|
Обратите внимание, что наш сайт не размещает какие-либо файлы из списка. Вы не можете скачать
эти файлы или скачать torrent-файл.
|
| 1. Download Functionality.mp4 |
124.73Мб |
| 1. Download Functionality.srt |
21.94Кб |
| 1. Generate Private and Public Keys on Kali Machine.mp4 |
33.01Мб |
| 1. Generate Private and Public Keys on Kali Machine.srt |
7.56Кб |
| 1. Introduction.mp4 |
30.34Мб |
| 1. Introduction to Security.mp4 |
30.22Мб |
| 1. Introduction to Security.srt |
4.04Кб |
| 1. Introduction to subprocess module.mp4 |
43.48Мб |
| 1. Introduction to subprocess module.srt |
8.96Кб |
| 1. What is a Ransomware.mp4 |
25.33Мб |
| 1. What is a Ransomware.srt |
3.71Кб |
| 1. What is Backdoor.mp4 |
32.47Мб |
| 1. What is Backdoor.srt |
4.98Кб |
| 10. Binding Payload with other files.mp4 |
146.03Мб |
| 10. Binding Payload with other files.srt |
19.15Кб |
| 10. Change Directory using Backdoor.mp4 |
127.20Мб |
| 10. Change Directory using Backdoor.srt |
24.73Кб |
| 10. Display Ransom Note on Victim's Computer.mp4 |
250.20Мб |
| 10. Display Ransom Note on Victim's Computer.srt |
31.28Кб |
| 11. Decrypting Files on Victim Computer.mp4 |
92.40Мб |
| 11. Decrypting Files on Victim Computer.srt |
17.62Кб |
| 11. Handle Change Directory (cd) exceptions.mp4 |
70.11Мб |
| 11. Handle Change Directory (cd) exceptions.srt |
12.29Кб |
| 12. Finally Testing our Ransomware.mp4 |
265.34Мб |
| 12. Finally Testing our Ransomware.srt |
30.63Кб |
| 2. Create Fernet Key for Ransomware.mp4 |
81.71Мб |
| 2. Create Fernet Key for Ransomware.srt |
19.43Кб |
| 2. Handle Download Exceptions.mp4 |
52.07Мб |
| 2. Handle Download Exceptions.srt |
8.61Кб |
| 2. How do Criminal install Ransomware.mp4 |
7.87Мб |
| 2. How do Criminal install Ransomware.srt |
1.26Кб |
| 2. Saving result of command execution.mp4 |
41.55Мб |
| 2. Saving result of command execution.srt |
7.57Кб |
| 2. Security Goals.mp4 |
41.60Мб |
| 2. Security Goals.srt |
4.84Кб |
| 3. Backdoor in Server-Client.mp4 |
12.45Мб |
| 3. Backdoor in Server-Client.srt |
1.65Кб |
| 3. Maintaining DRY principle at Client Side.mp4 |
61.98Мб |
| 3. Maintaining DRY principle at Client Side.srt |
8.75Кб |
| 3. Testing Ransomware to generate Fernet Key on Windows Machine.mp4 |
112.33Мб |
| 3. Testing Ransomware to generate Fernet Key on Windows Machine.srt |
19.30Кб |
| 3. Types of Ransomware.mp4 |
79.83Мб |
| 3. Types of Ransomware.srt |
12.32Кб |
| 3. What is Cryptography.mp4 |
52.62Мб |
| 3. What is Cryptography.srt |
5.59Кб |
| 4. Categories of Cryptography.mp4 |
117.18Мб |
| 4. Categories of Cryptography.srt |
13.22Кб |
| 4. Encrypt Fernet Key.mp4 |
135.40Мб |
| 4. Encrypt Fernet Key.srt |
23.03Кб |
| 4. Maintaining DRY principle at Server Side.mp4 |
30.74Мб |
| 4. Maintaining DRY principle at Server Side.srt |
4.65Кб |
| 4. Server Side Programming.mp4 |
26.96Мб |
| 4. Server Side Programming.srt |
6.06Кб |
| 5. Client Side Programming.mp4 |
48.49Мб |
| 5. Client Side Programming.srt |
8.59Кб |
| 5. Encrypt and Decrypt Files.mp4 |
43.72Мб |
| 5. Encrypt and Decrypt Files.srt |
8.81Кб |
| 5. Symmetric and Asymmetric Encryption.mp4 |
27.31Мб |
| 5. Symmetric and Asymmetric Encryption.srt |
5.07Кб |
| 5. Upload Functionality.mp4 |
72.99Мб |
| 5. Upload Functionality.srt |
12.23Кб |
| 6. Asymmetric Cryptography - RSA algorithm.mp4 |
57.14Мб |
| 6. Asymmetric Cryptography - RSA algorithm.srt |
12.13Кб |
| 6. Crypt System by Traversing through Directories and Files.mp4 |
151.81Мб |
| 6. Crypt System by Traversing through Directories and Files.srt |
19.96Кб |
| 6. Debug and Test Upload Feature.mp4 |
104.79Мб |
| 6. Debug and Test Upload Feature.srt |
16.51Кб |
| 6. Send message from Server to Client.mp4 |
61.86Мб |
| 6. Send message from Server to Client.srt |
8.89Кб |
| 7. Decrypt Fernet Key on Kali Linux.mp4 |
145.51Мб |
| 7. Decrypt Fernet Key on Kali Linux.srt |
25.02Кб |
| 7. Lock Windows Machine.mp4 |
72.38Мб |
| 7. Lock Windows Machine.srt |
10.25Кб |
| 7. Server-Client Communication.mp4 |
63.95Мб |
| 7. Server-Client Communication.srt |
10.99Кб |
| 8. Change Victim's Desktop Background.mp4 |
141.77Мб |
| 8. Change Victim's Desktop Background.srt |
17.74Кб |
| 8. Executing shell commands through backdoor.mp4 |
86.78Мб |
| 8. Executing shell commands through backdoor.srt |
16.05Кб |
| 8. Making Payload Persistance.mp4 |
109.55Мб |
| 8. Making Payload Persistance.srt |
17.44Кб |
| 9. Convert .py to .exe Making Executables.mp4 |
51.99Мб |
| 9. Convert .py to .exe Making Executables.srt |
7.17Кб |
| 9. Handle Exceptions.mp4 |
78.05Мб |
| 9. Handle Exceptions.srt |
12.66Кб |
| 9. Ransom Note.mp4 |
55.35Мб |
| 9. Ransom Note.srt |
7.83Кб |
| Bonus Resources.txt |
386б |
| Get Bonus Downloads Here.url |
182б |