Info Hash:550EEF147C7341C25C4A348CF23FB9AB095E2CF0
收录时间2026-03-01 03:57:28
更新时间2026-03-01 03:57:28
文件列表 (116)
Get Bonus Downloads Here.url
180 B
~Get Your Files Here !/1 - Course 1 Fedora Linux from Scratch/1. Introduction.mp4
9.89 MB
~Get Your Files Here !/1 - Course 1 Fedora Linux from Scratch/10. How to Change File Permissions in Linux.mp4
13.79 MB
~Get Your Files Here !/1 - Course 1 Fedora Linux from Scratch/11. How to easily Encrypt Decrypt a File with Gpg.mp4
9.2 MB
~Get Your Files Here !/1 - Course 1 Fedora Linux from Scratch/2. Introduction to Linux.mp4
11.18 MB
~Get Your Files Here !/1 - Course 1 Fedora Linux from Scratch/3. Setting Up Fedora in Virtualbox.mp4
45.84 MB
~Get Your Files Here !/1 - Course 1 Fedora Linux from Scratch/4. Basic Linux Commands Part 1.mp4
49.05 MB
~Get Your Files Here !/1 - Course 1 Fedora Linux from Scratch/5. Basic Linux Commands Part 2.mp4
14.13 MB
~Get Your Files Here !/1 - Course 1 Fedora Linux from Scratch/6. How to add new user in Linux.mp4
16.49 MB
~Get Your Files Here !/1 - Course 1 Fedora Linux from Scratch/7. Using the DNF Package Manager.mp4
16.24 MB
~Get Your Files Here !/1 - Course 1 Fedora Linux from Scratch/8. Useful Networking Commands.mp4
19.83 MB
~Get Your Files Here !/1 - Course 1 Fedora Linux from Scratch/9. Useful Networking Tools.mp4
35.83 MB
~Get Your Files Here !/10 - Evil Twin Attacks/63. How to Sniff Login Credentials from the Captive Portal.mp4
22.38 MB
~Get Your Files Here !/10 - Evil Twin Attacks/64. Capture the Login Information using a PhP Script.mp4
24.66 MB
~Get Your Files Here !/10 - Evil Twin Attacks/65. Setting up an Access Point with a Fake Captive Portal.mp4
50.43 MB
~Get Your Files Here !/10 - Evil Twin Attacks/66. Stealing Credentials with the Social Engineering Toolkit.mp4
32.48 MB
~Get Your Files Here !/10 - Evil Twin Attacks/67. How to use BeEF with the Captive Portal.mp4
37.31 MB
~Get Your Files Here !/10 - Evil Twin Attacks/68. How to Set up an Access Point with Internet Access.mp4
32.55 MB
~Get Your Files Here !/10 - Evil Twin Attacks/capture.txt
0 B
~Get Your Files Here !/10 - Evil Twin Attacks/post.php
160 B
~Get Your Files Here !/11 - WiFi Hacking Tools/69. How to use Wireshark Filters to Inspect Packets.mp4
33.2 MB
~Get Your Files Here !/11 - WiFi Hacking Tools/70. Evil Twin Attack with Airgeddon.mp4
48.25 MB
~Get Your Files Here !/11 - WiFi Hacking Tools/71. Customizing the Captive Portal Page.mp4
18.52 MB
~Get Your Files Here !/11 - WiFi Hacking Tools/72. Stealing Login Credentials from a WPA Enterprise Network.mp4
41.8 MB
~Get Your Files Here !/11 - WiFi Hacking Tools/73. Stealing Social Media Accounts using a Captive Portal.mp4
61.57 MB
~Get Your Files Here !/11 - WiFi Hacking Tools/74. How to use Dns Spoofing and BeEF using WiFi Pumpkin.mp4
35 MB
~Get Your Files Here !/12 - Security/75. Detect WiFi Attacks using Wireshark.mp4
28.39 MB
~Get Your Files Here !/12 - Security/76. How to Detect Evil Twin Attacks using EvilAP Defender.mp4
20.38 MB
~Get Your Files Here !/12 - Security/76. Protect from Evil Twin.pdf
324.62 KB
~Get Your Files Here !/12 - Security/77. Protect your Home Network using Guest WiFi.mp4
21.63 MB
~Get Your Files Here !/13 - Course 5 Social Engineering/78. Course Introduction.mp4
23.47 MB
~Get Your Files Here !/13 - Course 5 Social Engineering/79. Social Engineering Defined.mp4
12.85 MB
~Get Your Files Here !/14 - Evil Files/80. Create a Malicious File with MSFvenom.mp4
48.61 MB
~Get Your Files Here !/14 - Evil Files/81. How to Create an Undetectable Payload with FatRat.mp4
61.68 MB
~Get Your Files Here !/14 - Evil Files/82. Inject Payload in exe file using Shellter.mp4
32.48 MB
~Get Your Files Here !/14 - Evil Files/83. Make A Malicious Microsoft Word Document.mp4
25.91 MB
~Get Your Files Here !/15 - Exploitation/84. Meterpreter Basics.mp4
25.16 MB
~Get Your Files Here !/15 - Exploitation/85. Extract Saved Passwords with LaZagne.mp4
11.88 MB
~Get Your Files Here !/15 - Exploitation/86. Capture VNC Session.mp4
9.57 MB
~Get Your Files Here !/15 - Exploitation/87. How to view saved WiFi passwords.mp4
22.3 MB
~Get Your Files Here !/15 - Exploitation/88. How to perform a Man in the middle (MITM) Attack.mp4
25.68 MB
~Get Your Files Here !/16 - Social Engineering Tools/89. How To Create a Fake Login Page Using Setoolkit.mp4
26.9 MB
~Get Your Files Here !/16 - Social Engineering Tools/90. Blackeye Phishing Tool.mp4
18.8 MB
~Get Your Files Here !/17 - Browser Exploitation/91. How to Exploit Web Browsers with BeEF.mp4
38.27 MB
~Get Your Files Here !/17 - Browser Exploitation/92. Hook Web Browsers with MITMf and BeEF.mp4
12.78 MB
~Get Your Files Here !/17 - Browser Exploitation/93. Gain Full Control over the Target Machine using BeEF.mp4
27.51 MB
~Get Your Files Here !/18 - Attacking Outside The Local Network/94. Hacking Over the Internet Without Port Forwarding.mp4
31.93 MB
~Get Your Files Here !/18 - Attacking Outside The Local Network/95. How To Use Setoolkit Outside The Local Network.mp4
23.42 MB
~Get Your Files Here !/18 - Attacking Outside The Local Network/96. BeEF Attack Outside the Local Network.mp4
24.22 MB
~Get Your Files Here !/18 - Attacking Outside The Local Network/97. Phishing Email Attack.mp4
29.33 MB
~Get Your Files Here !/19 - Security/100. How to Avoid Phishing Attacks.mp4
16.58 MB
~Get Your Files Here !/19 - Security/98. How to Detect Meterpreter in Your PC.mp4
16.91 MB
~Get Your Files Here !/19 - Security/99. Protect Yourself from Browser Exploits.mp4
17.44 MB
~Get Your Files Here !/2 - Advanced/12. Linux Commands.pdf
338.52 KB
~Get Your Files Here !/2 - Advanced/12. Middle Level Linux Commands.mp4
17.62 MB
~Get Your Files Here !/2 - Advanced/13. Compress and Extract Files in Linux.mp4
12.08 MB
~Get Your Files Here !/2 - Advanced/14. Partitioning with Gparted.mp4
15.72 MB
~Get Your Files Here !/2 - Advanced/15. Understand Linux Shell Scripting.mp4
15.34 MB
~Get Your Files Here !/2 - Advanced/16. How to use Systemctl to Manage Services.mp4
18.22 MB
~Get Your Files Here !/2 - Advanced/17. Automating Tasks with Crontab.mp4
29.42 MB
~Get Your Files Here !/2 - Advanced/18. Set Up Your Own Web Server.mp4
28.56 MB
~Get Your Files Here !/2 - Advanced/19. How to Install WordPress on your Web Server.mp4
29.35 MB
~Get Your Files Here !/2 - Advanced/20. How to Set up an FTP Server.mp4
28.52 MB
~Get Your Files Here !/3 - Course 2 Web Hacking for Beginners/21. Introduction to the Course.mp4
36.5 MB
~Get Your Files Here !/3 - Course 2 Web Hacking for Beginners/22. How the Web Works.mp4
18.52 MB
~Get Your Files Here !/3 - Course 2 Web Hacking for Beginners/23. How to capture HTTP packets with Wireshark.mp4
48.66 MB
~Get Your Files Here !/3 - Course 2 Web Hacking for Beginners/24. Set up your Web Testing Lab.mp4
37.14 MB
~Get Your Files Here !/3 - Course 2 Web Hacking for Beginners/25. How to use Vega Web Vulnerability Scanner.mp4
35.1 MB
~Get Your Files Here !/4 - SQL Injection/26. SQL Introduction and Examples.mp4
58.59 MB
~Get Your Files Here !/4 - SQL Injection/27. Understanding How SQL Injection Attacks Work.mp4
35.17 MB
~Get Your Files Here !/4 - SQL Injection/28. How to Use SQLMAP.mp4
61.12 MB
~Get Your Files Here !/4 - SQL Injection/29. Preventing SQL Injection.mp4
25.22 MB
~Get Your Files Here !/5 - WordPress Exploitation/30. Introduction to WPScan.mp4
24.57 MB
~Get Your Files Here !/5 - WordPress Exploitation/31. How to Hack a WordPress Website with WPScan.mp4
65.56 MB
~Get Your Files Here !/5 - WordPress Exploitation/32. How to Secure Your WordPress Website.mp4
52.27 MB
~Get Your Files Here !/6 - Cross Site Scripting (XSS)/33. Understand Cross Site Scripting.mp4
25.44 MB
~Get Your Files Here !/6 - Cross Site Scripting (XSS)/34. Stored Cross Site Scripting.mp4
36.28 MB
~Get Your Files Here !/6 - Cross Site Scripting (XSS)/35. Preventing Cross Site Scripting Attacks.mp4
23.87 MB
~Get Your Files Here !/7 - Browser Exploitation/36. How to Hack Web Browsers Using BeEF Framework.mp4
47.86 MB
~Get Your Files Here !/7 - Browser Exploitation/37. Gaining Full Control Using BeEF.mp4
56.76 MB
~Get Your Files Here !/7 - Browser Exploitation/38. How to Defeat BeEF using Vegan Extension.mp4
22.23 MB
~Get Your Files Here !/7 - Browser Exploitation/39. How to Use Weevely PHP Backdoor.mp4
32.21 MB
~Get Your Files Here !/7 - Browser Exploitation/40. CSRF example.pdf
325.38 KB
~Get Your Files Here !/7 - Browser Exploitation/40. How to perform CSRF Attack.mp4
31.51 MB
~Get Your Files Here !/7 - Browser Exploitation/41. Phishing Attack.mp4
34.44 MB
~Get Your Files Here !/7 - Browser Exploitation/41. Phishing.pdf
333.63 KB
~Get Your Files Here !/8 - Course 3 WiFi Hacking for Beginners/42. Introduction.mp4
8.49 MB
~Get Your Files Here !/8 - Course 3 WiFi Hacking for Beginners/43. Introduction to Wireless Networks.mp4
32.33 MB
~Get Your Files Here !/8 - Course 3 WiFi Hacking for Beginners/44. How to Install Kali Linux in VMware Player.mp4
61.4 MB
~Get Your Files Here !/8 - Course 3 WiFi Hacking for Beginners/45. Packet Injection and Monitor Mode.mp4
29.7 MB
~Get Your Files Here !/8 - Course 3 WiFi Hacking for Beginners/46. How to Find Hidden Wireless Networks.mp4
36.32 MB
~Get Your Files Here !/8 - Course 3 WiFi Hacking for Beginners/47. How to Spoof your Mac Address.mp4
30.2 MB
~Get Your Files Here !/8 - Course 3 WiFi Hacking for Beginners/48. How to use Wireshark.mp4
52.4 MB
~Get Your Files Here !/8 - Course 3 WiFi Hacking for Beginners/49. How to Perform a Denial of Service Attack.mp4
57.42 MB
~Get Your Files Here !/8 - Course 3 WiFi Hacking for Beginners/50. Break WiFi Networks with WEP encryption.mp4
55.54 MB
~Get Your Files Here !/8 - Course 3 WiFi Hacking for Beginners/51. Break WiFi Networks with WPA WPA2 encryption.mp4
41.51 MB
~Get Your Files Here !/8 - Course 3 WiFi Hacking for Beginners/52. Create your own Wordlist using Crunch.mp4
39.46 MB
~Get Your Files Here !/8 - Course 3 WiFi Hacking for Beginners/53. Speeding up WPA2 Cracking.mp4
45.56 MB
~Get Your Files Here !/8 - Course 3 WiFi Hacking for Beginners/54. Break WiFi Networks using Pyrit.mp4
42.77 MB
~Get Your Files Here !/8 - Course 3 WiFi Hacking for Beginners/55. Break WiFi Networks with Reaver.mp4
38.88 MB
~Get Your Files Here !/8 - Course 3 WiFi Hacking for Beginners/56. Create an Evil Twin Access Point.mp4
53.9 MB
~Get Your Files Here !/8 - Course 3 WiFi Hacking for Beginners/56. Protect from Evil Twin.pdf
313.54 KB
~Get Your Files Here !/8 - Course 3 WiFi Hacking for Beginners/56. Tips to secure wifi network.pdf
329.63 KB
~Get Your Files Here !/9 - Course 4 WiFi Hacking using Evil Twin Attacks and Captive Portals/57. Course Introduction.mp4
30.6 MB
~Get Your Files Here !/9 - Course 4 WiFi Hacking using Evil Twin Attacks and Captive Portals/58. Intro to Evil Twin and Captive Portals.mp4
23.77 MB
~Get Your Files Here !/9 - Course 4 WiFi Hacking using Evil Twin Attacks and Captive Portals/59. Choosing the Wireless Adapter.mp4
33.56 MB
~Get Your Files Here !/9 - Course 4 WiFi Hacking using Evil Twin Attacks and Captive Portals/59. Wi Fi Card.pdf
329.76 KB
~Get Your Files Here !/9 - Course 4 WiFi Hacking using Evil Twin Attacks and Captive Portals/60. How to Sniff and Inject Packets into a Wireless Network.mp4
33.05 MB
~Get Your Files Here !/9 - Course 4 WiFi Hacking using Evil Twin Attacks and Captive Portals/61. How to Set up an Access Point.mp4
38.96 MB
~Get Your Files Here !/9 - Course 4 WiFi Hacking using Evil Twin Attacks and Captive Portals/62. Setting up a Captive Portal.mp4
32.49 MB
~Get Your Files Here !/9 - Course 4 WiFi Hacking using Evil Twin Attacks and Captive Portals/Basic-portal/css/style.css
2.98 KB
~Get Your Files Here !/9 - Course 4 WiFi Hacking using Evil Twin Attacks and Captive Portals/Basic-portal/index.html
3.41 KB
~Get Your Files Here !/9 - Course 4 WiFi Hacking using Evil Twin Attacks and Captive Portals/Basic-portal/wifi.png
20.48 KB
~Get Your Files Here !/9 - Course 4 WiFi Hacking using Evil Twin Attacks and Captive Portals/dnsmasq.conf
290 B
~Get Your Files Here !/9 - Course 4 WiFi Hacking using Evil Twin Attacks and Captive Portals/hostapd.conf