Please note that this page does not hosts or makes available any of the listed filenames. You
cannot download any of those files from here.
|
[TGx]Downloaded from torrentgalaxy.to .txt |
585B |
0 |
436.36KB |
1 |
698.92KB |
1. Fundamentals of Linux Introduction.mp4 |
27.81MB |
1. Fundamentals of Linux Introduction-en_US.srt |
4.92KB |
1. Installing Metasploit.mp4 |
93.67MB |
1. Installing Metasploit-en_US.srt |
8.08KB |
1. Linux - Filesystem Part 1.mp4 |
113.85MB |
1. Linux - Filesystem Part 1-en_US.srt |
11.52KB |
1. Linux Software Control Part 1.mp4 |
63.47MB |
1. Linux Software Control Part 1-en_US.srt |
5.84KB |
1. Linux - Working With Archive Files 1.mp4 |
109.04MB |
1. Linux - Working With Archive Files 1-en_US.srt |
13.62KB |
1. Linux Working With Files - Part 1.mp4 |
95.62MB |
1. Linux Working With Files - Part 1-en_US.srt |
10.45KB |
1. Reconnaissance and Footprinting.mp4 |
46.18MB |
1. Reconnaissance and Footprinting-en_US.srt |
9.40KB |
1. User Enviroment Variable Introduction.mp4 |
65.30MB |
1. User Enviroment Variable Introduction-en_US.srt |
6.98KB |
1. Who is Hacker and What you will learn.mp4 |
68.41MB |
1. Who is Hacker and What you will learn-en_US.srt |
3.35KB |
1. Working with Processes - Part 1.mp4 |
50.29MB |
1. Working with Processes - Part 1-en_US.srt |
6.87KB |
10 |
155.29KB |
11 |
847.75KB |
12 |
981.21KB |
13 |
431.09KB |
14 |
300.61KB |
15 |
547.23KB |
16 |
394.00KB |
17 |
867.98KB |
18 |
333.03KB |
19 |
717.17KB |
2 |
686.67KB |
2. Changing Enviroment Variables.mp4 |
41.04MB |
2. Changing Enviroment Variables-en_US.srt |
6.18KB |
2. Dealing With Files.mp4 |
118.82MB |
2. Dealing With Files-en_US.srt |
11.88KB |
2. Linux - Filesystem Part 2.mp4 |
154.32MB |
2. Linux - Filesystem Part 2-en_US.srt |
16.79KB |
2. Linux Filtering Processes.mp4 |
60.60MB |
2. Linux Filtering Processes-en_US.srt |
4.96KB |
2. Linux Software Control Part 2.mp4 |
142.42MB |
2. Linux Software Control Part 2-en_US.srt |
12.54KB |
2. Linux - Working With Archive Files 2.mp4 |
147.00MB |
2. Linux - Working With Archive Files 2-en_US.srt |
14.02KB |
2. Linux Working With Files - Part 2.mp4 |
40.77MB |
2. Linux Working With Files - Part 2-en_US.srt |
6.84KB |
2. Maltego - Part 1.mp4 |
108.58MB |
2. Maltego - Part 1-en_US.srt |
11.62KB |
2. Metasploit Basics - Part 1.mp4 |
129.33MB |
2. Metasploit Basics - Part 1-en_US.srt |
14.78KB |
2. Types of Hackers.mp4 |
123.17MB |
2. Types of Hackers-en_US.srt |
11.16KB |
20 |
463.53KB |
21 |
96.04KB |
22 |
599.45KB |
23 |
750.00KB |
24 |
713.82KB |
25 |
661.97KB |
26 |
539.87KB |
27 |
414.68KB |
28 |
697.22KB |
29 |
950.74KB |
3 |
1019.87KB |
3. DNS Info Gathering.mp4 |
74.91MB |
3. DNS Info Gathering-en_US.srt |
8.25KB |
3. Editing and Creating New Variables.mp4 |
80.55MB |
3. Editing and Creating New Variables-en_US.srt |
12.24KB |
3. Important Terminologies.mp4 |
37.41MB |
3. Important Terminologies-en_US.srt |
8.84KB |
3. Linux - Logging and Remaining Stealthy.mp4 |
216.17MB |
3. Linux - Logging and Remaining Stealthy-en_US.srt |
24.80KB |
3. Linux Network Manipulation - Part 1.mp4 |
107.71MB |
3. Linux Network Manipulation - Part 1-en_US.srt |
12.72KB |
3. Metasploit Basics - Part 2.mp4 |
148.33MB |
3. Metasploit Basics - Part 2-en_US.srt |
15.83KB |
3. Working with Processes - Part 2.mp4 |
130.77MB |
3. Working with Processes - Part 2-en_US.srt |
13.90KB |
30 |
267.45KB |
31 |
722.88KB |
32 |
834.95KB |
33 |
986.48KB |
34 |
232.21KB |
35 |
452.15KB |
36 |
606.93KB |
37 |
701.89KB |
38 |
948.66KB |
39 |
661.21KB |
4 |
597.76KB |
4. Linux - Creating our own Web Server.mp4 |
101.47MB |
4. Linux - Creating our own Web Server-en_US.srt |
14.23KB |
4. Linux MAC Adress Spoofing.mp4 |
64.35MB |
4. Linux MAC Adress Spoofing-en_US.srt |
5.64KB |
4. Metasploit Basics - Part 3.mp4 |
109.17MB |
4. Metasploit Basics - Part 3-en_US.srt |
7.67KB |
4. Pentest phases - Part 1.mp4 |
50.74MB |
4. Pentest phases - Part 1-en_US.srt |
10.94KB |
4. Working with Processes - Part 3.mp4 |
57.32MB |
4. Working with Processes - Part 3-en_US.srt |
9.19KB |
5 |
881.88KB |
5. Changing DNS in Linux.mp4 |
86.30MB |
5. Changing DNS in Linux-en_US.srt |
10.85KB |
5. Installing Metasploitable.mp4 |
94.15MB |
5. Installing Metasploitable-en_US.srt |
9.80KB |
5. Pentest phases - Part 2.mp4 |
28.35MB |
5. Pentest phases - Part 2-en_US.srt |
5.91KB |
6 |
236.96KB |
6. Manipulating Hosts File.mp4 |
32.07MB |
6. Manipulating Hosts File-en_US.srt |
4.55KB |
6. Pentest Methodologies and Approaches.mp4 |
32.31MB |
6. Pentest Methodologies and Approaches-en_US.srt |
9.64KB |
6. Running NMAP in Metasploit and Port Scanning.mp4 |
141.14MB |
6. Running NMAP in Metasploit and Port Scanning-en_US.srt |
10.92KB |
7 |
683.66KB |
7. Exploiting SMB Ports.mp4 |
66.27MB |
7. Exploiting SMB Ports-en_US.srt |
7.45KB |
7. Pentest types.mp4 |
38.56MB |
7. Pentest types-en_US.srt |
8.04KB |
8 |
851.91KB |
8. Hacking Phases.mp4 |
52.07MB |
8. Hacking Phases-en_US.srt |
7.92KB |
9 |
187.37KB |
TutsNode.com.txt |
63B |