File | Size |
---|
0. Websites you may like/0. (1Hack.Us) Premium Tutorials-Guides-Articles _ Community based Forum.url | 377.00 B |
0. Websites you may like/1. (FreeCoursesOnline.Me) Download Udacity, Masterclass, Lynda, PHLearn, Pluralsight Free.url | 286.00 B |
0. Websites you may like/3. (FTUApps.com) Download Cracked Developers Applications For Free.url | 239.00 B |
0. Websites you may like/How you can help our Group!.txt | 208.00 B |
1 - Reading, Modifying, and Testing an Exploit Script/01 - The Course Overview.mp4 | 13.51 MB |
1 - Reading, Modifying, and Testing an Exploit Script/02 - Setting Up Your Virtual Environment.mp4 | 11.20 MB |
1 - Reading, Modifying, and Testing an Exploit Script/03 - Finding an Exploit Script.mp4 | 9.87 MB |
1 - Reading, Modifying, and Testing an Exploit Script/04 - Understanding the Script.mp4 | 11.48 MB |
1 - Reading, Modifying, and Testing an Exploit Script/05 - Modifying the Script.mp4 | 19.16 MB |
1 - Reading, Modifying, and Testing an Exploit Script/06 - Testing the Script.mp4 | 13.99 MB |
2 - Analyzing a Packet Capture File/07 - Viewing a Packet Capture File in Wireshark.mp4 | 20.40 MB |
2 - Analyzing a Packet Capture File/08 - Understanding Normal Traffic Patterns.mp4 | 16.98 MB |
2 - Analyzing a Packet Capture File/09 - Writing a Python Script to Look for Malicious Network Traffic.mp4 | 17.76 MB |
2 - Analyzing a Packet Capture File/10 - Writing a Python Script to Calculate a Network Traffic Baseline.mp4 | 22.12 MB |
2 - Analyzing a Packet Capture File/11 - Writing a Python Script to Compare a Baseline Against Network Traffic.mp4 | 18.01 MB |
3 - Gathering Open-Source Intelligence/12 - What OSINT Is.mp4 | 12.05 MB |
3 - Gathering Open-Source Intelligence/13 - Enumerating Domain Names with Python.mp4 | 15.43 MB |
3 - Gathering Open-Source Intelligence/14 - What Is Google Dorking.mp4 | 12.90 MB |
3 - Gathering Open-Source Intelligence/15 - Automating Google Dorking with Python.mp4 | 12.96 MB |
3 - Gathering Open-Source Intelligence/16 - Web Directory Enumeration with Python.mp4 | 15.47 MB |
4 - Analyzing a Log File/17 - Reading a Log File.mp4 | 15.85 MB |
4 - Analyzing a Log File/18 - Understanding Normal Log Messages.mp4 | 14.58 MB |
4 - Analyzing a Log File/19 - Writing a Python Script to Look for Logs Indicating Malicious Activity.mp4 | 17.55 MB |
4 - Analyzing a Log File/20 - Writing a Python Script to Calculate a Log Message Baseline.mp4 | 17.58 MB |
4 - Analyzing a Log File/21 - Writing a Python Script to Compare a Baseline Against a Log File.mp4 | 14.69 MB |
5 - Writing a Python Replacement for Netcat/22 - What Is Netcat.mp4 | 13.65 MB |
5 - Writing a Python Replacement for Netcat/23 - Writing the Input Arguments.mp4 | 20.10 MB |
5 - Writing a Python Replacement for Netcat/24 - Writing the Client.mp4 | 14.01 MB |
5 - Writing a Python Replacement for Netcat/25 - Writing the Server.mp4 | 17.28 MB |
5 - Writing a Python Replacement for Netcat/26 - Testing Your Program.mp4 | 13.47 MB |
6 - Collecting Network Packets Off the Wire/27 - Introduction to Passive Network Capture.mp4 | 8.51 MB |
6 - Collecting Network Packets Off the Wire/28 - Writing a Python Packet Sniffer.mp4 | 14.36 MB |
6 - Collecting Network Packets Off the Wire/29 - Capturing Plain-Text Credentials from Network Packets with Python.mp4 | 15.18 MB |
6 - Collecting Network Packets Off the Wire/30 - Introduction to ARP Cache Poisoning.mp4 | 9.15 MB |
6 - Collecting Network Packets Off the Wire/31 - Writing a Python ARP Cache Poisoner.mp4 | 17.88 MB |
7 - Building a Penetration Testing Tool/32 - Introduction to the Metasploit Framework.mp4 | 20.79 MB |
7 - Building a Penetration Testing Tool/33 - Writing the Discovery Module.mp4 | 16.51 MB |
7 - Building a Penetration Testing Tool/34 - Writing the Exploit Framework.mp4 | 19.07 MB |
7 - Building a Penetration Testing Tool/35 - Stitching It All Together with an Interactive Command Shell.mp4 | 23.65 MB |
7 - Building a Penetration Testing Tool/36 - Testing MSFPY.mp4 | 15.29 MB |
9781838828219_Code.zip | 9.72 MB |