|
Please note that this page does not hosts or makes available any of the listed filenames. You
cannot download any of those files from here.
|
| [TGx]Downloaded from torrentgalaxy.to .txt |
585B |
| 0 |
104B |
| 1 |
7B |
| 1.1 Section 3 Resources.pdf |
85.26KB |
| 1.1 Section 5 Resources.pdf |
77.40KB |
| 1. Course Overview.mp4 |
55.96MB |
| 1. Course Overview.srt |
11.80KB |
| 1. Getting Your Name Out There Section Overview.mp4 |
17.51MB |
| 1. Getting Your Name Out There Section Overview.srt |
3.15KB |
| 1. Hacking Lab Section Overview.mp4 |
88.08MB |
| 1. Hacking Lab Section Overview.srt |
13.28KB |
| 1. Launching Attacks Overview.mp4 |
60.66MB |
| 1. Launching Attacks Overview.srt |
15.88KB |
| 1. Linux+Python+Bash+Powershell Section Overview.mp4 |
55.07MB |
| 1. Linux+Python+Bash+Powershell Section Overview.srt |
9.05KB |
| 1. Making Money Section Overview.mp4 |
10.46MB |
| 1. Making Money Section Overview.srt |
2.67KB |
| 1. Mobile Phone Hacking Section Overview.mp4 |
77.77MB |
| 1. Mobile Phone Hacking Section Overview.srt |
15.93KB |
| 1. Networking Section Overview.mp4 |
119.85MB |
| 1. Networking Section Overview.srt |
17.63KB |
| 1. Post Exploitation Section Overview.mp4 |
23.63MB |
| 1. Post Exploitation Section Overview.srt |
4.21KB |
| 1. Potential Salary & Cybersecurity Roadmap.mp4 |
83.34MB |
| 1. Potential Salary & Cybersecurity Roadmap.srt |
16.82KB |
| 1. Reconnaissance Section Overview.mp4 |
43.45MB |
| 1. Reconnaissance Section Overview.srt |
5.92KB |
| 1. Remaining Anonymous Section Overview.mp4 |
53.69MB |
| 1. Remaining Anonymous Section Overview.srt |
9.47KB |
| 1. Website & Web Application Hacking Overview.mp4 |
44.38MB |
| 1. Website & Web Application Hacking Overview.srt |
8.67KB |
| 1. WiFi Hacking Section Overview.mp4 |
51.66MB |
| 1. WiFi Hacking Section Overview.srt |
9.00KB |
| 10 |
937.54KB |
| 10.1 Section 8 HTML Files.zip |
4.10KB |
| 10. ARP Spoofing Overview.mp4 |
100.62MB |
| 10. ARP Spoofing Overview.srt |
28.71KB |
| 10. Ethical Hacking vs Penetration Testing.mp4 |
34.00MB |
| 10. Ethical Hacking vs Penetration Testing.srt |
8.80KB |
| 10. SQL Injection Overview.mp4 |
91.32MB |
| 10. SQL Injection Overview.srt |
26.58KB |
| 10. Ssllabs.comssltest (Look for SSL issues on website).mp4 |
15.49MB |
| 10. Ssllabs.comssltest (Look for SSL issues on website).srt |
3.33KB |
| 100 |
681.47KB |
| 101 |
332.56KB |
| 11 |
986.81KB |
| 11. Introduction To Cryptography.mp4 |
78.22MB |
| 11. Introduction To Cryptography.srt |
18.48KB |
| 11. Job Opportunities in Cybersecurity.mp4 |
8.92MB |
| 11. Job Opportunities in Cybersecurity.srt |
2.14KB |
| 11. Pastebin.com (Sensitive Information).mp4 |
4.68MB |
| 11. Pastebin.com (Sensitive Information).srt |
1.40KB |
| 11. Using Cross Site Request Forgery.mp4 |
53.96MB |
| 11. Using Cross Site Request Forgery.srt |
14.63KB |
| 12 |
467.65KB |
| 12. Cross Site Scripting Overview.mp4 |
61.24MB |
| 12. Cross Site Scripting Overview.srt |
16.82KB |
| 12. NMAP Port Scanning (Discover open ports, OS, Services, Vulnerabilities, etc.).mp4 |
87.04MB |
| 12. NMAP Port Scanning (Discover open ports, OS, Services, Vulnerabilities, etc.).srt |
22.65KB |
| 12. Section 8 Quiz.html |
167B |
| 12. Who is This Course is For.mp4 |
9.08MB |
| 12. Who is This Course is For.srt |
2.06KB |
| 13 |
216.10KB |
| 13. Netcat Overview + SMBNFSEnumeration.mp4 |
58.52MB |
| 13. Netcat Overview + SMBNFSEnumeration.srt |
21.38KB |
| 13. Section 10 Quiz.html |
167B |
| 13. Section 1 Quiz.html |
167B |
| 14 |
675.96KB |
| 14. Nikto & Sparta Web Application Scanner.mp4 |
23.57MB |
| 14. Nikto & Sparta Web Application Scanner.srt |
9.40KB |
| 15 |
321.09KB |
| 15. SMPT Enumeration + NessusOpenvas Scanners.mp4 |
19.94MB |
| 15. SMPT Enumeration + NessusOpenvas Scanners.srt |
7.50KB |
| 16 |
801.15KB |
| 16. Section 7 Quiz.html |
167B |
| 17 |
941.17KB |
| 18 |
234.90KB |
| 19 |
199.22KB |
| 2 |
107B |
| 2.1 Section 4 Resources.pdf |
122.62KB |
| 2.1 Section 6 Resources.pdf |
89.71KB |
| 2.1 Section 9 Resources.pdf |
88.28KB |
| 2. About Your Instructors.mp4 |
18.16MB |
| 2. About Your Instructors.srt |
3.82KB |
| 2. Analyzing Information Gathered.mp4 |
21.64MB |
| 2. Analyzing Information Gathered.srt |
5.04KB |
| 2. Books Recommendations.mp4 |
10.82MB |
| 2. Books Recommendations.srt |
4.56KB |
| 2. Bug Bounty Programs.mp4 |
41.31MB |
| 2. Bug Bounty Programs.srt |
6.56KB |
| 2. Building A Brand.mp4 |
78.08MB |
| 2. Building A Brand.srt |
14.00KB |
| 2. How Data Travels Across The Internet.mp4 |
12.78MB |
| 2. How Data Travels Across The Internet.srt |
2.43KB |
| 2. Linux Basics.mp4 |
53.56MB |
| 2. Linux Basics.srt |
15.05KB |
| 2. Mobile Attack Vectors.mp4 |
10.33MB |
| 2. Mobile Attack Vectors.srt |
2.99KB |
| 2. Passive Recon vs Active Recon.mp4 |
8.37MB |
| 2. Passive Recon vs Active Recon.srt |
1.88KB |
| 2. Privilege Escalation.mp4 |
159.33MB |
| 2. Privilege Escalation.srt |
39.40KB |
| 2. TOR Browser Overview.mp4 |
23.84MB |
| 2. TOR Browser Overview.srt |
7.45KB |
| 2. Understanding Virtual Machines.mp4 |
24.18MB |
| 2. Understanding Virtual Machines.srt |
5.25KB |
| 2. Web Application Scanning.mp4 |
52.72MB |
| 2. Web Application Scanning.srt |
11.55KB |
| 2. WiFi Hacking System Setup.mp4 |
47.60MB |
| 2. WiFi Hacking System Setup.srt |
12.76KB |
| 20 |
777.75KB |
| 21 |
350.24KB |
| 22 |
488.08KB |
| 23 |
511.34KB |
| 24 |
179.99KB |
| 25 |
42.02KB |
| 26 |
104.71KB |
| 27 |
950.76KB |
| 28 |
43.11KB |
| 29 |
321.15KB |
| 3 |
774.72KB |
| 3. Anonsurf Overview.mp4 |
17.14MB |
| 3. Anonsurf Overview.srt |
4.11KB |
| 3. Directory Buster Hacking Tool.mp4 |
12.57MB |
| 3. Directory Buster Hacking Tool.srt |
3.70KB |
| 3. How To Start Freelancing.mp4 |
93.73MB |
| 3. How To Start Freelancing.srt |
15.80KB |
| 3. Mobile Hacking Using URLs.mp4 |
14.30MB |
| 3. Mobile Hacking Using URLs.srt |
3.09KB |
| 3. Personal Branding.mp4 |
107.78MB |
| 3. Personal Branding.srt |
19.92KB |
| 3. Places to Practice Hacking for Free.mp4 |
23.02MB |
| 3. Places to Practice Hacking for Free.srt |
5.71KB |
| 3. Recon-ng Overview.mp4 |
83.79MB |
| 3. Recon-ng Overview.srt |
23.66KB |
| 3. Section Overview.mp4 |
9.71MB |
| 3. Section Overview.srt |
4.83KB |
| 3. Setup Your Kali Linux Machine.mp4 |
58.50MB |
| 3. Setup Your Kali Linux Machine.srt |
13.96KB |
| 3. Taking Advantage of Telenet.mp4 |
33.49MB |
| 3. Taking Advantage of Telenet.srt |
9.12KB |
| 3. Transferring Files inout of Victim, Creating Custom Malware + Evading Antivirus.mp4 |
142.77MB |
| 3. Transferring Files inout of Victim, Creating Custom Malware + Evading Antivirus.srt |
35.93KB |
| 3. Understanding Ports and Protocols.mp4 |
37.01MB |
| 3. Understanding Ports and Protocols.srt |
12.34KB |
| 3. WEP Hacking Attack #1.mp4 |
38.88MB |
| 3. WEP Hacking Attack #1.srt |
11.67KB |
| 3. Working With Directories & Moving Files.mp4 |
12.35MB |
| 3. Working With Directories & Moving Files.srt |
4.15KB |
| 30 |
448.77KB |
| 31 |
737.87KB |
| 32 |
283.34KB |
| 33 |
345.99KB |
| 34 |
406.56KB |
| 35 |
261.73KB |
| 36 |
634.00KB |
| 37 |
1013.22KB |
| 38 |
561.60KB |
| 39 |
709.94KB |
| 4 |
152.11KB |
| 4. Changing Mac Addresses.mp4 |
14.81MB |
| 4. Changing Mac Addresses.srt |
3.52KB |
| 4. Current Cybersecurity Market.mp4 |
32.13MB |
| 4. Current Cybersecurity Market.srt |
12.65KB |
| 4. How To Start Client Consulting.mp4 |
85.54MB |
| 4. How To Start Client Consulting.srt |
13.33KB |
| 4. Installing & Updating Application Files.mp4 |
10.79MB |
| 4. Installing & Updating Application Files.srt |
2.72KB |
| 4. Installing a Keylogger.mp4 |
13.95MB |
| 4. Installing a Keylogger.srt |
3.17KB |
| 4. Jail Breaking and Rooting Considerations.mp4 |
6.27MB |
| 4. Jail Breaking and Rooting Considerations.srt |
1.49KB |
| 4. Nikto Web App Hacking Tool.mp4 |
23.18MB |
| 4. Nikto Web App Hacking Tool.srt |
5.13KB |
| 4. Searching & Understanding Exploits.mp4 |
39.32MB |
| 4. Searching & Understanding Exploits.srt |
8.32KB |
| 4. Section 14 Quiz.html |
167B |
| 4. Setup Your Website and Blog.mp4 |
115.03MB |
| 4. Setup Your Website and Blog.srt |
16.24KB |
| 4. Understanding IP Addresses Public & Private.mp4 |
12.14MB |
| 4. Understanding IP Addresses Public & Private.srt |
3.32KB |
| 4. VN Setup & Testing Vulnerable Systems.mp4 |
142.06MB |
| 4. VN Setup & Testing Vulnerable Systems.srt |
32.02KB |
| 4. WEP Hacking Attack #2.mp4 |
17.75MB |
| 4. WEP Hacking Attack #2.srt |
6.83KB |
| 4. Whois Enumeration.mp4 |
13.34MB |
| 4. Whois Enumeration.srt |
3.40KB |
| 40 |
701.42KB |
| 41 |
127.91KB |
| 42 |
999.83KB |
| 43 |
842.32KB |
| 44 |
1010.43KB |
| 45 |
104.69KB |
| 46 |
175.75KB |
| 47 |
1019.36KB |
| 48 |
493.32KB |
| 49 |
526.75KB |
| 5 |
989.03KB |
| 5. Copy Exploits From Searchsploit.mp4 |
12.11MB |
| 5. Copy Exploits From Searchsploit.srt |
4.31KB |
| 5. DNS Enumeration Overview.mp4 |
16.27MB |
| 5. DNS Enumeration Overview.srt |
3.23KB |
| 5. Installing a Backdoor.mp4 |
33.52MB |
| 5. Installing a Backdoor.srt |
9.10KB |
| 5. Linux Text Editors.mp4 |
17.67MB |
| 5. Linux Text Editors.srt |
6.47KB |
| 5. Privacy Issues (Geo Location).mp4 |
5.33MB |
| 5. Privacy Issues (Geo Location).srt |
1.53KB |
| 5. Section 13 Quiz.html |
167B |
| 5. Section 3 Quiz.html |
167B |
| 5. SQLmap and SQL Ninja Overview.mp4 |
3.88MB |
| 5. SQLmap and SQL Ninja Overview.srt |
1.29KB |
| 5. The 3 Types of Hackers.mp4 |
15.61MB |
| 5. The 3 Types of Hackers.srt |
7.12KB |
| 5. Using a Virtual Private NetworkServer (VPN, VPS).mp4 |
27.53MB |
| 5. Using a Virtual Private NetworkServer (VPN, VPS).srt |
6.49KB |
| 5. What Are Subnets.mp4 |
17.44MB |
| 5. What Are Subnets.srt |
4.21KB |
| 5. WPAWPA2 Hacking.mp4 |
44.01MB |
| 5. WPAWPA2 Hacking.srt |
14.74KB |
| 5. Writing a Book.mp4 |
81.69MB |
| 5. Writing a Book.srt |
13.65KB |
| 50 |
932.48KB |
| 51 |
895.84KB |
| 52 |
909.08KB |
| 53 |
537.10KB |
| 54 |
138.95KB |
| 55 |
477.67KB |
| 56 |
842.42KB |
| 57 |
162.77KB |
| 58 |
383.00KB |
| 59 |
438.68KB |
| 6 |
228.65KB |
| 6. How To Execute Brute Force Attacks.mp4 |
69.81MB |
| 6. How To Execute Brute Force Attacks.srt |
19.33KB |
| 6. Mobile Phone Data Security.mp4 |
16.34MB |
| 6. Mobile Phone Data Security.srt |
3.83KB |
| 6. Netcraft.com DNS Information.mp4 |
14.12MB |
| 6. Netcraft.com DNS Information.srt |
3.65KB |
| 6. Searching For Files.mp4 |
9.75MB |
| 6. Searching For Files.srt |
2.79KB |
| 6. Section 5 Quiz.html |
167B |
| 6. Section 6 Quiz.html |
167B |
| 6. Section 9 Quiz.html |
167B |
| 6. Starting a Podcast.mp4 |
55.90MB |
| 6. Starting a Podcast.srt |
11.89KB |
| 6. The 4 Elements of Security.mp4 |
37.18MB |
| 6. The 4 Elements of Security.srt |
5.95KB |
| 6. The Average Network vs Remote Based.mp4 |
36.83MB |
| 6. The Average Network vs Remote Based.srt |
8.19KB |
| 6. Understanding Exploits.mp4 |
23.01MB |
| 6. Understanding Exploits.srt |
6.99KB |
| 60 |
836.12KB |
| 61 |
1007.87KB |
| 62 |
1015.74KB |
| 63 |
366.47KB |
| 64 |
66.51KB |
| 65 |
862.50KB |
| 66 |
253.03KB |
| 67 |
338.30KB |
| 68 |
502.68KB |
| 69 |
573.71KB |
| 7 |
384.40KB |
| 7. Bash Scripting Basics.mp4 |
33.09MB |
| 7. Bash Scripting Basics.srt |
11.62KB |
| 7. Ethical Hacker Terminology.mp4 |
32.11MB |
| 7. Ethical Hacker Terminology.srt |
5.06KB |
| 7. Google Hacking.mp4 |
36.90MB |
| 7. Google Hacking.srt |
7.10KB |
| 7. Launching Exploits.mp4 |
153.62MB |
| 7. Launching Exploits.srt |
35.74KB |
| 7. Networking Overview.mp4 |
38.02MB |
| 7. Networking Overview.srt |
9.77KB |
| 7. Section 11 Quiz.html |
167B |
| 7. Section 2 Quiz.html |
167B |
| 7. Using Command Injection.mp4 |
16.75MB |
| 7. Using Command Injection.srt |
4.50KB |
| 70 |
880.10KB |
| 71 |
1002.63KB |
| 72 |
260.85KB |
| 73 |
649.72KB |
| 74 |
677.21KB |
| 75 |
744.18KB |
| 76 |
402.74KB |
| 77 |
518.40KB |
| 78 |
198.01KB |
| 79 |
714.89KB |
| 8 |
275.43KB |
| 8. Brute Force Attacks.mp4 |
31.48MB |
| 8. Brute Force Attacks.srt |
8.69KB |
| 8. Common Methods of Hacking.mp4 |
30.86MB |
| 8. Common Methods of Hacking.srt |
10.96KB |
| 8. Malicious File Upload.mp4 |
57.82MB |
| 8. Malicious File Upload.srt |
13.44KB |
| 8. Python Basics.mp4 |
45.74MB |
| 8. Python Basics.srt |
15.01KB |
| 8. Section 12 Quiz.html |
167B |
| 8. Shodan.io Overview.mp4 |
17.02MB |
| 8. Shodan.io Overview.srt |
3.82KB |
| 80 |
896.06KB |
| 81 |
54.79KB |
| 82 |
679.95KB |
| 83 |
228.28KB |
| 84 |
327.59KB |
| 85 |
444.06KB |
| 86 |
558.04KB |
| 87 |
661.05KB |
| 88 |
883.45KB |
| 89 |
911.19KB |
| 9 |
698.88KB |
| 9. Cybersecurity & Ethical Hacking Overview.mp4 |
16.37MB |
| 9. Cybersecurity & Ethical Hacking Overview.srt |
3.64KB |
| 9. How To Crack Passwords.mp4 |
12.46MB |
| 9. How To Crack Passwords.srt |
5.85KB |
| 9. Local & Remote File Inclusion.mp4 |
53.28MB |
| 9. Local & Remote File Inclusion.srt |
13.04KB |
| 9. Section 4 Quiz.html |
167B |
| 9. Securityheaders.com (Analyze HTTPS Headers of website).mp4 |
12.68MB |
| 9. Securityheaders.com (Analyze HTTPS Headers of website).srt |
2.64KB |
| 90 |
188.23KB |
| 91 |
210.60KB |
| 92 |
549.47KB |
| 93 |
683.23KB |
| 94 |
252.49KB |
| 95 |
294.96KB |
| 96 |
938.98KB |
| 97 |
79.97KB |
| 98 |
642.50KB |
| 99 |
745.54KB |
| TutsNode.com.txt |
63B |