Обратите внимание, что наш сайт не размещает какие-либо файлы из списка. Вы не можете скачать
эти файлы или скачать torrent-файл.
|
001 Active Directory Attacks Concepts - Part 1.mp4 |
157.96Мб |
001 Basics 1_ Installation & Config , Basic Operations, Binary Operations.mp4 |
72.19Мб |
001 Disclaimer.html |
1.12Кб |
001 File Integrity Monitoring (FIM)_ Alert when Critical Files Touched.mp4 |
103.45Мб |
001 Initial Presentation.mp4 |
167.44Мб |
001 Initial Reconnaissance with OSINT Framework.mp4 |
189.63Мб |
001 Installation Note.html |
1.15Кб |
001 Integrating Windows Endpoint in Wazuh Manager.mp4 |
45.72Мб |
001 Introduction to MITRE ATT&CK - Part 1.mp4 |
98.90Мб |
001 Introduction to Red Teaming - Part 1.mp4 |
152.38Мб |
001 Introduction to Vulnerability Scanning and Analysis.mp4 |
89.64Мб |
001 Intro to Hack the Box (HTB) CTF.mp4 |
64.71Мб |
001 Man in the Middle Attacks (Sniffing & Spoofing) - Part 1.mp4 |
128.70Мб |
001 MITRE ATT&CK and Cyber Kill Chain.mp4 |
69.89Мб |
001 Programming Decoders and Rules in Wazuh Part 1.mp4 |
122.43Мб |
001 Run & Detect SSH & RDP Brute Force Attack - Linux & Windows Endpoint.mp4 |
68.01Мб |
001 SIEM vs. SOC.mp4 |
53.37Мб |
001 Social Engineering Concepts - Part 1.mp4 |
74.43Мб |
001 Understanding Attack Vectors.mp4 |
75.20Мб |
001 Virtual Environment.mp4 |
117.83Мб |
001 Wazuh Index State Management (ISM) & Storage Productivity.mp4 |
120.36Мб |
001 Web App Pentesting Concepts - Part 1.mp4 |
143.45Мб |
002 Active Directory Attacks Concepts - Part 2.mp4 |
125.57Мб |
002 Architecture, Installation & Configuring Wazuh Manager Server.mp4 |
69.99Мб |
002 Automated Roll-out of Wazuh Agent on a Network of Windows Workstations.mp4 |
126.06Мб |
002 Basics 2_ Loop Statements, Flow Control and Modules.mp4 |
93.64Мб |
002 Easy 1 - BLUE (Enumeration, Exploitation, Hash Dump and Impacket Framework).mp4 |
216.37Мб |
002 How SIEM works.mp4 |
18.98Мб |
002 Introduction to MITRE ATT&CK - Part 2.mp4 |
152.60Мб |
002 Introduction to Red Teaming - Part 2.mp4 |
182.17Мб |
002 Kali Linux Installation & Environment.mp4 |
102.17Мб |
002 Linux System Calls Monitoring_ Alert when Auditctl Rules are met.mp4 |
48.62Мб |
002 Man in the Middle Attacks (Sniffing & Spoofing) - Part 2.mp4 |
180.19Мб |
002 Metasploitable2 - Part 1.mp4 |
119.71Мб |
002 OWASP TOP 10, ASVS, MASVS, PTES, ISSAF and OSSTMM.mp4 |
78.18Мб |
002 Programming Decoders and Rules in Wazuh Part 2.mp4 |
99.08Мб |
002 Run & Detect Shellshock Attack - Linux Endpoint.mp4 |
23.12Мб |
002 Scanning with ZENMAP.mp4 |
137.62Мб |
002 Setting up OpenVAS-GVM.mp4 |
103.79Мб |
002 Social Engineering Concepts - Part 2.mp4 |
70.56Мб |
002 VSCode IDE For Your Scripts!.mp4 |
84.68Мб |
002 Web App Pentesting Concepts - Part 2.mp4 |
95.67Мб |
003 .tmux.conf |
56.28Кб |
003 .tmux.conf.local |
10.14Кб |
003 .zshrc |
3.36Кб |
003 Active Directory Attacks Concepts - Part 3.mp4 |
147.18Мб |
003 Basics 3_ Data Types and Functions.mp4 |
90.14Мб |
003 cmd.txt |
463б |
003 Continuous Enterprise Vulnerability Monitoring.mp4 |
84.95Мб |
003 Easy 2 - DEVEL (Indirect Web Shell Upload, Local Exploit Suggester, Priv. Esc.).mp4 |
133.63Мб |
003 Gophish Framework - Reaching the Target - Part 1.mp4 |
121.05Мб |
003 Installation & Configuring Elasticsearch.mp4 |
81.81Мб |
003 Integrating Linux Endpoint in Wazuh Manager.mp4 |
32.74Мб |
003 Intro to Ethical Hacking Basic Concepts and Terminologies.mp4 |
219.95Мб |
003 Metasploitable2 - Part 2.mp4 |
113.16Мб |
003 Power Up Your Linux Shell_ TERMINATOR-ZSH-TMUX.mp4 |
129.85Мб |
003 Reconnaissance.mp4 |
107.53Мб |
003 Red Teaming Operations - Part 1.mp4 |
113.50Мб |
003 Run & Detect MSHTA Session initiation Attack.mp4 |
56.34Мб |
003 Scanning with NMAP in Command Line & in Python.mp4 |
233.35Мб |
003 Vulnerability Assessment with OpenVAS-GVM.mp4 |
116.09Мб |
003 Web App Pentesting Concepts - Part 3.mp4 |
117.55Мб |
003 What are SIEM Use-Cases and Common Mistakes_.mp4 |
49.69Мб |
003 Wireless Attacks - Part 1.mp4 |
50.14Мб |
004 Active Directory Setup on Metasploitable VM.mp4 |
95.83Мб |
004 CIS Hardening Monitoring with Wazuh SCA (Less is More Principle).mp4 |
81.68Мб |
004 Classes and Objects, Mini Project I_ Writing a Port Scanner.mp4 |
128.96Мб |
004 Easy 3 - NETMON (PRTG Exploit with Python, Creds Discovery & Guessing) - Part 1.mp4 |
181.71Мб |
004 Gophish Framework - Reaching the Target - Part 2.mp4 |
86.64Мб |
004 Installation & Configuring FileBeat & Kibana.mp4 |
78.19Мб |
004 Integrating Fortigate Firewall in Wazuh Manager.mp4 |
91.21Мб |
004 Linux Basics & Commands.mp4 |
262.36Мб |
004 LinuxCheatSeet_ALL.md |
95.85Кб |
004 Metasploitable2 - Part 3.mp4 |
158.47Мб |
004 Red Teaming Operations - Part 2.mp4 |
152.72Мб |
004 Resource Development.mp4 |
60.73Мб |
004 Run & Detect Spawn Session and Process Injection.mp4 |
41.50Мб |
004 Scanning with Metasploit AUX & CENSYS.mp4 |
146.27Мб |
004 Threat Intelligence & OSSIM Open Threat Exchange (OTX) P1.mp4 |
54.19Мб |
004 Vulnerability Analysis in Action.mp4 |
259.44Мб |
004 Vulnerable Labs #1_ dvwa, bwapp, webgoat, juiceshop, metasploitable2.mp4 |
142.57Мб |
004 Web App Pentesting Concepts - Part 4.mp4 |
83.85Мб |
004 Wireless Attacks - Part 2.mp4 |
66.98Мб |
005 Burp Suite Basics - Part 1.mp4 |
130.08Мб |
005 Changing Password of the Read-Only Admin Account.mp4 |
68.25Мб |
005 cmd.txt |
879б |
005 Docker on Linux.mp4 |
159.73Мб |
005 Easy 3 - NETMON (PRTG Manual Exploit with Nishang Reverse Shells) - Part 2.mp4 |
145.81Мб |
005 Initial Access.mp4 |
143.17Мб |
005 Metasploitable2 - Part 4.mp4 |
176.28Мб |
005 Metasploitable Environment Preparation.mp4 |
65.18Мб |
005 Mini Project II_ Writing a Malware Command & Control (C&C) Server_Client.mp4 |
119.23Мб |
005 Read Me!.html |
1.47Кб |
005 Red Teaming Infrastructure - Part 1.mp4 |
86.20Мб |
005 Run & Detect Priv Esc, Lateral Mov. & Exec using PSExec WMIC (Windows Endpoint).mp4 |
60.63Мб |
005 Second Opinion Vulnerability Scanning with NMAP NSE Scripts.mp4 |
217.38Мб |
005 Social Engineering Client Side Attacks - Part 1.mp4 |
93.90Мб |
005 Threat Intelligence & OSSIM Open Threat Exchange (OTX) P2.mp4 |
39.29Мб |
005 Vulnerable AD Lab Preparation.mp4 |
153.06Мб |
005 Windows Defender in Wazuh_ Centrally Monitor Malware & Actions across Endpoints.mp4 |
61.40Мб |
006 AD Enumeration, Credentials Replay Attacks, Over-PTH, Secretsdump and Evil-WinRM.mp4 |
164.38Мб |
006 Burp Suite Basics - Part 2.mp4 |
117.05Мб |
006 Enum with NMAP Part 1.mp4 |
213.03Мб |
006 Execution.mp4 |
71.68Мб |
006 Medium 1 - POPCORN (Dirbuster Enum, Upload Abuse, Nix PAM, DirtyCow Exploit).mp4 |
209.53Мб |
006 Metasploitable3 Ubuntu - Part 1.mp4 |
155.84Мб |
006 Red Teaming Infrastructure - Part 2.mp4 |
74.75Мб |
006 Run & Detect Mimikatz & Pass The Hash Attacks.mp4 |
32.70Мб |
006 SIEM vs. SOAR vs. UEBA.mp4 |
23.27Мб |
006 Social Engineering Client Side Attacks - Part 2.mp4 |
81.11Мб |
006 Third Opinion Vulnerability Scanning with Metasploit.mp4 |
128.24Мб |
006 Use Sysinternals Sysmon with Wazuh_ The Swiss Army Knife for Windows Monitoring.mp4 |
92.68Мб |
006 Vulnerable Labs #2_ metasploitable3.mp4 |
73.97Мб |
007 AS-REP Roast, Hashcat, Pass The Ticket Attacks.mp4 |
172.07Мб |
007 Capture The Flags(CTF)_ HTB and others.mp4 |
183.45Мб |
007 cmd.txt |
383б |
007 Damn Vulnerable Web Application Lab - Part 1.mp4 |
109.39Мб |
007 Enum with NMAP Part 2.mp4 |
168.84Мб |
007 How secure is secure enough_.mp4 |
28.48Мб |
007 Medium 2 - BLUNDER (Gobuster, Bludit CMS exploits) - Part 1.mp4 |
167.97Мб |
007 Metasploitable3 Ubuntu - Part 2.mp4 |
176.53Мб |
007 Persistence.mp4 |
117.28Мб |
007 Red Teaming Infrastructure - Part 3.mp4 |
91.51Мб |
007 Run & Detect Log Tampering IoC (Someone is deleting his traces).mp4 |
38.46Мб |
008 Damn Vulnerable Web Application Lab - Part 2.mp4 |
148.38Мб |
008 Defense-in-Depth Architecture Part 1.mp4 |
47.41Мб |
008 Enum with Metasploit and other tools.mp4 |
172.34Мб |
008 Golden Tickets, Kerberoasting against User SPNs and Mimikatz Attacks.mp4 |
155.37Мб |
008 Medium 2 - BLUNDER (Hashcat, LinPEAS Priv Esc., sudo Exploit) - Part 2.mp4 |
137.02Мб |
008 Metasploitable3 Ubuntu - Part 3.mp4 |
161.56Мб |
008 Privilege Escalation.mp4 |
91.12Мб |
008 Red Teaming Command and Control (C&C) - Part 1.mp4 |
92.69Мб |
009 cmd.txt |
1.87Кб |
009 Damn Vulnerable Web Application Lab - Part 3.mp4 |
230.69Мб |
009 Defense Evasion.mp4 |
192.14Мб |
009 Defense-in-Depth Architecture Part 2.mp4 |
39.28Мб |
009 Medium 2 - BLUNDER (CSRF_Anti-Bruteforce Bypass with Python Scripting) - Part 3.mp4 |
125.50Мб |
009 Metasploitable3 Ubuntu - Part 4.mp4 |
121.21Мб |
009 Red Teaming Command and Control (C&C) - Part 2.mp4 |
129.79Мб |
009 Resources.txt |
2.45Кб |
010 Credential Access.mp4 |
95.26Мб |
010 Damn Vulnerable Web Application Lab - Part 4.mp4 |
204.62Мб |
010 Medium 3 - SNIPER (SMB Enum, LFI RFI, Gain Rev Shell) - Part 1.mp4 |
141.95Мб |
010 Metasploitable3 Win2k8 - Part 1.mp4 |
129.65Мб |
010 Red Teaming Command and Control (C&C) - Part 3.mp4 |
206.49Мб |
011 Damn Vulnerable Web Application Lab - Part 5.mp4 |
84.03Мб |
011 Discovery.mp4 |
93.57Мб |
011 Installation.txt |
3.16Кб |
011 Medium 3 - SNIPER (RFI RCE, Local Enum, Priv Esc, CHM Weaponization) - Part 2.mp4 |
135.79Мб |
011 Metasploitable3 Win2k8 - Part 2.mp4 |
144.45Мб |
011 Red Teaming Command and Control (C&C) - Part 4.mp4 |
216.32Мб |
012 Lateral Movement.mp4 |
53.43Мб |
012 Medium 3 - SNIPER (CrackMapExec, Impacket, Cookie Poisoning) - Part 3.mp4 |
151.78Мб |
012 Metasploitable3 Win2k8 - Part 3.mp4 |
159.99Мб |
012 OWASP Webgoat Lab - Part 1.mp4 |
79.25Мб |
012 Red Teaming Command and Control (C&C) - Part 5.mp4 |
272.50Мб |
013 Collection.mp4 |
59.58Мб |
013 Medium 4 - MANGO (Recon, NoSQL MongoDB Injection) - Part 1.mp4 |
165.63Мб |
013 OWASP Webgoat Lab - Part 2.mp4 |
119.83Мб |
013 Password Hash Crack - Part 1.mp4 |
164.60Мб |
013 Red Teaming Weaponization (DDE & Micro Attacks) - Part 1.mp4 |
92.44Мб |
014 Command and Control.mp4 |
102.25Мб |
014 Medium 4 - MANGO (Write NoSQL Injector with Python) - Part 2.mp4 |
104.89Мб |
014 OWASP Mutillidae II Lab - Part 1.mp4 |
189.40Мб |
014 Password Hash Crack - Part 2.mp4 |
219.27Мб |
014 Red Teaming Weaponization (HTA Attack, Droppers, File Format Exploits) - Part 2.mp4 |
73.99Мб |
015 Exfiltration.mp4 |
52.22Мб |
015 Medium 4 - MANGO (Write NoSQL Injector with Python) - Part 3.mp4 |
173.49Мб |
015 OWASP Mutillidae II Lab - Part 2.mp4 |
213.75Мб |
015 Red Teaming Initial Access Attack Scenarios.mp4 |
83.51Мб |
016 Impact.mp4 |
86.99Мб |
016 Medium 4 - MANGO (LinPEAS, GTFOBins Priv. Esc. Attack Vectors) - Part 4.mp4 |
152.43Мб |
016 Metasploitable 3 Vulnerable Web App.mp4 |
61.56Мб |
016 python_NMAPER.py |
695б |
016 Red Teaming Post Exploit (Proc Injection & Bypass UAC, Token Tampering) - Part 1.mp4 |
125.74Мб |
017 bWAPP - Buggy Web Application Lab.mp4 |
139.02Мб |
017 Hard 1 - CONTROL (Manual SQL Injection, SQLmap) - Part 1.mp4 |
155.01Мб |
017 Red Teaming Post Exploit (Keylogger, Screen Spy, Cobalt Strike Ops) - Part 2.mp4 |
147.04Мб |
018 Hard 1 - CONTROL (Read & Write Webshells with SQLMap, winPEAS) - Part 2.mp4 |
176.34Мб |
018 PortSwigger - Online Vulnerable Web Apps - Part 1.mp4 |
130.70Мб |
018 Red Teaming Post Exploit (Pivoting, Session Passing, RDP Tunnel) - Part 3.mp4 |
103.18Мб |
019 Hard 1 - CONTROL (Windows Priv. Esc Abusing SDDL Perms, Service Exec) - Part 3.mp4 |
171.00Мб |
019 PortSwigger - Online Vulnerable Web Apps - Part 2.mp4 |
103.70Мб |
084 brute.py |
1.56Кб |
090 MongoInject.py |
2.74Кб |
107 amazon.profile |
1.78Кб |
107 CS4.0_guideline.profile |
19.54Кб |
107 gmail.profile |
2.74Кб |
107 jquery-c2.3.11.profile |
39.74Кб |
107 jquery-c2.4.3.profile |
54.72Кб |
155 custom_fortigate_decoders.xml |
3.23Кб |
155 custom_fortigate_rules.xml |
3.80Кб |
157 OpenDistro_ISM_ hot_cold_delete_workflow.json |
1.46Кб |
external-assets-links.txt |
1.43Кб |
external-assets-links.txt |
1.00Кб |
external-assets-links.txt |
1.34Кб |
external-assets-links.txt |
848б |
external-assets-links.txt |
956б |
external-assets-links.txt |
739б |
external-assets-links.txt |
627б |
external-assets-links.txt |
682б |
external-assets-links.txt |
75б |
external-assets-links.txt |
202б |
external-assets-links.txt |
498б |
external-assets-links.txt |
696б |
external-assets-links.txt |
1010б |
external-assets-links.txt |
417б |
external-assets-links.txt |
220б |
external-assets-links.txt |
1.82Кб |
external-assets-links.txt |
475б |
external-assets-links.txt |
2.31Кб |
external-assets-links.txt |
994б |
external-assets-links.txt |
165б |
Readme.txt |
178б |