Общая информация
Название [ CourseMega.com ] Udemy - Learn Social Engineering From Scratch (updated 10 - 2021)
Тип
Размер 3.99Гб

Файлы в торренте
Обратите внимание, что наш сайт не размещает какие-либо файлы из списка. Вы не можете скачать эти файлы или скачать torrent-файл.
1 - 01-The-Lab.pdf 460.96Кб
1 - 02-Information-Gathering.pdf 87.98Кб
1 - 03-Generating-Evil-Files-For-Windows.pdf 692.07Кб
1 - 04-Generating-Evil-Files-For-Mac-OS-X.pdf 141.49Кб
1 - 06-Delivery-Methods.pdf 127.02Кб
10 - Backdooring a Legitimate Android App_en.srt 14.55Кб
10 - Backdooring a Legitimate Android App.encrypted.m4a 5.98Мб
10 - Backdooring a Legitimate Android App.encrypted.mp4 38.33Мб
10 - Modifying Backdoor Source To Bypass All Anti-virus Programs_en.srt 10.84Кб
10 - Modifying Backdoor Source To Bypass All Anti-virus Programs.encrypted.m4a 3.93Мб
10 - Modifying Backdoor Source To Bypass All Anti-virus Programs.encrypted.mp4 18.68Мб
10 - URL Manipulation_en.srt 13.52Кб
10 - URL Manipulation.mp4 54.85Мб
11 - Luring Targets Into Accessing Evil URL Without Direct Interaction_en.srt 13.55Кб
11 - Luring Targets Into Accessing Evil URL Without Direct Interaction.encrypted.m4a 5.25Мб
11 - Luring Targets Into Accessing Evil URL Without Direct Interaction.encrypted.mp4 61.87Мб
12 - Basic BeEF Commands_en.srt 5.99Кб
12 - Basic BeEF Commands.encrypted.m4a 2.16Мб
12 - Basic BeEF Commands.encrypted.mp4 9.11Мб
13 - Stealing Credentials Passwords Using A Fake Login Prompt_en.srt 3.16Кб
13 - Stealing Credentials Passwords Using A Fake Login Prompt.encrypted.m4a 1.12Мб
13 - Stealing Credentials Passwords Using A Fake Login Prompt.encrypted.mp4 7.44Мб
14 - Hacking Windows 10 Using A Fake Update_en.srt 6.17Кб
14 - Hacking Windows 10 Using A Fake Update.encrypted.m4a 2.29Мб
14 - Hacking Windows 10 Using A Fake Update.encrypted.mp4 18.00Мб
15 - Hacking Mac OS X Using A Fake Update_en.srt 5.82Кб
15 - Hacking Mac OS X Using A Fake Update.encrypted.m4a 2.20Мб
15 - Hacking Mac OS X Using A Fake Update.encrypted.mp4 10.28Мб
16 - Hacking Linux Using A Fake Update_en.srt 5.76Кб
16 - Hacking Linux Using A Fake Update.encrypted.m4a 2.33Мб
16 - Hacking Linux Using A Fake Update.encrypted.mp4 13.97Мб
1 - Basic Overview Of Kali Linux_en.srt 6.81Кб
1 - Basic Overview Of Kali Linux.encrypted.m4a 2.53Мб
1 - Basic Overview Of Kali Linux.encrypted.mp4 13.44Мб
1 - Basics Of Empire Agents_en.srt 9.58Кб
1 - Basics Of Empire Agents.encrypted.m4a 3.14Мб
1 - Basics Of Empire Agents.encrypted.mp4 10.71Мб
1 - Bonus Lecture - What's Next.html 6.80Кб
1 - Bypassing All Anti-Virus Programs By Modifying Hex Vales_en.srt 13.17Кб
1 - Bypassing All Anti-Virus Programs By Modifying Hex Vales.encrypted.m4a 5.18Мб
1 - Bypassing All Anti-Virus Programs By Modifying Hex Vales.encrypted.mp4 36.93Мб
1 - Detecting Fake Spoofed Emails_en.srt 8.72Кб
1 - Detecting Fake Spoofed Emails.encrypted.m4a 3.01Мб
1 - Detecting Fake Spoofed Emails.encrypted.mp4 13.83Мб
1 - Discovering Websites, Links & Social Networking Accounts_en.srt 13.62Кб
1 - Discovering Websites, Links & Social Networking Accounts.encrypted.m4a 4.63Мб
1 - Discovering Websites, Links & Social Networking Accounts.encrypted.mp4 16.70Мб
1 - Embedding Evil Files With Any File Type Like An Image Or PDF_en.srt 13.86Кб
1 - Embedding Evil Files With Any File Type Like An Image Or PDF.encrypted.m4a 5.01Мб
1 - Embedding Evil Files With Any File Type Like An Image Or PDF.encrypted.mp4 31.41Мб
1 - Installing Ubuntu As a Virtual Machine_en.srt 8.23Кб
1 - Installing Ubuntu As a Virtual Machine.encrypted.m4a 2.70Мб
1 - Installing Ubuntu As a Virtual Machine.encrypted.mp4 12.03Мб
1 - Installing Veil Framework_en.srt 5.88Кб
1 - Installing Veil Framework.mp4 49.68Мб
1 - install-veil 250б
1 - install-veil-kali-2021 79б
1 - Introduction_en.srt 3.96Кб
1 - Introduction_en.srt 2.61Кб
1 - Introduction_en.srt 3.23Кб
1 - Introduction_en.srt 2.60Кб
1 - Introduction_en.srt 2.92Кб
1 - Introduction.encrypted.m4a 1.56Мб
1 - Introduction.encrypted.m4a 1.07Мб
1 - Introduction.encrypted.m4a 939.91Кб
1 - Introduction.encrypted.mp4 26.07Мб
1 - Introduction.encrypted.mp4 5.48Мб
1 - Introduction.encrypted.mp4 4.69Мб
1 - Introduction.mp4 6.21Мб
1 - Introduction.mp4 5.05Мб
1 - Introduction to Keyloggers_en.srt 8.34Кб
1 - Introduction to Keyloggers.encrypted.m4a 3.21Мб
1 - Introduction to Keyloggers.encrypted.mp4 52.52Мб
1 - Lab Overview & Needed Software_en.srt 7.62Кб
1 - Lab Overview & Needed Software.encrypted.m4a 2.89Мб
1 - Lab Overview & Needed Software.encrypted.mp4 13.32Мб
1 - Maltego Overview_en.srt 9.70Кб
1 - Maltego Overview.mp4 104.63Мб
1 - Meterpreter Basics_en.srt 7.66Кб
1 - Meterpreter Basics.encrypted.m4a 3.12Мб
1 - Meterpreter Basics.encrypted.mp4 21.51Мб
1 - Overview of the Setup_en.srt 9.04Кб
1 - Overview of the Setup.mp4 96.38Мб
1 - Security.pdf 100.01Кб
1 - Teaser - Hacking An Android Phone & Accessing The Camera_en.srt 8.15Кб
1 - Teaser - Hacking An Android Phone & Accessing The Camera.mp4 11.86Мб
2 - 05-Generating-Evil-Files-For-Linux.pdf 246.70Кб
2 - Creating A Remote Keylogger_en.srt 10.91Кб
2 - Creating A Remote Keylogger.encrypted.m4a 4.42Мб
2 - Creating A Remote Keylogger.encrypted.mp4 39.00Мб
2 - Discovering Domain Info & Emails Associated With Target_en.srt 9.52Кб
2 - Discovering Domain Info & Emails Associated With Target.encrypted.m4a 3.62Мб
2 - Discovering Domain Info & Emails Associated With Target.encrypted.mp4 12.04Мб
2 - Discovering Twitter Friends & Associated Accounts_en.srt 6.52Кб
2 - Discovering Twitter Friends & Associated Accounts.encrypted.m4a 2.42Мб
2 - Discovering Twitter Friends & Associated Accounts.encrypted.mp4 13.33Мб
2 - Download & Execute Payload_en.srt 8.60Кб
2 - Download & Execute Payload.encrypted.m4a 3.09Мб
2 - Download & Execute Payload.encrypted.mp4 60.77Мб
2 - download-and-execute.txt.part
2 - Ex1 - Generating a Backdoor That Works Outside The Network_en.srt 7.11Кб
2 - Ex1 - Generating a Backdoor That Works Outside The Network.encrypted.m4a 2.64Мб
2 - Ex1 - Generating a Backdoor That Works Outside The Network.encrypted.mp4 21.28Мб
2 - File System Commands_en.srt 5.55Кб
2 - File System Commands_en.srt 8.15Кб
2 - File System Commands.encrypted.m4a 2.53Мб
2 - File System Commands.encrypted.m4a 2.93Мб
2 - File System Commands.encrypted.mp4 15.58Мб
2 - File System Commands.encrypted.mp4 22.05Мб
2 - Hacking Into Linux-Like Systems Using One Command_en.srt 11.73Кб
2 - Hacking Into Linux-Like Systems Using One Command.encrypted.m4a 4.36Мб
2 - Hacking Into Linux-Like Systems Using One Command.encrypted.mp4 36.28Мб
2 - Hacking Mac OS X Using A Meterpreter Backdoor_en.srt 14.17Кб
2 - Hacking Mac OS X Using A Meterpreter Backdoor.encrypted.m4a 5.90Мб
2 - Hacking Mac OS X Using A Meterpreter Backdoor.encrypted.mp4 113.84Мб
2 - How to Protect Against BeEF & Other Browser Exploits_en.srt 5.33Кб
2 - How to Protect Against BeEF & Other Browser Exploits.encrypted.m4a 2.10Мб
2 - How to Protect Against BeEF & Other Browser Exploits.encrypted.mp4 21.37Мб
2 - Initial Preparation_en.srt 11.54Кб
2 - Initial Preparation.encrypted.m4a 4.36Мб
2 - Initial Preparation.encrypted.mp4 76.55Мб
2 - Installing Windows As a Virtual Machine_en.srt 8.08Кб
2 - Installing Windows As a Virtual Machine.encrypted.m4a 3.01Мб
2 - Installing Windows As a Virtual Machine.encrypted.mp4 20.38Мб
2 - Introduction to Social Engineering_en.srt 4.55Кб
2 - Introduction to Social Engineering.encrypted.m4a 1.58Мб
2 - Introduction to Social Engineering.encrypted.mp4 11.70Мб
2 - Mail Deliver - Setting up an SMTP Server_en.srt 9.17Кб
2 - Mail Deliver - Setting up an SMTP Server.encrypted.m4a 3.36Мб
2 - Mail Deliver - Setting up an SMTP Server.encrypted.mp4 19.50Мб
2 - Running Evil Files Silently In The Background_en.srt 9.92Кб
2 - Running Evil Files Silently In The Background.encrypted.m4a 3.89Мб
2 - Running Evil Files Silently In The Background.encrypted.mp4 33.57Мб
2 - The Linux Terminal & Basic Linux Commands_en.srt 15.30Кб
2 - The Linux Terminal & Basic Linux Commands_en.vtt 14.71Кб
2 - The Linux Terminal & Basic Linux Commands.encrypted.m4a 6.41Мб
2 - The Linux Terminal & Basic Linux Commands.encrypted.mp4 145.76Мб
2 - Upgrading Basic Shell Access To A Meterpreter Empire Access_en.srt 12.25Кб
2 - Upgrading Basic Shell Access To A Meterpreter Empire Access.encrypted.m4a 4.46Мб
2 - Upgrading Basic Shell Access To A Meterpreter Empire Access.encrypted.mp4 12.14Мб
2 - Veil Overview & Payload Basics_en.srt 10.37Кб
2 - Veil Overview & Payload Basics.encrypted.m4a 3.59Мб
2 - Veil Overview & Payload Basics.encrypted.mp4 12.83Мб
2 - What-is-Social-Engineering.pdf 98.73Кб
3 - 00-Intro-Perperation.pdf 364.17Кб
3 - Changing Trojan's Icon_en.srt 10.15Кб
3 - Changing Trojan's Icon.encrypted.m4a 4.06Мб
3 - Changing Trojan's Icon.encrypted.mp4 31.54Мб
3 - Configuring The Router To Forward Connections To Kali_en.srt 8.81Кб
3 - Configuring The Router To Forward Connections To Kali.encrypted.m4a 3.41Мб
3 - Configuring The Router To Forward Connections To Kali.encrypted.mp4 24.50Мб
3 - Course Overview_en.srt 6.06Кб
3 - Course Overview.encrypted.m4a 2.09Мб
3 - Course Overview.encrypted.mp4 15.60Мб
3 - Creating The Perfect Spying Tool_en.srt 9.15Кб
3 - Creating The Perfect Spying Tool.mp4 14.53Мб
3 - Detecting Trojans Manually_en.srt 6.46Кб
3 - Detecting Trojans Manually.encrypted.m4a 2.71Мб
3 - Detecting Trojans Manually.encrypted.mp4 26.21Мб
3 - Discovering Emails Of The Target's Friends_en.srt 5.91Кб
3 - Discovering Emails Of The Target's Friends.encrypted.m4a 2.28Мб
3 - Discovering Emails Of The Target's Friends.encrypted.mp4 12.61Мб
3 - Discovering Information About Hosting Company, Support Team Emails & Admin Email_en.srt 8.48Кб
3 - Discovering Information About Hosting Company, Support Team Emails & Admin Email.encrypted.m4a 3.39Мб
3 - Discovering Information About Hosting Company, Support Team Emails & Admin Email.encrypted.mp4 18.87Мб
3 - Generating Undetectable Backdoors For Windows_en.srt 13.43Кб
3 - Generating Undetectable Backdoors For Windows.mp4 83.00Мб
3 - Hacking Mac OS X Using An Empire Stager_en.srt 8.87Кб
3 - Hacking Mac OS X Using An Empire Stager.encrypted.m4a 3.22Мб
3 - Hacking Mac OS X Using An Empire Stager.encrypted.mp4 14.76Мб
3 - Installing Kali Linux as a VM on Windows_en.srt 12.08Кб
3 - Installing Kali Linux as a VM on Windows.encrypted.m4a 4.35Мб
3 - Installing Kali Linux as a VM on Windows.encrypted.mp4 39.47Мб
3 - Mail Delivery - Spoofing Emails_en.srt 15.22Кб
3 - Mail Delivery - Spoofing Emails.encrypted.m4a 5.79Мб
3 - Mail Delivery - Spoofing Emails.encrypted.mp4 71.41Мб
3 - Maintaining Access Basic Methods_en.srt 7.13Кб
3 - Maintaining Access Basic Methods.encrypted.m4a 2.51Мб
3 - Maintaining Access Basic Methods.encrypted.mp4 13.64Мб
3 - More Advanced Linux Backdoor_en.srt 8.54Кб
3 - More Advanced Linux Backdoor.encrypted.m4a 3.22Мб
3 - More Advanced Linux Backdoor.encrypted.mp4 18.58Мб
3 - Upload & Execute Shell Commands_en.srt 5.55Кб
3 - Upload & Execute Shell Commands.encrypted.m4a 2.23Мб
3 - Upload & Execute Shell Commands.encrypted.mp4 16.25Мб
3 - Using A Remote Keylogger To Capture Key Strikes Including Passwords_en.srt 9.10Кб
3 - Using A Remote Keylogger To Capture Key Strikes Including Passwords.encrypted.m4a 3.68Мб
3 - Using A Remote Keylogger To Capture Key Strikes Including Passwords.encrypted.mp4 46.97Мб
4 - Analysing The Gathered Info & Building An Attack Strategy_en.srt 11.73Кб
4 - Analysing The Gathered Info & Building An Attack Strategy.encrypted.m4a 4.25Мб
4 - Analysing The Gathered Info & Building An Attack Strategy.encrypted.mp4 14.92Мб
4 - Converting Basic Backdoor To An Executable_en.srt 4.35Кб
4 - Converting Basic Backdoor To An Executable.encrypted.m4a 1.75Мб
4 - Converting Basic Backdoor To An Executable.encrypted.mp4 15.12Мб
4 - Detecting Trojans Using a Sandbox_en.srt 4.19Кб
4 - Detecting Trojans Using a Sandbox.encrypted.m4a 1.60Мб
4 - Detecting Trojans Using a Sandbox.encrypted.mp4 13.57Мб
4 - Discovering Files, Links, Websites & Other Companies Related To Target_en.srt 6.03Кб
4 - Discovering Files, Links, Websites & Other Companies Related To Target.encrypted.m4a 2.55Мб
4 - Discovering Files, Links, Websites & Other Companies Related To Target.encrypted.mp4 19.94Мб
4 - Ex2 - Using BeEF Outside The Network_en.srt 7.16Кб
4 - Ex2 - Using BeEF Outside The Network.encrypted.m4a 2.85Мб
4 - Ex2 - Using BeEF Outside The Network.encrypted.mp4 14.81Мб
4 - Injecting a Backdoor In a System Processes_en.srt 12.77Кб
4 - Injecting a Backdoor In a System Processes.encrypted.m4a 4.71Мб
4 - Injecting a Backdoor In a System Processes.encrypted.mp4 71.06Мб
4 - Installing Kali Linux as a VM on Apple Mac OS_en.srt 12.84Кб
4 - Installing Kali Linux as a VM on Apple Mac OS.encrypted.m4a 4.72Мб
4 - Installing Kali Linux as a VM on Apple Mac OS.encrypted.mp4 17.29Мб
4 - Listening For Incoming Connections_en.srt 9.31Кб
4 - Listening For Incoming Connections.mp4 29.08Мб
4 - Mail Delivery - Spoofing Emails (method 2)_en.srt 15.54Кб
4 - Mail Delivery - Spoofing Emails (method 2).encrypted.m4a 5.12Мб
4 - Mail Delivery - Spoofing Emails (method 2).encrypted.mp4 55.63Мб
4 - mailer-make-sure-you-rename-this-file-to-send.php.txt 1.73Кб
4 - Maintaining Access - Using a Reliable & undetectable Method_en.srt 7.94Кб
4 - Maintaining Access - Using a Reliable & undetectable Method.encrypted.m4a 3.37Мб
4 - Maintaining Access - Using a Reliable & undetectable Method.encrypted.mp4 39.57Мб
4 - Password Recovery Basics_en.srt 9.76Кб
4 - Password Recovery Basics.encrypted.m4a 3.66Мб
4 - Password Recovery Basics.encrypted.mp4 19.73Мб
4 - Spoofing File Extension from .exe to anything else (pdf, png ..etc)_en.srt 14.54Кб
4 - Spoofing File Extension from .exe to anything else (pdf, png ..etc).encrypted.m4a 5.61Мб
4 - Spoofing File Extension from .exe to anything else (pdf, png ..etc).encrypted.mp4 44.74Мб
4 - Using A Remote Keylogger To Capture Key Strikes Including Passwords_en.srt 11.55Кб
4 - Using A Remote Keylogger To Capture Key Strikes Including Passwords.mp4 100.14Мб
5 - 2 Methods to Escalating Privileges On OS X_en.srt 9.07Кб
5 - 2 Methods to Escalating Privileges On OS X.encrypted.m4a 3.56Мб
5 - 2 Methods to Escalating Privileges On OS X.encrypted.mp4 50.51Мб
5 - autoit-download-and-execute.txt.part
5 - Download & Execute Payload (Method 2)_en.srt 8.60Кб
5 - Download & Execute Payload (Method 2).encrypted.m4a 3.10Мб
5 - Download & Execute Payload (Method 2).encrypted.mp4 61.08Мб
5 - Embedding A Normal File With Backdoor_en.srt 12.40Кб
5 - Embedding A Normal File With Backdoor.encrypted.m4a 4.57Мб
5 - Embedding A Normal File With Backdoor.encrypted.mp4 73.32Мб
5 - Hacking A Windows 10 Machine Using The Generated Backdoor_en.srt 8.94Кб
5 - Hacking A Windows 10 Machine Using The Generated Backdoor.encrypted.m4a 3.53Мб
5 - Hacking A Windows 10 Machine Using The Generated Backdoor.encrypted.mp4 23.37Мб
5 - Hacking OS X & Linux Using Pure Social Engineering Without Sending Any Files_en.srt 13.75Кб
5 - Hacking OS X & Linux Using Pure Social Engineering Without Sending Any Files.encrypted.m4a 4.97Мб
5 - Hacking OS X & Linux Using Pure Social Engineering Without Sending Any Files.encrypted.mp4 72.86Мб
5 - Installing Kali Linux as a VM on Apple M1 Computers_en.srt 13.11Кб
5 - Installing Kali Linux as a VM on Apple M1 Computers.encrypted.m4a 4.47Мб
5 - Installing Kali Linux as a VM on Apple M1 Computers.encrypted.mp4 30.97Мб
5 - Recovering Saved Passwords From A Local Machine_en.srt 8.94Кб
5 - Recovering Saved Passwords From A Local Machine.encrypted.m4a 3.53Мб
5 - Recovering Saved Passwords From A Local Machine.encrypted.mp4 27.60Мб
5 - Recovering Saved Passwords From Local Machine_en.srt 3.90Кб
5 - Recovering Saved Passwords From Local Machine.encrypted.m4a 1.61Мб
5 - Recovering Saved Passwords From Local Machine.encrypted.mp4 11.20Мб
5 - Spying - Capturing Key Strikes & Taking Screen Shots_en.srt 3.28Кб
5 - Spying - Capturing Key Strikes & Taking Screen Shots.encrypted.m4a 1.31Мб
5 - Spying - Capturing Key Strikes & Taking Screen Shots.encrypted.mp4 5.27Мб
5 - Using The Gathered Info To Build An Attack Strategy_en.srt 6.00Кб
5 - Using The Gathered Info To Build An Attack Strategy.encrypted.m4a 2.09Мб
5 - Using The Gathered Info To Build An Attack Strategy.encrypted.mp4 9.26Мб
6 - Creating A Replica Of Any Website Login Page_en.srt 7.62Кб
6 - Creating A Replica Of Any Website Login Page.encrypted.m4a 2.96Мб
6 - Creating A Replica Of Any Website Login Page.encrypted.mp4 26.27Мб
6 - Embedding Evil Files With Any File Type Like An Image Or PDF (Method 2)_en.srt 8.88Кб
6 - Embedding Evil Files With Any File Type Like An Image Or PDF (Method 2).encrypted.m4a 3.30Мб
6 - Embedding Evil Files With Any File Type Like An Image Or PDF (Method 2).encrypted.mp4 54.73Мб
6 - Execute & Report Payload_en.srt 9.28Кб
6 - Execute & Report Payload.encrypted.m4a 3.40Мб
6 - Execute & Report Payload.encrypted.mp4 15.33Мб
6 - Generating a Basic Trojan For Max OS X_en.srt 9.24Кб
6 - Generating a Basic Trojan For Max OS X.encrypted.m4a 3.34Мб
6 - Generating a Basic Trojan For Max OS X.encrypted.mp4 55.80Мб
6 - Installing Kali Linux as a VM on Linux_en.srt 14.18Кб
6 - Installing Kali Linux as a VM on Linux.encrypted.m4a 5.25Мб
6 - Installing Kali Linux as a VM on Linux.encrypted.mp4 50.04Мб
6 - Introduction to The Fat Rat_en.srt 8.24Кб
6 - Introduction to The Fat Rat.encrypted.m4a 3.08Мб
6 - Introduction to The Fat Rat.encrypted.mp4 40.76Мб
6 - Maintaining Access On OS X_en.srt 7.00Кб
6 - Maintaining Access On OS X.mp4 12.18Мб
6 - Pivoting - Theory (What is Pivoting )_en.srt 7.72Кб
6 - Pivoting - Theory (What is Pivoting ).encrypted.m4a 3.48Мб
6 - Pivoting - Theory (What is Pivoting ).encrypted.mp4 34.30Мб
6 - Recovering Saved Passwords From A Remote Machine_en.srt 14.82Кб
6 - Recovering Saved Passwords From A Remote Machine.encrypted.m4a 5.80Мб
6 - Recovering Saved Passwords From A Remote Machine.encrypted.mp4 38.58Мб
6 - run-laZagne.txt 862б
7 - Changing Trojan's Icon_en.srt 8.26Кб
7 - Changing Trojan's Icon.encrypted.m4a 3.21Мб
7 - Changing Trojan's Icon.encrypted.mp4 32.47Мб
7 - Embedding a Backdoor In a Legitimate Microsoft Office Document_en.srt 10.21Кб
7 - Embedding a Backdoor In a Legitimate Microsoft Office Document.encrypted.m4a 4.29Мб
7 - Embedding a Backdoor In a Legitimate Microsoft Office Document.encrypted.mp4 67.35Мб
7 - Generating An Undetectable Backdoor For Windows - Method 2_en.srt 14.01Кб
7 - Generating An Undetectable Backdoor For Windows - Method 2.encrypted.m4a 5.62Мб
7 - Generating An Undetectable Backdoor For Windows - Method 2.encrypted.mp4 155.79Мб
7 - Pivoting - Exploiting Devices on The Same Network As a Hacked Computer_en.srt 10.42Кб
7 - Pivoting - Exploiting Devices on The Same Network As a Hacked Computer.encrypted.m4a 4.00Мб
7 - Pivoting - Exploiting Devices on The Same Network As a Hacked Computer.encrypted.mp4 25.15Мб
7 - Recovering Saved Passwords From A Remote Machine_en.srt 8.28Кб
7 - Recovering Saved Passwords From A Remote Machine.encrypted.m4a 3.37Мб
7 - Recovering Saved Passwords From A Remote Machine.encrypted.mp4 23.10Мб
7 - Stealing Login Info Using Fake A Login Page_en.srt 14.90Кб
7 - Stealing Login Info Using Fake A Login Page.mp4 83.00Мб
8 - BeEF Overview & Basic Hook Method_en.srt 9.39Кб
8 - BeEF Overview & Basic Hook Method.encrypted.m4a 3.49Мб
8 - BeEF Overview & Basic Hook Method.encrypted.mp4 20.76Мб
8 - Configuring The Trojan To Run Silently_en.srt 7.55Кб
8 - Configuring The Trojan To Run Silently.encrypted.m4a 3.05Мб
8 - Configuring The Trojan To Run Silently.encrypted.mp4 54.27Мб
8 - Controlling Android Phone & Accessing Mic, Camera, Messages, File System & More_en.srt 12.03Кб
8 - Controlling Android Phone & Accessing Mic, Camera, Messages, File System & More.encrypted.m4a 4.27Мб
8 - Controlling Android Phone & Accessing Mic, Camera, Messages, File System & More.encrypted.mp4 29.22Мб
8 - download-and-execute-macro.txt.part
8 - Embedding Any Evil File In A Legitimate Microsoft Office Document_en.srt 12.76Кб
8 - Embedding Any Evil File In A Legitimate Microsoft Office Document.encrypted.m4a 5.05Мб
8 - Embedding Any Evil File In A Legitimate Microsoft Office Document.encrypted.mp4 34.26Мб
8 - Embedding Evil Code In A Legitimate Linux Package - Part 1_en.srt 18.12Кб
8 - Embedding Evil Code In A Legitimate Linux Package - Part 1.encrypted.m4a 6.18Мб
8 - Embedding Evil Code In A Legitimate Linux Package - Part 1.encrypted.mp4 25.28Мб
8 - Introduction to Empire_en.srt 12.43Кб
8 - Introduction to Empire.encrypted.m4a 4.11Мб
8 - Introduction to Empire.encrypted.mp4 27.97Мб
9 - Creating a Windows Powershell Stager & Hacking Windows 10_en.srt 11.73Кб
9 - Creating a Windows Powershell Stager & Hacking Windows 10.encrypted.m4a 3.93Мб
9 - Creating a Windows Powershell Stager & Hacking Windows 10.encrypted.mp4 14.36Мб
9 - Embedding Backdoor In A Legitimate Microsoft Office Document_en.srt 7.39Кб
9 - Embedding Backdoor In A Legitimate Microsoft Office Document.mp4 13.88Мб
9 - Embedding Evil Code In A Legitimate Linux Package - Part 2_en.srt 6.41Кб
9 - Embedding Evil Code In A Legitimate Linux Package - Part 2.encrypted.m4a 2.44Мб
9 - Embedding Evil Code In A Legitimate Linux Package - Part 2.encrypted.mp4 20.14Мб
9 - Injecting BeEF's Hook In Any Webpage_en.srt 6.04Кб
9 - Injecting BeEF's Hook In Any Webpage.encrypted.m4a 2.43Мб
9 - Injecting BeEF's Hook In Any Webpage.encrypted.mp4 21.08Мб
9 - Maintaining Access On OS X_en.srt 12.89Кб
9 - Maintaining Access On OS X.encrypted.m4a 5.12Мб
9 - Maintaining Access On OS X.encrypted.mp4 45.54Мб
Bonus Resources.txt 357б
external-assets-links.txt 323б
external-assets-links.txt 338б
external-assets-links.txt 297б
external-assets-links.txt 199б
external-assets-links.txt 86б
external-assets-links.txt 53б
external-assets-links.txt 146б
external-assets-links.txt 96б
external-assets-links.txt 306б
external-assets-links.txt 113б
Get Bonus Downloads Here.url 180б
Статистика распространения по странам
Всего 0
Список IP Полный список IP-адресов, которые скачивают или раздают этот торрент