The RedTeam Blueprint - A Unique Guide To Ethical Hacking
大小
6.84 GB
文件数
747
Info Hash:
88F50A1A2658E73AA65DF95203B5628697985566
收录时间
2026-01-08 18:33:30
更新时间
2026-01-08 18:33:30
文件列表 (747)
19. Exploitation/11. SQL Injection _ SQLMap.mp4
133.65 MB
1. Welcome! Who Is This Guy!/1. Introduction.srt
2.29 KB
2. The 3 Teams/1. Module Overview - The 3 Teams.mp4
3.54 MB
2. The 3 Teams/1. Module Overview - The 3 Teams.srt
1.79 KB
2. The 3 Teams/1.1 The 3 Teams.pptx
91.53 KB
2. The 3 Teams/2. The Red Team.mp4
29.27 MB
2. The 3 Teams/2. The Red Team.srt
12.02 KB
2. The 3 Teams/2.1 The Red Team.pptx
97.41 KB
2. The 3 Teams/3. The Blue Team.mp4
18.1 MB
2. The 3 Teams/3. The Blue Team.srt
7.1 KB
2. The 3 Teams/3.1 The Blue Team.pptx
97.42 KB
2. The 3 Teams/4. The Purple Team.mp4
21.74 MB
2. The 3 Teams/4. The Purple Team.srt
9.52 KB
2. The 3 Teams/4.1 The Purple Team.pptx
96.95 KB
3. Penetration Testing Process/1. Module Overview - Penetration Testing Process.mp4
8.44 MB
3. Penetration Testing Process/1. Module Overview - Penetration Testing Process.srt
4.75 KB
3. Penetration Testing Process/1.1 Penetration Testing Process - Module Overview.pptx
100.7 KB
3. Penetration Testing Process/2. Penetration Testing Methodology.mp4
19.73 MB
3. Penetration Testing Process/2. Penetration Testing Methodology.srt
11.9 KB
3. Penetration Testing Process/2.1 Penetration Testing Methodology.pptx
106.42 KB
3. Penetration Testing Process/3. Metrics _ Why They Are Important.mp4
37.34 MB
3. Penetration Testing Process/3. Metrics _ Why They Are Important.srt
15.41 KB
3. Penetration Testing Process/3.1 Metrics.xlsx
36.7 KB
3. Penetration Testing Process/4. Routine Assessments Part 1 - What Are Routine Assessments.mp4
11.11 MB
3. Penetration Testing Process/4. Routine Assessments Part 1 - What Are Routine Assessments.srt
5.9 KB
3. Penetration Testing Process/4.1 What Are Routine Assessments.pptx
94.56 KB
3. Penetration Testing Process/5. Routine Assessments Part 2 - Yearly Assessments.mp4
16.27 MB
3. Penetration Testing Process/5. Routine Assessments Part 2 - Yearly Assessments.srt
7.44 KB
3. Penetration Testing Process/5.1 Yearly Assessments.pptx
96.17 KB
3. Penetration Testing Process/6. Routine Assessments Part 3 - Quarterly Assessments.mp4
25.72 MB
3. Penetration Testing Process/6. Routine Assessments Part 3 - Quarterly Assessments.srt
12.71 KB
3. Penetration Testing Process/6.1 Quarterly Assessments.pptx
109.07 KB
3. Penetration Testing Process/7. Routine Assessments Part 4- Monthly Assessments.mp4
11.01 MB
3. Penetration Testing Process/7. Routine Assessments Part 4- Monthly Assessments.srt
6.28 KB
3. Penetration Testing Process/7.1 Monthly Assessments.pptx
96.08 KB
3. Penetration Testing Process/8. Routine Assessments Part 5 - Constant Assessments.mp4
17.66 MB
3. Penetration Testing Process/8. Routine Assessments Part 5 - Constant Assessments.srt
12.02 KB
3. Penetration Testing Process/8.1 Constant Assessments.pptx
97.51 KB
3. Penetration Testing Process/9. Routine Assessments Part 6 - Building an Assessment Plan.mp4
31.23 MB
3. Penetration Testing Process/9. Routine Assessments Part 6 - Building an Assessment Plan.srt
9.91 KB
3. Penetration Testing Process/9.1 Assessment Template.xlsx
24.38 KB
3. Penetration Testing Process/10. Building _ Working with an Enterprise Budget.mp4
36.31 MB
3. Penetration Testing Process/10. Building _ Working with an Enterprise Budget.srt
17.14 KB
3. Penetration Testing Process/10.1 Budget Sample.xlsx
27.69 KB
3. Penetration Testing Process/10.2 Budget Template.xlsx
23.95 KB
3. Penetration Testing Process/11. Specialties!.mp4
11.72 MB
3. Penetration Testing Process/11. Specialties!.srt
6.11 KB
3. Penetration Testing Process/11.1 Specialties.pptx
98.36 KB
3. Penetration Testing Process/12. The CIA Triangle.mp4
9.58 MB
3. Penetration Testing Process/12. The CIA Triangle.srt
4.09 KB
3. Penetration Testing Process/12.1 CIA Triangle.pptx
98.61 KB
4. The Windows Operating System/1. Installing _ Using VirtualBox for Lab Virtualization.mp4
49.53 MB
4. The Windows Operating System/1. Installing _ Using VirtualBox for Lab Virtualization.srt
13.02 KB
4. The Windows Operating System/1.1 VirtualBox Download.html
102 B
4. The Windows Operating System/1.2 Windows Server 2016 ISO.html
132 B
4. The Windows Operating System/2. Windows at a Glance.mp4
104.39 MB
4. The Windows Operating System/2. Windows at a Glance.srt
29.02 KB
4. The Windows Operating System/2.1 Windows Registry.html
143 B
4. The Windows Operating System/3. The Windows File System.mp4
41.7 MB
4. The Windows Operating System/3. The Windows File System.srt
15.91 KB
4. The Windows Operating System/3.1 The Windows File System.pptx
101.79 KB
4. The Windows Operating System/3.2 NTFS Basics.html
92 B
4. The Windows Operating System/3.2 NTFS Cluster.html
119 B
4. The Windows Operating System/3.3 NTFS Cluster.html
119 B
4. The Windows Operating System/3.3 NTFS In More Detail.html
127 B
4. The Windows Operating System/3.4 Journaling File System.html
113 B
4. The Windows Operating System/3.4 NTFS In More Detail.html
127 B
4. The Windows Operating System/3.5 Journaling File System.html
113 B
4. The Windows Operating System/3.5 NTFS Basics.html
92 B
4. The Windows Operating System/4. Windows Logs.mp4
42.32 MB
4. The Windows Operating System/4. Windows Logs.srt
14.32 KB
4. The Windows Operating System/5. Windows Internals - UAC.mp4
31.14 MB
4. The Windows Operating System/5. Windows Internals - UAC.srt
11.32 KB
4. The Windows Operating System/5.1 UAC Microsoft Documents.html
182 B
4. The Windows Operating System/5.1 Windows UAC.pptx
164.01 KB
4. The Windows Operating System/5.2 UAC Microsoft Documents.html
182 B
4. The Windows Operating System/5.2 Windows UAC.pptx
164.01 KB
4. The Windows Operating System/6. Windows Internals - Permissions.mp4
62.41 MB
4. The Windows Operating System/6. Windows Internals - Permissions.srt
20.9 KB
4. The Windows Operating System/7. Windows Internals - Alternate Data Streams.mp4
32 MB
4. The Windows Operating System/7. Windows Internals - Alternate Data Streams.srt
9.74 KB
4. The Windows Operating System/7.1 File Streams.html
129 B
4. The Windows Operating System/8. Windows Internals - API Calls.mp4
53.14 MB
4. The Windows Operating System/8. Windows Internals - API Calls.srt
15.19 KB
4. The Windows Operating System/8.1 Dependency Walker.html
110 B
4. The Windows Operating System/8.2 API Calls.pptx
94.75 KB
4. The Windows Operating System/9. Windows Internals - The SID.mp4
18.2 MB
4. The Windows Operating System/9. Windows Internals - The SID.srt
8.38 KB
4. The Windows Operating System/9.1 SID.pptx
135.51 KB
4. The Windows Operating System/10. Windows Internals - Tokens.mp4
26.57 MB
4. The Windows Operating System/10. Windows Internals - Tokens.srt
10.2 KB
4. The Windows Operating System/10.1 Tokens.pptx
102 KB
4. The Windows Operating System/11. Windows Internals - Named Pipes.mp4
20.15 MB
4. The Windows Operating System/11. Windows Internals - Named Pipes.srt
7.43 KB
4. The Windows Operating System/11.1 Microsoft PipeList.html
113 B
4. The Windows Operating System/11.2 Windows Pipes.pptx
100.05 KB
4. The Windows Operating System/12. Windows Internals - PE Files _ DLLs.mp4
50.42 MB
4. The Windows Operating System/12. Windows Internals - PE Files _ DLLs.srt
21.15 KB
4. The Windows Operating System/12.1 PE Explorer.html
119 B
4. The Windows Operating System/12.1 PE Files and DLLs.pptx
118.26 KB
4. The Windows Operating System/12.2 PE Explorer.html
119 B
4. The Windows Operating System/12.2 PE Files and DLLs.pptx
118.26 KB
4. The Windows Operating System/13. Windows Command Line - Accessing the Command Line.mp4
22.59 MB
4. The Windows Operating System/13. Windows Command Line - Accessing the Command Line.srt
6.51 KB
4. The Windows Operating System/14. Windows Command Line - Navigation.mp4
32.12 MB
4. The Windows Operating System/14. Windows Command Line - Navigation.srt
9.33 KB
4. The Windows Operating System/15. Windows Command Line - Working with Files and Directories.mp4
34.65 MB
4. The Windows Operating System/15. Windows Command Line - Working with Files and Directories.srt
9.45 KB
4. The Windows Operating System/16. Windows Command Line - Working with Pipes.mp4
40.96 MB
4. The Windows Operating System/16. Windows Command Line - Working with Pipes.srt
11.42 KB
4. The Windows Operating System/17. Windows Command Line - Standard IOE.mp4
16.63 MB
4. The Windows Operating System/17. Windows Command Line - Standard IOE.srt
5.64 KB
4. The Windows Operating System/18. Windows Command Line - Managing Windows.mp4
41.09 MB
4. The Windows Operating System/18. Windows Command Line - Managing Windows.srt
16.95 KB
5. The Linux Operating System/1. Where is the GUI!.mp4
10.24 MB
5. The Linux Operating System/1. Where is the GUI!.srt
5.56 KB
5. The Linux Operating System/1.1 The GUI.pptx
95.46 KB
5. The Linux Operating System/1.2 Ubuntu ISO Updated.html
96 B
5. The Linux Operating System/2. The Linux File System.mp4
14.99 MB
5. The Linux Operating System/2. The Linux File System.srt
7.56 KB
5. The Linux Operating System/2.1 EXT4 Info.html
116 B
5. The Linux Operating System/2.2 The Linux File System.pptx
107.62 KB
5. The Linux Operating System/3. Linux Command Line - Navigation.mp4
17.05 MB
5. The Linux Operating System/3. Linux Command Line - Navigation.srt
5.66 KB
5. The Linux Operating System/4. Linux Command Line - Working with Files and Directories.mp4
38.82 MB
5. The Linux Operating System/4. Linux Command Line - Working with Files and Directories.srt
12.45 KB
5. The Linux Operating System/5. Linux Command Line - Standard IOE Recap.mp4
16.22 MB
5. The Linux Operating System/5. Linux Command Line - Standard IOE Recap.srt
5.41 KB
5. The Linux Operating System/6. Linux Command Line - Working with Data.mp4
56.47 MB
5. The Linux Operating System/6. Linux Command Line - Working with Data.srt
17.92 KB
5. The Linux Operating System/7. Linux Command Line - Working with File Permissions.mp4
26.63 MB
5. The Linux Operating System/7. Linux Command Line - Working with File Permissions.srt
13.45 KB
5. The Linux Operating System/7.1 Linux File Permissions.pptx
134.07 KB
5. The Linux Operating System/8. Linux Command Line - Man Pages.mp4
16.52 MB
5. The Linux Operating System/8. Linux Command Line - Man Pages.srt
4.9 KB
5. The Linux Operating System/9. Linux Command Line - Base64.mp4
16.16 MB
5. The Linux Operating System/9. Linux Command Line - Base64.srt
3.19 KB
5. The Linux Operating System/10. Linux Command Line - Hex.mp4
30.2 MB
5. The Linux Operating System/10. Linux Command Line - Hex.srt
7.45 KB
5. The Linux Operating System/11. Linux Command Line - Network Connections Recap.mp4
21.5 MB
5. The Linux Operating System/11. Linux Command Line - Network Connections Recap.srt
5.39 KB
5. The Linux Operating System/12. Linux Processes.mp4
54.14 MB
5. The Linux Operating System/12. Linux Processes.srt
16.73 KB
5. The Linux Operating System/12.1 Process Info.html
111 B
5. The Linux Operating System/12.2 Processes.pptx
117.11 KB
5. The Linux Operating System/13. What are INodes.mp4
19.27 MB
5. The Linux Operating System/13. What are INodes.srt
5.64 KB
5. The Linux Operating System/13.1 Inodes.pptx
99.53 KB
5. The Linux Operating System/14. Working with Open Files.mp4
33.1 MB
5. The Linux Operating System/14. Working with Open Files.srt
8.76 KB
5. The Linux Operating System/14.1 Open FIles.pptx
107.78 KB
5. The Linux Operating System/15. Symbolic Links.mp4
22.62 MB
5. The Linux Operating System/15. Symbolic Links.srt
8.1 KB
5. The Linux Operating System/15.1 Symbolic Links.pptx
102.83 KB
5. The Linux Operating System/16. The ID_s.mp4
14.09 MB
5. The Linux Operating System/16. The ID_s.srt
3.82 KB
5. The Linux Operating System/17. Linux Pipes.mp4
14.52 MB
5. The Linux Operating System/17. Linux Pipes.srt
3.84 KB
5. The Linux Operating System/18. Linux Run Levels.mp4
11.98 MB
5. The Linux Operating System/18. Linux Run Levels.srt
5.01 KB
5. The Linux Operating System/18.1 Run Levels.pptx
99.77 KB
5. The Linux Operating System/19. Linux Logs.mp4
20.36 MB
5. The Linux Operating System/19. Linux Logs.srt
4.65 KB
6. Operating System Internals/1. The Kernel.mp4
32.38 MB
6. Operating System Internals/1. The Kernel.srt
14.65 KB
6. Operating System Internals/1.1 The Kernel.pptx
119.78 KB
6. Operating System Internals/2. One Ring to Rule Them All.mp4
17.72 MB
6. Operating System Internals/2. One Ring to Rule Them All.srt
7.64 KB
6. Operating System Internals/2.1 One Ring to Rule Them All.pptx
102.33 KB
6. Operating System Internals/3. What is a CPU.mp4
9.16 MB
6. Operating System Internals/3. What is a CPU.srt
3.74 KB
6. Operating System Internals/3.1 What is a CPU.pptx
98.13 KB
6. Operating System Internals/4. The CPU Registers.mp4
30.77 MB
6. Operating System Internals/4. The CPU Registers.srt
11.41 KB
6. Operating System Internals/4.1 Registers.pptx
119.52 KB
6. Operating System Internals/5. The CPU Flags.mp4
7.57 MB
6. Operating System Internals/5. The CPU Flags.srt
3.22 KB
6. Operating System Internals/5.1 Flags.pptx
96.36 KB
6. Operating System Internals/5.2 CPU Flags.html
105 B
6. Operating System Internals/6. What is Memory _ How does it work.mp4
10.84 MB
6. Operating System Internals/6. What is Memory _ How does it work.srt
4.78 KB
6. Operating System Internals/6.1 Memory.pptx
96.12 KB
6. Operating System Internals/7. The Stack.mp4
19.52 MB
6. Operating System Internals/7. The Stack.srt
8.12 KB
6. Operating System Internals/7.1 The Stack.pptx
98.58 KB
6. Operating System Internals/8. The Heap.mp4
11.08 MB
6. Operating System Internals/8. The Heap.srt
4.59 KB
6. Operating System Internals/8.1 The Heap.pptx
95.34 KB
6. Operating System Internals/9. Extra information on Memory.mp4
13.84 MB
6. Operating System Internals/9. Extra information on Memory.srt
5.6 KB
6. Operating System Internals/9.1 More on Memory.pptx
101.64 KB
6. Operating System Internals/10. Debuggers.mp4
20.53 MB
6. Operating System Internals/10. Debuggers.srt
7.14 KB
6. Operating System Internals/10.1 Immunity Debugger.html
107 B
6. Operating System Internals/10.2 Debugger.pptx
444.66 KB
6. Operating System Internals/11. Taking a look at ASLR.mp4
8.75 MB
6. Operating System Internals/11. Taking a look at ASLR.srt
4.37 KB
6. Operating System Internals/11.1 ASLR.pptx
101.38 KB
6. Operating System Internals/12. A Quick Word About AntiVirus.mp4
15.02 MB
6. Operating System Internals/12. A Quick Word About AntiVirus.srt
7.24 KB
6. Operating System Internals/12.1 AntiVirus.pptx
101.7 KB
7. Active Directory/1. What is Active Directory.mp4
19.32 MB
7. Active Directory/1. What is Active Directory.srt
7.59 KB
7. Active Directory/1.1 What is Active Directory.pptx
95.09 KB
7. Active Directory/2. Basic Windows Server Configuration.mp4
32.65 MB
7. Active Directory/2. Basic Windows Server Configuration.srt
9.41 KB
7. Active Directory/3. Install AD DS.mp4
38.13 MB
7. Active Directory/3. Install AD DS.srt
12.9 KB
7. Active Directory/4. The AD Tree.mp4
39.11 MB
7. Active Directory/4. The AD Tree.srt
12.96 KB
7. Active Directory/5. OU_s and their Permissions.mp4
30.86 MB
7. Active Directory/5. OU_s and their Permissions.srt
8.21 KB
7. Active Directory/6. Managing Users and Groups.mp4
20.32 MB
7. Active Directory/6. Managing Users and Groups.srt
6.36 KB
7. Active Directory/7. Adding Machine to the Domain.mp4
36.51 MB
7. Active Directory/7. Adding Machine to the Domain.srt
8.83 KB
7. Active Directory/7.1 Windows 10 ISO.html
123 B
7. Active Directory/8. Setting up Group Policies.mp4
54.47 MB
7. Active Directory/8. Setting up Group Policies.srt
16.56 KB
7. Active Directory/9. Cached Credentials.mp4
14.34 MB
7. Active Directory/9. Cached Credentials.srt
3.74 KB
8. Kerberos/1. What is Kerberos.mp4
10.48 MB
8. Kerberos/1. What is Kerberos.srt
4.93 KB
8. Kerberos/1.1 What is Kerberos.pptx
95.53 KB
8. Kerberos/2. Kerberos Realms.mp4
4.52 MB
8. Kerberos/2. Kerberos Realms.srt
2.23 KB
8. Kerberos/2.1 Kerberos Realm.pptx
94.27 KB
8. Kerberos/3. The Authentication Server.mp4
9.67 MB
8. Kerberos/3. The Authentication Server.srt
4.66 KB
8. Kerberos/3.1 The Authentication Sever.pptx
97.1 KB
8. Kerberos/4. The Ticket Granting Server.mp4
21.14 MB
8. Kerberos/4. The Ticket Granting Server.srt
9.26 KB
8. Kerberos/4.1 The Ticket Granting Server.pptx
102.2 KB
9. Data Manipulation/1. What is Encryption.mp4
10.5 MB
9. Data Manipulation/1. What is Encryption.srt
4.58 KB
9. Data Manipulation/1.1 What is Encryption.pptx
94.51 KB
9. Data Manipulation/2. Symmetric Encryption.mp4
10.88 MB
9. Data Manipulation/2. Symmetric Encryption.srt
4.76 KB
9. Data Manipulation/2.1 Symmetric Encryption.pptx
96.89 KB
9. Data Manipulation/3. Asymmetric Encryption.mp4
14.23 MB
9. Data Manipulation/3. Asymmetric Encryption.srt
7.32 KB
9. Data Manipulation/3.1 Asymmetric Encryption.pptx
101.44 KB
9. Data Manipulation/4. RSA Encryption.mp4
6.17 MB
9. Data Manipulation/4. RSA Encryption.srt
2.81 KB
9. Data Manipulation/4.1 RSA.html
114 B
9. Data Manipulation/4.2 RSA.pptx
92.64 KB
9. Data Manipulation/5. AES Encryption.mp4
5.48 MB
9. Data Manipulation/5. AES Encryption.srt
2.37 KB
9. Data Manipulation/5.1 AES.html
138 B
9. Data Manipulation/5.2 AES.pptx
92.6 KB
9. Data Manipulation/6. What is Hashing.mp4
10.49 MB
9. Data Manipulation/6. What is Hashing.srt
4.41 KB
9. Data Manipulation/6.1 What is Hashing.pptx
94.25 KB
9. Data Manipulation/7. MD5 Hashing.mp4
8.23 MB
9. Data Manipulation/7. MD5 Hashing.srt
3.38 KB
9. Data Manipulation/7.1 MD5.html
114 B
9. Data Manipulation/7.2 MD5.pptx
92.54 KB
9. Data Manipulation/8. SHA Hashing.mp4
14.06 MB
9. Data Manipulation/8. SHA Hashing.srt
6.23 KB
9. Data Manipulation/8.1 SHA.html
114 B
9. Data Manipulation/8.2 SHA.pptx
92.63 KB
9. Data Manipulation/9. What is Encoding.mp4
5.53 MB
9. Data Manipulation/9. What is Encoding.srt
2.83 KB
9. Data Manipulation/9.1 What is Encoding.pptx
94.32 KB
9. Data Manipulation/10. Base64 Encoding.mp4
13.31 MB
9. Data Manipulation/10. Base64 Encoding.srt
5.83 KB
9. Data Manipulation/10.1 Base64.html
112 B
9. Data Manipulation/10.2 Base64.pptx
109.95 KB
9. Data Manipulation/11. Hex Encoding.mp4
12.74 MB
9. Data Manipulation/11. Hex Encoding.srt
5.79 KB
9. Data Manipulation/11.1 Hex.pptx
95.68 KB
9. Data Manipulation/11.2 Hex.html
113 B
9. Data Manipulation/12. URL Encoding.mp4
9.55 MB
9. Data Manipulation/12. URL Encoding.srt
4.03 KB
9. Data Manipulation/12.1 URL.pptx
94.28 KB
9. Data Manipulation/12.2 URL.html
110 B
9. Data Manipulation/13. What is Compression.mp4
8.02 MB
9. Data Manipulation/13. What is Compression.srt
4.52 KB
9. Data Manipulation/13.1 What is Compression.pptx
96.19 KB
9. Data Manipulation/14. Lossless vs Lossy Compression.mp4
10.73 MB
9. Data Manipulation/14. Lossless vs Lossy Compression.srt
4.29 KB
9. Data Manipulation/14.1 Lossless vs Lossy.pptx
93.74 KB
9. Data Manipulation/15. LZ77 _ LZ78 Compression Algorithms.mp4
6.38 MB
9. Data Manipulation/15. LZ77 _ LZ78 Compression Algorithms.srt
2.86 KB
9. Data Manipulation/15.1 LZ77 _ LZ78.html
104 B
9. Data Manipulation/15.2 LZ77 and LZ78.pptx
93.35 KB
9. Data Manipulation/16. Data Manipulation - Hands On.mp4
5.34 MB
9. Data Manipulation/16. Data Manipulation - Hands On.srt
2.37 KB
9. Data Manipulation/16.1 Data Manipulation Hands On.pptx
91.49 KB
10. Networking/1. What is Networking.mp4
18.77 MB
10. Networking/1. What is Networking.srt
11.6 KB
10. Networking/1.1 What is Networking.pptx
107.54 KB
10. Networking/2. The OSI Model.mp4
18.99 MB
10. Networking/2. The OSI Model.srt
7.38 KB
10. Networking/2.1 OSI Model.pptx
103.42 KB
10. Networking/3. TCPIP.mp4
28.91 MB
10. Networking/3. TCPIP.srt
13.51 KB
10. Networking/3.1 TCPIP.pptx
100.32 KB
10. Networking/4. UDP.mp4
10.19 MB
10. Networking/4. UDP.srt
3.56 KB
10. Networking/4.1 UDP.pptx
91.07 KB
10. Networking/5. The Switch.mp4
12.57 MB
10. Networking/5. The Switch.srt
5.47 KB
10. Networking/5.1 The Switch.pptx
405.03 KB
10. Networking/6. Routers _ Gateways.mp4
19.56 MB
10. Networking/6. Routers _ Gateways.srt
8.42 KB
10. Networking/6.1 Routers and Gateways.pptx
95.47 KB
10. Networking/7. What is a Protocol.mp4
5.03 MB
10. Networking/7. What is a Protocol.srt
1.89 KB
10. Networking/7.1 What is a Protocol.pptx
91.51 KB
10. Networking/8. ICMP.mp4
19.04 MB
10. Networking/8. ICMP.srt
8.37 KB
10. Networking/8.1 ICMP.pptx
95.83 KB
10. Networking/9. DNS.mp4
26.74 MB
10. Networking/9. DNS.srt
10.98 KB
10. Networking/9.1 DNS.pptx
98.98 KB
10. Networking/10. DHCP.mp4
18.29 MB
10. Networking/10. DHCP.srt
8.54 KB
10. Networking/10.1 DHCP.pptx
100.42 KB
10. Networking/11. ARP.mp4
16.61 MB
10. Networking/11. ARP.srt
6.07 KB
10. Networking/11.1 ARP.pptx
95.83 KB
10. Networking/12. What is an IDS.mp4
10.47 MB
10. Networking/12. What is an IDS.srt
4.7 KB
10. Networking/12.1 What is an IDS.pptx
95.57 KB
10. Networking/13. What is an IPS.mp4
15.82 MB
10. Networking/13. What is an IPS.srt
6.47 KB
10. Networking/13.1 What is an IPS.pptx
95.77 KB
10. Networking/14. What is HA.mp4
14.62 MB
10. Networking/14. What is HA.srt
6.62 KB
10. Networking/14.1 What is HA.pptx
94.01 KB
10. Networking/15. Proxys.mp4
8.46 MB
10. Networking/15. Proxys.srt
4.93 KB
10. Networking/15.1 Proxys.pptx
92.74 KB
10. Networking/16. The DMZ.mp4
7.84 MB
10. Networking/16. The DMZ.srt
3.42 KB
10. Networking/16.1 DMZ.pptx
91.19 KB
10. Networking/17. Quick Talk on Databases.mp4
14.03 MB
10. Networking/17. Quick Talk on Databases.srt
5.81 KB
10. Networking/17.1 Quick Talk on Databases.pptx
95.96 KB
10. Networking/17.2 SQL Tutorial.html
96 B
11. VPNs/1. What is a VPN.mp4
9.81 MB
11. VPNs/1. What is a VPN.srt
3.58 KB
11. VPNs/1.1 What is a VPN.pptx
92.54 KB
11. VPNs/2. What is IPSEC.mp4
23.54 MB
11. VPNs/2. What is IPSEC.srt
12.02 KB
11. VPNs/2.1 What is a IPSEC.pptx
102.19 KB
11. VPNs/3. What is IKE.mp4
18.63 MB
11. VPNs/3. What is IKE.srt
9.27 KB
11. VPNs/3.1 What is a IKE.pptx
100.87 KB
12. Firewalls/1. What is a Firewall.mp4
15.03 MB
12. Firewalls/1. What is a Firewall.srt
5.89 KB
12. Firewalls/1.1 What is a Firewall.pptx
96.05 KB
12. Firewalls/2. Packet Filtering Firewalls.mp4
3.34 MB
12. Firewalls/2. Packet Filtering Firewalls.srt
1.98 KB
12. Firewalls/2.1 Packet Filtering Firewalls.pptx
94.09 KB
12. Firewalls/3. Stateful Inspecting Firewalls.mp4
7.48 MB
12. Firewalls/3. Stateful Inspecting Firewalls.srt
3.77 KB
12. Firewalls/3.1 Stateful Inspection Firewalls.pptx
94.57 KB
12. Firewalls/4. Web Application Firewalls.mp4
6.01 MB
12. Firewalls/4. Web Application Firewalls.srt
3.09 KB
12. Firewalls/4.1 Web Application Firewalls.pptx
92.81 KB
13. Configuring PFSense Firewalls/1. Installing PFSense.mp4
33.52 MB
13. Configuring PFSense Firewalls/1. Installing PFSense.srt
10.01 KB
13. Configuring PFSense Firewalls/1.1 PFSense Installer.html
94 B
13. Configuring PFSense Firewalls/2. The Firewall UI.mp4
39.51 MB
13. Configuring PFSense Firewalls/2. The Firewall UI.srt
13.33 KB
13. Configuring PFSense Firewalls/3. Configuring a DMZ.mp4
25.97 MB
13. Configuring PFSense Firewalls/3. Configuring a DMZ.srt
10.89 KB
13. Configuring PFSense Firewalls/4. Configuring a VPN.mp4
24.55 MB
13. Configuring PFSense Firewalls/4. Configuring a VPN.srt
9.73 KB
13. Configuring PFSense Firewalls/5. Backup _ Logging.mp4
18.7 MB
13. Configuring PFSense Firewalls/5. Backup _ Logging.srt
6.74 KB
13. Configuring PFSense Firewalls/6. PFsense Hands On.mp4
5.37 MB
13. Configuring PFSense Firewalls/6. PFsense Hands On.srt
3.21 KB
13. Configuring PFSense Firewalls/6.1 PFSense Hands On.pptx
92.29 KB
14. Program Theory/1. What is a Compiler.mp4
11.31 MB
14. Program Theory/1. What is a Compiler.srt
5.16 KB
14. Program Theory/1.1 What is a Compiler.pptx
96.02 KB
14. Program Theory/2. What is a Linker.mp4
15.11 MB
14. Program Theory/2. What is a Linker.srt
6.33 KB
14. Program Theory/2.1 What is a Linker.pptx
94.23 KB
15. Python Course/1. Why Python.mp4
10.39 MB
15. Python Course/1. Why Python.srt
5.65 KB
15. Python Course/1.1 Why Python.pptx
91.28 KB
15. Python Course/2. Installing Python.mp4
14.59 MB
15. Python Course/2. Installing Python.srt
5.64 KB
15. Python Course/2.1 Sublime IDE.html
90 B
15. Python Course/2.2 Python Installer.html
94 B
15. Python Course/3. Hello World.mp4
17.43 MB
15. Python Course/3. Hello World.srt
8.86 KB
15. Python Course/3.1 HelloWorld.py
583 B
15. Python Course/4. Variables.mp4
17.49 MB
15. Python Course/4. Variables.srt
8.66 KB
15. Python Course/4.1 Variables.py
1.18 KB
15. Python Course/5. Type Casting.mp4
11.65 MB
15. Python Course/5. Type Casting.srt
6.31 KB
15. Python Course/5.1 TypeCasting.py
1015 B
15. Python Course/6. Operators.mp4
10.77 MB
15. Python Course/6. Operators.srt
5.99 KB
15. Python Course/6.1 Operators.py
2.32 KB
15. Python Course/7. IfElse.mp4
34.15 MB
15. Python Course/7. IfElse.srt
16.24 KB
15. Python Course/7.1 IfElse.py
2.28 KB
15. Python Course/8. Loops.mp4
20.12 MB
15. Python Course/8. Loops.srt
10.55 KB
15. Python Course/8.1 Loops.py
1.28 KB
15. Python Course/9. The Dictionary.mp4
23.96 MB
15. Python Course/9. The Dictionary.srt
12.27 KB
15. Python Course/9.1 Dictionary.py
2 KB
15. Python Course/10. Lists.mp4
26.37 MB
15. Python Course/10. Lists.srt
13.24 KB
15. Python Course/10.1 Lists.py
1.54 KB
15. Python Course/11. Tuples.mp4
10.02 MB
15. Python Course/11. Tuples.srt
5.32 KB
15. Python Course/11.1 Tuples.py
1.14 KB
15. Python Course/12. Modules.mp4
17.07 MB
15. Python Course/12. Modules.srt
8.31 KB
15. Python Course/12.1 Modules.py
810 B
15. Python Course/13. Classes.mp4
27.17 MB
15. Python Course/13. Classes.srt
14.95 KB
15. Python Course/13.1 Classes.py
1.36 KB
15. Python Course/13.2 Person.py
878 B
15. Python Course/14. Inheritance.mp4
48.55 MB
15. Python Course/14. Inheritance.srt
18.16 KB
15. Python Course/14.1 Inheritance.py
1.63 KB
15. Python Course/14.2 CheckingAccount.py
822 B
15. Python Course/14.3 Account.py
961 B
15. Python Course/15. Configuration Files.mp4
12.7 MB
15. Python Course/15. Configuration Files.srt
5.99 KB
15. Python Course/15.1 Configs.py
1.24 KB
15. Python Course/15.2 Configs.zip
1.57 KB
15. Python Course/16. Logging.mp4
15.17 MB
15. Python Course/16. Logging.srt
9.22 KB
15. Python Course/16.1 Logging.py
1.4 KB
15. Python Course/17. Error Handling.mp4
20.6 MB
15. Python Course/17. Error Handling.srt
9.61 KB
15. Python Course/17.1 ErrorHandling.py
1.25 KB
15. Python Course/18. Sockets.mp4
28.81 MB
15. Python Course/18. Sockets.srt
14.7 KB
15. Python Course/18.1 SocketsClient.py
929 B
15. Python Course/18.2 SocketsServer.py
1.17 KB
15. Python Course/19. Threading.mp4
17.94 MB
15. Python Course/19. Threading.srt
9.5 KB
15. Python Course/19.1 Threading.py
845 B
15. Python Course/20. Python Hands On.mp4
6.98 MB
15. Python Course/20. Python Hands On.srt
3.63 KB
15. Python Course/20.1 Hands On Python.pptx
93.65 KB
16. Assembly Course/1. Why Assembly.mp4
5.15 MB
16. Assembly Course/1. Why Assembly.srt
2.76 KB
16. Assembly Course/1.1 Why ASM.pptx
92.61 KB
16. Assembly Course/2. Hello World.mp4
59.66 MB
16. Assembly Course/2. Hello World.srt
21.13 KB
16. Assembly Course/2.1 HelloWorld.asm.zip
1.22 KB
16. Assembly Course/3. Variables.mp4
21.66 MB
16. Assembly Course/3. Variables.srt
7.14 KB
16. Assembly Course/3.1 DataTypes.asm.zip
1.12 KB
16. Assembly Course/4. Saving States.mp4
32.36 MB
16. Assembly Course/4. Saving States.srt
13.47 KB
16. Assembly Course/4.1 SavingState.asm.zip
1.39 KB
16. Assembly Course/5. Arithmetic.mp4
77.42 MB
16. Assembly Course/5. Arithmetic.srt
24.07 KB
16. Assembly Course/5.1 Arithmetic.asm.zip
2.11 KB
16. Assembly Course/6. Loops.mp4
15.76 MB
16. Assembly Course/6. Loops.srt
6.23 KB
16. Assembly Course/6.1 Loops.asm.zip
1.56 KB
16. Assembly Course/7. Logic Control.mp4
38.67 MB
16. Assembly Course/7. Logic Control.srt
13.28 KB
16. Assembly Course/7.1 Logic.asm.zip
1.24 KB
16. Assembly Course/8. Reading Files.mp4
45.84 MB
16. Assembly Course/8. Reading Files.srt
15.24 KB
16. Assembly Course/8.1 ReadingFiles.asm.zip
1.51 KB
16. Assembly Course/9. Writing Files.mp4
22.77 MB
16. Assembly Course/9. Writing Files.srt
8.38 KB
16. Assembly Course/9.1 WritingFiles.asm.zip
1.4 KB
16. Assembly Course/10. Op Code.mp4
23.64 MB
16. Assembly Course/10. Op Code.srt
8.61 KB
16. Assembly Course/11. Bit Operators.mp4
8.97 MB
16. Assembly Course/11. Bit Operators.srt
4.44 KB
16. Assembly Course/11.1 Bit Operators.pptx
97.97 KB
16. Assembly Course/12. Assembly Hands On.mp4
3.48 MB
16. Assembly Course/12. Assembly Hands On.srt
1.96 KB
16. Assembly Course/12.1 Assembly Hands On.pptx
92.21 KB
17. Scope Identification/1. Goal _ Scope Identification.mp4
17.07 MB
17. Scope Identification/1. Goal _ Scope Identification.srt
8.95 KB
17. Scope Identification/1.1 Goal and Scope Identification.pptx
97.29 KB
17. Scope Identification/2. Stability Considerations.mp4
19.97 MB
17. Scope Identification/2. Stability Considerations.srt
11.09 KB
17. Scope Identification/2.1 Stability Considerations.pptx
95.72 KB
17. Scope Identification/3. Briefing Stake Holders.mp4
7.04 MB
17. Scope Identification/3. Briefing Stake Holders.srt
3.33 KB
17. Scope Identification/3.1 Briefing Stake Holders.pptx
93.99 KB
17. Scope Identification/4. Prepping.mp4
9.98 MB
17. Scope Identification/4. Prepping.srt
4.83 KB
17. Scope Identification/4.1 Assessment Document Template.docx
33.93 KB
17. Scope Identification/5. Scope Identification Hands On.mp4
5.55 MB
17. Scope Identification/5. Scope Identification Hands On.srt
3.48 KB
17. Scope Identification/5.1 Scope Identification Hands On.pptx
93.17 KB
18. Reconnaissance/1. What is Reconnaissance.mp4
9.73 MB
18. Reconnaissance/1. What is Reconnaissance.srt
5.47 KB
18. Reconnaissance/1.1 What is Recon.pptx
93.5 KB
18. Reconnaissance/2. Installing Kali.mp4
35.56 MB
18. Reconnaissance/2. Installing Kali.srt
8.41 KB
18. Reconnaissance/2.1 Kali Iso Updated.html
137 B
18. Reconnaissance/3. Passive Recon - Google.mp4
47.8 MB
18. Reconnaissance/3. Passive Recon - Google.srt
13.12 KB
18. Reconnaissance/3.1 Google Hacking Database.html
111 B
18. Reconnaissance/4. Passive Recon - Shodan.mp4
22.49 MB
18. Reconnaissance/4. Passive Recon - Shodan.srt
7.74 KB
18. Reconnaissance/4.1 Shodan.html
83 B
18. Reconnaissance/5. Passive Recon - Whois.mp4
32.64 MB
18. Reconnaissance/5. Passive Recon - Whois.srt
9.67 KB
18. Reconnaissance/5.1 Whois.html
87 B
18. Reconnaissance/6. Passive Recon - Netcraft.mp4
37.71 MB
18. Reconnaissance/6. Passive Recon - Netcraft.srt
10.04 KB
18. Reconnaissance/6.1 Netcraft.html
86 B
18. Reconnaissance/7. Passive Recon - Job Posting.mp4
40.88 MB
18. Reconnaissance/7. Passive Recon - Job Posting.srt
10.97 KB
18. Reconnaissance/8. Active Recon - Port Scanning.mp4
110.48 MB
18. Reconnaissance/8. Active Recon - Port Scanning.srt
28.28 KB
18. Reconnaissance/9. Active Recon - DNS.mp4
42.9 MB
18. Reconnaissance/9. Active Recon - DNS.srt
10.46 KB
18. Reconnaissance/10. Active Recon - Nikto.mp4
32.17 MB
18. Reconnaissance/10. Active Recon - Nikto.srt
8.39 KB
18. Reconnaissance/11. Active Recon - Dirb.mp4
24.22 MB
18. Reconnaissance/11. Active Recon - Dirb.srt
6.78 KB
18. Reconnaissance/12. Active Recon - Sparta.mp4
42.72 MB
18. Reconnaissance/12. Active Recon - Sparta.srt
12.13 KB
18. Reconnaissance/13. Active Recon - Working with NC.mp4
67.62 MB
18. Reconnaissance/13. Active Recon - Working with NC.srt
16.79 KB
18. Reconnaissance/13.1 NC For Windows.html
109 B
18. Reconnaissance/13.2 Pentest Monkey.html
130 B
18. Reconnaissance/14. Active Recon - Banner Grabbing.mp4
37.21 MB
18. Reconnaissance/14. Active Recon - Banner Grabbing.srt
11.03 KB
18. Reconnaissance/15. Active Recon - Vulnerability Scanners.mp4
14.95 MB
18. Reconnaissance/15. Active Recon - Vulnerability Scanners.srt
6.93 KB
18. Reconnaissance/15.1 Nessus Download.html
101 B
18. Reconnaissance/15.2 Vuln Scanners.pptx
95.49 KB
18. Reconnaissance/15.3 Nessus Tutorial.html
161 B
18. Reconnaissance/16. Active Recon - Browsing.mp4
31.93 MB
18. Reconnaissance/16. Active Recon - Browsing.srt
9.51 KB
18. Reconnaissance/17. Active Recon - Manual vs Automated.mp4
22.81 MB
18. Reconnaissance/17. Active Recon - Manual vs Automated.srt
5.91 KB
18. Reconnaissance/18. Reconnaissance Hands On.mp4
7.47 MB
18. Reconnaissance/18. Reconnaissance Hands On.srt
2.32 KB
19. Exploitation/1. Finding Exploits.mp4
59.09 MB
19. Exploitation/1. Finding Exploits.srt
13.55 KB
19. Exploitation/1.1 Exploit-DB.html
102 B
19. Exploitation/2. Misconfigurations.mp4
10.88 MB
19. Exploitation/2. Misconfigurations.srt
5.44 KB
19. Exploitation/2.1 Misconfigurations.pptx
94.79 KB
19. Exploitation/3. Looking for 0 days.mp4
11.8 MB
19. Exploitation/3. Looking for 0 days.srt
6.14 KB
19. Exploitation/3.1 0Days.pptx
92.65 KB
19. Exploitation/4. Metasploit - What is Metasploit.mp4
30.21 MB
19. Exploitation/4. Metasploit - What is Metasploit.srt
10.83 KB
19. Exploitation/5. Metasploit - Exploits and Payloads.mp4
81.56 MB
19. Exploitation/5. Metasploit - Exploits and Payloads.srt
21.46 KB
19. Exploitation/6. Metasploit - The Meterpreter.mp4
67.81 MB
19. Exploitation/6. Metasploit - The Meterpreter.srt
18.48 KB
19. Exploitation/7. Metasploit - Adding an Exploit to Metasploit.mp4
42.22 MB
19. Exploitation/7. Metasploit - Adding an Exploit to Metasploit.srt
13.68 KB
19. Exploitation/8. Metasploit - MSFVenom.mp4
44.99 MB
19. Exploitation/8. Metasploit - MSFVenom.srt
10.75 KB
19. Exploitation/9. Metasploit - Hands On.mp4
8.95 MB
19. Exploitation/9. Metasploit - Hands On.srt
4.57 KB
19. Exploitation/9.1 Metasploit Hands On.pptx
92.53 KB
19. Exploitation/10. The OWASP Top 10.mp4
50.1 MB
19. Exploitation/10. The OWASP Top 10.srt
10.89 KB
19. Exploitation/10.1 CSRF.html
139 B
19. Exploitation/10.2 OWASP Top 10.html
145 B
1. Welcome! Who Is This Guy!/1. Introduction.mp4
9.28 MB
19. Exploitation/11. SQL Injection _ SQLMap.srt
39.47 KB
19. Exploitation/11.1 Installing DVWA in Kali Linux.html
179 B
19. Exploitation/11.2 SQLInjection Tutorial.html
108 B
19. Exploitation/12. XSS.mp4
48.47 MB
19. Exploitation/12. XSS.srt
18.65 KB
19. Exploitation/13. Insecure Direct Object Reference.mp4
17.35 MB
19. Exploitation/13. Insecure Direct Object Reference.srt
7.86 KB
19. Exploitation/13.1 idor.txt
496 B
19. Exploitation/14. Local File Inclusion.mp4
73.75 MB
19. Exploitation/14. Local File Inclusion.srt
15.86 KB
19. Exploitation/15. Remote File Inclusion.mp4
30.44 MB
19. Exploitation/15. Remote File Inclusion.srt
10.37 KB
19. Exploitation/16. The Authenticated Unauthenticated Pages.mp4
18.65 MB
19. Exploitation/16. The Authenticated Unauthenticated Pages.srt
7.13 KB
19. Exploitation/17. Broken Authentication and Session Management.mp4
25.18 MB
19. Exploitation/17. Broken Authentication and Session Management.srt
11.83 KB
19. Exploitation/17.1 Broken Auth.pptx
100.39 KB
19. Exploitation/18. Faulty Redirects.mp4
8.79 MB
19. Exploitation/18. Faulty Redirects.srt
5.15 KB
20. Post Exploitation/1. Stabilizing Shells.mp4
66.28 MB
20. Post Exploitation/1. Stabilizing Shells.srt
18.08 KB
20. Post Exploitation/2. Breaking Out Of The Jail Shell.mp4
39.54 MB
20. Post Exploitation/2. Breaking Out Of The Jail Shell.srt
11.22 KB
20. Post Exploitation/3. What is Persistence.mp4
6.61 MB
20. Post Exploitation/3. What is Persistence.srt
3.88 KB
20. Post Exploitation/3.1 What is Persistence.pptx
95.4 KB
20. Post Exploitation/4. Windows Persistence.mp4
47.46 MB
20. Post Exploitation/4. Windows Persistence.srt
13.51 KB
20. Post Exploitation/5. Linux Persistence.mp4
47.95 MB
20. Post Exploitation/5. Linux Persistence.srt
14.63 KB
20. Post Exploitation/6. What is Privilege Escalation.mp4
24.7 MB
20. Post Exploitation/6. What is Privilege Escalation.srt
6.49 KB
20. Post Exploitation/7. OS Version.mp4
59.02 MB
20. Post Exploitation/7. OS Version.srt
13.85 KB
20. Post Exploitation/8. Common Configuration Issues.mp4
56.77 MB
20. Post Exploitation/8. Common Configuration Issues.srt
15.6 KB
20. Post Exploitation/8.1 Windows Privilege Escalation Tutorial 1.html
142 B
20. Post Exploitation/8.2 Windows Privilege Escalation Tutorial 2.html
107 B
20. Post Exploitation/8.3 Linux Privilege Escalation Tutorial 2.html
130 B
20. Post Exploitation/8.4 Linux Privilege Escalation Tutorial 1.html
127 B
20. Post Exploitation/9. File Permissions.mp4
70.68 MB
20. Post Exploitation/9. File Permissions.srt
18.92 KB
20. Post Exploitation/9.1 AccessCheck Tutorial.html
107 B
20. Post Exploitation/10. MySQL.mp4
68.81 MB
20. Post Exploitation/10. MySQL.srt
17.81 KB
20. Post Exploitation/11. Sudo.mp4
44.63 MB
20. Post Exploitation/11. Sudo.srt
11.51 KB
20. Post Exploitation/12. Relative Path Sudo Binary.mp4
46.68 MB
20. Post Exploitation/12. Relative Path Sudo Binary.srt
10.21 KB
20. Post Exploitation/13. Unquoted Service Path.mp4
61.22 MB
20. Post Exploitation/13. Unquoted Service Path.srt
18.8 KB
20. Post Exploitation/14. Service Misconfigurations.mp4
43.38 MB
20. Post Exploitation/14. Service Misconfigurations.srt
9.49 KB
20. Post Exploitation/14.1 AccessCheck Windows XP.html
147 B
20. Post Exploitation/14.2 AccessCheck Windows Vista _ Up.html
114 B
20. Post Exploitation/15. LinuxPrivChecker.mp4
45.23 MB
20. Post Exploitation/15. LinuxPrivChecker.srt
9.81 KB
20. Post Exploitation/15.1 LinuxPrivChecker.html
118 B
20. Post Exploitation/16. Im Root Now What.mp4
12.57 MB
20. Post Exploitation/16. Im Root Now What.srt
4.29 KB
20. Post Exploitation/17. Pulling Hashes.mp4
47.31 MB
20. Post Exploitation/17. Pulling Hashes.srt
13.61 KB
20. Post Exploitation/18. Pass The Hash.mp4
20.5 MB
20. Post Exploitation/18. Pass The Hash.srt
6.79 KB
20. Post Exploitation/19. SSH Keys.mp4
25.3 MB
20. Post Exploitation/19. SSH Keys.srt
6.71 KB
20. Post Exploitation/20. Checking Logs.mp4
9.85 MB
20. Post Exploitation/20. Checking Logs.srt
2.65 KB
20. Post Exploitation/21. Duel Homed Machines.mp4
8.73 MB
20. Post Exploitation/21. Duel Homed Machines.srt
2.87 KB
20. Post Exploitation/22. Network Traffic.mp4
39.86 MB
20. Post Exploitation/22. Network Traffic.srt
10.56 KB
20. Post Exploitation/23. ARP Poisoning.mp4
35.32 MB
20. Post Exploitation/23. ARP Poisoning.srt
9.61 KB
20. Post Exploitation/24. Web Servers.mp4
9.84 MB
20. Post Exploitation/24. Web Servers.srt
3.3 KB
20. Post Exploitation/25. Account Directory Attacks.mp4
17.95 MB
20. Post Exploitation/25. Account Directory Attacks.srt
5.48 KB
20. Post Exploitation/26. Password Spraying.mp4
25.39 MB
20. Post Exploitation/26. Password Spraying.srt
8.24 KB
20. Post Exploitation/26.1 spray.py
831 B
20. Post Exploitation/27. SSH Tunneling.mp4
57.15 MB
20. Post Exploitation/27. SSH Tunneling.srt
15.18 KB
20. Post Exploitation/28. Pivoting.mp4
64.52 MB
20. Post Exploitation/28. Pivoting.srt
17.88 KB
21. Password Cracking/1. What is Password Cracking.mp4
13.99 MB
21. Password Cracking/1. What is Password Cracking.srt
6.88 KB
21. Password Cracking/1.1 What is Password Cracking.pptx
98.81 KB
21. Password Cracking/2. John The Ripper.mp4
21.33 MB
21. Password Cracking/2. John The Ripper.srt
7.08 KB
21. Password Cracking/2.1 John The Ripper Windows Tutorial.html
135 B
21. Password Cracking/2.2 John The Ripper Linux Tutorial.html
162 B
21. Password Cracking/3. Hashcat.mp4
28.43 MB
21. Password Cracking/3. Hashcat.srt
8.75 KB
21. Password Cracking/4. Rainbow Tables.mp4
16.59 MB
21. Password Cracking/4. Rainbow Tables.srt
7.22 KB
21. Password Cracking/4.1 Rainbow Tables.pptx
99.36 KB
21. Password Cracking/5. Password Cracking Hands On.mp4
3.76 MB
21. Password Cracking/5. Password Cracking Hands On.srt
2.18 KB
21. Password Cracking/5.1 Password Cracking Hands On.pptx
93.01 KB
22. Covering Your Tracks/1. Why Cover Your Tracks.mp4
11.44 MB
22. Covering Your Tracks/1. Why Cover Your Tracks.srt
6.49 KB
22. Covering Your Tracks/1.1 Why Cover Your Tracks.pptx
96.82 KB
22. Covering Your Tracks/2. Clearing Windows Logs.mp4
17.41 MB
22. Covering Your Tracks/2. Clearing Windows Logs.srt
4.61 KB
22. Covering Your Tracks/3. Clearing Linux Logs.mp4
40.54 MB
22. Covering Your Tracks/3. Clearing Linux Logs.srt
7.71 KB
22. Covering Your Tracks/4. Quick Talk on Logging.mp4
26.19 MB
22. Covering Your Tracks/4. Quick Talk on Logging.srt
7.44 KB
22. Covering Your Tracks/5. Clearing Command History.mp4
35.8 MB
22. Covering Your Tracks/5. Clearing Command History.srt
11.27 KB
22. Covering Your Tracks/6. Persistent Backdoors.mp4
15.83 MB
22. Covering Your Tracks/6. Persistent Backdoors.srt
4.46 KB
22. Covering Your Tracks/7. The Clean Up.mp4
9.87 MB
22. Covering Your Tracks/7. The Clean Up.srt
4.5 KB
22. Covering Your Tracks/8. Covering Your Tracks Hands On.mp4
2.04 MB
22. Covering Your Tracks/8. Covering Your Tracks Hands On.srt
1.52 KB
23. Reporting/1. The Format.mp4
68.86 MB
23. Reporting/1. The Format.srt
21.1 KB
23. Reporting/1.1 Report Template.docx
111.92 KB
23. Reporting/2. The Audience.mp4
11.57 MB
23. Reporting/2. The Audience.srt
6.01 KB
23. Reporting/2.1 The Audience.pptx
96.06 KB
23. Reporting/3. Business Risks on Findings.mp4
14.38 MB
23. Reporting/3. Business Risks on Findings.srt
8.32 KB
23. Reporting/3.1 Buisness Risk on Findings.pptx
97.01 KB
23. Reporting/4. Remediation Options.mp4
7.69 MB
23. Reporting/4. Remediation Options.srt
4.61 KB
23. Reporting/4.1 Remediation Options.pptx
92.46 KB
23. Reporting/5. Working With The Blue Team.mp4
6.08 MB
23. Reporting/5. Working With The Blue Team.srt
3.1 KB
23. Reporting/5.1 Working With The Blue Team.pptx
92.95 KB
24. Attacking Active Directory (Realistic Scenario)/1. Reconnaissance.mp4
12.6 MB
24. Attacking Active Directory (Realistic Scenario)/1. Reconnaissance.srt
4.07 KB
24. Attacking Active Directory (Realistic Scenario)/2. Exploitation.mp4
17.78 MB
24. Attacking Active Directory (Realistic Scenario)/2. Exploitation.srt
4.99 KB
24. Attacking Active Directory (Realistic Scenario)/3. Post Exploitation.mp4
18.38 MB
24. Attacking Active Directory (Realistic Scenario)/3. Post Exploitation.srt
4.46 KB
24. Attacking Active Directory (Realistic Scenario)/4. Finding New Access.mp4
26.82 MB
24. Attacking Active Directory (Realistic Scenario)/4. Finding New Access.srt
8.92 KB
24. Attacking Active Directory (Realistic Scenario)/5. Moving Up In The World!.mp4
21.77 MB
24. Attacking Active Directory (Realistic Scenario)/5. Moving Up In The World!.srt
4.85 KB
24. Attacking Active Directory (Realistic Scenario)/6. Getting Domain Admin.mp4
36.18 MB
24. Attacking Active Directory (Realistic Scenario)/6. Getting Domain Admin.srt
10.17 KB
25. Job Hunting/1. The Resume.mp4
47.65 MB
25. Job Hunting/1. The Resume.srt
11.38 KB
25. Job Hunting/1.1 Resume.docx
19.04 KB
25. Job Hunting/2. Professional Email.mp4
14.66 MB
25. Job Hunting/2. Professional Email.srt
6.69 KB
25. Job Hunting/3. Certifications.mp4
47.41 MB
25. Job Hunting/3. Certifications.srt
18.48 KB
25. Job Hunting/4. Personal Brand.mp4
51.37 MB
25. Job Hunting/4. Personal Brand.srt
18.11 KB
25. Job Hunting/5. Searching for the Job.mp4
56.26 MB
25. Job Hunting/5. Searching for the Job.srt
17.79 KB
25. Job Hunting/6. Analyzing the Job Post.mp4
121.84 MB
25. Job Hunting/6. Analyzing the Job Post.srt
35.04 KB
25. Job Hunting/7. Applying for the Job.mp4
22.75 MB
25. Job Hunting/7. Applying for the Job.srt
6.92 KB
25. Job Hunting/8. The Future Company.mp4
42.8 MB
25. Job Hunting/8. The Future Company.srt
12.75 KB
25. Job Hunting/9. Salary Requirements.mp4
46.98 MB
25. Job Hunting/9. Salary Requirements.srt
16.39 KB
25. Job Hunting/10. The Interview Process - The Screening Call.mp4
19.06 MB
25. Job Hunting/10. The Interview Process - The Screening Call.srt
12.46 KB
25. Job Hunting/10.1 The Screening Call.pptx
95.05 KB
25. Job Hunting/11. The Interview Process - Prepping for the Technical Interviews.srt
356 B
25. Job Hunting/12. The Interview Process - The Technical Screening Interview.srt
356 B
25. Job Hunting/13. The Interview Process - Prepping for the On Site Final Interview.srt
356 B
25. Job Hunting/13.1 Prepping for the on site Interview.pptx
345 B
25. Job Hunting/14. The Interview Process - The Onsite.srt
356 B
25. Job Hunting/14.1 Onsite Interview.pptx
345 B
25. Job Hunting/15. The Interview Process - The Offer.srt
356 B
25. Job Hunting/15.1 The Offer.pptx
345 B
25. Job Hunting/16. Congratulations!.srt
356 B