资源详情

返回首页 | 相关搜索
Pluralsight - Exploitation with PowerShell 2023-3
大小 218.9 MB
文件数 72
Info Hash: 2F328B54A9600C10D6554EDE679969910743798F
收录时间 2026-01-24 10:19:28
更新时间 2026-01-24 10:19:28
文件列表 (72)
powershell-exploitation.zip
23.48 MB
Read me.txt
121 B
1. Course Overview/1. Course Overview.mp4
4.08 MB
1. Course Overview/1. Course Overview.vtt
2.71 KB
2. Crafting Payloads/1. Why Learn PowerShell Exploitation.mp4
2.21 MB
2. Crafting Payloads/1. Why Learn PowerShell Exploitation.vtt
1.62 KB
2. Crafting Payloads/2. What Are Payloads and How Are They Delivered.mp4
5 MB
2. Crafting Payloads/2. What Are Payloads and How Are They Delivered.vtt
5.33 KB
2. Crafting Payloads/3. Meterpreter.mp4
4.38 MB
2. Crafting Payloads/3. Meterpreter.vtt
3.98 KB
2. Crafting Payloads/4. Demo - Meterpreter.mp4
7.66 MB
2. Crafting Payloads/4. Demo - Meterpreter.vtt
5.47 KB
2. Crafting Payloads/5. Nishang.mp4
1.09 MB
2. Crafting Payloads/5. Nishang.vtt
1.31 KB
2. Crafting Payloads/6. Demo - Nishang.mp4
5.64 MB
2. Crafting Payloads/6. Demo - Nishang.vtt
3.26 KB
2. Crafting Payloads/7. DNSCat.mp4
6.78 MB
2. Crafting Payloads/7. DNSCat.vtt
5.33 KB
2. Crafting Payloads/8. Veil-Ordnance.mp4
7.14 MB
2. Crafting Payloads/8. Veil-Ordnance.vtt
4.19 KB
2. Crafting Payloads/9. Custom Tools.mp4
10.65 MB
2. Crafting Payloads/9. Custom Tools.vtt
5.68 KB
3. Client-side Exploitation/1. Introduction to Client-side Exploitation.mp4
2.13 MB
3. Client-side Exploitation/1. Introduction to Client-side Exploitation.vtt
2 KB
3. Client-side Exploitation/2. Microsoft Office Macros.mp4
7.31 MB
3. Client-side Exploitation/2. Microsoft Office Macros.vtt
5.65 KB
3. Client-side Exploitation/3. Weaponizing Office Documents.mp4
4.05 MB
3. Client-side Exploitation/3. Weaponizing Office Documents.vtt
3.53 KB
3. Client-side Exploitation/4. PowerShell Download Cradles in Office Macros.mp4
4.36 MB
3. Client-side Exploitation/4. PowerShell Download Cradles in Office Macros.vtt
3.98 KB
3. Client-side Exploitation/5. Office Macro Shellcode Injection.mp4
6.63 MB
3. Client-side Exploitation/5. Office Macro Shellcode Injection.vtt
5.23 KB
3. Client-side Exploitation/6. Phishing with Hyperlinks and HTML Smuggling.mp4
15.13 MB
3. Client-side Exploitation/6. Phishing with Hyperlinks and HTML Smuggling.vtt
11.76 KB
3. Client-side Exploitation/7. The Rubber Ducky.mp4
2.09 MB
3. Client-side Exploitation/7. The Rubber Ducky.vtt
1.3 KB
3. Client-side Exploitation/8. Summary.mp4
2.55 MB
3. Client-side Exploitation/8. Summary.vtt
2.35 KB
4. Bypassing Security/1. Common Security Mitigations.mp4
2.98 MB
4. Bypassing Security/1. Common Security Mitigations.vtt
3.47 KB
4. Bypassing Security/2. AppLocker.mp4
8.93 MB
4. Bypassing Security/2. AppLocker.vtt
5.75 KB
4. Bypassing Security/3. Constrained Language Mode.mp4
4.9 MB
4. Bypassing Security/3. Constrained Language Mode.vtt
4.59 KB
4. Bypassing Security/4. Attack Surface Reduction.mp4
12.32 MB
4. Bypassing Security/4. Attack Surface Reduction.vtt
6.26 KB
4. Bypassing Security/5. Anti-malware Scan Interface.mp4
11.86 MB
4. Bypassing Security/5. Anti-malware Scan Interface.vtt
8.24 KB
4. Bypassing Security/6. PowerShell Logging.mp4
10.23 MB
4. Bypassing Security/6. PowerShell Logging.vtt
4.53 KB
4. Bypassing Security/7. Office Trusted Locations.mp4
10.95 MB
4. Bypassing Security/7. Office Trusted Locations.vtt
4.63 KB
4. Bypassing Security/8. Summary.mp4
1.02 MB
4. Bypassing Security/8. Summary.vtt
1019 B
5. Remote Exploitation/1. Introduction to Remote Exploitation.mp4
1.83 MB
5. Remote Exploitation/1. Introduction to Remote Exploitation.vtt
1.81 KB
5. Remote Exploitation/2. WinRM.mp4
5.34 MB
5. Remote Exploitation/2. WinRM.vtt
5.81 KB
5. Remote Exploitation/3. SMB and RPC.mp4
6.36 MB
5. Remote Exploitation/3. SMB and RPC.vtt
4.42 KB
5. Remote Exploitation/4. RDP.mp4
4.22 MB
5. Remote Exploitation/4. RDP.vtt
3.1 KB
5. Remote Exploitation/5. WMI.mp4
5.5 MB
5. Remote Exploitation/5. WMI.vtt
4.31 KB
5. Remote Exploitation/6. SSH.mp4
4.56 MB
5. Remote Exploitation/6. SSH.vtt
3.6 KB
5. Remote Exploitation/7. Getting a Reverse Shell on a Remote Target.mp4
1.61 MB
5. Remote Exploitation/7. Getting a Reverse Shell on a Remote Target.vtt
1.67 KB
6. Course Conclusion/1. Course Conclusion.mp4
1.54 MB
6. Course Conclusion/1. Course Conclusion.vtt
1.29 KB
6. Course Conclusion/2. Course Recap.mp4
2.27 MB
6. Course Conclusion/2. Course Recap.vtt
2.35 KB

免责声明

本网站仅提供DHT网络磁力资源索引服务,不存储任何资源文件。所有资源均来自DHT网络,本站无法控制其内容。请遵守当地法律法规,合理使用网络资源。如涉及版权问题,请联系 lulutang@protonmail.com。