TorBT - Torrents and Magnet Links Search Engine

[Coursera] Advanced Python Scripting for Cybersecurity Specialization - 3 course series

File Name
Size
defensive-python/01_defensive-python onehack.us/01_defensive-python/01_04_detecting-ssh-brute-force-with-scapy.mp4
47 MB
defensive-python/01_defensive-python onehack.us/01_defensive-python/01_01_introduction-to-defensive-python.en.srt
16 kB
defensive-python/01_defensive-python onehack.us/01_defensive-python/01_01_introduction-to-defensive-python.en.txt
10 kB
defensive-python/01_defensive-python onehack.us/01_defensive-python/01_01_introduction-to-defensive-python.mp4
19 MB
defensive-python/01_defensive-python onehack.us/01_defensive-python/01_02_brute-force-detection-with-windows-events.en.srt
25 kB
defensive-python/01_defensive-python onehack.us/01_defensive-python/01_02_brute-force-detection-with-windows-events.en.txt
13 kB
defensive-python/01_defensive-python onehack.us/01_defensive-python/01_02_brute-force-detection-with-windows-events.mp4
37 MB
defensive-python/01_defensive-python onehack.us/01_defensive-python/01_03_detecting-ftp-brute-force-with-scapy.en.srt
20 kB
defensive-python/01_defensive-python onehack.us/01_defensive-python/01_03_detecting-ftp-brute-force-with-scapy.en.txt
11 kB
defensive-python/01_defensive-python onehack.us/01_defensive-python/01_03_detecting-ftp-brute-force-with-scapy.mp4
34 MB
defensive-python/01_defensive-python onehack.us/01_defensive-python/01_04_detecting-ssh-brute-force-with-scapy.en.srt
25 kB
defensive-python/01_defensive-python onehack.us/01_defensive-python/01_04_detecting-ssh-brute-force-with-scapy.en.txt
13 kB
0. Join Our Discord for More Awesome Stuff!.txt
156 B
defensive-python/01_defensive-python onehack.us/01_defensive-python/01_05_feature-selection-for-traffic-analysis.en.srt
23 kB
defensive-python/01_defensive-python onehack.us/01_defensive-python/01_05_feature-selection-for-traffic-analysis.en.txt
12 kB
defensive-python/01_defensive-python onehack.us/01_defensive-python/01_05_feature-selection-for-traffic-analysis.mp4
43 MB
defensive-python/01_defensive-python onehack.us/01_defensive-python/01_06_detecting-anomalous-network-traffic-with-scapy.en.srt
15 kB
defensive-python/01_defensive-python onehack.us/01_defensive-python/01_06_detecting-anomalous-network-traffic-with-scapy.en.txt
7.6 kB
defensive-python/01_defensive-python onehack.us/01_defensive-python/01_06_detecting-anomalous-network-traffic-with-scapy.mp4
28 MB
defensive-python/01_defensive-python onehack.us/01_defensive-python/01_07_connection-hijacking-with-scapy.en.srt
28 kB
defensive-python/01_defensive-python onehack.us/01_defensive-python/01_07_connection-hijacking-with-scapy.en.txt
18 kB
defensive-python/01_defensive-python onehack.us/01_defensive-python/01_07_connection-hijacking-with-scapy.mp4
46 MB
defensive-python/01_defensive-python onehack.us/01_defensive-python/01_08_defensive-python_exam.html
5.1 kB
establishing-command-and-control-and-finding-credentials/01_establishing-command-and-control/01_establishing-command-and-control/01_01_introduction-to-command-and-control.en.srt
17 kB
establishing-command-and-control-and-finding-credentials/01_establishing-command-and-control/01_establishing-command-and-control/01_01_introduction-to-command-and-control.en.txt
11 kB
establishing-command-and-control-and-finding-credentials/01_establishing-command-and-control/01_establishing-command-and-control/01_01_introduction-to-command-and-control.mp4
20 MB
establishing-command-and-control-and-finding-credentials/01_establishing-command-and-control/01_establishing-command-and-control/01_02_traffic-analysis-with-python.en.srt
27 kB
establishing-command-and-control-and-finding-credentials/01_establishing-command-and-control/01_establishing-command-and-control/01_02_traffic-analysis-with-python.en.txt
14 kB
establishing-command-and-control-and-finding-credentials/01_establishing-command-and-control/01_establishing-command-and-control/01_02_traffic-analysis-with-python.mp4
42 MB
establishing-command-and-control-and-finding-credentials/01_establishing-command-and-control/01_establishing-command-and-control/01_03_calculating-entropy-with-python.en.srt
14 kB
establishing-command-and-control-and-finding-credentials/01_establishing-command-and-control/01_establishing-command-and-control/01_03_calculating-entropy-with-python.en.txt
7.3 kB
establishing-command-and-control-and-finding-credentials/01_establishing-command-and-control/01_establishing-command-and-control/01_03_calculating-entropy-with-python.mp4
19 MB
establishing-command-and-control-and-finding-credentials/01_establishing-command-and-control/01_establishing-command-and-control/01_04_detecting-encodings-with-python.en.srt
14 kB
establishing-command-and-control-and-finding-credentials/01_establishing-command-and-control/01_establishing-command-and-control/01_04_detecting-encodings-with-python.en.txt
9.1 kB
establishing-command-and-control-and-finding-credentials/01_establishing-command-and-control/01_establishing-command-and-control/01_04_detecting-encodings-with-python.mp4
23 MB
establishing-command-and-control-and-finding-credentials/01_establishing-command-and-control/01_establishing-command-and-control/01_05_building-c2-packets-with-python.en.srt
19 kB
establishing-command-and-control-and-finding-credentials/01_establishing-command-and-control/01_establishing-command-and-control/01_05_building-c2-packets-with-python.en.txt
9.8 kB
establishing-command-and-control-and-finding-credentials/01_establishing-command-and-control/01_establishing-command-and-control/01_05_building-c2-packets-with-python.mp4
26 MB
establishing-command-and-control-and-finding-credentials/02_finding-credentials/01_finding-credentials/01_01_introduction-to-credential-access.en.srt
16 kB
establishing-command-and-control-and-finding-credentials/02_finding-credentials/01_finding-credentials/01_01_introduction-to-credential-access.en.txt
10 kB
establishing-command-and-control-and-finding-credentials/02_finding-credentials/01_finding-credentials/01_01_introduction-to-credential-access.mp4
19 MB
establishing-command-and-control-and-finding-credentials/02_finding-credentials/01_finding-credentials/01_02_dumping-chrome-credentials-with-python.en.srt
17 kB
establishing-command-and-control-and-finding-credentials/02_finding-credentials/01_finding-credentials/01_02_dumping-chrome-credentials-with-python.en.txt
8.9 kB
establishing-command-and-control-and-finding-credentials/02_finding-credentials/01_finding-credentials/01_02_dumping-chrome-credentials-with-python.mp4
33 MB
establishing-command-and-control-and-finding-credentials/02_finding-credentials/01_finding-credentials/01_03_searching-the-registry-with-python.en.srt
23 kB
establishing-command-and-control-and-finding-credentials/02_finding-credentials/01_finding-credentials/01_03_searching-the-registry-with-python.en.txt
14 kB
establishing-command-and-control-and-finding-credentials/02_finding-credentials/01_finding-credentials/01_03_searching-the-registry-with-python.mp4
43 MB
establishing-command-and-control-and-finding-credentials/02_finding-credentials/01_finding-credentials/01_04_searching-the-system-with-python.en.srt
24 kB
establishing-command-and-control-and-finding-credentials/02_finding-credentials/01_finding-credentials/01_04_searching-the-system-with-python.en.txt
12 kB
establishing-command-and-control-and-finding-credentials/02_finding-credentials/01_finding-credentials/01_04_searching-the-system-with-python.mp4
33 MB
establishing-command-and-control-and-finding-credentials/02_finding-credentials/01_finding-credentials/01_05_cracking-the-linux-passwords-with-python.en.srt
15 kB
establishing-command-and-control-and-finding-credentials/02_finding-credentials/01_finding-credentials/01_05_cracking-the-linux-passwords-with-python.en.txt
9.9 kB
establishing-command-and-control-and-finding-credentials/02_finding-credentials/01_finding-credentials/01_05_cracking-the-linux-passwords-with-python.mp4
23 MB
establishing-command-and-control-and-finding-credentials/02_finding-credentials/01_finding-credentials/01_06_analyzing-passwords-with-python.en.srt
22 kB
establishing-command-and-control-and-finding-credentials/02_finding-credentials/01_finding-credentials/01_06_analyzing-passwords-with-python.en.txt
12 kB
establishing-command-and-control-and-finding-credentials/02_finding-credentials/01_finding-credentials/01_06_analyzing-passwords-with-python.mp4
33 MB
establishing-command-and-control-and-finding-credentials/02_finding-credentials/01_finding-credentials/01_07_establishing-command-and-control-and-finding-credentials_exam.html
10 kB
python-in-recon/01_introduction onehack.us/01_introduction-to-advanced-python-for-cybersecurity/01_01_welcome-to-advanced-python-for-cybersecurity.en.srt
1.9 kB
python-in-recon/01_introduction onehack.us/01_introduction-to-advanced-python-for-cybersecurity/01_01_welcome-to-advanced-python-for-cybersecurity.en.txt
1009 B
python-in-recon/01_introduction onehack.us/01_introduction-to-advanced-python-for-cybersecurity/01_01_welcome-to-advanced-python-for-cybersecurity.mp4
8.2 MB
python-in-recon/01_introduction onehack.us/01_introduction-to-advanced-python-for-cybersecurity/01_02_introduction-to-python.en.srt
11 kB
python-in-recon/01_introduction onehack.us/01_introduction-to-advanced-python-for-cybersecurity/01_02_introduction-to-python.en.txt
5.8 kB
python-in-recon/01_introduction onehack.us/01_introduction-to-advanced-python-for-cybersecurity/01_02_introduction-to-python.mp4
11 MB
python-in-recon/01_introduction onehack.us/01_introduction-to-advanced-python-for-cybersecurity/01_03_introduction-to-mitre-att-ck-and-shield.en.srt
16 kB
python-in-recon/01_introduction onehack.us/01_introduction-to-advanced-python-for-cybersecurity/01_03_introduction-to-mitre-att-ck-and-shield.en.txt
8.6 kB
python-in-recon/01_introduction onehack.us/01_introduction-to-advanced-python-for-cybersecurity/01_03_introduction-to-mitre-att-ck-and-shield.mp4
21 MB
python-in-recon/02_performing-reconnaissance/01_performing-reconnaissance/01_01_introduction-to-reconnaissance.en.srt
18 kB
python-in-recon/02_performing-reconnaissance/01_performing-reconnaissance/01_01_introduction-to-reconnaissance.en.txt
11 kB
python-in-recon/02_performing-reconnaissance/01_performing-reconnaissance/01_01_introduction-to-reconnaissance.mp4
22 MB
python-in-recon/02_performing-reconnaissance/01_performing-reconnaissance/01_02_querying-shodan-with-python.en.srt
20 kB
python-in-recon/02_performing-reconnaissance/01_performing-reconnaissance/01_02_querying-shodan-with-python.en.txt
11 kB
python-in-recon/02_performing-reconnaissance/01_performing-reconnaissance/01_02_querying-shodan-with-python.mp4
42 MB
python-in-recon/02_performing-reconnaissance/01_performing-reconnaissance/01_03_dns-queries-with-python.en.srt
19 kB
python-in-recon/02_performing-reconnaissance/01_performing-reconnaissance/01_03_dns-queries-with-python.en.txt
12 kB
python-in-recon/02_performing-reconnaissance/01_performing-reconnaissance/01_03_dns-queries-with-python.mp4
29 MB
python-in-recon/02_performing-reconnaissance/01_performing-reconnaissance/01_04_network-scanning-with-scapy.en.srt
25 kB
python-in-recon/02_performing-reconnaissance/01_performing-reconnaissance/01_04_network-scanning-with-scapy.en.txt
13 kB
python-in-recon/02_performing-reconnaissance/01_performing-reconnaissance/01_04_network-scanning-with-scapy.mp4
37 MB
python-in-recon/02_performing-reconnaissance/01_performing-reconnaissance/01_05_service-detection-with-python.en.srt
32 kB
python-in-recon/02_performing-reconnaissance/01_performing-reconnaissance/01_05_service-detection-with-python.en.txt
16 kB
python-in-recon/02_performing-reconnaissance/01_performing-reconnaissance/01_05_service-detection-with-python.mp4
44 MB
python-in-recon/02_performing-reconnaissance/01_performing-reconnaissance/01_06_cve-lookups-with-python.en.srt
7.9 kB
python-in-recon/02_performing-reconnaissance/01_performing-reconnaissance/01_06_cve-lookups-with-python.en.txt
5.0 kB
python-in-recon/02_performing-reconnaissance/01_performing-reconnaissance/01_06_cve-lookups-with-python.mp4
13 MB
python-in-recon/03_gaining-initial-access/01_gaining-initial-access/01_01_introduction-to-initial-access.en.srt
20 kB
python-in-recon/03_gaining-initial-access/01_gaining-initial-access/01_01_introduction-to-initial-access.en.txt
11 kB
python-in-recon/03_gaining-initial-access/01_gaining-initial-access/01_01_introduction-to-initial-access.mp4
21 MB
python-in-recon/03_gaining-initial-access/01_gaining-initial-access/01_02_generating-password-variations-with-python.en.srt
20 kB
python-in-recon/03_gaining-initial-access/01_gaining-initial-access/01_02_generating-password-variations-with-python.en.txt
10 kB
python-in-recon/03_gaining-initial-access/01_gaining-initial-access/01_02_generating-password-variations-with-python.mp4
44 MB
python-in-recon/03_gaining-initial-access/01_gaining-initial-access/01_03_generating-three-random-words-with-python.en.srt
15 kB
python-in-recon/03_gaining-initial-access/01_gaining-initial-access/01_03_generating-three-random-words-with-python.en.txt
7.8 kB
python-in-recon/03_gaining-initial-access/01_gaining-initial-access/01_03_generating-three-random-words-with-python.mp4
18 MB
python-in-recon/03_gaining-initial-access/01_gaining-initial-access/01_04_automating-brute-force.en.srt
15 kB
python-in-recon/03_gaining-initial-access/01_gaining-initial-access/01_04_automating-brute-force.en.txt
9.3 kB
python-in-recon/03_gaining-initial-access/01_gaining-initial-access/01_04_automating-brute-force.mp4
25 MB
python-in-recon/03_gaining-initial-access/01_gaining-initial-access/01_05_advanced-python-reconnaissance_exam.html
11 kB