|
Please note that this page does not hosts or makes available any of the listed filenames. You
cannot download any of those files from here.
|
| [TGx]Downloaded from torrentgalaxy.to .txt |
585B |
| 0 |
12B |
| 001 About the course.en.srt |
5.15KB |
| 001 About the course.mp4 |
40.96MB |
| 001 Blocks of Information Gathering.en.srt |
10.24KB |
| 001 Blocks of Information Gathering.mp4 |
103.96MB |
| 001 How Secure are Web Application Applications_.en.srt |
14.41KB |
| 001 How Secure are Web Application Applications_.mp4 |
128.64MB |
| 001 Interacting with Target Machine -Part 1.en.srt |
7.12KB |
| 001 Interacting with Target Machine -Part 1.mp4 |
73.57MB |
| 001 Introduction to Metasploit Framework.en.srt |
27.76KB |
| 001 Introduction to Metasploit Framework.mp4 |
136.03MB |
| 001 Introduction to Shodan.en.srt |
4.79KB |
| 001 Introduction to Shodan.mp4 |
42.21MB |
| 001 JavaScript- Explained.en.srt |
15.07KB |
| 001 JavaScript- Explained.mp4 |
143.10MB |
| 001 Myth_1 Bad Hackers are Most-Skilled and Smart!.html |
1.20KB |
| 001 Prepare your Mind.en.srt |
8.29KB |
| 001 Prepare your Mind.mp4 |
95.52MB |
| 001 Risk and Anonymity.en.srt |
17.61KB |
| 001 Risk and Anonymity.mp4 |
220.96MB |
| 001 Setting up the Lab.en.srt |
7.57KB |
| 001 Setting up the Lab.mp4 |
52.44MB |
| 001 SQL Injection - Explained.en.srt |
16.14KB |
| 001 SQL Injection - Explained.mp4 |
140.88MB |
| 001 Windows 10 and Malwares.en.srt |
6.92KB |
| 001 Windows 10 and Malwares.mp4 |
57.34MB |
| 002 About Instructor.en.srt |
5.29KB |
| 002 About Instructor.mp4 |
45.32MB |
| 002 Bonus_ What is Virtualization_.en.srt |
22.25KB |
| 002 Bonus_ What is Virtualization_.mp4 |
176.09MB |
| 002 Career Options- Based on 2021 Market.en.srt |
11.16KB |
| 002 Career Options- Based on 2021 Market.mp4 |
79.42MB |
| 002 Creating MSF Workspaces.en.srt |
2.47KB |
| 002 Creating MSF Workspaces.mp4 |
10.88MB |
| 002 Frequently used Queries.en.srt |
8.64KB |
| 002 Frequently used Queries.mp4 |
76.72MB |
| 002 HTTP.en.srt |
13.94KB |
| 002 HTTP.mp4 |
98.74MB |
| 002 HTTP Header Analysis.en.srt |
2.98KB |
| 002 HTTP Header Analysis.mp4 |
31.29MB |
| 002 Interacting with Target Machine -Part 2.en.srt |
5.35KB |
| 002 Interacting with Target Machine -Part 2.mp4 |
61.98MB |
| 002 Myth_2 Hackers are illegal person.html |
1.23KB |
| 002 Security Challenges.en.srt |
16.62KB |
| 002 Security Challenges.mp4 |
135.23MB |
| 002 Setting up a MySQL Database from Scratch.en.srt |
21.88KB |
| 002 Setting up a MySQL Database from Scratch.mp4 |
176.33MB |
| 002 What are Threats in Windows 10.en.srt |
6.65KB |
| 002 What are Threats in Windows 10.mp4 |
57.39MB |
| 002 What is Dark Web_.en.srt |
9.01KB |
| 002 What is Dark Web_.mp4 |
100.98MB |
| 003 Backdoor.en.srt |
5.30KB |
| 003 Backdoor.mp4 |
48.03MB |
| 003 Bind Shell vs Reverse Shell.en.srt |
13.40KB |
| 003 Bind Shell vs Reverse Shell.mp4 |
97.74MB |
| 003 Clearing the Tracks.html |
1.45KB |
| 003 Demo_ IP Camera Access with Shodan.en.srt |
19.13KB |
| 003 Demo_ IP Camera Access with Shodan.mp4 |
210.63MB |
| 003 Exploring VMware Workstation Pro.en.srt |
8.49KB |
| 003 Exploring VMware Workstation Pro.mp4 |
79.47MB |
| 003 Installing Tor browser in Kali Linux.en.srt |
7.89KB |
| 003 Installing Tor browser in Kali Linux.mp4 |
114.63MB |
| 003 Lab_ HTTP.en.srt |
12.72KB |
| 003 Lab_ HTTP.mp4 |
135.75MB |
| 003 Lab_ HTTP Header Analysis.en.srt |
13.05KB |
| 003 Lab_ HTTP Header Analysis.mp4 |
133.46MB |
| 003 Myth_3 All the attacks are launched from China and Russia!.html |
1.35KB |
| 003 Penetration Tester.en.srt |
16.63KB |
| 003 Penetration Tester.mp4 |
122.90MB |
| 003 Same-Origin Policy(SOP).en.srt |
8.82KB |
| 003 Same-Origin Policy(SOP).mp4 |
90.87MB |
| 003 What its like being hacked_.en.srt |
8.74KB |
| 003 What its like being hacked_.mp4 |
73.64MB |
| 003 Working of SQL Query.en.srt |
4.05KB |
| 003 Working of SQL Query.mp4 |
39.31MB |
| 004 All you need is just one Tool!.html |
1.07KB |
| 004 Bonus_ Types of VMware Virtulizations.en.srt |
7.97KB |
| 004 Bonus_ Types of VMware Virtulizations.mp4 |
65.64MB |
| 004 Creating a Payload using MSFVenom.en.srt |
17.03KB |
| 004 Creating a Payload using MSFVenom.mp4 |
195.58MB |
| 004 Fact 1_ You dont need degree to become an Ethical Hacker!.html |
1.55KB |
| 004 How Form-based Authentication works_.en.srt |
8.35KB |
| 004 How Form-based Authentication works_.mp4 |
70.14MB |
| 004 HTTPS.en.srt |
9.19KB |
| 004 HTTPS.mp4 |
89.81MB |
| 004 Introduction to Censys.en.srt |
3.24KB |
| 004 Introduction to Censys.mp4 |
29.35MB |
| 004 Stages in Ethical Hacking.en.srt |
13.57KB |
| 004 Stages in Ethical Hacking.mp4 |
106.73MB |
| 004 What is Cross-Site Scripting attack_.en.srt |
5.26KB |
| 004 What is Cross-Site Scripting attack_.mp4 |
47.92MB |
| 004 What is Proxychains_.en.srt |
4.89KB |
| 004 What is Proxychains_.mp4 |
70.42MB |
| 004 What is Vulnerability_.en.srt |
6.23KB |
| 004 What is Vulnerability_.mp4 |
62.60MB |
| 004 Why to learn Ethical Hacking.en.srt |
6.02KB |
| 004 Why to learn Ethical Hacking.mp4 |
62.54MB |
| 005 Application Security Testing Practices.en.srt |
15.09KB |
| 005 Application Security Testing Practices.mp4 |
122.04MB |
| 005 Attack Planning.en.srt |
11.74KB |
| 005 Attack Planning.mp4 |
109.92MB |
| 005 Bonus_ Exploring Virtualbox.en.srt |
5.67KB |
| 005 Bonus_ Exploring Virtualbox.mp4 |
46.99MB |
| 005 Creating an Encoded Payload using MSFVenom.en.srt |
9.37KB |
| 005 Creating an Encoded Payload using MSFVenom.mp4 |
114.83MB |
| 005 Demo IP Camera Access with Censys.en.srt |
8.55KB |
| 005 Demo IP Camera Access with Censys.mp4 |
96.45MB |
| 005 Fact 2_ You dont need spend huge on certifications!.html |
1.29KB |
| 005 Lab_ Proxychains.en.srt |
12.52KB |
| 005 Lab_ Proxychains.mp4.part |
107.77MB |
| 005 Lab_ Setup and Resources.en.srt |
8.35KB |
| 005 Lab_ Setup and Resources.mp4 |
70.13MB |
| 005 Real-World Example of LetsMeetUp App.en.srt |
6.38KB |
| 005 Real-World Example of LetsMeetUp App.mp4 |
47.50MB |
| 005 Reflected XSS Attack.en.srt |
13.28KB |
| 005 Reflected XSS Attack.mp4 |
96.76MB |
| 005 Trailer_ Access a website without username_password.en.srt |
8.05KB |
| 005 Trailer_ Access a website without username_password.mp4 |
79.31MB |
| 006 Accessing Dark Web.en.srt |
10.27KB |
| 006 Accessing Dark Web.mp4 |
129.04MB |
| 006 Fact 3_ There is no perfect age to start your career in Ethical Hacking!.html |
1.25KB |
| 006 Finding Target email address.en.srt |
13.66KB |
| 006 Finding Target email address.mp4 |
152.65MB |
| 006 Introduction to Kali Linux.en.srt |
8.07KB |
| 006 Introduction to Kali Linux.mp4 |
68.67MB |
| 006 Introduction to Veil Evasion.en.srt |
4.53KB |
| 006 Introduction to Veil Evasion.mp4 |
46.60MB |
| 006 Lab_ Altoro Mutual.html |
955B |
| 006 Reflected XSS Attack_ A Closer look.en.srt |
6.58KB |
| 006 Reflected XSS Attack_ A Closer look.mp4 |
56.57MB |
| 006 Types of Vulnerabilities.en.srt |
10.81KB |
| 006 Types of Vulnerabilities.mp4 |
73.40MB |
| 006 What is an Ethical Hacking.en.srt |
5.82KB |
| 006 What is an Ethical Hacking.mp4 |
52.36MB |
| 007 CVEdetails.com and Exploit-DB.en.srt |
17.08KB |
| 007 CVEdetails.com and Exploit-DB.mp4 |
168.33MB |
| 007 Generating Payload with Veil Evasion.en.srt |
17.62KB |
| 007 Generating Payload with Veil Evasion.mp4 |
193.16MB |
| 007 Installing Kali Linux on Virtualbox.en.srt |
6.15KB |
| 007 Installing Kali Linux on Virtualbox.mp4 |
91.94MB |
| 007 Lab_ bWAPP.en.srt |
6.85KB |
| 007 Lab_ bWAPP.mp4 |
85.82MB |
| 007 Lab Setup_ Reflected XSS Attack.en.srt |
5.99KB |
| 007 Lab Setup_ Reflected XSS Attack.mp4 |
40.78MB |
| 007 Signal Hire and Hunter.io Tools.en.srt |
7.66KB |
| 007 Signal Hire and Hunter.io Tools.mp4 |
89.12MB |
| 008 Demo_ Launching SQL Injection Attack on Altoro Mutual.en.srt |
8.05KB |
| 008 Demo_ Launching SQL Injection Attack on Altoro Mutual.mp4 |
79.39MB |
| 008 Installing Kali Linux on VMware.en.srt |
7.59KB |
| 008 Installing Kali Linux on VMware.mp4 |
91.62MB |
| 008 Introduction to BeEF Tool.html |
1.59KB |
| 008 Vulnerability Scanning.en.srt |
4.33KB |
| 008 Vulnerability Scanning.mp4 |
27.74MB |
| 009 Installing BeEF Tool.en.srt |
15.94KB |
| 009 Installing BeEF Tool.mp4 |
170.77MB |
| 009 Introduction to Burp-Suite.en.srt |
11.53KB |
| 009 Introduction to Burp-Suite.mp4 |
98.73MB |
| 009 Introduction to Nessus Scanner.en.srt |
9.11KB |
| 009 Introduction to Nessus Scanner.mp4 |
55.08MB |
| 009 Kali Linux Basic Set-up.en.srt |
15.03KB |
| 009 Kali Linux Basic Set-up.mp4 |
160.73MB |
| 010 Getting started with Nessus Scanner.en.srt |
13.67KB |
| 010 Getting started with Nessus Scanner.mp4 |
114.56MB |
| 010 Intruder feature in Burp-Suite.en.srt |
4.33KB |
| 010 Intruder feature in Burp-Suite.mp4 |
44.72MB |
| 010 Lab_ DVWA(Damn Vulnerable Web Application).html |
1021B |
| 010 Linux Basics- Part 1.en.srt |
23.40KB |
| 010 Linux Basics- Part 1.mp4 |
196.18MB |
| 011 Demo_ Linkedin Account Hack using BeEF and DVWA.en.srt |
22.29KB |
| 011 Demo_ Linkedin Account Hack using BeEF and DVWA.mp4 |
259.37MB |
| 011 Downloading and Installing Metaspoitable.html |
972B |
| 011 Linux Basics -Part 2.en.srt |
10.54KB |
| 011 Linux Basics -Part 2.mp4 |
90.05MB |
| 011 Steps to launch SQL Injection using Burp-Suite.en.srt |
2.12KB |
| 011 Steps to launch SQL Injection using Burp-Suite.mp4 |
19.83MB |
| 012 Demo_ Launching SQL Injection attack on Altoro Mutual using Burp-Suite.en.srt |
12.62KB |
| 012 Demo_ Launching SQL Injection attack on Altoro Mutual using Burp-Suite.mp4 |
133.61MB |
| 012 Demo_ Linkedin Account Hack using BeEF and bWAPP.en.srt |
12.27KB |
| 012 Demo_ Linkedin Account Hack using BeEF and bWAPP.mp4 |
141.06MB |
| 012 Discovering Vulnerabilities on Target Server.en.srt |
19.56KB |
| 012 Discovering Vulnerabilities on Target Server.mp4 |
150.46MB |
| 012 Linux Basics - Part 3.en.srt |
6.17KB |
| 012 Linux Basics - Part 3.mp4 |
64.72MB |
| 013 Scanning Network for Vulnerabilities.en.srt |
16.28KB |
| 013 Scanning Network for Vulnerabilities.mp4 |
135.12MB |
| 013 Stored XSS Attack.en.srt |
10.63KB |
| 013 Stored XSS Attack.mp4 |
107.92MB |
| 013 User Permissions in Kali Linux.en.srt |
4.55KB |
| 013 User Permissions in Kali Linux.mp4 |
35.21MB |
| 014 Demo_ Stored XSS Attack - Part 1.en.srt |
4.19KB |
| 014 Demo_ Stored XSS Attack - Part 1.mp4 |
53.79MB |
| 014 Introduction to OpenVAS_GVM Scanner.en.srt |
7.45KB |
| 014 Introduction to OpenVAS_GVM Scanner.mp4 |
20.91MB |
| 015 Installing OpenVAS Scanner on Kali Linux.en.srt |
15.18KB |
| 015 Installing OpenVAS Scanner on Kali Linux.mp4 |
130.21MB |
| 016 Discovering Vulnerabilities on Victim Server with OpenVAS Scanner.en.srt |
14.31KB |
| 016 Discovering Vulnerabilities on Victim Server with OpenVAS Scanner.mp4 |
89.55MB |
| 017 Bonus_ Scan Config, Alerts and Schedules.en.srt |
12.51KB |
| 017 Bonus_ Scan Config, Alerts and Schedules.mp4 |
86.88MB |
| 018 Getting Started with Nmap.en.srt |
16.79KB |
| 018 Getting Started with Nmap.mp4 |
62.25MB |
| 019 Basic Scan with Nmap Part-1.en.srt |
7.40KB |
| 019 Basic Scan with Nmap Part-1.mp4 |
52.51MB |
| 020 Basic scan with Nmap Part -2.en.srt |
11.63KB |
| 020 Basic scan with Nmap Part -2.mp4 |
90.56MB |
| 021 Nmap Script Engine.en.srt |
23.71KB |
| 021 Nmap Script Engine.mp4 |
102.17MB |
| 022 Finding Exposed HTTP Methods with Nmap.en.srt |
6.72KB |
| 022 Finding Exposed HTTP Methods with Nmap.mp4 |
44.09MB |
| 023 HTTP Enumeration with Nmap tool.en.srt |
10.12KB |
| 023 HTTP Enumeration with Nmap tool.mp4 |
136.12MB |
| 024 Sensitive Data Leakage.en.srt |
8.41KB |
| 024 Sensitive Data Leakage.mp4 |
86.33MB |
| 025 Lab_ DirBuster.en.srt |
15.37KB |
| 025 Lab_ DirBuster.mp4 |
176.32MB |
| 026 Recon-ng Introduction.en.srt |
6.45KB |
| 026 Recon-ng Introduction.mp4 |
62.88MB |
| 027 Lab_ Finding Verified Email accounts with Recon-ng.en.srt |
9.47KB |
| 027 Lab_ Finding Verified Email accounts with Recon-ng.mp4 |
121.79MB |
| 028 Discovering Sub-domains.en.srt |
7.23KB |
| 028 Discovering Sub-domains.mp4 |
97.36MB |
| 029 Discovering Sub-domains with Recon-ng.en.srt |
14.31KB |
| 029 Discovering Sub-domains with Recon-ng.mp4 |
187.63MB |
| 030 Introduction to Wireshark tool.en.srt |
7.22KB |
| 030 Introduction to Wireshark tool.mp4 |
96.09MB |
| 031 Wireshark Interfaces.en.srt |
7.44KB |
| 031 Wireshark Interfaces.mp4 |
79.59MB |
| 1 |
264B |
| 10 |
237.17KB |
| 100 |
809.23KB |
| 101 |
729.72KB |
| 102 |
670.30KB |
| 103 |
264.83KB |
| 104 |
91.97KB |
| 105 |
172.51KB |
| 11 |
684.03KB |
| 12 |
274.08KB |
| 13 |
357.84KB |
| 14 |
552.62KB |
| 15 |
918.31KB |
| 16 |
966.90KB |
| 17 |
121.11KB |
| 18 |
900.23KB |
| 19 |
993.09KB |
| 2 |
190B |
| 20 |
255.28KB |
| 21 |
789.47KB |
| 22 |
906.10KB |
| 23 |
394.81KB |
| 24 |
556.11KB |
| 25 |
805.33KB |
| 26 |
979.19KB |
| 27 |
371.54KB |
| 28 |
103.15KB |
| 29 |
978.52KB |
| 3 |
760.72KB |
| 30 |
211.66KB |
| 31 |
174.68KB |
| 32 |
381.67KB |
| 33 |
447.41KB |
| 34 |
78.89KB |
| 35 |
83.58KB |
| 36 |
240.00KB |
| 37 |
279.36KB |
| 38 |
37.12KB |
| 39 |
850.45KB |
| 4 |
430.95KB |
| 40 |
23.53KB |
| 41 |
261.70KB |
| 42 |
279.77KB |
| 43 |
270.77KB |
| 44 |
656.57KB |
| 45 |
248.95KB |
| 46 |
558.29KB |
| 47 |
927.23KB |
| 48 |
490.60KB |
| 49 |
61.09KB |
| 5 |
857.32KB |
| 50 |
390.17KB |
| 51 |
136.27KB |
| 52 |
450.13KB |
| 53 |
977.47KB |
| 54 |
189.80KB |
| 55 |
459.43KB |
| 56 |
903.94KB |
| 57 |
123.06KB |
| 58 |
686.92KB |
| 59 |
181.86KB |
| 6 |
379.03KB |
| 60 |
421.59KB |
| 61 |
539.34KB |
| 62 |
598.34KB |
| 63 |
621.63KB |
| 64 |
705.94KB |
| 65 |
289.99KB |
| 66 |
363.70KB |
| 67 |
443.46KB |
| 68 |
617.77KB |
| 69 |
597.31KB |
| 7 |
685.59KB |
| 70 |
877.75KB |
| 71 |
894.96KB |
| 72 |
336.32KB |
| 73 |
371.20KB |
| 74 |
285.44KB |
| 75 |
126.13KB |
| 76 |
406.83KB |
| 77 |
474.25KB |
| 78 |
771.97KB |
| 79 |
19.21KB |
| 8 |
692.25KB |
| 80 |
623.97KB |
| 81 |
679.92KB |
| 82 |
443.60KB |
| 83 |
947.11KB |
| 84 |
214.05KB |
| 85 |
499.67KB |
| 86 |
570.26KB |
| 87 |
652.37KB |
| 88 |
996.13KB |
| 89 |
82.90KB |
| 9 |
931.93KB |
| 90 |
513.27KB |
| 91 |
8.33KB |
| 92 |
412.01KB |
| 93 |
691.49KB |
| 94 |
290.46KB |
| 95 |
933.69KB |
| 96 |
812.89KB |
| 97 |
43.34KB |
| 98 |
226.94KB |
| 99 |
706.41KB |
| external-assets-links.txt |
109B |
| external-assets-links.txt |
66B |
| external-assets-links.txt |
54B |
| TutsNode.com.txt |
63B |