{"version":"1.0","provider_name":"\uff28\uff49\uff44\uff45\uff3a\uff45\uff52\uff4f\uff2f\uff4e\uff45","provider_url":"https:\/\/hide01.ir","title":"\u062f\u0648\u0631\u0647 Sektor7 - RED TEAM Operator: Malware Development Essentials","type":"rich","width":600,"height":338,"html":"<blockquote class=\"wp-embedded-content\" data-secret=\"SBriIF1RGB\"><a href=\"https:\/\/hide01.ir\/red-team-operator-malware-development-essentials\/\">\u062f\u0648\u0631\u0647 Sektor7 &#8211; RED TEAM Operator: Malware Development Essentials<\/a><\/blockquote><iframe sandbox=\"allow-scripts\" security=\"restricted\" src=\"https:\/\/hide01.ir\/red-team-operator-malware-development-essentials\/embed\/#?secret=SBriIF1RGB\" width=\"600\" height=\"338\" title=\"&#8220;\u062f\u0648\u0631\u0647 Sektor7 &#8211; RED TEAM Operator: Malware Development Essentials&#8221; &#8212; \uff28\uff49\uff44\uff45\uff3a\uff45\uff52\uff4f\uff2f\uff4e\uff45\" data-secret=\"SBriIF1RGB\" frameborder=\"0\" marginwidth=\"0\" marginheight=\"0\" scrolling=\"no\" class=\"wp-embedded-content\"><\/iframe><script type=\"text\/javascript\">\n\/* <![CDATA[ *\/\n\/*! This file is auto-generated *\/\n!function(d,l){\"use strict\";l.querySelector&&d.addEventListener&&\"undefined\"!=typeof URL&&(d.wp=d.wp||{},d.wp.receiveEmbedMessage||(d.wp.receiveEmbedMessage=function(e){var t=e.data;if((t||t.secret||t.message||t.value)&&!\/[^a-zA-Z0-9]\/.test(t.secret)){for(var s,r,n,a=l.querySelectorAll('iframe[data-secret=\"'+t.secret+'\"]'),o=l.querySelectorAll('blockquote[data-secret=\"'+t.secret+'\"]'),c=new RegExp(\"^https?:$\",\"i\"),i=0;i<o.length;i++)o[i].style.display=\"none\";for(i=0;i<a.length;i++)s=a[i],e.source===s.contentWindow&&(s.removeAttribute(\"style\"),\"height\"===t.message?(1e3<(r=parseInt(t.value,10))?r=1e3:~~r<200&&(r=200),s.height=r):\"link\"===t.message&&(r=new URL(s.getAttribute(\"src\")),n=new URL(t.value),c.test(n.protocol))&&n.host===r.host&&l.activeElement===s&&(d.top.location.href=t.value))}},d.addEventListener(\"message\",d.wp.receiveEmbedMessage,!1),l.addEventListener(\"DOMContentLoaded\",function(){for(var e,t,s=l.querySelectorAll(\"iframe.wp-embedded-content\"),r=0;r<s.length;r++)(t=(e=s[r]).getAttribute(\"data-secret\"))||(t=Math.random().toString(36).substring(2,12),e.src+=\"#?secret=\"+t,e.setAttribute(\"data-secret\",t)),e.contentWindow.postMessage({message:\"ready\",secret:t},\"*\")},!1)))}(window,document);\n\/\/# sourceURL=https:\/\/hide01.ir\/wp-includes\/js\/wp-embed.min.js\n\/* ]]> *\/\n<\/script>\n","thumbnail_url":"https:\/\/hide01.ir\/wp-content\/uploads\/2024\/02\/RTO-maldev-essentials.png","thumbnail_width":1177,"thumbnail_height":660,"description":"Are you a pen tester having some experience with\u00a0Metasploit\u00a0or\u00a0Empire\u00a0frameworks? Or maybe you take your first steps as an ethical hacker and you want to know more about how all these offensive tools work? Or you are a\u00a0blue teamer\u00a0or\u00a0threat hunter who needs to better understand the internal workings of malware? This course will provide you the [&hellip;]"}