques and complex attack vectors, enabling participants to uncover and exploit vulnerabilities in a wide range of systems and networks."}