Torrent Info
Title [DesireCourse.Com] Udemy - Learn Ethical Hacking From Scratch
Category Books
Size 1.91GB

Files List
Please note that this page does not hosts or makes available any of the listed filenames. You cannot download any of those files from here.
[DesireCourse.Com].url 51B
001 Course Introduction & Overview.mp4 12.51MB
001 Course Introduction & Overview-subtitle-en.vtt 4.56KB
001 Course Introduction & Overview-subtitle-fr.vtt 4.71KB
001 Course Introduction & Overview-subtitle-hi.vtt 10.08KB
001 Course Introduction & Overview-subtitle-ko.vtt 4.55KB
001 Course Introduction & Overview-subtitle-nl.vtt 4.32KB
001 Course Introduction & Overview-subtitle-pl.vtt 4.50KB
001 Course Introduction & Overview-subtitle-zh.vtt 3.58KB
002 Teaser - Hacking a Windows 10 Computer & Accessing Their Webcam.mp4 20.95MB
002 Teaser - Hacking a Windows 10 Computer & Accessing Their Webcam-subtitle-en.vtt 8.17KB
002 Teaser - Hacking a Windows 10 Computer & Accessing Their Webcam-subtitle-fr.vtt 7.99KB
002 Teaser - Hacking a Windows 10 Computer & Accessing Their Webcam-subtitle-hi.vtt 17.33KB
002 Teaser - Hacking a Windows 10 Computer & Accessing Their Webcam-subtitle-ko.vtt 8.34KB
002 Teaser - Hacking a Windows 10 Computer & Accessing Their Webcam-subtitle-nl.vtt 7.54KB
002 Teaser - Hacking a Windows 10 Computer & Accessing Their Webcam-subtitle-pl.vtt 7.47KB
002 Teaser - Hacking a Windows 10 Computer & Accessing Their Webcam-subtitle-zh.vtt 6.58KB
003 What Is Hacking & Why Learn It _.mp4 8.82MB
003 What Is Hacking & Why Learn It _-subtitle-en.vtt 4.60KB
003 What Is Hacking & Why Learn It _-subtitle-fr.vtt 4.70KB
003 What Is Hacking & Why Learn It _-subtitle-hi.vtt 9.34KB
003 What Is Hacking & Why Learn It _-subtitle-ko.vtt 4.68KB
003 What Is Hacking & Why Learn It _-subtitle-nl.vtt 4.31KB
003 What Is Hacking & Why Learn It _-subtitle-pl.vtt 4.42KB
003 What Is Hacking & Why Learn It _-subtitle-zh.vtt 3.74KB
004 Lab Overview & Needed Software.mp4 9.40MB
004 Lab Overview & Needed Software-subtitle-en.vtt 4.64KB
004 Lab Overview & Needed Software-subtitle-fr.vtt 4.67KB
004 Lab Overview & Needed Software-subtitle-hi.vtt 9.91KB
004 Lab Overview & Needed Software-subtitle-ko.vtt 4.67KB
004 Lab Overview & Needed Software-subtitle-nl.vtt 4.23KB
004 Lab Overview & Needed Software-subtitle-pl.vtt 4.38KB
004 Lab Overview & Needed Software-subtitle-zh.vtt 3.87KB
004 The-Lab-1.pdf 346.75KB
005 Installing Kali E7 As a Virtual Machine.mp4 20.99MB
005 Installing Kali E7 As a Virtual Machine-subtitle-en.vtt 10.09KB
006 Installing Metasploitable As a Virtual Machine.mp4 11.01MB
006 Installing Metasploitable As a Virtual Machine-subtitle-en.vtt 5.24KB
006 Installing Metasploitable As a Virtual Machine-subtitle-fr.vtt 5.19KB
006 Installing Metasploitable As a Virtual Machine-subtitle-hi.vtt 10.59KB
006 Installing Metasploitable As a Virtual Machine-subtitle-ko.vtt 5.29KB
006 Installing Metasploitable As a Virtual Machine-subtitle-nl.vtt 4.91KB
006 Installing Metasploitable As a Virtual Machine-subtitle-pl.vtt 4.93KB
006 Installing Metasploitable As a Virtual Machine-subtitle-zh.vtt 4.33KB
007 Installing Windows As a Virtual Machine.mp4 9.31MB
007 Installing Windows As a Virtual Machine-subtitle-en.vtt 4.18KB
007 Installing Windows As a Virtual Machine-subtitle-fr.vtt 4.05KB
007 Installing Windows As a Virtual Machine-subtitle-hi.vtt 8.16KB
007 Installing Windows As a Virtual Machine-subtitle-ko.vtt 3.96KB
007 Installing Windows As a Virtual Machine-subtitle-nl.vtt 3.76KB
007 Installing Windows As a Virtual Machine-subtitle-pl.vtt 3.74KB
007 Installing Windows As a Virtual Machine-subtitle-zh.vtt 3.33KB
008 Creating & Using Snapshots.mp4 18.88MB
008 Creating & Using Snapshots-subtitle-en.vtt 10.74KB
008 Creating & Using Snapshots-subtitle-fr.vtt 5.30KB
008 Creating & Using Snapshots-subtitle-hi.vtt 11.47KB
008 Creating & Using Snapshots-subtitle-ko.vtt 4.67KB
008 Creating & Using Snapshots-subtitle-nl.vtt 4.77KB
008 Creating & Using Snapshots-subtitle-pl.vtt 4.73KB
008 Creating & Using Snapshots-subtitle-zh.vtt 3.83KB
009 Basic Overview of Kali Linux.mp4 26.56MB
009 Basic Overview of Kali Linux-subtitle-en.vtt 8.75KB
009 Basic Overview of Kali Linux-subtitle-fr.vtt 8.87KB
009 Basic Overview of Kali Linux-subtitle-hi.vtt 17.81KB
009 Basic Overview of Kali Linux-subtitle-ko.vtt 8.47KB
009 Basic Overview of Kali Linux-subtitle-nl.vtt 8.09KB
009 Basic Overview of Kali Linux-subtitle-pl.vtt 8.20KB
009 Basic Overview of Kali Linux-subtitle-zh.vtt 6.99KB
010 The Terminal & Linux Commands.mp4 29.61MB
010 The Terminal & Linux Commands-subtitle-en.vtt 11.56KB
010 The Terminal & Linux Commands-subtitle-fr.vtt 11.72KB
010 The Terminal & Linux Commands-subtitle-hi.vtt 24.14KB
010 The Terminal & Linux Commands-subtitle-ko.vtt 11.63KB
010 The Terminal & Linux Commands-subtitle-nl.vtt 10.78KB
010 The Terminal & Linux Commands-subtitle-pl.vtt 10.98KB
010 The Terminal & Linux Commands-subtitle-zh.vtt 9.48KB
011 Updating Sources & Installing Programs.mp4 16.94MB
011 Updating Sources & Installing Programs-subtitle-en.vtt 27.68KB
011 Updating Sources & Installing Programs-subtitle-fr.vtt 7B
011 Updating Sources & Installing Programs-subtitle-hi.vtt 7B
011 Updating Sources & Installing Programs-subtitle-ko.vtt 7B
011 Updating Sources & Installing Programs-subtitle-nl.vtt 7B
011 Updating Sources & Installing Programs-subtitle-pl.vtt 7B
011 Updating Sources & Installing Programs-subtitle-zh.vtt 7B
012 Network Penetration Testing Introduction.mp4 7.29MB
012 Network Penetration Testing Introduction-subtitle-en.vtt 3.71KB
012 Network Penetration Testing Introduction-subtitle-fr.vtt 3.51KB
012 Network Penetration Testing Introduction-subtitle-hi.vtt 7.24KB
012 Network Penetration Testing Introduction-subtitle-ko.vtt 3.48KB
012 Network Penetration Testing Introduction-subtitle-nl.vtt 3.29KB
012 Network Penetration Testing Introduction-subtitle-pl.vtt 3.29KB
012 Network Penetration Testing Introduction-subtitle-zh.vtt 2.63KB
012 Networks-Intro.pdf 106.81KB
013 Networks Basics.mp4 5.95MB
013 Networks Basics-subtitle-en.vtt 3.83KB
013 Networks Basics-subtitle-fr.vtt 3.89KB
013 Networks Basics-subtitle-hi.vtt 7.71KB
013 Networks Basics-subtitle-ko.vtt 3.76KB
013 Networks Basics-subtitle-nl.vtt 3.60KB
013 Networks Basics-subtitle-pl.vtt 3.63KB
013 Networks Basics-subtitle-zh.vtt 3.21KB
014 Connecting a Wireless Adapter To Kali.mp4 20.89MB
014 Connecting a Wireless Adapter To Kali-subtitle-en.vtt 8.52KB
015 What is MAC Address & How To Change It.mp4 8.62MB
015 What is MAC Address & How To Change It-subtitle-en.vtt 5.86KB
015 What is MAC Address & How To Change It-subtitle-fr.vtt 6.10KB
015 What is MAC Address & How To Change It-subtitle-hi.vtt 12.18KB
015 What is MAC Address & How To Change It-subtitle-ko.vtt 5.99KB
015 What is MAC Address & How To Change It-subtitle-nl.vtt 5.82KB
015 What is MAC Address & How To Change It-subtitle-pl.vtt 5.71KB
015 What is MAC Address & How To Change It-subtitle-zh.vtt 5.09KB
016 Wireless Modes (Managed & Monitor).mp4 9.90MB
016 Wireless Modes (Managed & Monitor)-subtitle-en.vtt 8.41KB
016 Wireless Modes (Managed & Monitor)-subtitle-fr.vtt 7B
016 Wireless Modes (Managed & Monitor)-subtitle-hi.vtt 7B
016 Wireless Modes (Managed & Monitor)-subtitle-ko.vtt 7B
016 Wireless Modes (Managed & Monitor)-subtitle-nl.vtt 7B
016 Wireless Modes (Managed & Monitor)-subtitle-pl.vtt 7B
016 Wireless Modes (Managed & Monitor)-subtitle-zh.vtt 7B
017 Enabling Monitor Mode Manually (2nd method).mp4 4.81MB
017 Enabling Monitor Mode Manually (2nd method)-subtitle-en.vtt 3.45KB
017 Enabling Monitor Mode Manually (2nd method)-subtitle-fr.vtt 3.81KB
017 Enabling Monitor Mode Manually (2nd method)-subtitle-hi.vtt 7.31KB
017 Enabling Monitor Mode Manually (2nd method)-subtitle-ko.vtt 3.65KB
017 Enabling Monitor Mode Manually (2nd method)-subtitle-nl.vtt 3.58KB
017 Enabling Monitor Mode Manually (2nd method)-subtitle-pl.vtt 3.62KB
017 Enabling Monitor Mode Manually (2nd method)-subtitle-zh.vtt 3.20KB
018 Enabling Monitor Mode Using airmon-ng (3rd method).mp4 5.23MB
018 Enabling Monitor Mode Using airmon-ng (3rd method)-subtitle-en.vtt 3.97KB
018 Enabling Monitor Mode Using airmon-ng (3rd method)-subtitle-fr.vtt 4.15KB
018 Enabling Monitor Mode Using airmon-ng (3rd method)-subtitle-hi.vtt 8.12KB
018 Enabling Monitor Mode Using airmon-ng (3rd method)-subtitle-ko.vtt 4.09KB
018 Enabling Monitor Mode Using airmon-ng (3rd method)-subtitle-nl.vtt 3.74KB
018 Enabling Monitor Mode Using airmon-ng (3rd method)-subtitle-pl.vtt 3.78KB
018 Enabling Monitor Mode Using airmon-ng (3rd method)-subtitle-zh.vtt 3.39KB
019 Networks-Pre-Connection-Attacks.pdf 156.67KB
019 Packet Sniffing Basics Using Airodump-ng.mp4 11.60MB
019 Packet Sniffing Basics Using Airodump-ng-subtitle-en.vtt 6.79KB
019 Packet Sniffing Basics Using Airodump-ng-subtitle-fr.vtt 6.85KB
019 Packet Sniffing Basics Using Airodump-ng-subtitle-hi.vtt 13.12KB
019 Packet Sniffing Basics Using Airodump-ng-subtitle-ko.vtt 6.89KB
019 Packet Sniffing Basics Using Airodump-ng-subtitle-nl.vtt 6.43KB
019 Packet Sniffing Basics Using Airodump-ng-subtitle-pl.vtt 6.49KB
019 Packet Sniffing Basics Using Airodump-ng-subtitle-zh.vtt 5.78KB
020 Targeted Packet Sniffing Using Airodump-ng.mp4 17.35MB
020 Targeted Packet Sniffing Using Airodump-ng-subtitle-en.vtt 9.00KB
020 Targeted Packet Sniffing Using Airodump-ng-subtitle-fr.vtt 9.12KB
020 Targeted Packet Sniffing Using Airodump-ng-subtitle-hi.vtt 18.20KB
020 Targeted Packet Sniffing Using Airodump-ng-subtitle-ko.vtt 9.59KB
020 Targeted Packet Sniffing Using Airodump-ng-subtitle-nl.vtt 8.51KB
020 Targeted Packet Sniffing Using Airodump-ng-subtitle-pl.vtt 8.40KB
020 Targeted Packet Sniffing Using Airodump-ng-subtitle-zh.vtt 7.78KB
021 Deauthentication Attack (Disconnecting Any Device From The Network).mp4 10.79MB
021 Deauthentication Attack (Disconnecting Any Device From The Network)-subtitle-en.vtt 6.20KB
021 Deauthentication Attack (Disconnecting Any Device From The Network)-subtitle-fr.vtt 6.35KB
021 Deauthentication Attack (Disconnecting Any Device From The Network)-subtitle-hi.vtt 12.94KB
021 Deauthentication Attack (Disconnecting Any Device From The Network)-subtitle-ko.vtt 6.65KB
021 Deauthentication Attack (Disconnecting Any Device From The Network)-subtitle-nl.vtt 5.99KB
021 Deauthentication Attack (Disconnecting Any Device From The Network)-subtitle-pl.vtt 6.06KB
021 Deauthentication Attack (Disconnecting Any Device From The Network)-subtitle-zh.vtt 5.41KB
022 Creating a Fake Access Point (Honeypot) - Theory.mp4 7.23MB
022 Creating a Fake Access Point (Honeypot) - Theory-subtitle-en.vtt 4.84KB
022 Creating a Fake Access Point (Honeypot) - Theory-subtitle-fr.vtt 4.76KB
022 Creating a Fake Access Point (Honeypot) - Theory-subtitle-hi.vtt 10.13KB
022 Creating a Fake Access Point (Honeypot) - Theory-subtitle-ko.vtt 5.18KB
022 Creating a Fake Access Point (Honeypot) - Theory-subtitle-nl.vtt 4.62KB
022 Creating a Fake Access Point (Honeypot) - Theory-subtitle-pl.vtt 4.74KB
022 Creating a Fake Access Point (Honeypot) - Theory-subtitle-zh.vtt 4.05KB
023 Creating a Fake Access Point (Honeypot) - Practical.mp4 20.98MB
023 Creating a Fake Access Point (Honeypot) - Practical-subtitle-en.vtt 12.69KB
023 Creating a Fake Access Point (Honeypot) - Practical-subtitle-fr.vtt 12.35KB
023 Creating a Fake Access Point (Honeypot) - Practical-subtitle-hi.vtt 25.22KB
023 Creating a Fake Access Point (Honeypot) - Practical-subtitle-ko.vtt 12.90KB
023 Creating a Fake Access Point (Honeypot) - Practical-subtitle-nl.vtt 11.78KB
023 Creating a Fake Access Point (Honeypot) - Practical-subtitle-pl.vtt 12.17KB
023 Creating a Fake Access Point (Honeypot) - Practical-subtitle-zh.vtt 10.41KB
024 Gaining Access Introduction.mp4 3.39MB
024 Gaining Access Introduction-subtitle-en.vtt 1.72KB
024 Gaining Access Introduction-subtitle-fr.vtt 1.69KB
024 Gaining Access Introduction-subtitle-hi.vtt 3.61KB
024 Gaining Access Introduction-subtitle-ko.vtt 1.58KB
024 Gaining Access Introduction-subtitle-nl.vtt 1.58KB
024 Gaining Access Introduction-subtitle-pl.vtt 1.52KB
024 Gaining Access Introduction-subtitle-zh.vtt 1.35KB
024 Network-Pentesting-Gaining-Access.pdf 1.48MB
025 WEP Cracking - Theory Behind Cracking WEP Encryption.mp4 7.10MB
025 WEP Cracking - Theory Behind Cracking WEP Encryption-subtitle-en.vtt 4.01KB
025 WEP Cracking - Theory Behind Cracking WEP Encryption-subtitle-fr.vtt 3.83KB
025 WEP Cracking - Theory Behind Cracking WEP Encryption-subtitle-hi.vtt 7.67KB
025 WEP Cracking - Theory Behind Cracking WEP Encryption-subtitle-ko.vtt 4.00KB
025 WEP Cracking - Theory Behind Cracking WEP Encryption-subtitle-nl.vtt 3.68KB
025 WEP Cracking - Theory Behind Cracking WEP Encryption-subtitle-pl.vtt 3.70KB
025 WEP Cracking - Theory Behind Cracking WEP Encryption-subtitle-zh.vtt 3.14KB
026 WEP Cracking - Basic Case.mp4 13.56MB
026 WEP Cracking - Basic Case-subtitle-en.vtt 6.78KB
026 WEP Cracking - Basic Case-subtitle-fr.vtt 7.03KB
026 WEP Cracking - Basic Case-subtitle-hi.vtt 13.98KB
026 WEP Cracking - Basic Case-subtitle-ko.vtt 7.26KB
026 WEP Cracking - Basic Case-subtitle-nl.vtt 6.83KB
026 WEP Cracking - Basic Case-subtitle-pl.vtt 6.75KB
026 WEP Cracking - Basic Case-subtitle-zh.vtt 6.14KB
027 WEP Cracking - Fake Authentication.mp4 11.90MB
027 WEP Cracking - Fake Authentication-subtitle-en.vtt 7.06KB
027 WEP Cracking - Fake Authentication-subtitle-fr.vtt 7.12KB
027 WEP Cracking - Fake Authentication-subtitle-hi.vtt 14.68KB
027 WEP Cracking - Fake Authentication-subtitle-ko.vtt 7.31KB
027 WEP Cracking - Fake Authentication-subtitle-nl.vtt 6.67KB
027 WEP Cracking - Fake Authentication-subtitle-pl.vtt 6.82KB
027 WEP Cracking - Fake Authentication-subtitle-zh.vtt 6.15KB
028 WEP Cracking - ARP Request Replay Attack.mp4 10.31MB
028 WEP Cracking - ARP Request Replay Attack-subtitle-en.vtt 4.88KB
028 WEP Cracking - ARP Request Replay Attack-subtitle-fr.vtt 4.73KB
028 WEP Cracking - ARP Request Replay Attack-subtitle-hi.vtt 9.77KB
028 WEP Cracking - ARP Request Replay Attack-subtitle-ko.vtt 4.95KB
028 WEP Cracking - ARP Request Replay Attack-subtitle-nl.vtt 4.52KB
028 WEP Cracking - ARP Request Replay Attack-subtitle-pl.vtt 4.51KB
028 WEP Cracking - ARP Request Replay Attack-subtitle-zh.vtt 3.96KB
029 WPA Cracking - Introduction.mp4 4.10MB
029 WPA Cracking - Introduction-subtitle-en.vtt 2.24KB
029 WPA Cracking - Introduction-subtitle-fr.vtt 1.98KB
029 WPA Cracking - Introduction-subtitle-hi.vtt 4.09KB
029 WPA Cracking - Introduction-subtitle-ko.vtt 1.98KB
029 WPA Cracking - Introduction-subtitle-nl.vtt 1.88KB
029 WPA Cracking - Introduction-subtitle-pl.vtt 1.96KB
029 WPA Cracking - Introduction-subtitle-zh.vtt 1.51KB
030 WPA Cracking - Exploiting WPS Feature.mp4 14.17MB
030 WPA Cracking - Exploiting WPS Feature-subtitle-en.vtt 7.64KB
030 WPA Cracking - Exploiting WPS Feature-subtitle-fr.vtt 7.83KB
030 WPA Cracking - Exploiting WPS Feature-subtitle-hi.vtt 15.66KB
030 WPA Cracking - Exploiting WPS Feature-subtitle-ko.vtt 7.91KB
030 WPA Cracking - Exploiting WPS Feature-subtitle-nl.vtt 7.41KB
030 WPA Cracking - Exploiting WPS Feature-subtitle-pl.vtt 7.20KB
030 WPA Cracking - Exploiting WPS Feature-subtitle-zh.vtt 6.47KB
031 WPA Cracking - Theory Behind WPA_WPA2 Cracking.mp4 4.40MB
031 WPA Cracking - Theory Behind WPA_WPA2 Cracking-subtitle-en.vtt 2.50KB
031 WPA Cracking - Theory Behind WPA_WPA2 Cracking-subtitle-fr.vtt 2.48KB
031 WPA Cracking - Theory Behind WPA_WPA2 Cracking-subtitle-hi.vtt 4.83KB
031 WPA Cracking - Theory Behind WPA_WPA2 Cracking-subtitle-ko.vtt 2.46KB
031 WPA Cracking - Theory Behind WPA_WPA2 Cracking-subtitle-nl.vtt 2.26KB
031 WPA Cracking - Theory Behind WPA_WPA2 Cracking-subtitle-pl.vtt 2.27KB
031 WPA Cracking - Theory Behind WPA_WPA2 Cracking-subtitle-zh.vtt 1.94KB
032 WPA Cracking - How To Capture The Handshake.mp4 9.30MB
032 WPA Cracking - How To Capture The Handshake-subtitle-en.vtt 5.56KB
032 WPA Cracking - How To Capture The Handshake-subtitle-fr.vtt 5.44KB
032 WPA Cracking - How To Capture The Handshake-subtitle-hi.vtt 10.99KB
032 WPA Cracking - How To Capture The Handshake-subtitle-ko.vtt 5.35KB
032 WPA Cracking - How To Capture The Handshake-subtitle-nl.vtt 5.10KB
032 WPA Cracking - How To Capture The Handshake-subtitle-pl.vtt 5.12KB
032 WPA Cracking - How To Capture The Handshake-subtitle-zh.vtt 4.40KB
033 Some-Links-To-Wordlists.txt 434B
033 WPA Cracking - Creating a Wordlist.mp4 11.25MB
033 WPA Cracking - Creating a Wordlist-subtitle-en.vtt 6.46KB
033 WPA Cracking - Creating a Wordlist-subtitle-fr.vtt 5.94KB
033 WPA Cracking - Creating a Wordlist-subtitle-hi.vtt 11.90KB
033 WPA Cracking - Creating a Wordlist-subtitle-ko.vtt 5.56KB
033 WPA Cracking - Creating a Wordlist-subtitle-nl.vtt 5.61KB
033 WPA Cracking - Creating a Wordlist-subtitle-pl.vtt 5.48KB
033 WPA Cracking - Creating a Wordlist-subtitle-zh.vtt 4.79KB
034 WPA Cracking - Using a Wordlist Attack.mp4 7.63MB
034 WPA Cracking - Using a Wordlist Attack-subtitle-en.vtt 3.39KB
034 WPA Cracking - Using a Wordlist Attack-subtitle-fr.vtt 3.36KB
034 WPA Cracking - Using a Wordlist Attack-subtitle-hi.vtt 6.71KB
034 WPA Cracking - Using a Wordlist Attack-subtitle-ko.vtt 3.38KB
034 WPA Cracking - Using a Wordlist Attack-subtitle-nl.vtt 3.28KB
034 WPA Cracking - Using a Wordlist Attack-subtitle-pl.vtt 3.15KB
034 WPA Cracking - Using a Wordlist Attack-subtitle-zh.vtt 2.70KB
035 Securing Your Network From The Above Attacks.html 3.90KB
036 How to Configure Wireless Security Settings To Secure Your Network.mp4 11.84MB
036 How to Configure Wireless Security Settings To Secure Your Network-subtitle-en.vtt 8.18KB
036 How to Configure Wireless Security Settings To Secure Your Network-subtitle-fr.vtt 8.32KB
036 How to Configure Wireless Security Settings To Secure Your Network-subtitle-hi.vtt 16.71KB
036 How to Configure Wireless Security Settings To Secure Your Network-subtitle-ko.vtt 7.66KB
036 How to Configure Wireless Security Settings To Secure Your Network-subtitle-nl.vtt 7.82KB
036 How to Configure Wireless Security Settings To Secure Your Network-subtitle-pl.vtt 7.37KB
036 How to Configure Wireless Security Settings To Secure Your Network-subtitle-zh.vtt 6.31KB
037 04-post-connection-attacks.pdf 1.65MB
037 Introduction.mp4 8.04MB
037 Introduction-subtitle-en.vtt 3.75KB
037 Introduction-subtitle-fr.vtt 3.63KB
037 Introduction-subtitle-hi.vtt 7.67KB
037 Introduction-subtitle-ko.vtt 3.55KB
037 Introduction-subtitle-nl.vtt 3.33KB
037 Introduction-subtitle-pl.vtt 3.41KB
037 Introduction-subtitle-zh.vtt 2.90KB
038 Information Gathering - Discovering Connected Clients using netdiscover.mp4 6.29MB
038 Information Gathering - Discovering Connected Clients using netdiscover-subtitle-en.vtt 4.03KB
038 Information Gathering - Discovering Connected Clients using netdiscover-subtitle-fr.vtt 3.98KB
038 Information Gathering - Discovering Connected Clients using netdiscover-subtitle-hi.vtt 8.19KB
038 Information Gathering - Discovering Connected Clients using netdiscover-subtitle-ko.vtt 3.95KB
038 Information Gathering - Discovering Connected Clients using netdiscover-subtitle-nl.vtt 3.77KB
038 Information Gathering - Discovering Connected Clients using netdiscover-subtitle-pl.vtt 3.69KB
038 Information Gathering - Discovering Connected Clients using netdiscover-subtitle-zh.vtt 3.28KB
039 Gathering More Information Using Autoscan.mp4 23.36MB
039 Gathering More Information Using Autoscan-subtitle-en.vtt 10.45KB
039 Gathering More Information Using Autoscan-subtitle-fr.vtt 10.69KB
039 Gathering More Information Using Autoscan-subtitle-hi.vtt 21.67KB
039 Gathering More Information Using Autoscan-subtitle-ko.vtt 10.89KB
039 Gathering More Information Using Autoscan-subtitle-nl.vtt 10.14KB
039 Gathering More Information Using Autoscan-subtitle-pl.vtt 10.11KB
039 Gathering More Information Using Autoscan-subtitle-zh.vtt 8.76KB
040 Gathering Even More Information Using Zenmap.mp4 23.76MB
040 Gathering Even More Information Using Zenmap-subtitle-en.vtt 12.56KB
040 Gathering Even More Information Using Zenmap-subtitle-fr.vtt 12.98KB
040 Gathering Even More Information Using Zenmap-subtitle-hi.vtt 24.24KB
040 Gathering Even More Information Using Zenmap-subtitle-ko.vtt 13.08KB
040 Gathering Even More Information Using Zenmap-subtitle-nl.vtt 11.86KB
040 Gathering Even More Information Using Zenmap-subtitle-pl.vtt 11.91KB
040 Gathering Even More Information Using Zenmap-subtitle-zh.vtt 11.07KB
041 MITM - ARP Poisonning Theory.mp4 11.38MB
041 MITM - ARP Poisonning Theory-subtitle-en.vtt 7.02KB
041 MITM - ARP Poisonning Theory-subtitle-fr.vtt 7.00KB
041 MITM - ARP Poisonning Theory-subtitle-hi.vtt 14.04KB
041 MITM - ARP Poisonning Theory-subtitle-ko.vtt 7.08KB
041 MITM - ARP Poisonning Theory-subtitle-nl.vtt 6.77KB
041 MITM - ARP Poisonning Theory-subtitle-pl.vtt 6.57KB
041 MITM - ARP Poisonning Theory-subtitle-zh.vtt 5.88KB
042 MITM - ARP Spoofing using arpspoof.mp4 13.07MB
042 MITM - ARP Spoofing using arpspoof-subtitle-en.vtt 6.46KB
042 MITM - ARP Spoofing using arpspoof-subtitle-fr.vtt 6.39KB
042 MITM - ARP Spoofing using arpspoof-subtitle-hi.vtt 13.63KB
042 MITM - ARP Spoofing using arpspoof-subtitle-ko.vtt 6.87KB
042 MITM - ARP Spoofing using arpspoof-subtitle-nl.vtt 6.23KB
042 MITM - ARP Spoofing using arpspoof-subtitle-pl.vtt 6.15KB
042 MITM - ARP Spoofing using arpspoof-subtitle-zh.vtt 5.54KB
043 MITM - ARP Spoofing Using MITMf.mp4 13.82MB
043 MITM - ARP Spoofing Using MITMf-subtitle-en.vtt 6.21KB
043 MITM - ARP Spoofing Using MITMf-subtitle-fr.vtt 6.06KB
043 MITM - ARP Spoofing Using MITMf-subtitle-hi.vtt 12.64KB
043 MITM - ARP Spoofing Using MITMf-subtitle-ko.vtt 5.96KB
043 MITM - ARP Spoofing Using MITMf-subtitle-nl.vtt 5.69KB
043 MITM - ARP Spoofing Using MITMf-subtitle-pl.vtt 5.91KB
043 MITM - ARP Spoofing Using MITMf-subtitle-zh.vtt 4.98KB
044 MITM - Bypassing HTTPS.mp4 13.35MB
044 MITM - Bypassing HTTPS-subtitle-en.vtt 5.51KB
044 MITM - Bypassing HTTPS-subtitle-fr.vtt 5.29KB
044 MITM - Bypassing HTTPS-subtitle-hi.vtt 11.43KB
044 MITM - Bypassing HTTPS-subtitle-ko.vtt 5.22KB
044 MITM - Bypassing HTTPS-subtitle-nl.vtt 4.91KB
044 MITM - Bypassing HTTPS-subtitle-pl.vtt 5.07KB
044 MITM - Bypassing HTTPS-subtitle-zh.vtt 4.27KB
045 MITM - Session Hijacking.mp4 19.47MB
045 MITM - Session Hijacking-subtitle-en.vtt 7.96KB
045 MITM - Session Hijacking-subtitle-fr.vtt 8.17KB
045 MITM - Session Hijacking-subtitle-hi.vtt 17.06KB
045 MITM - Session Hijacking-subtitle-ko.vtt 8.44KB
045 MITM - Session Hijacking-subtitle-nl.vtt 7.72KB
045 MITM - Session Hijacking-subtitle-pl.vtt 7.80KB
045 MITM - Session Hijacking-subtitle-zh.vtt 6.91KB
046 MITM - DNS Spoofing.mp4 9.81MB
046 MITM - DNS Spoofing-subtitle-en.vtt 5.99KB
046 MITM - DNS Spoofing-subtitle-fr.vtt 6.16KB
046 MITM - DNS Spoofing-subtitle-hi.vtt 13.21KB
046 MITM - DNS Spoofing-subtitle-ko.vtt 6.24KB
046 MITM - DNS Spoofing-subtitle-nl.vtt 5.52KB
046 MITM - DNS Spoofing-subtitle-pl.vtt 5.86KB
046 MITM - DNS Spoofing-subtitle-zh.vtt 5.10KB
047 MITM - Capturing Screen Of Target & Injecting a Keylogger.mp4 18.37MB
047 MITM - Capturing Screen Of Target & Injecting a Keylogger-subtitle-en.vtt 6.67KB
047 MITM - Capturing Screen Of Target & Injecting a Keylogger-subtitle-fr.vtt 6.70KB
047 MITM - Capturing Screen Of Target & Injecting a Keylogger-subtitle-hi.vtt 13.35KB
047 MITM - Capturing Screen Of Target & Injecting a Keylogger-subtitle-ko.vtt 6.39KB
047 MITM - Capturing Screen Of Target & Injecting a Keylogger-subtitle-nl.vtt 6.07KB
047 MITM - Capturing Screen Of Target & Injecting a Keylogger-subtitle-pl.vtt 6.18KB
047 MITM - Capturing Screen Of Target & Injecting a Keylogger-subtitle-zh.vtt 5.42KB
048 MITM - Injecting Javascript_HTML Code.mp4 16.09MB
048 MITM - Injecting Javascript_HTML Code-subtitle-en.vtt 8.35KB
048 MITM - Injecting Javascript_HTML Code-subtitle-fr.vtt 8.43KB
048 MITM - Injecting Javascript_HTML Code-subtitle-hi.vtt 17.92KB
048 MITM - Injecting Javascript_HTML Code-subtitle-ko.vtt 8.65KB
048 MITM - Injecting Javascript_HTML Code-subtitle-nl.vtt 7.86KB
048 MITM - Injecting Javascript_HTML Code-subtitle-pl.vtt 7.93KB
048 MITM - Injecting Javascript_HTML Code-subtitle-zh.vtt 7.12KB
049 MITM - Using MITMf Against Real Networks.mp4 26.25MB
049 MITM - Using MITMf Against Real Networks-subtitle-en.vtt 10.88KB
049 MITM - Using MITMf Against Real Networks-subtitle-fr.vtt 10.59KB
049 MITM - Using MITMf Against Real Networks-subtitle-hi.vtt 21.90KB
049 MITM - Using MITMf Against Real Networks-subtitle-ko.vtt 10.72KB
049 MITM - Using MITMf Against Real Networks-subtitle-nl.vtt 10.04KB
049 MITM - Using MITMf Against Real Networks-subtitle-pl.vtt 10.26KB
049 MITM - Using MITMf Against Real Networks-subtitle-zh.vtt 8.76KB
050 Wireshark - Basic Overview & How To Use It With MITM Attacks.mp4 27.18MB
050 Wireshark - Basic Overview & How To Use It With MITM Attacks-subtitle-en.vtt 12.44KB
050 Wireshark - Basic Overview & How To Use It With MITM Attacks-subtitle-fr.vtt 11.80KB
050 Wireshark - Basic Overview & How To Use It With MITM Attacks-subtitle-hi.vtt 25.39KB
050 Wireshark - Basic Overview & How To Use It With MITM Attacks-subtitle-ko.vtt 12.17KB
050 Wireshark - Basic Overview & How To Use It With MITM Attacks-subtitle-nl.vtt 11.17KB
050 Wireshark - Basic Overview & How To Use It With MITM Attacks-subtitle-pl.vtt 11.61KB
050 Wireshark - Basic Overview & How To Use It With MITM Attacks-subtitle-zh.vtt 9.90KB
051 Wireshark - Sniffing Data & Analysing HTTP Traffic.mp4 27.25MB
051 Wireshark - Sniffing Data & Analysing HTTP Traffic-subtitle-en.vtt 10.30KB
051 Wireshark - Sniffing Data & Analysing HTTP Traffic-subtitle-fr.vtt 10.16KB
051 Wireshark - Sniffing Data & Analysing HTTP Traffic-subtitle-hi.vtt 20.25KB
051 Wireshark - Sniffing Data & Analysing HTTP Traffic-subtitle-ko.vtt 9.94KB
051 Wireshark - Sniffing Data & Analysing HTTP Traffic-subtitle-nl.vtt 9.46KB
051 Wireshark - Sniffing Data & Analysing HTTP Traffic-subtitle-pl.vtt 9.51KB
051 Wireshark - Sniffing Data & Analysing HTTP Traffic-subtitle-zh.vtt 8.45KB
052 Wireshark - Capturing Passwords & Cookies Entered By Any Device In The Network.mp4 17.14MB
052 Wireshark - Capturing Passwords & Cookies Entered By Any Device In The Network-subtitle-en.vtt 6.75KB
052 Wireshark - Capturing Passwords & Cookies Entered By Any Device In The Network-subtitle-fr.vtt 6.50KB
052 Wireshark - Capturing Passwords & Cookies Entered By Any Device In The Network-subtitle-hi.vtt 13.70KB
052 Wireshark - Capturing Passwords & Cookies Entered By Any Device In The Network-subtitle-ko.vtt 6.69KB
052 Wireshark - Capturing Passwords & Cookies Entered By Any Device In The Network-subtitle-nl.vtt 6.08KB
052 Wireshark - Capturing Passwords & Cookies Entered By Any Device In The Network-subtitle-pl.vtt 6.23KB
052 Wireshark - Capturing Passwords & Cookies Entered By Any Device In The Network-subtitle-zh.vtt 5.44KB
053 Detecting ARP Poisonning Attacks.mp4 14.55MB
053 Detecting ARP Poisonning Attacks-subtitle-en.vtt 6.28KB
053 Detecting ARP Poisonning Attacks-subtitle-fr.vtt 6.00KB
053 Detecting ARP Poisonning Attacks-subtitle-hi.vtt 12.06KB
053 Detecting ARP Poisonning Attacks-subtitle-ko.vtt 6.01KB
053 Detecting ARP Poisonning Attacks-subtitle-nl.vtt 5.67KB
053 Detecting ARP Poisonning Attacks-subtitle-pl.vtt 5.54KB
053 Detecting ARP Poisonning Attacks-subtitle-zh.vtt 5.03KB
054 Detecting suspicious Activities Using Wireshark.mp4 14.98MB
054 Detecting suspicious Activities Using Wireshark-subtitle-en.vtt 6.63KB
054 Detecting suspicious Activities Using Wireshark-subtitle-fr.vtt 6.59KB
054 Detecting suspicious Activities Using Wireshark-subtitle-hi.vtt 13.28KB
054 Detecting suspicious Activities Using Wireshark-subtitle-ko.vtt 6.56KB
054 Detecting suspicious Activities Using Wireshark-subtitle-nl.vtt 6.18KB
054 Detecting suspicious Activities Using Wireshark-subtitle-pl.vtt 5.99KB
054 Detecting suspicious Activities Using Wireshark-subtitle-zh.vtt 5.40KB
055 Gaining Access Introduction.mp4 10.48MB
055 Gaining Access Introduction-subtitle-en.vtt 5.50KB
055 Gaining Access Introduction-subtitle-fr.vtt 5.63KB
055 Gaining Access Introduction-subtitle-hi.vtt 11.87KB
055 Gaining Access Introduction-subtitle-ko.vtt 5.63KB
055 Gaining Access Introduction-subtitle-nl.vtt 5.25KB
055 Gaining Access Introduction-subtitle-pl.vtt 5.30KB
055 Gaining Access Introduction-subtitle-zh.vtt 4.57KB
056 Gaining-Access-Server-Side-Attacks.pdf 168.87KB
056 Introduction.mp4 12.37MB
056 Introduction-subtitle-en.vtt 5.19KB
056 Introduction-subtitle-fr.vtt 5.23KB
056 Introduction-subtitle-hi.vtt 10.87KB
056 Introduction-subtitle-ko.vtt 5.26KB
056 Introduction-subtitle-nl.vtt 4.77KB
056 Introduction-subtitle-pl.vtt 4.97KB
056 Introduction-subtitle-zh.vtt 4.39KB
057 Basic Information Gathering & Exploitation.mp4 24.57MB
057 Basic Information Gathering & Exploitation-subtitle-en.vtt 12.28KB
057 Basic Information Gathering & Exploitation-subtitle-fr.vtt 12.95KB
057 Basic Information Gathering & Exploitation-subtitle-hi.vtt 25.69KB
057 Basic Information Gathering & Exploitation-subtitle-ko.vtt 12.83KB
057 Basic Information Gathering & Exploitation-subtitle-nl.vtt 12.05KB
057 Basic Information Gathering & Exploitation-subtitle-pl.vtt 11.88KB
057 Basic Information Gathering & Exploitation-subtitle-zh.vtt 10.64KB
058 Using a Basic Metasploit Exploit.mp4 18.84MB
058 Using a Basic Metasploit Exploit-subtitle-en.vtt 9.61KB
058 Using a Basic Metasploit Exploit-subtitle-fr.vtt 9.77KB
058 Using a Basic Metasploit Exploit-subtitle-hi.vtt 19.94KB
058 Using a Basic Metasploit Exploit-subtitle-ko.vtt 10.11KB
058 Using a Basic Metasploit Exploit-subtitle-nl.vtt 9.21KB
058 Using a Basic Metasploit Exploit-subtitle-pl.vtt 9.12KB
058 Using a Basic Metasploit Exploit-subtitle-zh.vtt 8.34KB
059 Exploiting a Code Execution Vulnerability.mp4 20.50MB
059 Exploiting a Code Execution Vulnerability-subtitle-en.vtt 12.36KB
059 Exploiting a Code Execution Vulnerability-subtitle-fr.vtt 12.52KB
059 Exploiting a Code Execution Vulnerability-subtitle-hi.vtt 25.38KB
059 Exploiting a Code Execution Vulnerability-subtitle-ko.vtt 12.59KB
059 Exploiting a Code Execution Vulnerability-subtitle-nl.vtt 11.52KB
059 Exploiting a Code Execution Vulnerability-subtitle-pl.vtt 11.77KB
059 Exploiting a Code Execution Vulnerability-subtitle-zh.vtt 10.45KB
060 MSFC - Installing MSFC (Metasploit Community).mp4 12.34MB
060 MSFC - Installing MSFC (Metasploit Community)-subtitle-en.vtt 7.29KB
060 MSFC - Installing MSFC (Metasploit Community)-subtitle-fr.vtt 7.54KB
060 MSFC - Installing MSFC (Metasploit Community)-subtitle-hi.vtt 15.55KB
060 MSFC - Installing MSFC (Metasploit Community)-subtitle-ko.vtt 7.34KB
060 MSFC - Installing MSFC (Metasploit Community)-subtitle-nl.vtt 6.94KB
060 MSFC - Installing MSFC (Metasploit Community)-subtitle-pl.vtt 7.07KB
060 MSFC - Installing MSFC (Metasploit Community)-subtitle-zh.vtt 6.05KB
061 MSFC - Scanning Target(s) For Vulnerabilities.mp4 7.58MB
061 MSFC - Scanning Target(s) For Vulnerabilities-subtitle-en.vtt 3.95KB
061 MSFC - Scanning Target(s) For Vulnerabilities-subtitle-fr.vtt 4.23KB
061 MSFC - Scanning Target(s) For Vulnerabilities-subtitle-hi.vtt 8.34KB
061 MSFC - Scanning Target(s) For Vulnerabilities-subtitle-ko.vtt 4.32KB
061 MSFC - Scanning Target(s) For Vulnerabilities-subtitle-nl.vtt 3.94KB
061 MSFC - Scanning Target(s) For Vulnerabilities-subtitle-pl.vtt 3.94KB
061 MSFC - Scanning Target(s) For Vulnerabilities-subtitle-zh.vtt 3.48KB
062 MSFC - Analysing Scan results & Exploiting Target System.mp4 22.13MB
062 MSFC - Analysing Scan results & Exploiting Target System-subtitle-en.vtt 11.23KB
062 MSFC - Analysing Scan results & Exploiting Target System-subtitle-fr.vtt 11.82KB
062 MSFC - Analysing Scan results & Exploiting Target System-subtitle-hi.vtt 23.13KB
062 MSFC - Analysing Scan results & Exploiting Target System-subtitle-ko.vtt 11.79KB
062 MSFC - Analysing Scan results & Exploiting Target System-subtitle-nl.vtt 10.72KB
062 MSFC - Analysing Scan results & Exploiting Target System-subtitle-pl.vtt 10.65KB
062 MSFC - Analysing Scan results & Exploiting Target System-subtitle-zh.vtt 9.70KB
063 Nexpose - Installing Nexpose.mp4 25.61MB
063 Nexpose - Installing Nexpose-subtitle-en.vtt 10.64KB
063 Nexpose - Installing Nexpose-subtitle-fr.vtt 10.46KB
063 Nexpose - Installing Nexpose-subtitle-hi.vtt 22.38KB
063 Nexpose - Installing Nexpose-subtitle-ko.vtt 10.36KB
063 Nexpose - Installing Nexpose-subtitle-nl.vtt 9.81KB
063 Nexpose - Installing Nexpose-subtitle-pl.vtt 9.83KB
063 Nexpose - Installing Nexpose-subtitle-zh.vtt 8.55KB
064 Nexpose - How To Configure & Launch a Scan.mp4 19.13MB
064 Nexpose - How To Configure & Launch a Scan-subtitle-en.vtt 11.01KB
064 Nexpose - How To Configure & Launch a Scan-subtitle-fr.vtt 11.53KB
064 Nexpose - How To Configure & Launch a Scan-subtitle-hi.vtt 23.39KB
064 Nexpose - How To Configure & Launch a Scan-subtitle-ko.vtt 11.32KB
064 Nexpose - How To Configure & Launch a Scan-subtitle-nl.vtt 10.54KB
064 Nexpose - How To Configure & Launch a Scan-subtitle-pl.vtt 10.75KB
064 Nexpose - How To Configure & Launch a Scan-subtitle-zh.vtt 9.54KB
065 Nexpose - Analysing Scan Results & Generating Reports.mp4 21.45MB
065 Nexpose - Analysing Scan Results & Generating Reports-subtitle-en.vtt 9.52KB
065 Nexpose - Analysing Scan Results & Generating Reports-subtitle-fr.vtt 9.97KB
065 Nexpose - Analysing Scan Results & Generating Reports-subtitle-hi.vtt 19.51KB
065 Nexpose - Analysing Scan Results & Generating Reports-subtitle-ko.vtt 9.79KB
065 Nexpose - Analysing Scan Results & Generating Reports-subtitle-nl.vtt 9.06KB
065 Nexpose - Analysing Scan Results & Generating Reports-subtitle-pl.vtt 9.19KB
065 Nexpose - Analysing Scan Results & Generating Reports-subtitle-zh.vtt 7.95KB
066 Gaining-Access-Client-Side-Attacks.pdf 187.55KB
066 Introduction.mp4 6.15MB
066 Introduction-subtitle-en.vtt 3.18KB
066 Introduction-subtitle-fr.vtt 3.16KB
066 Introduction-subtitle-hi.vtt 6.34KB
066 Introduction-subtitle-ko.vtt 3.21KB
066 Introduction-subtitle-nl.vtt 3.04KB
066 Introduction-subtitle-pl.vtt 3.00KB
066 Introduction-subtitle-zh.vtt 2.66KB
067 Installing Veil 3.mp4 21.04MB
067 Installing Veil 3-subtitle-en.vtt 8.47KB
068 Veil Overview & Payloads Basics.mp4 13.48MB
068 Veil Overview & Payloads Basics-subtitle-en.vtt 8.83KB
069 Generating An Undetectable Backdoor Using Veil 3.mp4 20.76MB
069 Generating An Undetectable Backdoor Using Veil 3-subtitle-en.vtt 11.33KB
070 Listening For Incoming Connections.mp4 12.47MB
070 Listening For Incoming Connections-subtitle-en.vtt 8.05KB
071 Using A Basic Deliver Method To Test The Backdoor & Hack Windows 10.mp4 15.96MB
071 Using A Basic Deliver Method To Test The Backdoor & Hack Windows 10-subtitle-en.vtt 8.30KB
072 Backdoor Delivery Method 1 - Using a Fake Update.mp4 22.79MB
072 Backdoor Delivery Method 1 - Using a Fake Update-subtitle-en.vtt 11.50KB
072 evilgrade-installation-commands-updated.txt 859B
073 Backdoor Delivery Method 2 - Backdooring Downloads on The Fly.mp4 21.94MB
073 Backdoor Delivery Method 2 - Backdooring Downloads on The Fly-subtitle-en.vtt 10.21KB
073 Backdoor Delivery Method 2 - Backdooring Downloads on The Fly-subtitle-fr.vtt 10.05KB
073 Backdoor Delivery Method 2 - Backdooring Downloads on The Fly-subtitle-hi.vtt 21.42KB
073 Backdoor Delivery Method 2 - Backdooring Downloads on The Fly-subtitle-ko.vtt 10.31KB
073 Backdoor Delivery Method 2 - Backdooring Downloads on The Fly-subtitle-nl.vtt 9.35KB
073 Backdoor Delivery Method 2 - Backdooring Downloads on The Fly-subtitle-pl.vtt 9.38KB
073 Backdoor Delivery Method 2 - Backdooring Downloads on The Fly-subtitle-zh.vtt 8.29KB
073 flushiptables.sh 168B
074 How to Protect Yourself From The Discussed Delivery Methods.mp4 11.29MB
074 How to Protect Yourself From The Discussed Delivery Methods-subtitle-en.vtt 4.44KB
074 How to Protect Yourself From The Discussed Delivery Methods-subtitle-fr.vtt 4.42KB
074 How to Protect Yourself From The Discussed Delivery Methods-subtitle-hi.vtt 8.98KB
074 How to Protect Yourself From The Discussed Delivery Methods-subtitle-ko.vtt 4.29KB
074 How to Protect Yourself From The Discussed Delivery Methods-subtitle-nl.vtt 4.17KB
074 How to Protect Yourself From The Discussed Delivery Methods-subtitle-pl.vtt 4.16KB
074 How to Protect Yourself From The Discussed Delivery Methods-subtitle-zh.vtt 3.47KB
075 Introduction.mp4 7.19MB
075 Introduction-subtitle-en.vtt 3.71KB
075 Introduction-subtitle-fr.vtt 3.49KB
075 Introduction-subtitle-hi.vtt 7.33KB
075 Introduction-subtitle-ko.vtt 3.44KB
075 Introduction-subtitle-nl.vtt 3.27KB
075 Introduction-subtitle-pl.vtt 3.19KB
075 Introduction-subtitle-zh.vtt 2.84KB
076 Maltego Basics.mp4 17.69MB
076 Maltego Basics-subtitle-en.vtt 6.86KB
077 Discovering Websites_ Links & Social Networking Accounts Associated With Target.mp4 22.61MB
077 Discovering Websites_ Links & Social Networking Accounts Associated With Target-subtitle-en.vtt 9.31KB
078 Discovering Twitter Friends & Associated Accounts.mp4 15.29MB
078 Discovering Twitter Friends & Associated Accounts-subtitle-en.vtt 5.78KB
079 Discovering Emails Of The Target's Friends.mp4 13.14MB
079 Discovering Emails Of The Target's Friends-subtitle-en.vtt 3.90KB
080 Analysing The Gathered Info & Building An Attack Stratigy.mp4 26.49MB
080 Analysing The Gathered Info & Building An Attack Stratigy-subtitle-en.vtt 10.08KB
081 autoit-download-and-execute.txt 492B
081 Backdooring Any File Type (images_ pdf's ___etc).mp4 12.76MB
081 Backdooring Any File Type (images_ pdf's ___etc)-subtitle-en.vtt 5.52KB
082 Compiling & Changing Trojan's Icon.mp4 16.41MB
082 Compiling & Changing Trojan's Icon-subtitle-en.vtt 7.29KB
083 Spoofing _exe Extension To Any Extension (jpg_ pdf ___etc).mp4 19.30MB
083 Spoofing _exe Extension To Any Extension (jpg_ pdf ___etc)-subtitle-en.vtt 9.56KB
084 Spoofing Emails - Send Emails As Any Email Account You Want.mp4 18.77MB
084 Spoofing Emails - Send Emails As Any Email Account You Want-subtitle-en.vtt 8.91KB
084 Spoofing Emails - Send Emails As Any Email Account You Want-subtitle-fr.vtt 8.71KB
084 Spoofing Emails - Send Emails As Any Email Account You Want-subtitle-hi.vtt 18.70KB
084 Spoofing Emails - Send Emails As Any Email Account You Want-subtitle-ko.vtt 9.33KB
084 Spoofing Emails - Send Emails As Any Email Account You Want-subtitle-nl.vtt 8.28KB
084 Spoofing Emails - Send Emails As Any Email Account You Want-subtitle-pl.vtt 8.49KB
084 Spoofing Emails - Send Emails As Any Email Account You Want-subtitle-zh.vtt 7.61KB
085 BeEF Overview & Basic Hook Method.mp4 18.89MB
085 BeEF Overview & Basic Hook Method-subtitle-en.vtt 8.05KB
085 BeEF Overview & Basic Hook Method-subtitle-fr.vtt 8.22KB
085 BeEF Overview & Basic Hook Method-subtitle-hi.vtt 16.72KB
085 BeEF Overview & Basic Hook Method-subtitle-ko.vtt 8.15KB
085 BeEF Overview & Basic Hook Method-subtitle-nl.vtt 7.54KB
085 BeEF Overview & Basic Hook Method-subtitle-pl.vtt 7.79KB
085 BeEF Overview & Basic Hook Method-subtitle-zh.vtt 6.57KB
086 BeEF - hooking targets using MITMf.mp4 8.67MB
086 BeEF - hooking targets using MITMf-subtitle-en.vtt 3.65KB
086 BeEF - hooking targets using MITMf-subtitle-fr.vtt 3.48KB
086 BeEF - hooking targets using MITMf-subtitle-hi.vtt 7.15KB
086 BeEF - hooking targets using MITMf-subtitle-ko.vtt 3.68KB
086 BeEF - hooking targets using MITMf-subtitle-nl.vtt 3.24KB
086 BeEF - hooking targets using MITMf-subtitle-pl.vtt 3.33KB
086 BeEF - hooking targets using MITMf-subtitle-zh.vtt 2.94KB
087 BeEF - Running Basic Commands On Target.mp4 11.45MB
087 BeEF - Running Basic Commands On Target-subtitle-en.vtt 5.70KB
087 BeEF - Running Basic Commands On Target-subtitle-fr.vtt 5.93KB
087 BeEF - Running Basic Commands On Target-subtitle-hi.vtt 12.15KB
087 BeEF - Running Basic Commands On Target-subtitle-ko.vtt 5.80KB
087 BeEF - Running Basic Commands On Target-subtitle-nl.vtt 5.46KB
087 BeEF - Running Basic Commands On Target-subtitle-pl.vtt 5.35KB
087 BeEF - Running Basic Commands On Target-subtitle-zh.vtt 4.87KB
088 BeEF - Stealing Credentials_Passwords Using A Fake Login Prompt.mp4 5.66MB
088 BeEF - Stealing Credentials_Passwords Using A Fake Login Prompt-subtitle-en.vtt 2.83KB
088 BeEF - Stealing Credentials_Passwords Using A Fake Login Prompt-subtitle-fr.vtt 2.91KB
088 BeEF - Stealing Credentials_Passwords Using A Fake Login Prompt-subtitle-hi.vtt 6.18KB
088 BeEF - Stealing Credentials_Passwords Using A Fake Login Prompt-subtitle-ko.vtt 2.76KB
088 BeEF - Stealing Credentials_Passwords Using A Fake Login Prompt-subtitle-nl.vtt 2.71KB
088 BeEF - Stealing Credentials_Passwords Using A Fake Login Prompt-subtitle-pl.vtt 2.76KB
088 BeEF - Stealing Credentials_Passwords Using A Fake Login Prompt-subtitle-zh.vtt 2.36KB
089 BeEF - Gaining Full Control Over Windows Target.mp4 8.61MB
089 BeEF - Gaining Full Control Over Windows Target-subtitle-en.vtt 4.38KB
089 BeEF - Gaining Full Control Over Windows Target-subtitle-fr.vtt 4.59KB
089 BeEF - Gaining Full Control Over Windows Target-subtitle-hi.vtt 9.48KB
089 BeEF - Gaining Full Control Over Windows Target-subtitle-ko.vtt 4.78KB
089 BeEF - Gaining Full Control Over Windows Target-subtitle-nl.vtt 4.30KB
089 BeEF - Gaining Full Control Over Windows Target-subtitle-pl.vtt 4.30KB
089 BeEF - Gaining Full Control Over Windows Target-subtitle-zh.vtt 3.81KB
090 Detecting Trojans Manually.mp4 15.09MB
090 Detecting Trojans Manually-subtitle-en.vtt 6.24KB
090 Detecting Trojans Manually-subtitle-fr.vtt 6.04KB
090 Detecting Trojans Manually-subtitle-hi.vtt 12.31KB
090 Detecting Trojans Manually-subtitle-ko.vtt 6.27KB
090 Detecting Trojans Manually-subtitle-nl.vtt 5.68KB
090 Detecting Trojans Manually-subtitle-pl.vtt 5.68KB
090 Detecting Trojans Manually-subtitle-zh.vtt 5.22KB
091 Detecting Trojans Using a Sandbox.mp4 12.08MB
091 Detecting Trojans Using a Sandbox-subtitle-en.vtt 3.77KB
091 Detecting Trojans Using a Sandbox-subtitle-fr.vtt 3.75KB
091 Detecting Trojans Using a Sandbox-subtitle-hi.vtt 7.72KB
091 Detecting Trojans Using a Sandbox-subtitle-ko.vtt 3.79KB
091 Detecting Trojans Using a Sandbox-subtitle-nl.vtt 3.48KB
091 Detecting Trojans Using a Sandbox-subtitle-pl.vtt 3.48KB
091 Detecting Trojans Using a Sandbox-subtitle-zh.vtt 3.02KB
092 Overview of the Setup.mp4 17.28MB
092 Overview of the Setup-subtitle-en.vtt 8.24KB
092 Overview of the Setup-subtitle-fr.vtt 8.30KB
092 Overview of the Setup-subtitle-hi.vtt 16.86KB
092 Overview of the Setup-subtitle-ko.vtt 8.47KB
092 Overview of the Setup-subtitle-nl.vtt 7.80KB
092 Overview of the Setup-subtitle-pl.vtt 7.83KB
092 Overview of the Setup-subtitle-zh.vtt 6.78KB
093 Ex1 - Generating a Backdoor That Works Outside The Network.mp4 15.42MB
093 Ex1 - Generating a Backdoor That Works Outside The Network-subtitle-en.vtt 6.63KB
093 Ex1 - Generating a Backdoor That Works Outside The Network-subtitle-fr.vtt 6.55KB
093 Ex1 - Generating a Backdoor That Works Outside The Network-subtitle-hi.vtt 13.92KB
093 Ex1 - Generating a Backdoor That Works Outside The Network-subtitle-ko.vtt 6.79KB
093 Ex1 - Generating a Backdoor That Works Outside The Network-subtitle-nl.vtt 6.26KB
093 Ex1 - Generating a Backdoor That Works Outside The Network-subtitle-pl.vtt 6.24KB
093 Ex1 - Generating a Backdoor That Works Outside The Network-subtitle-zh.vtt 5.50KB
094 Configuring The Router To Forward Connections To Kali.mp4 18.81MB
094 Configuring The Router To Forward Connections To Kali-subtitle-en.vtt 8.63KB
094 Configuring The Router To Forward Connections To Kali-subtitle-fr.vtt 8.69KB
094 Configuring The Router To Forward Connections To Kali-subtitle-hi.vtt 17.28KB
094 Configuring The Router To Forward Connections To Kali-subtitle-ko.vtt 8.69KB
094 Configuring The Router To Forward Connections To Kali-subtitle-nl.vtt 7.96KB
094 Configuring The Router To Forward Connections To Kali-subtitle-pl.vtt 7.89KB
094 Configuring The Router To Forward Connections To Kali-subtitle-zh.vtt 7.07KB
095 Ex2 - Using BeEF Outside The Network.mp4 15.21MB
095 Ex2 - Using BeEF Outside The Network-subtitle-en.vtt 6.55KB
095 Ex2 - Using BeEF Outside The Network-subtitle-fr.vtt 6.69KB
095 Ex2 - Using BeEF Outside The Network-subtitle-hi.vtt 13.90KB
095 Ex2 - Using BeEF Outside The Network-subtitle-ko.vtt 6.56KB
095 Ex2 - Using BeEF Outside The Network-subtitle-nl.vtt 6.31KB
095 Ex2 - Using BeEF Outside The Network-subtitle-pl.vtt 6.43KB
095 Ex2 - Using BeEF Outside The Network-subtitle-zh.vtt 5.54KB
096 Introduction.mp4 5.48MB
096 Introduction-subtitle-en.vtt 2.75KB
096 Introduction-subtitle-fr.vtt 2.63KB
096 Introduction-subtitle-hi.vtt 5.62KB
096 Introduction-subtitle-ko.vtt 2.66KB
096 Introduction-subtitle-nl.vtt 2.37KB
096 Introduction-subtitle-pl.vtt 2.51KB
096 Introduction-subtitle-zh.vtt 2.16KB
096 Post-Exploitation.pdf 304.26KB
097 Meterpreter Basics.mp4 15.23MB
097 Meterpreter Basics-subtitle-en.vtt 7.43KB
097 Meterpreter Basics-subtitle-fr.vtt 7.33KB
097 Meterpreter Basics-subtitle-hi.vtt 14.55KB
097 Meterpreter Basics-subtitle-ko.vtt 7.17KB
097 Meterpreter Basics-subtitle-nl.vtt 6.66KB
097 Meterpreter Basics-subtitle-pl.vtt 6.63KB
097 Meterpreter Basics-subtitle-zh.vtt 6.09KB
098 File System Commands.mp4 12.99MB
098 File System Commands-subtitle-en.vtt 5.14KB
098 File System Commands-subtitle-fr.vtt 5.69KB
098 File System Commands-subtitle-hi.vtt 11.34KB
098 File System Commands-subtitle-ko.vtt 5.51KB
098 File System Commands-subtitle-nl.vtt 5.02KB
098 File System Commands-subtitle-pl.vtt 4.98KB
098 File System Commands-subtitle-zh.vtt 4.59KB
099 Maintaining Access - Basic Methods.mp4 12.88MB
099 Maintaining Access - Basic Methods-subtitle-en.vtt 6.44KB
099 Maintaining Access - Basic Methods-subtitle-fr.vtt 6.65KB
099 Maintaining Access - Basic Methods-subtitle-hi.vtt 13.59KB
099 Maintaining Access - Basic Methods-subtitle-ko.vtt 6.52KB
099 Maintaining Access - Basic Methods-subtitle-nl.vtt 6.38KB
099 Maintaining Access - Basic Methods-subtitle-pl.vtt 6.29KB
099 Maintaining Access - Basic Methods-subtitle-zh.vtt 5.44KB
100 Maintaining Access - Using a Reliable & Undetectable Method.mp4 18.34MB
100 Maintaining Access - Using a Reliable & Undetectable Method-subtitle-en.vtt 7.77KB
100 Maintaining Access - Using a Reliable & Undetectable Method-subtitle-fr.vtt 7.80KB
100 Maintaining Access - Using a Reliable & Undetectable Method-subtitle-hi.vtt 16.35KB
100 Maintaining Access - Using a Reliable & Undetectable Method-subtitle-ko.vtt 7.84KB
100 Maintaining Access - Using a Reliable & Undetectable Method-subtitle-nl.vtt 7.41KB
100 Maintaining Access - Using a Reliable & Undetectable Method-subtitle-pl.vtt 7.37KB
100 Maintaining Access - Using a Reliable & Undetectable Method-subtitle-zh.vtt 6.58KB
101 Spying - Capturing Key Strikes & Taking Screen Shots.mp4 6.49MB
101 Spying - Capturing Key Strikes & Taking Screen Shots-subtitle-en.vtt 3.26KB
101 Spying - Capturing Key Strikes & Taking Screen Shots-subtitle-fr.vtt 3.23KB
101 Spying - Capturing Key Strikes & Taking Screen Shots-subtitle-hi.vtt 6.48KB
101 Spying - Capturing Key Strikes & Taking Screen Shots-subtitle-ko.vtt 3.24KB
101 Spying - Capturing Key Strikes & Taking Screen Shots-subtitle-nl.vtt 2.88KB
101 Spying - Capturing Key Strikes & Taking Screen Shots-subtitle-pl.vtt 3.08KB
101 Spying - Capturing Key Strikes & Taking Screen Shots-subtitle-zh.vtt 2.84KB
102 Pivoting - Theory (What is Pivoting_).mp4 20.17MB
102 Pivoting - Theory (What is Pivoting_)-subtitle-en.vtt 7.50KB
102 Pivoting - Theory (What is Pivoting_)-subtitle-fr.vtt 7.18KB
102 Pivoting - Theory (What is Pivoting_)-subtitle-hi.vtt 14.61KB
102 Pivoting - Theory (What is Pivoting_)-subtitle-ko.vtt 7.66KB
102 Pivoting - Theory (What is Pivoting_)-subtitle-nl.vtt 6.90KB
102 Pivoting - Theory (What is Pivoting_)-subtitle-pl.vtt 6.93KB
102 Pivoting - Theory (What is Pivoting_)-subtitle-zh.vtt 5.89KB
103 Pivoting - Exploiting Devices on The Same Network As The Target Computer.mp4 19.07MB
103 Pivoting - Exploiting Devices on The Same Network As The Target Computer-subtitle-en.vtt 9.22KB
103 Pivoting - Exploiting Devices on The Same Network As The Target Computer-subtitle-fr.vtt 9.18KB
103 Pivoting - Exploiting Devices on The Same Network As The Target Computer-subtitle-hi.vtt 19.36KB
103 Pivoting - Exploiting Devices on The Same Network As The Target Computer-subtitle-ko.vtt 8.99KB
103 Pivoting - Exploiting Devices on The Same Network As The Target Computer-subtitle-nl.vtt 8.33KB
103 Pivoting - Exploiting Devices on The Same Network As The Target Computer-subtitle-pl.vtt 8.58KB
103 Pivoting - Exploiting Devices on The Same Network As The Target Computer-subtitle-zh.vtt 7.45KB
104 Introduction - What Is A Website _.mp4 12.03MB
104 Introduction - What Is A Website _-subtitle-en.vtt 5.26KB
104 Introduction - What Is A Website _-subtitle-fr.vtt 5.05KB
104 Introduction - What Is A Website _-subtitle-hi.vtt 10.25KB
104 Introduction - What Is A Website _-subtitle-ko.vtt 5.11KB
104 Introduction - What Is A Website _-subtitle-nl.vtt 4.78KB
104 Introduction - What Is A Website _-subtitle-pl.vtt 4.79KB
104 Introduction - What Is A Website _-subtitle-zh.vtt 4.27KB
104 Web-Application-Penetration-Testing.pdf 592.72KB
105 How To Hack a Website_.mp4 11.41MB
105 How To Hack a Website_-subtitle-en.vtt 4.48KB
105 How To Hack a Website_-subtitle-fr.vtt 4.46KB
105 How To Hack a Website_-subtitle-hi.vtt 9.66KB
105 How To Hack a Website_-subtitle-ko.vtt 4.61KB
105 How To Hack a Website_-subtitle-nl.vtt 4.27KB
105 How To Hack a Website_-subtitle-pl.vtt 4.46KB
105 How To Hack a Website_-subtitle-zh.vtt 3.72KB
106 Gathering Basic Information Using Whois Lookup.mp4 18.95MB
106 Gathering Basic Information Using Whois Lookup-subtitle-en.vtt 6.90KB
106 Gathering Basic Information Using Whois Lookup-subtitle-fr.vtt 7.29KB
106 Gathering Basic Information Using Whois Lookup-subtitle-hi.vtt 14.71KB
106 Gathering Basic Information Using Whois Lookup-subtitle-ko.vtt 7.20KB
106 Gathering Basic Information Using Whois Lookup-subtitle-nl.vtt 6.63KB
106 Gathering Basic Information Using Whois Lookup-subtitle-pl.vtt 6.73KB
106 Gathering Basic Information Using Whois Lookup-subtitle-zh.vtt 5.85KB
107 Discoverin Technologies Used On The Website.mp4 24.73MB
107 Discoverin Technologies Used On The Website-subtitle-en.vtt 7.21KB
107 Discoverin Technologies Used On The Website-subtitle-fr.vtt 7.11KB
107 Discoverin Technologies Used On The Website-subtitle-hi.vtt 15.02KB
107 Discoverin Technologies Used On The Website-subtitle-ko.vtt 7.21KB
107 Discoverin Technologies Used On The Website-subtitle-nl.vtt 6.71KB
107 Discoverin Technologies Used On The Website-subtitle-pl.vtt 6.90KB
107 Discoverin Technologies Used On The Website-subtitle-zh.vtt 5.95KB
108 Gathering Comprehensive DNS Information.mp4 25.52MB
108 Gathering Comprehensive DNS Information-subtitle-en.vtt 6.35KB
108 Gathering Comprehensive DNS Information-subtitle-fr.vtt 6.57KB
108 Gathering Comprehensive DNS Information-subtitle-hi.vtt 13.07KB
108 Gathering Comprehensive DNS Information-subtitle-ko.vtt 6.82KB
108 Gathering Comprehensive DNS Information-subtitle-nl.vtt 5.95KB
108 Gathering Comprehensive DNS Information-subtitle-pl.vtt 6.14KB
108 Gathering Comprehensive DNS Information-subtitle-zh.vtt 5.54KB
109 Discovering Websites On The Same Server.mp4 12.37MB
109 Discovering Websites On The Same Server-subtitle-en.vtt 4.35KB
109 Discovering Websites On The Same Server-subtitle-fr.vtt 3.93KB
109 Discovering Websites On The Same Server-subtitle-hi.vtt 8.36KB
109 Discovering Websites On The Same Server-subtitle-ko.vtt 4.13KB
109 Discovering Websites On The Same Server-subtitle-nl.vtt 3.75KB
109 Discovering Websites On The Same Server-subtitle-pl.vtt 4.05KB
109 Discovering Websites On The Same Server-subtitle-zh.vtt 3.36KB
110 Discovering Subdomains.mp4 12.33MB
110 Discovering Subdomains-subtitle-en.vtt 6.33KB
110 Discovering Subdomains-subtitle-fr.vtt 6.14KB
110 Discovering Subdomains-subtitle-hi.vtt 12.56KB
110 Discovering Subdomains-subtitle-ko.vtt 5.98KB
110 Discovering Subdomains-subtitle-nl.vtt 5.66KB
110 Discovering Subdomains-subtitle-pl.vtt 5.77KB
110 Discovering Subdomains-subtitle-zh.vtt 4.77KB
111 Discovering Sensitive Files.mp4 19.71MB
111 Discovering Sensitive Files-subtitle-en.vtt 8.57KB
111 Discovering Sensitive Files-subtitle-fr.vtt 8.66KB
111 Discovering Sensitive Files-subtitle-hi.vtt 17.77KB
111 Discovering Sensitive Files-subtitle-ko.vtt 8.95KB
111 Discovering Sensitive Files-subtitle-nl.vtt 8.05KB
111 Discovering Sensitive Files-subtitle-pl.vtt 8.08KB
111 Discovering Sensitive Files-subtitle-zh.vtt 7.33KB
112 Analysing Discovered Files.mp4 11.71MB
112 Analysing Discovered Files-subtitle-en.vtt 5.07KB
112 Analysing Discovered Files-subtitle-fr.vtt 5.55KB
112 Analysing Discovered Files-subtitle-hi.vtt 10.97KB
112 Analysing Discovered Files-subtitle-ko.vtt 5.34KB
112 Analysing Discovered Files-subtitle-nl.vtt 4.97KB
112 Analysing Discovered Files-subtitle-pl.vtt 5.03KB
112 Analysing Discovered Files-subtitle-zh.vtt 4.49KB
113 Discovering & Exploiting File Upload Vulnerabilities.mp4 14.95MB
113 Discovering & Exploiting File Upload Vulnerabilities-subtitle-en.vtt 8.50KB
113 Discovering & Exploiting File Upload Vulnerabilities-subtitle-fr.vtt 8.72KB
113 Discovering & Exploiting File Upload Vulnerabilities-subtitle-hi.vtt 18.07KB
113 Discovering & Exploiting File Upload Vulnerabilities-subtitle-ko.vtt 8.50KB
113 Discovering & Exploiting File Upload Vulnerabilities-subtitle-nl.vtt 7.93KB
113 Discovering & Exploiting File Upload Vulnerabilities-subtitle-pl.vtt 8.08KB
113 Discovering & Exploiting File Upload Vulnerabilities-subtitle-zh.vtt 7.17KB
114 code-execution-reverse-shell-commands.txt 938B
114 Discovering & Exploiting Code Execution Vulnerabilities.mp4 15.63MB
114 Discovering & Exploiting Code Execution Vulnerabilities-subtitle-en.vtt 8.65KB
114 Discovering & Exploiting Code Execution Vulnerabilities-subtitle-fr.vtt 8.83KB
114 Discovering & Exploiting Code Execution Vulnerabilities-subtitle-hi.vtt 18.70KB
114 Discovering & Exploiting Code Execution Vulnerabilities-subtitle-ko.vtt 8.99KB
114 Discovering & Exploiting Code Execution Vulnerabilities-subtitle-nl.vtt 8.38KB
114 Discovering & Exploiting Code Execution Vulnerabilities-subtitle-pl.vtt 8.30KB
114 Discovering & Exploiting Code Execution Vulnerabilities-subtitle-zh.vtt 7.45KB
115 Discovering & Exploiting Local File Inclusion Vulnerabilities.mp4 11.08MB
115 Discovering & Exploiting Local File Inclusion Vulnerabilities-subtitle-en.vtt 5.60KB
115 Discovering & Exploiting Local File Inclusion Vulnerabilities-subtitle-fr.vtt 5.59KB
115 Discovering & Exploiting Local File Inclusion Vulnerabilities-subtitle-hi.vtt 11.83KB
115 Discovering & Exploiting Local File Inclusion Vulnerabilities-subtitle-ko.vtt 5.74KB
115 Discovering & Exploiting Local File Inclusion Vulnerabilities-subtitle-nl.vtt 5.42KB
115 Discovering & Exploiting Local File Inclusion Vulnerabilities-subtitle-pl.vtt 5.41KB
115 Discovering & Exploiting Local File Inclusion Vulnerabilities-subtitle-zh.vtt 4.79KB
116 Remote File Inclusion Vulnerabilities - Configuring PHP Settings.mp4 9.53MB
116 Remote File Inclusion Vulnerabilities - Configuring PHP Settings-subtitle-en.vtt 4.10KB
116 Remote File Inclusion Vulnerabilities - Configuring PHP Settings-subtitle-fr.vtt 4.22KB
116 Remote File Inclusion Vulnerabilities - Configuring PHP Settings-subtitle-hi.vtt 9.35KB
116 Remote File Inclusion Vulnerabilities - Configuring PHP Settings-subtitle-ko.vtt 4.14KB
116 Remote File Inclusion Vulnerabilities - Configuring PHP Settings-subtitle-nl.vtt 4.04KB
116 Remote File Inclusion Vulnerabilities - Configuring PHP Settings-subtitle-pl.vtt 3.96KB
116 Remote File Inclusion Vulnerabilities - Configuring PHP Settings-subtitle-zh.vtt 3.43KB
117 Remote File Inclusion Vulnerabilities - Discovery & Exploitation.mp4 10.66MB
117 Remote File Inclusion Vulnerabilities - Discovery & Exploitation-subtitle-en.vtt 6.90KB
117 Remote File Inclusion Vulnerabilities - Discovery & Exploitation-subtitle-fr.vtt 6.46KB
117 Remote File Inclusion Vulnerabilities - Discovery & Exploitation-subtitle-hi.vtt 13.79KB
117 Remote File Inclusion Vulnerabilities - Discovery & Exploitation-subtitle-ko.vtt 6.60KB
117 Remote File Inclusion Vulnerabilities - Discovery & Exploitation-subtitle-nl.vtt 6.21KB
117 Remote File Inclusion Vulnerabilities - Discovery & Exploitation-subtitle-pl.vtt 6.17KB
117 Remote File Inclusion Vulnerabilities - Discovery & Exploitation-subtitle-zh.vtt 5.51KB
118 Preventing The Above Vulnerabilities.mp4 16.69MB
118 Preventing The Above Vulnerabilities-subtitle-en.vtt 9.13KB
118 Preventing The Above Vulnerabilities-subtitle-fr.vtt 9.59KB
118 Preventing The Above Vulnerabilities-subtitle-hi.vtt 19.38KB
118 Preventing The Above Vulnerabilities-subtitle-ko.vtt 9.42KB
118 Preventing The Above Vulnerabilities-subtitle-nl.vtt 8.95KB
118 Preventing The Above Vulnerabilities-subtitle-pl.vtt 8.95KB
118 Preventing The Above Vulnerabilities-subtitle-zh.vtt 7.71KB
119 What is SQL.mp4 12.50MB
119 What is SQL-subtitle-en.vtt 7.18KB
119 What is SQL-subtitle-fr.vtt 7.56KB
119 What is SQL-subtitle-hi.vtt 14.35KB
119 What is SQL-subtitle-ko.vtt 7.68KB
119 What is SQL-subtitle-nl.vtt 6.91KB
119 What is SQL-subtitle-pl.vtt 6.95KB
119 What is SQL-subtitle-zh.vtt 6.07KB
120 Dangers of SQL Injection Vulnerabilities.mp4 7.92MB
120 Dangers of SQL Injection Vulnerabilities-subtitle-en.vtt 3.82KB
120 Dangers of SQL Injection Vulnerabilities-subtitle-fr.vtt 3.96KB
120 Dangers of SQL Injection Vulnerabilities-subtitle-hi.vtt 8.17KB
120 Dangers of SQL Injection Vulnerabilities-subtitle-ko.vtt 3.82KB
120 Dangers of SQL Injection Vulnerabilities-subtitle-nl.vtt 3.59KB
120 Dangers of SQL Injection Vulnerabilities-subtitle-pl.vtt 3.52KB
120 Dangers of SQL Injection Vulnerabilities-subtitle-zh.vtt 3.04KB
121 Discovering SQL injections In POST.mp4 18.10MB
121 Discovering SQL injections In POST-subtitle-en.vtt 10.02KB
121 Discovering SQL injections In POST-subtitle-fr.vtt 9.77KB
121 Discovering SQL injections In POST-subtitle-hi.vtt 20.30KB
121 Discovering SQL injections In POST-subtitle-ko.vtt 10.38KB
121 Discovering SQL injections In POST-subtitle-nl.vtt 9.54KB
121 Discovering SQL injections In POST-subtitle-pl.vtt 9.35KB
121 Discovering SQL injections In POST-subtitle-zh.vtt 8.55KB
122 Bypassing Logins Using SQL injection Vulnerability.mp4 9.77MB
122 Bypassing Logins Using SQL injection Vulnerability-subtitle-en.vtt 6.48KB
122 Bypassing Logins Using SQL injection Vulnerability-subtitle-fr.vtt 6.33KB
122 Bypassing Logins Using SQL injection Vulnerability-subtitle-hi.vtt 13.04KB
122 Bypassing Logins Using SQL injection Vulnerability-subtitle-ko.vtt 6.42KB
122 Bypassing Logins Using SQL injection Vulnerability-subtitle-nl.vtt 6.05KB
122 Bypassing Logins Using SQL injection Vulnerability-subtitle-pl.vtt 5.95KB
122 Bypassing Logins Using SQL injection Vulnerability-subtitle-zh.vtt 5.30KB
123 Discovering SQL injections in GET.mp4 14.13MB
123 Discovering SQL injections in GET-subtitle-en.vtt 8.23KB
123 Discovering SQL injections in GET-subtitle-fr.vtt 8.24KB
123 Discovering SQL injections in GET-subtitle-hi.vtt 16.75KB
123 Discovering SQL injections in GET-subtitle-ko.vtt 8.41KB
123 Discovering SQL injections in GET-subtitle-nl.vtt 7.58KB
123 Discovering SQL injections in GET-subtitle-pl.vtt 7.53KB
123 Discovering SQL injections in GET-subtitle-zh.vtt 6.77KB
124 Reading Database Information.mp4 11.65MB
124 Reading Database Information-subtitle-en.vtt 5.82KB
124 Reading Database Information-subtitle-fr.vtt 6.20KB
124 Reading Database Information-subtitle-hi.vtt 12.19KB
124 Reading Database Information-subtitle-ko.vtt 6.49KB
124 Reading Database Information-subtitle-nl.vtt 5.75KB
124 Reading Database Information-subtitle-pl.vtt 5.69KB
124 Reading Database Information-subtitle-zh.vtt 5.24KB
125 Finding Database Tables.mp4 8.67MB
125 Finding Database Tables-subtitle-en.vtt 3.37KB
125 Finding Database Tables-subtitle-fr.vtt 3.62KB
125 Finding Database Tables-subtitle-hi.vtt 6.65KB
125 Finding Database Tables-subtitle-ko.vtt 3.63KB
125 Finding Database Tables-subtitle-nl.vtt 3.08KB
125 Finding Database Tables-subtitle-pl.vtt 3.17KB
125 Finding Database Tables-subtitle-zh.vtt 2.83KB
126 Extracting Sensitive Data Such As Passwords.mp4 10.39MB
126 Extracting Sensitive Data Such As Passwords-subtitle-en.vtt 4.90KB
126 Extracting Sensitive Data Such As Passwords-subtitle-fr.vtt 4.67KB
126 Extracting Sensitive Data Such As Passwords-subtitle-hi.vtt 9.05KB
126 Extracting Sensitive Data Such As Passwords-subtitle-ko.vtt 4.42KB
126 Extracting Sensitive Data Such As Passwords-subtitle-nl.vtt 4.33KB
126 Extracting Sensitive Data Such As Passwords-subtitle-pl.vtt 4.10KB
126 Extracting Sensitive Data Such As Passwords-subtitle-zh.vtt 3.56KB
127 Reading & Writing Files On The Server Using SQL Injection Vulnerability.mp4 16.12MB
127 Reading & Writing Files On The Server Using SQL Injection Vulnerability-subtitle-en.vtt 6.56KB
127 Reading & Writing Files On The Server Using SQL Injection Vulnerability-subtitle-fr.vtt 6.69KB
127 Reading & Writing Files On The Server Using SQL Injection Vulnerability-subtitle-hi.vtt 13.96KB
127 Reading & Writing Files On The Server Using SQL Injection Vulnerability-subtitle-ko.vtt 6.69KB
127 Reading & Writing Files On The Server Using SQL Injection Vulnerability-subtitle-nl.vtt 6.20KB
127 Reading & Writing Files On The Server Using SQL Injection Vulnerability-subtitle-pl.vtt 6.27KB
127 Reading & Writing Files On The Server Using SQL Injection Vulnerability-subtitle-zh.vtt 5.59KB
128 Discoverting SQL Injections & Extracting Data Using SQLmap.mp4 21.10MB
128 Discoverting SQL Injections & Extracting Data Using SQLmap-subtitle-en.vtt 8.17KB
128 Discoverting SQL Injections & Extracting Data Using SQLmap-subtitle-fr.vtt 8.64KB
128 Discoverting SQL Injections & Extracting Data Using SQLmap-subtitle-hi.vtt 18.07KB
128 Discoverting SQL Injections & Extracting Data Using SQLmap-subtitle-ko.vtt 9.05KB
128 Discoverting SQL Injections & Extracting Data Using SQLmap-subtitle-nl.vtt 7.93KB
128 Discoverting SQL Injections & Extracting Data Using SQLmap-subtitle-pl.vtt 7.94KB
128 Discoverting SQL Injections & Extracting Data Using SQLmap-subtitle-zh.vtt 7.14KB
129 The Right Way To Prevent SQL Injection.mp4 11.23MB
129 The Right Way To Prevent SQL Injection-subtitle-en.vtt 5.85KB
129 The Right Way To Prevent SQL Injection-subtitle-fr.vtt 6.22KB
129 The Right Way To Prevent SQL Injection-subtitle-hi.vtt 12.44KB
129 The Right Way To Prevent SQL Injection-subtitle-ko.vtt 6.16KB
129 The Right Way To Prevent SQL Injection-subtitle-nl.vtt 5.93KB
129 The Right Way To Prevent SQL Injection-subtitle-pl.vtt 5.73KB
129 The Right Way To Prevent SQL Injection-subtitle-zh.vtt 5.04KB
130 Introduction - What is XSS or Cross Site Scripting_.mp4 8.15MB
130 Introduction - What is XSS or Cross Site Scripting_-subtitle-en.vtt 3.75KB
130 Introduction - What is XSS or Cross Site Scripting_-subtitle-fr.vtt 3.51KB
130 Introduction - What is XSS or Cross Site Scripting_-subtitle-hi.vtt 7.42KB
130 Introduction - What is XSS or Cross Site Scripting_-subtitle-ko.vtt 3.55KB
130 Introduction - What is XSS or Cross Site Scripting_-subtitle-nl.vtt 3.52KB
130 Introduction - What is XSS or Cross Site Scripting_-subtitle-pl.vtt 3.46KB
130 Introduction - What is XSS or Cross Site Scripting_-subtitle-zh.vtt 2.92KB
131 Discovering Reflected XSS.mp4 8.87MB
131 Discovering Reflected XSS-subtitle-en.vtt 3.88KB
131 Discovering Reflected XSS-subtitle-fr.vtt 3.71KB
131 Discovering Reflected XSS-subtitle-hi.vtt 7.72KB
131 Discovering Reflected XSS-subtitle-ko.vtt 3.86KB
131 Discovering Reflected XSS-subtitle-nl.vtt 3.59KB
131 Discovering Reflected XSS-subtitle-pl.vtt 3.46KB
131 Discovering Reflected XSS-subtitle-zh.vtt 3.18KB
132 Discovering Stored XSS.mp4 7.87MB
132 Discovering Stored XSS-subtitle-en.vtt 3.64KB
132 Discovering Stored XSS-subtitle-fr.vtt 3.45KB
132 Discovering Stored XSS-subtitle-hi.vtt 7.43KB
132 Discovering Stored XSS-subtitle-ko.vtt 3.62KB
132 Discovering Stored XSS-subtitle-nl.vtt 3.34KB
132 Discovering Stored XSS-subtitle-pl.vtt 3.30KB
132 Discovering Stored XSS-subtitle-zh.vtt 2.96KB
133 Exploiting XSS - Hooking Vulnerable Page Visitors To BeEF.mp4 16.54MB
133 Exploiting XSS - Hooking Vulnerable Page Visitors To BeEF-subtitle-en.vtt 6.12KB
133 Exploiting XSS - Hooking Vulnerable Page Visitors To BeEF-subtitle-fr.vtt 5.90KB
133 Exploiting XSS - Hooking Vulnerable Page Visitors To BeEF-subtitle-hi.vtt 12.69KB
133 Exploiting XSS - Hooking Vulnerable Page Visitors To BeEF-subtitle-ko.vtt 5.94KB
133 Exploiting XSS - Hooking Vulnerable Page Visitors To BeEF-subtitle-nl.vtt 5.59KB
133 Exploiting XSS - Hooking Vulnerable Page Visitors To BeEF-subtitle-pl.vtt 5.68KB
133 Exploiting XSS - Hooking Vulnerable Page Visitors To BeEF-subtitle-zh.vtt 4.85KB
134 Preventing XSS Vulnerabilities.mp4 12.99MB
134 Preventing XSS Vulnerabilities-subtitle-en.vtt 6.55KB
134 Preventing XSS Vulnerabilities-subtitle-fr.vtt 6.85KB
134 Preventing XSS Vulnerabilities-subtitle-hi.vtt 13.97KB
134 Preventing XSS Vulnerabilities-subtitle-ko.vtt 6.56KB
134 Preventing XSS Vulnerabilities-subtitle-nl.vtt 6.27KB
134 Preventing XSS Vulnerabilities-subtitle-pl.vtt 6.40KB
134 Preventing XSS Vulnerabilities-subtitle-zh.vtt 5.31KB
135 Scanning Target Website For Vulnerabilities.mp4 10.88MB
135 Scanning Target Website For Vulnerabilities-subtitle-en.vtt 5.13KB
135 Scanning Target Website For Vulnerabilities-subtitle-fr.vtt 5.14KB
135 Scanning Target Website For Vulnerabilities-subtitle-hi.vtt 10.82KB
135 Scanning Target Website For Vulnerabilities-subtitle-ko.vtt 5.21KB
135 Scanning Target Website For Vulnerabilities-subtitle-nl.vtt 4.86KB
135 Scanning Target Website For Vulnerabilities-subtitle-pl.vtt 4.87KB
135 Scanning Target Website For Vulnerabilities-subtitle-zh.vtt 4.26KB
136 Analysing Scan Results.mp4 12.32MB
136 Analysing Scan Results-subtitle-en.vtt 4.70KB
136 Analysing Scan Results-subtitle-fr.vtt 4.73KB
136 Analysing Scan Results-subtitle-hi.vtt 9.43KB
136 Analysing Scan Results-subtitle-ko.vtt 5.01KB
136 Analysing Scan Results-subtitle-nl.vtt 4.53KB
136 Analysing Scan Results-subtitle-pl.vtt 4.38KB
136 Analysing Scan Results-subtitle-zh.vtt 3.99KB
137 Bonus Lecture - What's Next_.html 6.06KB
external_links.txt 303B
external_links.txt 249B
external_links.txt 80B
external_links.txt 170B
external_links.txt 59B
external_links.txt 225B
external_links.txt 130B
external_links.txt 59B
external_links.txt 179B
external_links.txt 88B
Distribution statistics by country
India (IN) 1
Total 1
IP List List of IP addresses which were distributed this torrent