TorBT - Torrents and Magnet Links Search Engine
Udemy - Introdução à Ethical Hacker
- Date: 2026-04-20
- Size: 3.5 GB
- Files: 192
File Name
Size
03 Linux - Comandos Basicos/012 Atualizando o sistema e instalando Guest Additions.mp4
195 MB
01 Introduc227o Geral/002 Amostra - Hacking o Windows 10 e acessando a Webcam usando Beef atraves do Kali.mp4
20 MB
01 Introduc227o Geral/003 Aula 2 - O que e Hacking e por que aprender.mp4
58 MB
02 Configurando o laboratorio/004 03-The-Lab-ingl-s-portugu-s.pdf
1.3 MB
02 Configurando o laboratorio/004 Adaptadores-leitura-obrigat-ria-para-entender-qual-adaptor-comprar-leia-com-aten-o-as-refer-ncias-tamb-m.Oficial-do-Site-Kali-Linux.txt
95 B
02 Configurando o laboratorio/004 Configura-o-da-BIOS.pdf
458 kB
02 Configurando o laboratorio/004 Lab vis227o geral.mp4
17 MB
02 Configurando o laboratorio/004 Virtual-Box.txt
42 B
02 Configurando o laboratorio/005 Basicamente-todos-os-comandos-do-Kali-Planilha-de-comandos.txt
74 B
02 Configurando o laboratorio/005 Instalac227o de Kali como virtual machine.mp4
52 MB
02 Configurando o laboratorio/005 Kali-Linux-Virtual-Images-Download-Page.txt
80 B
02 Configurando o laboratorio/006 Como-consertar-a-conex-o-NAT-outra-vers-o.txt
44 B
02 Configurando o laboratorio/006 Imagen-do-Kali-para-seu-sistema.txt
80 B
02 Configurando o laboratorio/006 Instalando Kali Linux pelo arquivo .ova.mp4
23 MB
02 Configurando o laboratorio/006 Outra-vers-o-mais-curta-de-instala-o.txt
44 B
02 Configurando o laboratorio/007 Instalac227o de Metasploitable como Maquina Virtual.mp4
23 MB
02 Configurando o laboratorio/007 Metasploitable-Download-Page.txt
61 B
02 Configurando o laboratorio/008 Instalac227o do WIndows como Maquina Virtual.mp4
19 MB
02 Configurando o laboratorio/008 Windows-Virtual-Machines-Download-Page.txt
64 B
02 Configurando o laboratorio/009 Criando e usando Snapshots em VirtualBox.mp4
18 MB
02 Configurando o laboratorio/009 Snapshot-explica-o-em-portugu-s.txt
95 B
03 Linux - Comandos Basicos/010 12345.png
475 kB
03 Linux - Comandos Basicos/010 Vis227o geral do Linux.mp4
184 MB
03 Linux - Comandos Basicos/011 Commands.txt
61 B
03 Linux - Comandos Basicos/011 Linux-Commands-List.txt
62 B
03 Linux - Comandos Basicos/011 O terminal e linux commands.mp4
90 MB
01 Introduc227o Geral/001 Aula 1 - Introduc227o Geral.mp4
28 MB
03 Linux - Comandos Basicos/012 Blank-Login-Screen-Fix-only-click-here-if-you-get-a-blank-screen-when-you-reboot-after-apt-get-upgrade-.txt
44 B
03 Linux - Comandos Basicos/012 Fix-Blank-Login-After-Updating-Kali-Linux.txt
44 B
03 Linux - Comandos Basicos/013 Kali- toques finais.mp4
16 MB
04 Network Penetration - Parametros/014 11-Networks-Intro-ingles-portugues.pdf
240 kB
04 Network Penetration - Parametros/014 Introduc227o 224 network Penetration.mp4
37 MB
04 Network Penetration - Parametros/014 Networks-Intro.pdf
107 kB
04 Network Penetration - Parametros/014 Reverse-Shell-explica-o.txt
70 B
04 Network Penetration - Parametros/015 Entendimento basico do sistema.mp4
5.8 MB
04 Network Penetration - Parametros/016 Conectando o adaptador ao Sistema Kali - cuidados.mp4
21 MB
04 Network Penetration - Parametros/016 Corrigir-NAT-VirtualBox.pdf
538 kB
04 Network Penetration - Parametros/017 O que e MAC Address e como muda-lo.mp4
9.8 MB
04 Network Penetration - Parametros/018 Modos de Wirelles - Managed e Monitor.mp4
9.7 MB
04 Network Penetration - Parametros/019 Habilitando monitor modem manualmente.mp4
5.1 MB
04 Network Penetration - Parametros/020 Monitor-mode.mp4
9.8 MB
04 Network Penetration - Parametros/021 Terceiro metodo de habilitar o monitor mode.mp4
5.7 MB
05 Network Penetration Testing - Pre Connection Attacks/022 17-Networks-Pre-Connection-Attacks-inglesportugues.pdf
265 kB
05 Network Penetration Testing - Pre Connection Attacks/022 Usando airdump-ng - sniffing.mp4
13 MB
05 Network Penetration Testing - Pre Connection Attacks/023 Enviando pacotes pelo airodump.mp4
18 MB
05 Network Penetration Testing - Pre Connection Attacks/024 Ataque deautenticac227o.mp4
11 MB
05 Network Penetration Testing - Pre Connection Attacks/025 Criando um falso access point - teoria.mp4
7.9 MB
05 Network Penetration Testing - Pre Connection Attacks/026 21-Mana.pdf
1023 kB
05 Network Penetration Testing - Pre Connection Attacks/026 Criando um falso access point - pratica.mp4
23 MB
06 Network Penetration Teste - Ganhando acesso (WEPWPAWPA2 Cracking)/027 22-Network-Pentesting-Gaining-Access-ingles-portugues.pdf
246 kB
06 Network Penetration Teste - Ganhando acesso (WEPWPAWPA2 Cracking)/027 Ganhando acesso introduc227o.mp4
16 MB
06 Network Penetration Teste - Ganhando acesso (WEPWPAWPA2 Cracking)/028 WEP cracking.mp4
12 MB
06 Network Penetration Teste - Ganhando acesso (WEPWPAWPA2 Cracking)/029 WEB_caso basico.mp4
14 MB
06 Network Penetration Teste - Ganhando acesso (WEPWPAWPA2 Cracking)/030 WEP falsa autenticac227o.mp4
12 MB
06 Network Penetration Teste - Ganhando acesso (WEPWPAWPA2 Cracking)/031 arp request - WEP_replay ataque.mp4
10 MB
06 Network Penetration Teste - Ganhando acesso (WEPWPAWPA2 Cracking)/032 WPA introduc227o.mp4
7.5 MB
06 Network Penetration Teste - Ganhando acesso (WEPWPAWPA2 Cracking)/033 WPA explorando WPS.mp4
16 MB
06 Network Penetration Teste - Ganhando acesso (WEPWPAWPA2 Cracking)/034 Pacotes-do-wireshark-para-voc-fazer-download-e-verificar.pdf
69 kB
06 Network Penetration Teste - Ganhando acesso (WEPWPAWPA2 Cracking)/034 Teoria por tras de WPA-WPA2 cracking.mp4
5.0 MB
06 Network Penetration Teste - Ganhando acesso (WEPWPAWPA2 Cracking)/035 Como capturar o handshake - aperto de m227os.mp4
7.3 MB
06 Network Penetration Teste - Ganhando acesso (WEPWPAWPA2 Cracking)/035 tcp-three-way-handshake-como-capturar-teoria-e-possibilidades.txt
96 B
06 Network Penetration Teste - Ganhando acesso (WEPWPAWPA2 Cracking)/036 31-Some-Links-To-Wordlists.txt
431 B
06 Network Penetration Teste - Ganhando acesso (WEPWPAWPA2 Cracking)/036 WPA cracking - criando uma wordlist.mp4
12 MB
06 Network Penetration Teste - Ganhando acesso (WEPWPAWPA2 Cracking)/037 Mantendo a seguranca em relac227o aos ataques anteriores - teoria.html
3.7 kB
06 Network Penetration Teste - Ganhando acesso (WEPWPAWPA2 Cracking)/038 34-sec-done-pt.mp4
77 MB
06 Network Penetration Teste - Ganhando acesso (WEPWPAWPA2 Cracking)/038 Como configurac227o sua conex227o para se manter mais seguro.mp4
12 MB
07 Network Penetration Teste - Conex227o pos ataque/039 35-Network-Pentesting-Post-Connection-Attacks.pdf
1.5 MB
07 Network Penetration Teste - Conex227o pos ataque/039 Introduc227o.mp4
37 MB
07 Network Penetration Teste - Conex227o pos ataque/039 Network-Pentesting-Post-Connection-Attacks-bilinguecomtradu-o.pdf
324 kB
07 Network Penetration Teste - Conex227o pos ataque/039 Sequ-ncias-de-comando-para-Nmap.pdf
1.3 MB
07 Network Penetration Teste - Conex227o pos ataque/039 Sobre-a-porta-80-e-suas-peculiaridades.pdf
136 kB
07 Network Penetration Teste - Conex227o pos ataque/040 Obtendo informac227o - descobrindo clientes usando netdiscover.mp4
6.3 MB
07 Network Penetration Teste - Conex227o pos ataque/041 Auto-Scan-para-download.txt
82 B
07 Network Penetration Teste - Conex227o pos ataque/041 Autoscan-aula-detalhes.txt
76 B
07 Network Penetration Teste - Conex227o pos ataque/041 Obtendo informac227o atraves do AutoScan.mp4
23 MB
07 Network Penetration Teste - Conex227o pos ataque/042 Zenmap.mp4
23 MB
07 Network Penetration Teste - Conex227o pos ataque/043 MIMT - arp_poisoning.mp4
11 MB
07 Network Penetration Teste - Conex227o pos ataque/044 ARP Spoofing usando arpspoof.mp4
12 MB
07 Network Penetration Teste - Conex227o pos ataque/045 ARP Spoofing Usando MITMf.mp4
12 MB
07 Network Penetration Teste - Conex227o pos ataque/046 Bypassing HTTPS - Ultrapassando HTTPS.mp4
36 MB
07 Network Penetration Teste - Conex227o pos ataque/047 Sess227o Hijacking.mp4
22 MB
07 Network Penetration Teste - Conex227o pos ataque/048 DNS Spoofing - Domain Network Server.mp4
11 MB
07 Network Penetration Teste - Conex227o pos ataque/048 DNS-teoria.txt
95 B
07 Network Penetration Teste - Conex227o pos ataque/049 Capturando a tela e Injetando Keylogger.mp4
55 MB
07 Network Penetration Teste - Conex227o pos ataque/050 Injetando JavascriptHTML Code.mp4
19 MB
07 Network Penetration Teste - Conex227o pos ataque/051 Detalhes-e-considera-es-sobre-o-video.txt
87 B
07 Network Penetration Teste - Conex227o pos ataque/051 MITMf ataque contra reais networks.mp4
28 MB
07 Network Penetration Teste - Conex227o pos ataque/052 Wireshark Introduc227o.mp4
29 MB
07 Network Penetration Teste - Conex227o pos ataque/053 Wireshark Basics.mp4
25 MB
07 Network Penetration Teste - Conex227o pos ataque/054 Basico de Wireshark.mp4
28 MB
07 Network Penetration Teste - Conex227o pos ataque/055 Analisando pacotes do wireshark.mp4
18 MB
08 Network Penetration Testing - Detecc227o e seguranca/056 Detectando ARP Poisonning Attacks.mp4
31 MB
08 Network Penetration Testing - Detecc227o e seguranca/056 Xarp-Download-Page.txt
31 B
08 Network Penetration Testing - Detecc227o e seguranca/057 Detectando Atividades Usando Wireshark.mp4
31 MB
09 Ganhando acesso a computadores - dois tipos/058 Introduc227o.mp4
61 MB
10 Ganhando acesso - Server Side Attacks/059 52-Gaining-Access-Server-Side-Attacks.pdf
169 kB
10 Ganhando acesso - Server Side Attacks/059 Introduc227o.mp4
59 MB
10 Ganhando acesso - Server Side Attacks/060 Informac245es basicas e explorac227o - exploitation.mp4
29 MB
10 Ganhando acesso - Server Side Attacks/061 basico de Metasploit Exploit.mp4
23 MB
10 Ganhando acesso - Server Side Attacks/062 Code Execution Vulnerability - vulnerabilidade.mp4
24 MB
10 Ganhando acesso - Server Side Attacks/063 Metasploit Community.mp4
14 MB
10 Ganhando acesso - Server Side Attacks/063 Metasploit-Community-Download-Page.txt
81 B
10 Ganhando acesso - Server Side Attacks/064 Scanning alvo por Vulnerabilities.mp4
12 MB
10 Ganhando acesso - Server Side Attacks/065 MSFC - analisando o scan e explorando taticas.mp4
27 MB
10 Ganhando acesso - Server Side Attacks/066 59-nexpose-rolling-hack.txt
367 B
10 Ganhando acesso - Server Side Attacks/066 Nexpose-Download-Page.txt
63 B
10 Ganhando acesso - Server Side Attacks/066 Nexpose.mp4
62 MB
10 Ganhando acesso - Server Side Attacks/067 Nexpose - configurac227o.mp4
21 MB
10 Ganhando acesso - Server Side Attacks/068 Nexpose - analisando resultados.mp4
23 MB
11 Ganhando acesso - Client Side Attacks/069 62-Gaining-Access-Client-Side-Attacks.pdf
188 kB
11 Ganhando acesso - Client Side Attacks/069 Introduc227o.mp4
26 MB
11 Ganhando acesso - Client Side Attacks/070 CTF-vis-o-geral.txt
118 B
11 Ganhando acesso - Client Side Attacks/070 Gerando um indetectavel backdoor.mp4
70 MB
11 Ganhando acesso - Client Side Attacks/071 Esperando por comunicac245es.mp4
46 MB
11 Ganhando acesso - Client Side Attacks/072 65-evil-grade-installation-commands.txt
512 B
11 Ganhando acesso - Client Side Attacks/072 Backdoor Delivery Metodo 1 - Usando um Fake Update.mp4
28 MB
11 Ganhando acesso - Client Side Attacks/073 Backdoor Delivery Metodo 2 - Backdooring Downloads.mp4
26 MB
11 Ganhando acesso - Client Side Attacks/073 flushiptables.sh
168 B
11 Ganhando acesso - Client Side Attacks/073 payloads.txt
264 B
11 Ganhando acesso - Client Side Attacks/074 Como se proteger - metodo 3.mp4
22 MB
11 Ganhando acesso - Client Side Attacks/074 WinMD5-Download-Page.txt
23 B
12 Ganhando acesso - Client Side Attacks - Social Engineering/075 Introduc227o.mp4
36 MB
12 Ganhando acesso - Client Side Attacks - Social Engineering/076 Achando sites e informac245es pessoais do alvo.mp4
18 MB
12 Ganhando acesso - Client Side Attacks - Social Engineering/077 Missing-Facebook-Entity-Fix.txt
44 B
12 Ganhando acesso - Client Side Attacks - Social Engineering/077 Obtendo informac245es sobre o facebook.mp4
13 MB
12 Ganhando acesso - Client Side Attacks - Social Engineering/078 Obtendo informac245es sobre o Twitter.mp4
19 MB
12 Ganhando acesso - Client Side Attacks - Social Engineering/079 Obtendo informac245es sobre o e-mail.mp4
28 MB
12 Ganhando acesso - Client Side Attacks - Social Engineering/079 sam-spade.pdf
509 kB
12 Ganhando acesso - Client Side Attacks - Social Engineering/080 Social Engineering estrategia.mp4
20 MB
12 Ganhando acesso - Client Side Attacks - Social Engineering/081 Backdooring Executable Files - criando backdoors.mp4
20 MB
12 Ganhando acesso - Client Side Attacks - Social Engineering/082 75-execute-file.au3.txt
410 B
12 Ganhando acesso - Client Side Attacks - Social Engineering/082 75-payloads.txt
264 B
12 Ganhando acesso - Client Side Attacks - Social Engineering/082 Autoit-Download-Page.txt
52 B
12 Ganhando acesso - Client Side Attacks - Social Engineering/082 Backdooring tipos de arquivos (images pdfs ...etc) - Part 1.mp4
98 MB
12 Ganhando acesso - Client Side Attacks - Social Engineering/083 Backdooring tipos de arquivos - parte 2.mp4
15 MB
12 Ganhando acesso - Client Side Attacks - Social Engineering/084 Spoofing .exe Extension para qualquer extens227o.mp4
20 MB
12 Ganhando acesso - Client Side Attacks - Social Engineering/085 Spoofing Emails.mp4
21 MB
12 Ganhando acesso - Client Side Attacks - Social Engineering/086 BeEF Overview - Basico.mp4
88 MB
12 Ganhando acesso - Client Side Attacks - Social Engineering/087 BeEF - hooking targets usando MITMf.mp4
22 MB
12 Ganhando acesso - Client Side Attacks - Social Engineering/088 BeEF - Running Basic Commands On Target.mp4
12 MB
12 Ganhando acesso - Client Side Attacks - Social Engineering/089 BeEF - Stealing CredentialsPasswords Using A Fake Login Prompt.mp4
6.3 MB
12 Ganhando acesso - Client Side Attacks - Social Engineering/090 BeEF - Gaining Full Control Over Windows Target.mp4
9.7 MB
12 Ganhando acesso - Client Side Attacks - Social Engineering/091 Detecting Trojans Manually.mp4
32 MB
12 Ganhando acesso - Client Side Attacks - Social Engineering/092 Detecting Trojans Using a Sandbox.mp4
28 MB
12 Ganhando acesso - Client Side Attacks - Social Engineering/092 Hybrid-Analysis.txt
33 B
13 Post Exploitation/093 86-Post-Exploitation.pdf
304 kB
13 Post Exploitation/093 Introduc227o.mp4
23 MB
13 Post Exploitation/094 Meterpreter Basics.mp4
18 MB
13 Post Exploitation/095 File System Commands.mp4
15 MB
13 Post Exploitation/096 Mantendo acesso - Basic Methods.mp4
38 MB
13 Post Exploitation/097 Pensando um metodo indetectavel.mp4
14 MB
13 Post Exploitation/098 espiando - capturando teclado e tela.mp4
7.1 MB
13 Post Exploitation/099 Pos - explorac227o - pivoting.mp4
48 MB
13 Post Exploitation/100 Explorando devices na mesma rede que o alvo.mp4
26 MB
14 Website Penetration Testing/101 94-Web-Application-Penetration-Testing.pdf
1.6 MB
14 Website Penetration Testing/101 Introduc227o - o que e um website.mp4
71 MB
14 Website Penetration Testing/102 Como hackear um website.mp4
68 MB
15 Website Penetration Testing - obtendo informac245es/103 Usando Whois Lookup.mp4
37 MB
15 Website Penetration Testing - obtendo informac245es/103 Whois.txt
30 B
15 Website Penetration Testing - obtendo informac245es/104 Netcraft.mp4
41 MB
15 Website Penetration Testing - obtendo informac245es/104 Netcraft.txt
45 B
15 Website Penetration Testing - obtendo informac245es/105 Obtendo compreensivo DNS.mp4
53 MB
15 Website Penetration Testing - obtendo informac245es/105 Robtex.txt
24 B
15 Website Penetration Testing - obtendo informac245es/106 Descobrindo websites no mesmo servidor.mp4
24 MB
15 Website Penetration Testing - obtendo informac245es/107 Descobrindo subdominios.mp4
14 MB
15 Website Penetration Testing - obtendo informac245es/108 Descobrindo arquivos sensiveis.mp4
23 MB
15 Website Penetration Testing - obtendo informac245es/109 Analisando os arquivos.mp4
13 MB
16 Website Penetration Testing - Web Application Penetration Testing/110 Descobrindo e explorando File Upload Vulnerabilities.mp4
19 MB
16 Website Penetration Testing - Web Application Penetration Testing/111 104-code-execution-reverse-shell-commands.txt
938 B
16 Website Penetration Testing - Web Application Penetration Testing/111 Remote File Inclusion Vulnerabilities - Configuring PHP Settings.mp4
20 MB
16 Website Penetration Testing - Web Application Penetration Testing/112 Remote File Inclusion Vulnerabilities - Discovery Exploitation.mp4
13 MB
16 Website Penetration Testing - Web Application Penetration Testing/113 Prevenindo.mp4
21 MB
16 Website Penetration Testing - Web Application Penetration Testing/114 SQL Injection Vulnerabilities - What is SQL5.mp4
16 MB
16 Website Penetration Testing - Web Application Penetration Testing/115 SQL Injection Vulnerabilities - Dangers of SQLi.mp4
14 MB
16 Website Penetration Testing - Web Application Penetration Testing/116 SQL injection Vulnerabilities - Discovering SQLi In POST.mp4
24 MB
16 Website Penetration Testing - Web Application Penetration Testing/117 SQL injection Vulnerabilities - Bypassing Authentication.mp4
12 MB
16 Website Penetration Testing - Web Application Penetration Testing/118 SQL injection Vulnerabilities - Discovering SQLi in GET.mp4
18 MB
16 Website Penetration Testing - Web Application Penetration Testing/119 SQL injection Vulnerabilities - Selecting Data From Database.mp4
15 MB
16 Website Penetration Testing - Web Application Penetration Testing/120 SQL injection Vulnerabilities - Finding Database Tables.mp4
9.9 MB
16 Website Penetration Testing - Web Application Penetration Testing/121 SQL injection Vulnerabilities - Extracting Sensitive Data Such As Passwords4.mp4
13 MB
16 Website Penetration Testing - Web Application Penetration Testing/122 SQL injection Vulnerabilities - Reading Writing Files.mp4
32 MB
16 Website Penetration Testing - Web Application Penetration Testing/123 SQL injection Vulnerabilities - Using SQLmap.mp4
45 MB
16 Website Penetration Testing - Web Application Penetration Testing/124 SQL injection Vulnerabilities - Preventing SQLi.mp4
15 MB
16 Website Penetration Testing - Web Application Penetration Testing/125 Introduc227o 224 XSS.mp4
14 MB
16 Website Penetration Testing - Web Application Penetration Testing/126 Discovering XXS Vulnerabilities - Reflected XSS.mp4
12 MB
16 Website Penetration Testing - Web Application Penetration Testing/127 Discovering XXS Vulnerabilities - Stored XSS.mp4
13 MB
16 Website Penetration Testing - Web Application Penetration Testing/128 Exploiting XSS - Hooking Vulnerable Page Visitors To BeEF.mp4
51 MB
16 Website Penetration Testing - Web Application Penetration Testing/129 Preventing XSS Vulnerabilities.mp4
17 MB
16 Website Penetration Testing - Web Application Penetration Testing/130 Owasp Zap - Scanning Target Website For Vulnerabilities.mp4
14 MB
16 Website Penetration Testing - Web Application Penetration Testing/131 Owasp Zap - Analysing Scan Results.mp4
22 MB
16 Website Penetration Testing - Web Application Penetration Testing/131 OWASP-05-15-E8-published.pdf
26 kB
16 Website Penetration Testing - Web Application Penetration Testing/132 Capture the flags ou capturando as bandeiras.html
3.9 kB