资源详情

返回首页 | 相关搜索
LinuxAcademy - Kali Linux Deep Dive
大小 10.41 GB
文件数 106
Info Hash: 894A98C604C63FA66724C90835E528DDAB6336F3
收录时间 2025-12-28 01:29:11
更新时间 2025-12-28 02:36:39
文件列表 (106)
22. Don't Be an Easy Target!.mp4
206.93 MB
2. About the Author.mp4
20.28 MB
3. About the Course.mp4
37.12 MB
4. Course Prerequisites.mp4
63.02 MB
5. Community and Support.mp4
46.77 MB
6. Disclaimer It Is Not Like in the Movies! (1).mp4
53.7 MB
6. Disclaimer It Is Not Like in the Movies!.mp4
53.7 MB
7. What Is What.mp4
135.73 MB
8. Where Is What.mp4
106.4 MB
9. Linux Command Line Review.mp4
114.09 MB
10. Services.mp4
100.19 MB
11. Firewalls.mp4
83.15 MB
12. Users.mp4
59.41 MB
13. Introduction.mp4
36.83 MB
14. Installing Kali Linux — Part 1.mp4
83.35 MB
15. Installing Kali Linux — Part 2.mp4
16.1 MB
16. Building a Custom Kali Linux Image.mp4
148.13 MB
17. Creating a Live USB.mp4
43.75 MB
18. Booting from a Live USB.mp4
33.89 MB
19. Adding Encrypted Persistent Storage .mp4
84.71 MB
20. Finalizing and Testing the Live USB.mp4
125.42 MB
21. What Is Social Engineering.mp4
178.12 MB
1. An Important Note About A Cloud Guru and Linux Academy Courses.mp4
51.71 MB
23. Circles of Trust.mp4
94.4 MB
24. Keyloggers.mp4
97.45 MB
25. ATMs and Banks.mp4
61.03 MB
26. Physical Access to Devices.mp4
139.27 MB
27. Real Anonymity vs. Perceived Anonymity.mp4
133.94 MB
28. Common Pitfalls.mp4
143.13 MB
29. What Is a VPN.mp4
95.23 MB
30. Setting Up a VPN Server Side — Part 1.mp4
139.65 MB
31. Setting Up a VPN Server Side — Part 2.mp4
161.88 MB
32. Setting Up a VPN Server Side — Part 3.mp4
121.74 MB
33. Setting Up a VPN Client Side.mp4
150.55 MB
34. Connecting to a VPN.mp4
60.38 MB
35. What Is Tor.mp4
123.49 MB
36. Tor Browser.mp4
167.58 MB
37. The Tor Service.mp4
147.05 MB
38. What Is a Proxy.mp4
55.8 MB
39. Setting Up a SOCKS5 Proxy.mp4
112.9 MB
40. Connecting to a Proxy.mp4
86.12 MB
41. Introduction to Phishing and Tracking.mp4
65.17 MB
42. Setting Up Email Tracking.mp4
106.27 MB
43. Let's Go Phishing!.mp4
126.3 MB
44. ARP Spoofing.mp4
196.76 MB
45. MAC Address Spoofing.mp4
83.14 MB
46. DHCP Starvation.mp4
110.2 MB
47. Google Dorks.mp4
91.43 MB
48. WHOIS and GeoIP Lookup.mp4
106.46 MB
49. Nmap.mp4
102.54 MB
50. Host Discovery.mp4
103.21 MB
51. Open Port Discovery.mp4
164.28 MB
52. Network Mapping.mp4
75.31 MB
53. Service and Service Version Detection.mp4
54.37 MB
54. Identifying the Operating System.mp4
47.61 MB
55. Vulnerability Scans.mp4
164.78 MB
56. What Are DoS and DDoS Attacks.mp4
109.62 MB
57. Famous DDoS Attacks.mp4
82.64 MB
58. Scanning Networks, Capturing a Handshake, and Deauthenticating Clients.mp4
143.7 MB
59. Password Cracking Math, Common Sense, and Limits.mp4
85.07 MB
60. Setting Up the Environment and Installing GPU Drivers.mp4
139.09 MB
61. Using Hashcat and Password Masks.mp4
174.32 MB
62. Hashcat Wrap-Up.mp4
45.39 MB
63. What Is Buffer Overflow.mp4
119.29 MB
64. Using Buffer Overflow to Bypass Authentication.mp4
85.32 MB
65. What Is Reverse Engineering.mp4
109.61 MB
66. Setting Up an IDE to Compile a Keylogger.mp4
69.08 MB
67. Getting, Importing, and Compiling the Source Code.mp4
65.01 MB
68. Compiling and Customizing the Source Code.mp4
105.99 MB
69. Testing Out the Keylogger.mp4
35.88 MB
70. Detecting Process Abnormalities in the Task Manager.mp4
180.25 MB
71. Analyzing Processes with Cheat Engine.mp4
172.33 MB
72. Determining What an Unknown Program Is Doing — Part 1.mp4
149.66 MB
73. Determining What an Unknown Program Is Doing — Part 2.mp4
80.03 MB
74. Analyzing an Executable with a Decompiler .mp4
158.99 MB
75. Decompiling Function Parameters and Variables.mp4
140.66 MB
76. Reverse Engineering Function Logic with a Decompiler — Part 1.mp4
180.99 MB
77. Reverse Engineering Function Logic with a Decompiler — Part 2.mp4
122.94 MB
78. Reverse Engineering Function Logic with a Decompiler — Part 3.mp4
149.81 MB
79. Finding Salts in Decompiled Code.mp4
156.24 MB
80. Writing a Decryption Program from Pseudocode — Part 1.mp4
119.41 MB
81. Writing a Decryption Program from Pseudocode — Part 2.mp4
136.42 MB
82. Writing a Decryption Program from Pseudocode — Part 3.mp4
42.98 MB
83. Reverse Engineering Wrap-Up.mp4
61.76 MB
84. What Is Metasploit.mp4
103.53 MB
85. Basic Commands.mp4
106.23 MB
86. Other Useful Metasploit Commands.mp4
113.55 MB
87. Database Setup and ExploitDB.mp4
114.18 MB
88. Exploit Usage.mp4
53.98 MB
89. The Post-Exploitation Phase.mp4
87.95 MB
90. Armitage.mp4
80.52 MB
91. Shellshock.mp4
81 MB
92. Executing Code Remotely with Shellshock.mp4
104.22 MB
93. Writing an NSE Script Headers.mp4
65.09 MB
94. Writing an NSE Script Rules.mp4
124.44 MB
95. Writing an NSE Script Actions.mp4
122.62 MB
96. Debugging an NSE Script — Part 1.mp4
152.56 MB
97. Debugging an NSE Script — Part 2.mp4
52.68 MB
98. Examining a Metasploit Module .mp4
98.16 MB
99. Module Script Outline.mp4
132.65 MB
100. Loading a Module into Metasploit and Performing a Syntax Check.mp4
87.45 MB
101. Deploying and Testing a Script.mp4
128.72 MB
102. What's Next .mp4
54.91 MB
Resources/274_Kali-Linux-Deep-Dive_Reverse-Engineering_1552067412.pdf
853.29 KB
Resources/274_Kali-Linux_Deep-Dive_Study-Guide_1567788781.pdf
1.65 MB
Resources/linkstochartskali_1552431038
1019 B

免责声明

本网站仅提供DHT网络磁力资源索引服务,不存储任何资源文件。所有资源均来自DHT网络,本站无法控制其内容。请遵守当地法律法规,合理使用网络资源。如涉及版权问题,请联系 lulutang@protonmail.com。