[Udemy] Этический взлом с Go (2020)
大小
3.4 GB
文件数
235
Info Hash:
9B5187CF0330C73FDBBB8D96DAF5A9C30BCE3CF7
收录时间
2025-12-16 14:41:16
更新时间
2025-12-26 15:13:22
文件列表 (235)
18. Protection - How to protect yourself when online/1. Protection.mp4
137.21 MB
1. Introduction to course/1. Welcome to this course.srt
10.52 KB
1. Introduction to course/2. Note announcement.mp4
824.14 KB
1. Introduction to course/2. Note announcement.srt
496 B
1. Introduction to course/3. Introduction to Networking.mp4
38.29 MB
1. Introduction to course/3. Introduction to Networking.srt
13.92 KB
2. What is Hacking/1. Hacking Introduction.mp4
42.67 MB
2. What is Hacking/1. Hacking Introduction.srt
15.91 KB
3. Installation/1. Tools required.mp4
28.42 MB
3. Installation/1. Tools required.srt
5.24 KB
3. Installation/1.1 kali linux.html
143 B
3. Installation/1.1 Windows 10.html
134 B
3. Installation/1.2 kali linux.html
143 B
3. Installation/1.2 Windows 10.html
134 B
3. Installation/2. Installing go in windows.mp4
10.97 MB
3. Installation/2. Installing go in windows.srt
2.05 KB
3. Installation/3. IDE to use.mp4
23.68 MB
3. Installation/3. IDE to use.srt
3.69 KB
3. Installation/4. Linux Installation.mp4
27.58 MB
3. Installation/4. Linux Installation.srt
5.9 KB
3. Installation/5. Setting up golang.mp4
12.85 MB
3. Installation/5. Setting up golang.srt
4.29 KB
4. Executing System Commands/1. How to execute commands.mp4
39.98 MB
4. Executing System Commands/1. How to execute commands.srt
11.83 KB
4. Executing System Commands/2. Refactoring code.mp4
19.75 MB
4. Executing System Commands/2. Refactoring code.srt
4.75 KB
5. Changing MAC/1. Running ifconfig command on PC.mp4
35.88 MB
5. Changing MAC/1. Running ifconfig command on PC.srt
7.83 KB
5. Changing MAC/2. Changing MAC using ifconfig.mp4
7.37 MB
5. Changing MAC/2. Changing MAC using ifconfig.srt
2.49 KB
5. Changing MAC/3. Creating a program to automatically change MAC.mp4
20.46 MB
5. Changing MAC/3. Creating a program to automatically change MAC.srt
3.68 KB
5. Changing MAC/4. Creating executable and parsing flags.mp4
51.29 MB
5. Changing MAC/4. Creating executable and parsing flags.srt
9.07 KB
6. Creating Network Scanner/1. Creating a TCP scanner basic.mp4
28.76 MB
6. Creating Network Scanner/1. Creating a TCP scanner basic.srt
7.12 KB
6. Creating Network Scanner/2. Scanning Multiple ports.mp4
28.11 MB
6. Creating Network Scanner/2. Scanning Multiple ports.srt
4.51 KB
6. Creating Network Scanner/3. Scanning Multiple ports continued.mp4
7.98 MB
6. Creating Network Scanner/3. Scanning Multiple ports continued.srt
1.21 KB
6. Creating Network Scanner/4. TCP scanner Concurrent.mp4
41.19 MB
6. Creating Network Scanner/4. TCP scanner Concurrent.srt
7.22 KB
6. Creating Network Scanner/5. TCP scanner Concurrent continued.mp4
16.3 MB
6. Creating Network Scanner/6. Network Mapper Introduction - NMAP.mp4
83.51 MB
6. Creating Network Scanner/6. Network Mapper Introduction - NMAP.srt
12.34 KB
6. Creating Network Scanner/7. Nmap in golang.mp4
100.97 MB
6. Creating Network Scanner/7. Nmap in golang.srt
14.14 KB
6. Creating Network Scanner/8. Creating an nmap program in golang.mp4
28.65 MB
6. Creating Network Scanner/8. Creating an nmap program in golang.srt
3.89 KB
7. Source Code/1. Source code.html
257 B
8. Man in the Middle Attack - MITM with ARP/1. Address Resolution Protocol - ARP.mp4
120.57 MB
8. Man in the Middle Attack - MITM with ARP/1. Address Resolution Protocol - ARP.srt
7.87 KB
8. Man in the Middle Attack - MITM with ARP/2. ARP spoofing.mp4
87.39 MB
8. Man in the Middle Attack - MITM with ARP/2. ARP spoofing.srt
5.5 KB
8. Man in the Middle Attack - MITM with ARP/3. Installing ARP spoof Program.mp4
8.64 MB
8. Man in the Middle Attack - MITM with ARP/3. Installing ARP spoof Program.srt
2.21 KB
8. Man in the Middle Attack - MITM with ARP/4. Enabling IP packet forwarding.mp4
19.19 MB
8. Man in the Middle Attack - MITM with ARP/4. Enabling IP packet forwarding.srt
2.55 KB
8. Man in the Middle Attack - MITM with ARP/5. Performing MITM attack.mp4
27.58 MB
8. Man in the Middle Attack - MITM with ARP/5. Performing MITM attack.srt
5.79 KB
8. Man in the Middle Attack - MITM with ARP/6. Capturing Intercepted Packets.mp4
41.47 MB
8. Man in the Middle Attack - MITM with ARP/6. Capturing Intercepted Packets.srt
5.74 KB
9. Intercepting Packets/1. Installing gopacket package in golang.mp4
8.66 MB
9. Intercepting Packets/1. Installing gopacket package in golang.srt
2.01 KB
9. Intercepting Packets/2. Finding devices.mp4
28.67 MB
9. Intercepting Packets/2. Finding devices.srt
6.04 KB
9. Intercepting Packets/3. searching for devices over a machine.mp4
7.03 MB
9. Intercepting Packets/3. searching for devices over a machine.srt
1.54 KB
9. Intercepting Packets/4. Capturing Packets.mp4
20.19 MB
9. Intercepting Packets/4. Capturing Packets.srt
3.48 KB
9. Intercepting Packets/5. intercepting live traffic.mp4
30.78 MB
9. Intercepting Packets/5. intercepting live traffic.srt
6.33 KB
9. Intercepting Packets/6. Intercepting traffic from source.mp4
34.35 MB
9. Intercepting Packets/6. Intercepting traffic from source.srt
5.29 KB
9. Intercepting Packets/7. Spoofed packets.mp4
28.25 MB
9. Intercepting Packets/7. Spoofed packets.srt
2.83 KB
9. Intercepting Packets/8. Stealing Credentials.mp4
50 MB
9. Intercepting Packets/8. Stealing Credentials.srt
8.77 KB
9. Intercepting Packets/9. Stealing Logins over HTTP.mp4
17.5 MB
9. Intercepting Packets/9. Stealing Logins over HTTP.srt
2.59 KB
10. Malware - Creating your own Malware Backdoor RAT/1. Introduction to malware.mp4
115.71 MB
10. Malware - Creating your own Malware Backdoor RAT/1. Introduction to malware.srt
8.2 KB
10. Malware - Creating your own Malware Backdoor RAT/2. Creating Hacker Server.mp4
50.79 MB
10. Malware - Creating your own Malware Backdoor RAT/2. Creating Hacker Server.srt
8.12 KB
10. Malware - Creating your own Malware Backdoor RAT/3. Writing Victim Program.mp4
34.87 MB
10. Malware - Creating your own Malware Backdoor RAT/3. Writing Victim Program.srt
3.65 KB
10. Malware - Creating your own Malware Backdoor RAT/4. Running Server and Victim Programs.mp4
20.29 MB
10. Malware - Creating your own Malware Backdoor RAT/4. Running Server and Victim Programs.srt
3.11 KB
10. Malware - Creating your own Malware Backdoor RAT/5. Clean up server program.mp4
56.48 MB
10. Malware - Creating your own Malware Backdoor RAT/5. Clean up server program.srt
6.49 KB
10. Malware - Creating your own Malware Backdoor RAT/6. Clean up victim program.mp4
36.28 MB
10. Malware - Creating your own Malware Backdoor RAT/6. Clean up victim program.srt
4.54 KB
10. Malware - Creating your own Malware Backdoor RAT/7. Sending Data from server to victim.mp4
32.52 MB
10. Malware - Creating your own Malware Backdoor RAT/7. Sending Data from server to victim.srt
4.23 KB
10. Malware - Creating your own Malware Backdoor RAT/8. Receiving data from hacker server.mp4
45.59 MB
10. Malware - Creating your own Malware Backdoor RAT/8. Receiving data from hacker server.srt
9.37 KB
10. Malware - Creating your own Malware Backdoor RAT/9. Sending gob structs to victim.mp4
65.61 MB
10. Malware - Creating your own Malware Backdoor RAT/9. Sending gob structs to victim.srt
9.42 KB
10. Malware - Creating your own Malware Backdoor RAT/10. Receiving gob structs at victim machine.mp4
16.87 MB
10. Malware - Creating your own Malware Backdoor RAT/10. Receiving gob structs at victim machine.srt
2.76 KB
10. Malware - Creating your own Malware Backdoor RAT/11. Running the program to send and receive gobs.mp4
12.41 MB
10. Malware - Creating your own Malware Backdoor RAT/11. Running the program to send and receive gobs.srt
1.9 KB
10. Malware - Creating your own Malware Backdoor RAT/12. Executing command server side.mp4
74.01 MB
10. Malware - Creating your own Malware Backdoor RAT/12. Executing command server side.srt
12.5 KB
10. Malware - Creating your own Malware Backdoor RAT/13. Exit condition.mp4
9.85 MB
10. Malware - Creating your own Malware Backdoor RAT/13. Exit condition.srt
1.37 KB
10. Malware - Creating your own Malware Backdoor RAT/14. Victim Side main function.mp4
43.28 MB
10. Malware - Creating your own Malware Backdoor RAT/14. Victim Side main function.srt
6.59 KB
10. Malware - Creating your own Malware Backdoor RAT/15. Server logic command execution.mp4
55.75 MB
10. Malware - Creating your own Malware Backdoor RAT/15. Server logic command execution.srt
8.87 KB
10. Malware - Creating your own Malware Backdoor RAT/16. Victim Logic command execution.mp4
43.81 MB
10. Malware - Creating your own Malware Backdoor RAT/16. Victim Logic command execution.srt
6.87 KB
10. Malware - Creating your own Malware Backdoor RAT/17. Victim Logic command execution Part 2.mp4
38.47 MB
10. Malware - Creating your own Malware Backdoor RAT/17. Victim Logic command execution Part 2.srt
5.64 KB
10. Malware - Creating your own Malware Backdoor RAT/18. Minor Error.mp4
3.12 MB
10. Malware - Creating your own Malware Backdoor RAT/18. Minor Error.srt
440 B
10. Malware - Creating your own Malware Backdoor RAT/19. Executing Commands Complete program.mp4
28.3 MB
10. Malware - Creating your own Malware Backdoor RAT/19. Executing Commands Complete program.srt
4.32 KB
11. Malware - File System Navigation/1. Introduction.mp4
4.7 MB
11. Malware - File System Navigation/1. Introduction.srt
839 B
11. Malware - File System Navigation/2. setting up victim machine's main program.mp4
16.16 MB
11. Malware - File System Navigation/2. setting up victim machine's main program.srt
2.3 KB
11. Malware - File System Navigation/3. Sending initial current directory to Hacker.mp4
16.12 MB
11. Malware - File System Navigation/3. Sending initial current directory to Hacker.srt
2.73 KB
11. Malware - File System Navigation/4. Receiving initial pwd in server.mp4
29.61 MB
11. Malware - File System Navigation/4. Receiving initial pwd in server.srt
4.98 KB
11. Malware - File System Navigation/5. Getting user input.mp4
18.61 MB
11. Malware - File System Navigation/5. Getting user input.srt
2.83 KB
11. Malware - File System Navigation/6. Reading User Command.mp4
49.04 MB
11. Malware - File System Navigation/6. Reading User Command.srt
7.54 KB
11. Malware - File System Navigation/7. Getting Back results.mp4
22.47 MB
11. Malware - File System Navigation/7. Getting Back results.srt
3.08 KB
11. Malware - File System Navigation/8. Loop Navigation on server side.mp4
18.4 MB
11. Malware - File System Navigation/8. Loop Navigation on server side.srt
2.9 KB
11. Malware - File System Navigation/9. Exit Condition on server.mp4
11.19 MB
11. Malware - File System Navigation/9. Exit Condition on server.srt
1.82 KB
11. Malware - File System Navigation/10. Loop navigation on victim side.mp4
15.08 MB
11. Malware - File System Navigation/10. Loop navigation on victim side.srt
1.95 KB
11. Malware - File System Navigation/11. Running the program.mp4
17.41 MB
11. Malware - File System Navigation/11. Running the program.srt
2.79 KB
12. Malware - Uploading Viruses to victim/1. Introduction how to transfer files.mp4
50.72 MB
12. Malware - Uploading Viruses to victim/1. Introduction how to transfer files.srt
3.52 KB
12. Malware - Uploading Viruses to victim/2. Setting main function.mp4
24.91 MB
12. Malware - Uploading Viruses to victim/2. Setting main function.srt
4.08 KB
12. Malware - Uploading Viruses to victim/3. Check File's existence.mp4
15.12 MB
12. Malware - Uploading Viruses to victim/3. Check File's existence.srt
2.21 KB
12. Malware - Uploading Viruses to victim/4. Reading file contents.mp4
37.85 MB
12. Malware - Uploading Viruses to victim/4. Reading file contents.srt
4.48 KB
12. Malware - Uploading Viruses to victim/5. Creating buffer.mp4
28.89 MB
12. Malware - Uploading Viruses to victim/5. Creating buffer.srt
2.42 KB
12. Malware - Uploading Viruses to victim/6. Sending File to victim machine.mp4
35.85 MB
12. Malware - Uploading Viruses to victim/6. Sending File to victim machine.srt
4.07 KB
12. Malware - Uploading Viruses to victim/7. Setting up main function in victim.mp4
12.54 MB
12. Malware - Uploading Viruses to victim/7. Setting up main function in victim.srt
2.17 KB
12. Malware - Uploading Viruses to victim/8. Saving file on victim's disk.mp4
44.25 MB
12. Malware - Uploading Viruses to victim/8. Saving file on victim's disk.srt
5.88 KB
12. Malware - Uploading Viruses to victim/9. Getting back write status.mp4
12.67 MB
12. Malware - Uploading Viruses to victim/9. Getting back write status.srt
1.75 KB
12. Malware - Uploading Viruses to victim/10. Uploading a file.mp4
11.92 MB
12. Malware - Uploading Viruses to victim/10. Uploading a file.srt
2.01 KB
13. Malware - Downloading Files from Victim/1. Setting up main function in victim machine.mp4
12.69 MB
13. Malware - Downloading Files from Victim/1. Setting up main function in victim machine.srt
1.14 KB
13. Malware - Downloading Files from Victim/2. Getting the list of files in current directory.mp4
29.82 MB
13. Malware - Downloading Files from Victim/2. Getting the list of files in current directory.srt
6.54 KB
13. Malware - Downloading Files from Victim/3. Sending list to hacker.mp4
15.56 MB
13. Malware - Downloading Files from Victim/3. Sending list to hacker.srt
2.31 KB
13. Malware - Downloading Files from Victim/4. Receiving list at hacker.mp4
16.65 MB
13. Malware - Downloading Files from Victim/4. Receiving list at hacker.srt
2.77 KB
13. Malware - Downloading Files from Victim/5. Getting user input.mp4
20.26 MB
13. Malware - Downloading Files from Victim/5. Getting user input.srt
3.52 KB
13. Malware - Downloading Files from Victim/6. Converting user input to integer.mp4
6.56 MB
13. Malware - Downloading Files from Victim/6. Converting user input to integer.srt
1.06 KB
13. Malware - Downloading Files from Victim/7. Sending file names to victim.mp4
11.19 MB
13. Malware - Downloading Files from Victim/7. Sending file names to victim.srt
1.63 KB
13. Malware - Downloading Files from Victim/8. Reading file content from victim.mp4
35.86 MB
13. Malware - Downloading Files from Victim/8. Reading file content from victim.srt
4.05 KB
13. Malware - Downloading Files from Victim/9. Writing File content hacker.mp4
19.72 MB
13. Malware - Downloading Files from Victim/9. Writing File content hacker.srt
2.68 KB
13. Malware - Downloading Files from Victim/10. Downloading the file to hacker machine.mp4
15.92 MB
13. Malware - Downloading Files from Victim/10. Downloading the file to hacker machine.srt
2.59 KB
14. Malware - Stealing Folders from victim/1. Downloading folder from victim.mp4
21.01 MB
14. Malware - Stealing Folders from victim/1. Downloading folder from victim.srt
2.43 KB
14. Malware - Stealing Folders from victim/2. Setting main function.mp4
17.1 MB
14. Malware - Stealing Folders from victim/2. Setting main function.srt
2.37 KB
14. Malware - Stealing Folders from victim/3. getting folders.mp4
22.48 MB
14. Malware - Stealing Folders from victim/3. getting folders.srt
3.74 KB
14. Malware - Stealing Folders from victim/4. sending folder list to hacker.mp4
6.95 MB
14. Malware - Stealing Folders from victim/4. sending folder list to hacker.srt
1.32 KB
14. Malware - Stealing Folders from victim/5. Getting folder list and selecting folder.mp4
22.01 MB
14. Malware - Stealing Folders from victim/5. Getting folder list and selecting folder.srt
2.34 KB
14. Malware - Stealing Folders from victim/6. getting folder name on victim.mp4
9.86 MB
14. Malware - Stealing Folders from victim/6. getting folder name on victim.srt
1.58 KB
14. Malware - Stealing Folders from victim/7. Creating Zip file.mp4
33.97 MB
14. Malware - Stealing Folders from victim/7. Creating Zip file.srt
5.59 KB
14. Malware - Stealing Folders from victim/8. Zip file continued.mp4
47.78 MB
14. Malware - Stealing Folders from victim/8. Zip file continued.srt
7.25 KB
14. Malware - Stealing Folders from victim/9. Connection.mp4
2.85 MB
14. Malware - Stealing Folders from victim/9. Connection.srt
620 B
14. Malware - Stealing Folders from victim/10. Running Program.mp4
28.14 MB
14. Malware - Stealing Folders from victim/10. Running Program.srt
4.69 KB
15. Trojan - packaging a malware/1. Introduction to trojan.mp4
95.18 MB
15. Trojan - packaging a malware/1. Introduction to trojan.srt
6.44 KB
15. Trojan - packaging a malware/2. Packaging.mp4
19.31 MB
15. Trojan - packaging a malware/2. Packaging.srt
3.8 KB
15. Trojan - packaging a malware/3. Running executables.mp4
19.22 MB
15. Trojan - packaging a malware/3. Running executables.srt
4.07 KB
15. Trojan - packaging a malware/4. Running our malware.mp4
14.22 MB
15. Trojan - packaging a malware/4. Running our malware.srt
2.65 KB
15. Trojan - packaging a malware/5. Hiding console on victim.mp4
22.05 MB
15. Trojan - packaging a malware/5. Hiding console on victim.srt
4.39 KB
15. Trojan - packaging a malware/6. Batch file.mp4
39.46 MB
15. Trojan - packaging a malware/6. Batch file.srt
5.53 KB
15. Trojan - packaging a malware/6.1 batch file.txt
210 B
15. Trojan - packaging a malware/7. Batch to exe.mp4
16.15 MB
15. Trojan - packaging a malware/7. Batch to exe.srt
2.77 KB
15. Trojan - packaging a malware/8. Adding icon to executable.mp4
35.99 MB
15. Trojan - packaging a malware/8. Adding icon to executable.srt
4.58 KB
15. Trojan - packaging a malware/9. Running exe.mp4
10.01 MB
15. Trojan - packaging a malware/9. Running exe.srt
1.58 KB
15. Trojan - packaging a malware/10. How to perform attack over public internet.mp4
15.52 MB
15. Trojan - packaging a malware/10. How to perform attack over public internet.srt
3.31 KB
16. Keylogger/1. Creating a keylogger using go-keylogger package.mp4
54.03 MB
16. Keylogger/1. Creating a keylogger using go-keylogger package.srt
10.16 KB
16. Keylogger/2. Starting keylogger.mp4
6.59 MB
16. Keylogger/2. Starting keylogger.srt
1.22 KB
17. Stegnography/1. Stegnography Introduction.mp4
8.8 MB
17. Stegnography/1. Stegnography Introduction.srt
2.55 KB
17. Stegnography/2. Installing Package.mp4
9.85 MB
17. Stegnography/2. Installing Package.srt
1.63 KB
17. Stegnography/3. Encoding Data.mp4
33.96 MB
17. Stegnography/3. Encoding Data.srt
5.35 KB
17. Stegnography/4. Decoding Data.mp4
11.52 MB
17. Stegnography/4. Decoding Data.srt
2.43 KB
1. Introduction to course/1. Welcome to this course.mp4
28.84 MB
18. Protection - How to protect yourself when online/1. Protection.srt
9.18 KB