TorBT - Torrents and Magnet Links Search Engine

[Coursera] Python for Cybersecurity Specialization - 5 course series

File Name
Size
0. Join Our Discord for More Awesome Stuff!.txt
156 B
pythonforcybersecurity-introduction/01_introduction-to-python-for-cybersecurity/01_introduction-to-python-for-cybersecurity/01_04_python-for-cybersecurity-resources_instructions.html
1.0 kB
pythonforcybersecurity-introduction/01_introduction-to-python-for-cybersecurity/01_introduction-to-python-for-cybersecurity/01_01_introduction-to-python-for-cybersecurity.en.txt
1.8 kB
python-for-active-defense/03_python-for-active-defense-monitoring/01_monitoring/01_01_monitoring-for-active-defense.en.txt
2.0 kB
python-for-active-defense/02_python-for-active-defense-network/01_network/01_01_active-defense-on-the-network.en.txt
2.1 kB
credential-access-discovery-lateral-movement--collection/03_python-for-lateral-movement/01_python-for-lateral-movement/01_01_mitre-att-ck-lateral-movement.en.txt
2.2 kB
execution-persistence-privilege-escalation-and-evasion/01_python-for-execution/01_python-for-execution/01_02_introduction-to-user-execution.en.txt
2.3 kB
credential-access-discovery-lateral-movement--collection/04_python-for-collection/01_python-for-collection/01_01_mitre-att-ck-collection.en.txt
2.3 kB
command-and-control-exfiltration-and-impact/02_python-for-exfiltration/01_python-for-exfiltration/01_02_introduction-to-exfiltration-over-alternative-protocols.en.txt
2.4 kB
execution-persistence-privilege-escalation-and-evasion/04_python-for-defense-evasion/01_python-for-defense-evasion/01_01_mitre-att-ck-defense-evasion.en.txt
2.4 kB
execution-persistence-privilege-escalation-and-evasion/03_python-for-privilege-escalation/01_python-for-privilege-escalation/01_01_mitre-att-ck-privilege-escalation.en.txt
2.5 kB
execution-persistence-privilege-escalation-and-evasion/02_python-for-persistence/01_python-for-persistence/01_02_introduction-to-boot-or-logon-autostart-execution.en.txt
2.6 kB
command-and-control-exfiltration-and-impact/03_python-for-impact/01_python-for-impact/01_01_mitre-att-ck-impact.en.txt
2.6 kB
credential-access-discovery-lateral-movement--collection/03_python-for-lateral-movement/01_python-for-lateral-movement/01_02_introduction-to-remote-services.en.txt
2.7 kB
command-and-control-exfiltration-and-impact/03_python-for-impact/01_python-for-impact/01_02_introduction-to-data-encrypted-for-impact.en.txt
2.7 kB
command-and-control-exfiltration-and-impact/02_python-for-exfiltration/01_python-for-exfiltration/01_01_mitre-att-ck-exfiltration.en.txt
2.7 kB
execution-persistence-privilege-escalation-and-evasion/02_python-for-persistence/01_python-for-persistence/01_01_mitre-att-ck-persistence.en.txt
2.7 kB
execution-persistence-privilege-escalation-and-evasion/01_python-for-execution/01_python-for-execution/01_01_mitre-att-ck-execution.en.txt
2.7 kB
credential-access-discovery-lateral-movement--collection/02_python-for-discovery/01_python-for-discovery/01_04_introduction-to-file-and-directory-discovery.en.txt
2.8 kB
pythonforcybersecurity-introduction/01_introduction-to-python-for-cybersecurity/01_introduction-to-python-for-cybersecurity/01_01_introduction-to-python-for-cybersecurity.en.srt
2.8 kB
credential-access-discovery-lateral-movement--collection/02_python-for-discovery/01_python-for-discovery/01_01_mitre-att-ck-discovery.en.txt
2.9 kB
python-for-active-defense/03_python-for-active-defense-monitoring/01_monitoring/01_02_network-monitoring-for-active-defense.en.txt
2.9 kB
python-for-active-defense/02_python-for-active-defense-network/01_network/01_02_pcap-collection-for-active-defense.en.txt
3.0 kB
pythonforcybersecurity-introduction/03_python-for-initial-access/01_python-for-initial-access/01_01_mitre-att-ck-initial-access.en.txt
3.0 kB
python-for-active-defense/02_python-for-active-defense-network/01_network/01_04_protocol-decoding-for-active-defense.en.txt
3.1 kB
python-for-active-defense/02_python-for-active-defense-network/01_network/01_06_burn-in-for-active-defense.en.txt
3.1 kB
command-and-control-exfiltration-and-impact/01_python-for-command-and-control/01_python-for-command-and-control/01_01_mitre-att-ck-command-and-control.en.txt
3.1 kB
credential-access-discovery-lateral-movement--collection/01_python-for-credential-access/01_python-for-credential-access/01_02_introduction-to-credentials-from-password-stores.en.txt
3.2 kB
execution-persistence-privilege-escalation-and-evasion/01_python-for-execution/01_python-for-execution/01_04_introduction-to-scheduled-tasks-and-jobs.en.txt
3.2 kB
execution-persistence-privilege-escalation-and-evasion/02_python-for-persistence/01_python-for-persistence/01_04_introduction-to-hijack-execution-flow.en.txt
3.2 kB
execution-persistence-privilege-escalation-and-evasion/03_python-for-privilege-escalation/01_python-for-privilege-escalation/01_02_introduction-to-boot-or-logon-autostart-execution.en.txt
3.2 kB
command-and-control-exfiltration-and-impact/02_python-for-exfiltration/01_python-for-exfiltration/01_04_introduction-to-non-application-layer-protocol.en.txt
3.2 kB
python-for-active-defense/03_python-for-active-defense-monitoring/01_monitoring/01_01_monitoring-for-active-defense.en.srt
3.3 kB
credential-access-discovery-lateral-movement--collection/01_python-for-credential-access/01_python-for-credential-access/01_01_mitre-att-ck-credential-access.en.txt
3.3 kB
pythonforcybersecurity-introduction/02_python-for-pre-att-ck/01_python-for-pre-att-ck/01_05_introduction-to-open-technical-databases.en.txt
3.4 kB
pythonforcybersecurity-introduction/01_introduction-to-python-for-cybersecurity/01_introduction-to-python-for-cybersecurity/01_05_python-for-cybersecurity_quiz.html
3.4 kB
command-and-control-exfiltration-and-impact/02_python-for-exfiltration/01_python-for-exfiltration/01_05_non-application-layer-protocol.en.txt
3.4 kB
python-for-active-defense/01_python-for-active-defense-decoys/01_decoys/01_01_introduction-to-decoys.en.txt
3.5 kB
credential-access-discovery-lateral-movement--collection/03_python-for-lateral-movement/01_python-for-lateral-movement/01_01_mitre-att-ck-lateral-movement.en.srt
3.5 kB
python-for-active-defense/01_python-for-active-defense-decoys/01_decoys/01_04_decoy-content-for-active-defense.en.txt
3.6 kB
command-and-control-exfiltration-and-impact/03_python-for-impact/01_python-for-impact/01_04_introduction-to-account-access-removal.en.txt
3.6 kB
credential-access-discovery-lateral-movement--collection/04_python-for-collection/01_python-for-collection/01_05_local-email-collection.en.txt
3.6 kB
execution-persistence-privilege-escalation-and-evasion/04_python-for-defense-evasion/01_python-for-defense-evasion/01_02_introduction-to-impair-defenses.en.txt
3.6 kB
credential-access-discovery-lateral-movement--collection/01_python-for-credential-access/01_python-for-credential-access/01_04_introduction-to-network-sniffing.en.txt
3.6 kB
command-and-control-exfiltration-and-impact/01_python-for-command-and-control/01_python-for-command-and-control/01_02_introduction-to-encrypted-channels.en.txt
3.6 kB
python-for-active-defense/01_python-for-active-defense-decoys/01_decoys/01_02_decoy-processes-for-active-defense.en.txt
3.7 kB
credential-access-discovery-lateral-movement--collection/02_python-for-discovery/01_python-for-discovery/01_02_introduction-to-account-discovery.en.txt
3.7 kB
credential-access-discovery-lateral-movement--collection/04_python-for-collection/01_python-for-collection/01_01_mitre-att-ck-collection.en.srt
3.7 kB
python-for-active-defense/03_python-for-active-defense-monitoring/01_monitoring/01_04_system-activity-monitoring-for-active-defense.en.txt
3.7 kB
pythonforcybersecurity-introduction/02_python-for-pre-att-ck/01_python-for-pre-att-ck/01_02_introduction-to-network-scanning.en.txt
3.7 kB
pythonforcybersecurity-introduction/03_python-for-initial-access/01_python-for-initial-access/01_02_introduction-to-valid-accounts.en.txt
3.8 kB
credential-access-discovery-lateral-movement--collection/04_python-for-collection/01_python-for-collection/01_04_introduction-to-email-collection.en.txt
3.8 kB
pythonforcybersecurity-introduction/03_python-for-initial-access/01_python-for-initial-access/01_04_introduction-to-replication-through-removable-media.en.txt
3.9 kB
python-for-active-defense/02_python-for-active-defense-network/01_network/01_01_active-defense-on-the-network.en.srt
3.9 kB
pythonforcybersecurity-introduction/02_python-for-pre-att-ck/01_python-for-pre-att-ck/01_07_python-for-pre-att-ck_quiz.html
3.9 kB
pythonforcybersecurity-introduction/02_python-for-pre-att-ck/01_python-for-pre-att-ck/01_01_mitre-pre-att-ck.en.txt
3.9 kB
credential-access-discovery-lateral-movement--collection/04_python-for-collection/01_python-for-collection/01_02_introduction-to-clipboard-data.en.txt
3.9 kB
credential-access-discovery-lateral-movement--collection/02_python-for-discovery/01_python-for-discovery/01_06_python-for-discovery_quiz.html
4.0 kB
command-and-control-exfiltration-and-impact/02_python-for-exfiltration/01_python-for-exfiltration/01_06_python-for-exfiltration_quiz.html
4.0 kB
python-for-active-defense/01_python-for-active-defense-decoys/01_decoys/01_06_decoy-credentials-for-active-defense.en.txt
4.0 kB
credential-access-discovery-lateral-movement--collection/03_python-for-lateral-movement/01_python-for-lateral-movement/01_04_introduction-to-use-alternative-authentication-material.en.txt
4.0 kB
command-and-control-exfiltration-and-impact/01_python-for-command-and-control/01_python-for-command-and-control/01_04_introduction-to-protocol-tunneling.en.txt
4.0 kB
execution-persistence-privilege-escalation-and-evasion/02_python-for-persistence/01_python-for-persistence/01_06_python-for-persistence_quiz.html
4.1 kB
credential-access-discovery-lateral-movement--collection/01_python-for-credential-access/01_python-for-credential-access/01_06_python-for-credential-access_quiz.html
4.1 kB
execution-persistence-privilege-escalation-and-evasion/04_python-for-defense-evasion/01_python-for-defense-evasion/01_04_introduction-to-hide-artifacts.en.txt
4.1 kB
command-and-control-exfiltration-and-impact/03_python-for-impact/01_python-for-impact/01_01_mitre-att-ck-impact.en.srt
4.1 kB
python-for-active-defense/01_python-for-active-defense-decoys/01_decoys/01_05_decoy-content.en.txt
4.1 kB
execution-persistence-privilege-escalation-and-evasion/01_python-for-execution/01_python-for-execution/01_06_python-for-execution_quiz.html
4.1 kB
python-for-active-defense/03_python-for-active-defense-monitoring/01_monitoring/01_06_behavioral-analytics-for-active-defense.en.txt
4.2 kB
execution-persistence-privilege-escalation-and-evasion/01_python-for-execution/01_python-for-execution/01_02_introduction-to-user-execution.en.srt
4.2 kB
command-and-control-exfiltration-and-impact/02_python-for-exfiltration/01_python-for-exfiltration/01_01_mitre-att-ck-exfiltration.en.srt
4.2 kB
python-for-active-defense/02_python-for-active-defense-network/01_network/01_08_network_quiz.html
4.2 kB
pythonforcybersecurity-introduction/01_introduction-to-python-for-cybersecurity/01_introduction-to-python-for-cybersecurity/01_02_introduction-to-python.en.txt
4.3 kB
execution-persistence-privilege-escalation-and-evasion/04_python-for-defense-evasion/01_python-for-defense-evasion/01_06_python-for-defense-evasion_exam.html
4.3 kB
pythonforcybersecurity-introduction/03_python-for-initial-access/01_python-for-initial-access/01_06_python-for-initial-access_exam.html
4.3 kB
credential-access-discovery-lateral-movement--collection/02_python-for-discovery/01_python-for-discovery/01_04_introduction-to-file-and-directory-discovery.en.srt
4.4 kB
command-and-control-exfiltration-and-impact/02_python-for-exfiltration/01_python-for-exfiltration/01_02_introduction-to-exfiltration-over-alternative-protocols.en.srt
4.4 kB
execution-persistence-privilege-escalation-and-evasion/03_python-for-privilege-escalation/01_python-for-privilege-escalation/01_04_introduction-to-process-injection.en.txt
4.5 kB
credential-access-discovery-lateral-movement--collection/02_python-for-discovery/01_python-for-discovery/01_01_mitre-att-ck-discovery.en.srt
4.5 kB
execution-persistence-privilege-escalation-and-evasion/04_python-for-defense-evasion/01_python-for-defense-evasion/01_01_mitre-att-ck-defense-evasion.en.srt
4.5 kB
python-for-active-defense/03_python-for-active-defense-monitoring/01_monitoring/01_08_monitoring_exam.html
4.5 kB
command-and-control-exfiltration-and-impact/03_python-for-impact/01_python-for-impact/01_06_python-for-impact_exam.html
4.5 kB
command-and-control-exfiltration-and-impact/01_python-for-command-and-control/01_python-for-command-and-control/01_06_python-for-command-and-control_quiz.html
4.6 kB
credential-access-discovery-lateral-movement--collection/04_python-for-collection/01_python-for-collection/01_06_python-for-collection_exam.html
4.6 kB
credential-access-discovery-lateral-movement--collection/03_python-for-lateral-movement/01_python-for-lateral-movement/01_06_python-for-lateral-movement_quiz.html
4.7 kB
execution-persistence-privilege-escalation-and-evasion/03_python-for-privilege-escalation/01_python-for-privilege-escalation/01_01_mitre-att-ck-privilege-escalation.en.srt
4.8 kB
execution-persistence-privilege-escalation-and-evasion/02_python-for-persistence/01_python-for-persistence/01_02_introduction-to-boot-or-logon-autostart-execution.en.srt
4.8 kB
execution-persistence-privilege-escalation-and-evasion/03_python-for-privilege-escalation/01_python-for-privilege-escalation/01_06_python-for-privilege-escalation_quiz.html
4.9 kB
python-for-active-defense/01_python-for-active-defense-decoys/01_decoys/01_08_decoys_quiz.html
4.9 kB
command-and-control-exfiltration-and-impact/02_python-for-exfiltration/01_python-for-exfiltration/01_04_introduction-to-non-application-layer-protocol.en.srt
5.0 kB
credential-access-discovery-lateral-movement--collection/03_python-for-lateral-movement/01_python-for-lateral-movement/01_02_introduction-to-remote-services.en.srt
5.0 kB
execution-persistence-privilege-escalation-and-evasion/02_python-for-persistence/01_python-for-persistence/01_01_mitre-att-ck-persistence.en.srt
5.0 kB
execution-persistence-privilege-escalation-and-evasion/01_python-for-execution/01_python-for-execution/01_01_mitre-att-ck-execution.en.srt
5.1 kB
command-and-control-exfiltration-and-impact/03_python-for-impact/01_python-for-impact/01_02_introduction-to-data-encrypted-for-impact.en.srt
5.1 kB
credential-access-discovery-lateral-movement--collection/01_python-for-credential-access/01_python-for-credential-access/01_01_mitre-att-ck-credential-access.en.srt
5.2 kB
credential-access-discovery-lateral-movement--collection/03_python-for-lateral-movement/01_python-for-lateral-movement/01_03_smb-windows-admin-shares.en.txt
5.3 kB
python-for-active-defense/03_python-for-active-defense-monitoring/01_monitoring/01_02_network-monitoring-for-active-defense.en.srt
5.5 kB
python-for-active-defense/01_python-for-active-defense-decoys/01_decoys/01_04_decoy-content-for-active-defense.en.srt
5.5 kB
pythonforcybersecurity-introduction/03_python-for-initial-access/01_python-for-initial-access/01_01_mitre-att-ck-initial-access.en.srt
5.6 kB
python-for-active-defense/02_python-for-active-defense-network/01_network/01_02_pcap-collection-for-active-defense.en.srt
5.6 kB
python-for-active-defense/02_python-for-active-defense-network/01_network/01_04_protocol-decoding-for-active-defense.en.srt
5.8 kB
command-and-control-exfiltration-and-impact/01_python-for-command-and-control/01_python-for-command-and-control/01_01_mitre-att-ck-command-and-control.en.srt
5.8 kB
python-for-active-defense/02_python-for-active-defense-network/01_network/01_06_burn-in-for-active-defense.en.srt
5.9 kB
python-for-active-defense/03_python-for-active-defense-monitoring/01_monitoring/01_04_system-activity-monitoring-for-active-defense.en.srt
5.9 kB
credential-access-discovery-lateral-movement--collection/01_python-for-credential-access/01_python-for-credential-access/01_02_introduction-to-credentials-from-password-stores.en.srt
5.9 kB
execution-persistence-privilege-escalation-and-evasion/03_python-for-privilege-escalation/01_python-for-privilege-escalation/01_02_introduction-to-boot-or-logon-autostart-execution.en.srt
6.0 kB
execution-persistence-privilege-escalation-and-evasion/02_python-for-persistence/01_python-for-persistence/01_04_introduction-to-hijack-execution-flow.en.srt
6.0 kB
execution-persistence-privilege-escalation-and-evasion/01_python-for-execution/01_python-for-execution/01_04_introduction-to-scheduled-tasks-and-jobs.en.srt
6.0 kB
pythonforcybersecurity-introduction/02_python-for-pre-att-ck/01_python-for-pre-att-ck/01_03_introduction-to-scapy.en.txt
6.2 kB
credential-access-discovery-lateral-movement--collection/04_python-for-collection/01_python-for-collection/01_03_clipboard-data.en.txt
6.2 kB
credential-access-discovery-lateral-movement--collection/04_python-for-collection/01_python-for-collection/01_02_introduction-to-clipboard-data.en.srt
6.3 kB
credential-access-discovery-lateral-movement--collection/03_python-for-lateral-movement/01_python-for-lateral-movement/01_04_introduction-to-use-alternative-authentication-material.en.srt
6.3 kB
command-and-control-exfiltration-and-impact/01_python-for-command-and-control/01_python-for-command-and-control/01_04_introduction-to-protocol-tunneling.en.srt
6.3 kB
credential-access-discovery-lateral-movement--collection/03_python-for-lateral-movement/01_python-for-lateral-movement/01_05_web-session-cookie.en.txt
6.4 kB
pythonforcybersecurity-introduction/02_python-for-pre-att-ck/01_python-for-pre-att-ck/01_05_introduction-to-open-technical-databases.en.srt
6.4 kB
python-for-active-defense/01_python-for-active-defense-decoys/01_decoys/01_06_decoy-credentials-for-active-defense.en.srt
6.4 kB
command-and-control-exfiltration-and-impact/02_python-for-exfiltration/01_python-for-exfiltration/01_05_non-application-layer-protocol.en.srt
6.4 kB
pythonforcybersecurity-introduction/01_introduction-to-python-for-cybersecurity/01_introduction-to-python-for-cybersecurity/01_03_introduction-to-mitre-att-ck-and-shield.en.txt
6.4 kB
python-for-active-defense/01_python-for-active-defense-decoys/01_decoys/01_01_introduction-to-decoys.en.srt
6.5 kB
python-for-active-defense/03_python-for-active-defense-monitoring/01_monitoring/01_06_behavioral-analytics-for-active-defense.en.srt
6.6 kB
credential-access-discovery-lateral-movement--collection/04_python-for-collection/01_python-for-collection/01_05_local-email-collection.en.srt
6.6 kB
credential-access-discovery-lateral-movement--collection/01_python-for-credential-access/01_python-for-credential-access/01_04_introduction-to-network-sniffing.en.srt
6.6 kB
python-for-active-defense/01_python-for-active-defense-decoys/01_decoys/01_02_decoy-processes-for-active-defense.en.srt
6.7 kB
pythonforcybersecurity-introduction/01_introduction-to-python-for-cybersecurity/01_introduction-to-python-for-cybersecurity/01_02_introduction-to-python.en.srt
6.7 kB
command-and-control-exfiltration-and-impact/03_python-for-impact/01_python-for-impact/01_04_introduction-to-account-access-removal.en.srt
6.7 kB
credential-access-discovery-lateral-movement--collection/01_python-for-credential-access/01_python-for-credential-access/01_03_credentials-from-web-browsers.en.txt
6.8 kB
credential-access-discovery-lateral-movement--collection/02_python-for-discovery/01_python-for-discovery/01_02_introduction-to-account-discovery.en.srt
6.9 kB
execution-persistence-privilege-escalation-and-evasion/04_python-for-defense-evasion/01_python-for-defense-evasion/01_02_introduction-to-impair-defenses.en.srt
6.9 kB
execution-persistence-privilege-escalation-and-evasion/01_python-for-execution/01_python-for-execution/01_03_malicious-links.en.txt
6.9 kB
command-and-control-exfiltration-and-impact/01_python-for-command-and-control/01_python-for-command-and-control/01_02_introduction-to-encrypted-channels.en.srt
7.0 kB
pythonforcybersecurity-introduction/03_python-for-initial-access/01_python-for-initial-access/01_02_introduction-to-valid-accounts.en.srt
7.0 kB
pythonforcybersecurity-introduction/02_python-for-pre-att-ck/01_python-for-pre-att-ck/01_02_introduction-to-network-scanning.en.srt
7.1 kB
credential-access-discovery-lateral-movement--collection/04_python-for-collection/01_python-for-collection/01_04_introduction-to-email-collection.en.srt
7.1 kB
credential-access-discovery-lateral-movement--collection/02_python-for-discovery/01_python-for-discovery/01_05_file-and-directory-discovery.en.txt
7.1 kB
command-and-control-exfiltration-and-impact/03_python-for-impact/01_python-for-impact/01_05_account-access-removal.en.txt
7.1 kB
execution-persistence-privilege-escalation-and-evasion/03_python-for-privilege-escalation/01_python-for-privilege-escalation/01_05_python-library-injection.en.txt
7.2 kB
pythonforcybersecurity-introduction/03_python-for-initial-access/01_python-for-initial-access/01_04_introduction-to-replication-through-removable-media.en.srt
7.2 kB
pythonforcybersecurity-introduction/02_python-for-pre-att-ck/01_python-for-pre-att-ck/01_01_mitre-pre-att-ck.en.srt
7.3 kB
command-and-control-exfiltration-and-impact/01_python-for-command-and-control/01_python-for-command-and-control/01_05_protocol-tunneling.en.txt
7.3 kB
python-for-active-defense/03_python-for-active-defense-monitoring/01_monitoring/01_03_network-monitoring.en.txt
7.4 kB
python-for-active-defense/01_python-for-active-defense-decoys/01_decoys/01_03_decoy-processes.en.txt
7.5 kB
python-for-active-defense/02_python-for-active-defense-network/01_network/01_07_burn-in.en.txt
7.7 kB
execution-persistence-privilege-escalation-and-evasion/01_python-for-execution/01_python-for-execution/01_05_scheduled-execution.en.txt
7.7 kB
python-for-active-defense/01_python-for-active-defense-decoys/01_decoys/01_05_decoy-content.en.srt
7.8 kB
execution-persistence-privilege-escalation-and-evasion/04_python-for-defense-evasion/01_python-for-defense-evasion/01_04_introduction-to-hide-artifacts.en.srt
7.8 kB
command-and-control-exfiltration-and-impact/03_python-for-impact/01_python-for-impact/01_03_data-encryption.en.txt
8.3 kB
credential-access-discovery-lateral-movement--collection/03_python-for-lateral-movement/01_python-for-lateral-movement/01_03_smb-windows-admin-shares.en.srt
8.3 kB
python-for-active-defense/01_python-for-active-defense-decoys/01_decoys/01_07_decoy-credentials.en.txt
8.4 kB
execution-persistence-privilege-escalation-and-evasion/03_python-for-privilege-escalation/01_python-for-privilege-escalation/01_04_introduction-to-process-injection.en.srt
8.4 kB
execution-persistence-privilege-escalation-and-evasion/04_python-for-defense-evasion/01_python-for-defense-evasion/01_05_alternate-data-streams.en.txt
8.4 kB
execution-persistence-privilege-escalation-and-evasion/04_python-for-defense-evasion/01_python-for-defense-evasion/01_03_impair-avs.en.txt
8.5 kB
pythonforcybersecurity-introduction/03_python-for-initial-access/01_python-for-initial-access/01_03_default-account-discovery.en.txt
8.8 kB
pythonforcybersecurity-introduction/03_python-for-initial-access/01_python-for-initial-access/01_05_autorun-scripts.en.txt
9.2 kB
credential-access-discovery-lateral-movement--collection/04_python-for-collection/01_python-for-collection/01_03_clipboard-data.en.srt
9.8 kB
execution-persistence-privilege-escalation-and-evasion/03_python-for-privilege-escalation/01_python-for-privilege-escalation/01_03_logon-scripts.en.txt
10 kB
pythonforcybersecurity-introduction/01_introduction-to-python-for-cybersecurity/01_introduction-to-python-for-cybersecurity/01_03_introduction-to-mitre-att-ck-and-shield.en.srt
10 kB
python-for-active-defense/03_python-for-active-defense-monitoring/01_monitoring/01_05_system-activity-monitoring.en.txt
10 kB
command-and-control-exfiltration-and-impact/01_python-for-command-and-control/01_python-for-command-and-control/01_03_encrypted-channel.en.txt
10 kB
execution-persistence-privilege-escalation-and-evasion/01_python-for-execution/01_python-for-execution/01_03_malicious-links.en.srt
11 kB
credential-access-discovery-lateral-movement--collection/01_python-for-credential-access/01_python-for-credential-access/01_03_credentials-from-web-browsers.en.srt
11 kB
python-for-active-defense/02_python-for-active-defense-network/01_network/01_03_pcap-collection.en.txt
11 kB
command-and-control-exfiltration-and-impact/03_python-for-impact/01_python-for-impact/01_05_account-access-removal.en.srt
11 kB
execution-persistence-privilege-escalation-and-evasion/02_python-for-persistence/01_python-for-persistence/01_03_registry-autorun.en.txt
11 kB
execution-persistence-privilege-escalation-and-evasion/03_python-for-privilege-escalation/01_python-for-privilege-escalation/01_05_python-library-injection.en.srt
11 kB
execution-persistence-privilege-escalation-and-evasion/02_python-for-persistence/01_python-for-persistence/01_05_hijacked-execution-flow.en.txt
12 kB
credential-access-discovery-lateral-movement--collection/02_python-for-discovery/01_python-for-discovery/01_03_user-account-discovery.en.txt
12 kB
pythonforcybersecurity-introduction/02_python-for-pre-att-ck/01_python-for-pre-att-ck/01_03_introduction-to-scapy.en.srt
12 kB
credential-access-discovery-lateral-movement--collection/03_python-for-lateral-movement/01_python-for-lateral-movement/01_05_web-session-cookie.en.srt
12 kB
python-for-active-defense/03_python-for-active-defense-monitoring/01_monitoring/01_07_behavioral-analytics.en.txt
12 kB
pythonforcybersecurity-introduction/02_python-for-pre-att-ck/01_python-for-pre-att-ck/01_06_dns-exploration.en.txt
13 kB
python-for-active-defense/02_python-for-active-defense-network/01_network/01_05_protocol-decoding.en.txt
13 kB
command-and-control-exfiltration-and-impact/03_python-for-impact/01_python-for-impact/01_03_data-encryption.en.srt
13 kB
execution-persistence-privilege-escalation-and-evasion/04_python-for-defense-evasion/01_python-for-defense-evasion/01_03_impair-avs.en.srt
13 kB
credential-access-discovery-lateral-movement--collection/02_python-for-discovery/01_python-for-discovery/01_05_file-and-directory-discovery.en.srt
13 kB
command-and-control-exfiltration-and-impact/01_python-for-command-and-control/01_python-for-command-and-control/01_05_protocol-tunneling.en.srt
14 kB
python-for-active-defense/03_python-for-active-defense-monitoring/01_monitoring/01_03_network-monitoring.en.srt
14 kB
python-for-active-defense/01_python-for-active-defense-decoys/01_decoys/01_03_decoy-processes.en.srt
14 kB
python-for-active-defense/02_python-for-active-defense-network/01_network/01_07_burn-in.en.srt
15 kB
execution-persistence-privilege-escalation-and-evasion/01_python-for-execution/01_python-for-execution/01_05_scheduled-execution.en.srt
15 kB
pythonforcybersecurity-introduction/02_python-for-pre-att-ck/01_python-for-pre-att-ck/01_04_network-scanning.en.txt
16 kB
python-for-active-defense/01_python-for-active-defense-decoys/01_decoys/01_07_decoy-credentials.en.srt
16 kB
execution-persistence-privilege-escalation-and-evasion/04_python-for-defense-evasion/01_python-for-defense-evasion/01_05_alternate-data-streams.en.srt
16 kB
pythonforcybersecurity-introduction/03_python-for-initial-access/01_python-for-initial-access/01_03_default-account-discovery.en.srt
16 kB
credential-access-discovery-lateral-movement--collection/01_python-for-credential-access/01_python-for-credential-access/01_05_network-sniffing.en.txt
17 kB
pythonforcybersecurity-introduction/03_python-for-initial-access/01_python-for-initial-access/01_05_autorun-scripts.en.srt
17 kB
python-for-active-defense/02_python-for-active-defense-network/01_network/01_03_pcap-collection.en.srt
18 kB
execution-persistence-privilege-escalation-and-evasion/02_python-for-persistence/01_python-for-persistence/01_03_registry-autorun.en.srt
18 kB
execution-persistence-privilege-escalation-and-evasion/02_python-for-persistence/01_python-for-persistence/01_05_hijacked-execution-flow.en.srt
18 kB
execution-persistence-privilege-escalation-and-evasion/03_python-for-privilege-escalation/01_python-for-privilege-escalation/01_03_logon-scripts.en.srt
19 kB
pythonforcybersecurity-introduction/02_python-for-pre-att-ck/01_python-for-pre-att-ck/01_06_dns-exploration.en.srt
20 kB
python-for-active-defense/03_python-for-active-defense-monitoring/01_monitoring/01_05_system-activity-monitoring.en.srt
20 kB
python-for-active-defense/03_python-for-active-defense-monitoring/01_monitoring/01_07_behavioral-analytics.en.srt
20 kB
python-for-active-defense/02_python-for-active-defense-network/01_network/01_05_protocol-decoding.en.srt
20 kB
command-and-control-exfiltration-and-impact/01_python-for-command-and-control/01_python-for-command-and-control/01_03_encrypted-channel.en.srt
20 kB
command-and-control-exfiltration-and-impact/02_python-for-exfiltration/01_python-for-exfiltration/01_03_alternative-protocol.en.txt
20 kB
credential-access-discovery-lateral-movement--collection/02_python-for-discovery/01_python-for-discovery/01_03_user-account-discovery.en.srt
22 kB
pythonforcybersecurity-introduction/01_introduction-to-python-for-cybersecurity/01_introduction-to-python-for-cybersecurity/01_04_python-for-cybersecurity-resources_Python_for_Cybersecurity_Handout.pdf
25 kB
pythonforcybersecurity-introduction/02_python-for-pre-att-ck/01_python-for-pre-att-ck/01_04_network-scanning.en.srt
30 kB
credential-access-discovery-lateral-movement--collection/01_python-for-credential-access/01_python-for-credential-access/01_05_network-sniffing.en.srt
32 kB
command-and-control-exfiltration-and-impact/02_python-for-exfiltration/01_python-for-exfiltration/01_03_alternative-protocol.en.srt
39 kB
pythonforcybersecurity-introduction/01_introduction-to-python-for-cybersecurity/01_introduction-to-python-for-cybersecurity/01_01_introduction-to-python-for-cybersecurity.mp4
3.9 MB
python-for-active-defense/03_python-for-active-defense-monitoring/01_monitoring/01_01_monitoring-for-active-defense.mp4
4.4 MB
execution-persistence-privilege-escalation-and-evasion/01_python-for-execution/01_python-for-execution/01_02_introduction-to-user-execution.mp4
4.8 MB
python-for-active-defense/02_python-for-active-defense-network/01_network/01_01_active-defense-on-the-network.mp4
4.9 MB
credential-access-discovery-lateral-movement--collection/04_python-for-collection/01_python-for-collection/01_01_mitre-att-ck-collection.mp4
5.0 MB
credential-access-discovery-lateral-movement--collection/03_python-for-lateral-movement/01_python-for-lateral-movement/01_01_mitre-att-ck-lateral-movement.mp4
5.1 MB
command-and-control-exfiltration-and-impact/03_python-for-impact/01_python-for-impact/01_01_mitre-att-ck-impact.mp4
5.8 MB
credential-access-discovery-lateral-movement--collection/02_python-for-discovery/01_python-for-discovery/01_04_introduction-to-file-and-directory-discovery.mp4
5.8 MB
command-and-control-exfiltration-and-impact/02_python-for-exfiltration/01_python-for-exfiltration/01_02_introduction-to-exfiltration-over-alternative-protocols.mp4
5.8 MB
execution-persistence-privilege-escalation-and-evasion/03_python-for-privilege-escalation/01_python-for-privilege-escalation/01_01_mitre-att-ck-privilege-escalation.mp4
5.8 MB
command-and-control-exfiltration-and-impact/03_python-for-impact/01_python-for-impact/01_02_introduction-to-data-encrypted-for-impact.mp4
6.0 MB
command-and-control-exfiltration-and-impact/02_python-for-exfiltration/01_python-for-exfiltration/01_01_mitre-att-ck-exfiltration.mp4
6.0 MB
credential-access-discovery-lateral-movement--collection/03_python-for-lateral-movement/01_python-for-lateral-movement/01_02_introduction-to-remote-services.mp4
6.1 MB
execution-persistence-privilege-escalation-and-evasion/01_python-for-execution/01_python-for-execution/01_01_mitre-att-ck-execution.mp4
6.1 MB
execution-persistence-privilege-escalation-and-evasion/02_python-for-persistence/01_python-for-persistence/01_02_introduction-to-boot-or-logon-autostart-execution.mp4
6.2 MB
execution-persistence-privilege-escalation-and-evasion/02_python-for-persistence/01_python-for-persistence/01_01_mitre-att-ck-persistence.mp4
6.2 MB
python-for-active-defense/02_python-for-active-defense-network/01_network/01_02_pcap-collection-for-active-defense.mp4
6.3 MB
execution-persistence-privilege-escalation-and-evasion/01_python-for-execution/01_python-for-execution/01_04_introduction-to-scheduled-tasks-and-jobs.mp4
6.3 MB
credential-access-discovery-lateral-movement--collection/02_python-for-discovery/01_python-for-discovery/01_01_mitre-att-ck-discovery.mp4
6.3 MB
execution-persistence-privilege-escalation-and-evasion/04_python-for-defense-evasion/01_python-for-defense-evasion/01_01_mitre-att-ck-defense-evasion.mp4
6.4 MB
command-and-control-exfiltration-and-impact/02_python-for-exfiltration/01_python-for-exfiltration/01_04_introduction-to-non-application-layer-protocol.mp4
6.5 MB
credential-access-discovery-lateral-movement--collection/01_python-for-credential-access/01_python-for-credential-access/01_02_introduction-to-credentials-from-password-stores.mp4
6.6 MB
pythonforcybersecurity-introduction/03_python-for-initial-access/01_python-for-initial-access/01_01_mitre-att-ck-initial-access.mp4
6.6 MB
command-and-control-exfiltration-and-impact/02_python-for-exfiltration/01_python-for-exfiltration/01_05_non-application-layer-protocol.mp4
6.8 MB
python-for-active-defense/02_python-for-active-defense-network/01_network/01_04_protocol-decoding-for-active-defense.mp4
6.8 MB
python-for-active-defense/03_python-for-active-defense-monitoring/01_monitoring/01_02_network-monitoring-for-active-defense.mp4
6.9 MB
python-for-active-defense/02_python-for-active-defense-network/01_network/01_06_burn-in-for-active-defense.mp4
7.1 MB
execution-persistence-privilege-escalation-and-evasion/03_python-for-privilege-escalation/01_python-for-privilege-escalation/01_02_introduction-to-boot-or-logon-autostart-execution.mp4
7.1 MB
command-and-control-exfiltration-and-impact/01_python-for-command-and-control/01_python-for-command-and-control/01_01_mitre-att-ck onehack.us.mp4
7.3 MB
credential-access-discovery-lateral-movement--collection/04_python-for-collection/01_python-for-collection/01_05_local-email-collection.mp4
7.3 MB
credential-access-discovery-lateral-movement--collection/02_python-for-discovery/01_python-for-discovery/01_02_introduction-to-account-discovery.mp4
7.4 MB
credential-access-discovery-lateral-movement--collection/01_python-for-credential-access/01_python-for-credential-access/01_01_mitre-att-ck-credential-access.mp4
7.4 MB
command-and-control-exfiltration-and-impact/03_python-for-impact/01_python-for-impact/01_04_introduction-to-account-access-removal.mp4
7.4 MB
command-and-control-exfiltration-and-impact/01_python-for-command-and-control/01_python-for-command-and-control/01_04_introduction-to-protocol-tunneling.mp4
7.5 MB
credential-access-discovery-lateral-movement--collection/04_python-for-collection/01_python-for-collection/01_04_introduction-to-email-collection.mp4
7.5 MB
credential-access-discovery-lateral-movement--collection/01_python-for-credential-access/01_python-for-credential-access/01_04_introduction-to-network-sniffing.mp4
7.6 MB
execution-persistence-privilege-escalation-and-evasion/02_python-for-persistence/01_python-for-persistence/01_04_introduction-to-hijack-execution-flow.mp4
7.7 MB
pythonforcybersecurity-introduction/02_python-for-pre-att-ck/01_python-for-pre-att-ck/01_05_introduction-to-open-technical-databases.mp4
7.7 MB
python-for-active-defense/01_python-for-active-defense-decoys/01_decoys/01_06_decoy-credentials-for-active-defense.mp4
7.7 MB
command-and-control-exfiltration-and-impact/01_python-for-command-and-control/01_python-for-command-and-control/01_02_introduction-to-encrypted-channels.mp4
7.8 MB
python-for-active-defense/01_python-for-active-defense-decoys/01_decoys/01_04_decoy-content-for-active-defense.mp4
7.8 MB
pythonforcybersecurity-introduction/02_python-for-pre-att-ck/01_python-for-pre-att-ck/01_02_introduction-to-network-scanning.mp4
8.0 MB
credential-access-discovery-lateral-movement--collection/04_python-for-collection/01_python-for-collection/01_02_introduction-to-clipboard-data.mp4
8.1 MB
python-for-active-defense/01_python-for-active-defense-decoys/01_decoys/01_01_introduction-to-decoys.mp4
8.1 MB
pythonforcybersecurity-introduction/03_python-for-initial-access/01_python-for-initial-access/01_04_introduction-to-replication-through-removable-media.mp4
8.1 MB
pythonforcybersecurity-introduction/03_python-for-initial-access/01_python-for-initial-access/01_02_introduction-to-valid-accounts.mp4
8.2 MB
python-for-active-defense/01_python-for-active-defense-decoys/01_decoys/01_02_decoy-processes-for-active-defense.mp4
8.2 MB
python-for-active-defense/03_python-for-active-defense-monitoring/01_monitoring/01_04_system-activity-monitoring-for-active-defense.mp4
8.4 MB
execution-persistence-privilege-escalation-and-evasion/04_python-for-defense-evasion/01_python-for-defense-evasion/01_04_introduction-to-hide-artifacts.mp4
8.4 MB
execution-persistence-privilege-escalation-and-evasion/04_python-for-defense-evasion/01_python-for-defense-evasion/01_02_introduction-to-impair-defenses.mp4
8.4 MB
credential-access-discovery-lateral-movement--collection/03_python-for-lateral-movement/01_python-for-lateral-movement/01_04_introduction-to-use-alternative-authentication-material.mp4
8.6 MB
pythonforcybersecurity-introduction/01_introduction-to-python-for-cybersecurity/01_introduction-to-python-for-cybersecurity/01_02_introduction-to-python.mp4
8.8 MB
python-for-active-defense/03_python-for-active-defense-monitoring/01_monitoring/01_06_behavioral-analytics-for-active-defense.mp4
9.0 MB
pythonforcybersecurity-introduction/02_python-for-pre-att-ck/01_python-for-pre-att-ck/01_01_mitre-pre-att-ck.mp4
9.3 MB
python-for-active-defense/01_python-for-active-defense-decoys/01_decoys/01_05_decoy-content.mp4
9.5 MB
execution-persistence-privilege-escalation-and-evasion/03_python-for-privilege-escalation/01_python-for-privilege-escalation/01_04_introduction-to-process-injection.mp4
9.6 MB
credential-access-discovery-lateral-movement--collection/03_python-for-lateral-movement/01_python-for-lateral-movement/01_03_smb-windows-admin-shares.mp4
12 MB
credential-access-discovery-lateral-movement--collection/04_python-for-collection/01_python-for-collection/01_03_clipboard-data.mp4
13 MB
execution-persistence-privilege-escalation-and-evasion/01_python-for-execution/01_python-for-execution/01_03_malicious-links.mp4
13 MB
pythonforcybersecurity-introduction/02_python-for-pre-att-ck/01_python-for-pre-att-ck/01_03_introduction-to-scapy.mp4
14 MB
execution-persistence-privilege-escalation-and-evasion/03_python-for-privilege-escalation/01_python-for-privilege-escalation/01_05_python-library-injection.mp4
14 MB
credential-access-discovery-lateral-movement--collection/03_python-for-lateral-movement/01_python-for-lateral-movement/01_05_web-session-cookie.mp4
14 MB
command-and-control-exfiltration-and-impact/03_python-for-impact/01_python-for-impact/01_05_account-access-removal.mp4
14 MB
pythonforcybersecurity-introduction/01_introduction-to-python-for-cybersecurity/01_introduction-to-python-for-cybersecurity/01_03_introduction-to-mitre-att-ck-and-shield.mp4
16 MB
python-for-active-defense/03_python-for-active-defense-monitoring/01_monitoring/01_03_network-monitoring.mp4
16 MB
credential-access-discovery-lateral-movement--collection/02_python-for-discovery/01_python-for-discovery/01_05_file-and-directory-discovery.mp4
16 MB
python-for-active-defense/02_python-for-active-defense-network/01_network/01_07_burn-in.mp4
16 MB
command-and-control-exfiltration-and-impact/01_python-for-command-and-control/01_python-for-command-and-control/01_05_protocol-tunneling.mp4
17 MB
python-for-active-defense/01_python-for-active-defense-decoys/01_decoys/01_03_decoy-processes.mp4
18 MB
python-for-active-defense/01_python-for-active-defense-decoys/01_decoys/01_07_decoy-credentials.mp4
19 MB
credential-access-discovery-lateral-movement--collection/01_python-for-credential-access/01_python-for-credential-access/01_03_credentials-from-web-browsers.mp4
20 MB
execution-persistence-privilege-escalation-and-evasion/04_python-for-defense-evasion/01_python-for-defense-evasion/01_03_impair-avs.mp4
20 MB
pythonforcybersecurity-introduction/03_python-for-initial-access/01_python-for-initial-access/01_05_autorun-scripts.mp4
20 MB
pythonforcybersecurity-introduction/03_python-for-initial-access/01_python-for-initial-access/01_03_default-account-discovery.mp4
21 MB
execution-persistence-privilege-escalation-and-evasion/04_python-for-defense-evasion/01_python-for-defense-evasion/01_05_alternate-data-streams.mp4
21 MB
command-and-control-exfiltration-and-impact/03_python-for-impact/01_python-for-impact/01_03_data-encryption.mp4
22 MB
execution-persistence-privilege-escalation-and-evasion/03_python-for-privilege-escalation/01_python-for-privilege-escalation/01_03_logon-scripts.mp4
23 MB
credential-access-discovery-lateral-movement--collection/02_python-for-discovery/01_python-for-discovery/01_03_user-account-discovery.mp4
24 MB
execution-persistence-privilege-escalation-and-evasion/01_python-for-execution/01_python-for-execution/01_05_scheduled-execution.mp4
25 MB
command-and-control-exfiltration-and-impact/01_python-for-command-and-control/01_python-for-command-and-control/01_03_encrypted-channel.mp4
25 MB
python-for-active-defense/02_python-for-active-defense-network/01_network/01_03_pcap-collection.mp4
25 MB
python-for-active-defense/03_python-for-active-defense-monitoring/01_monitoring/01_05_system-activity-monitoring.mp4
25 MB
pythonforcybersecurity-introduction/02_python-for-pre-att-ck/01_python-for-pre-att-ck/01_06_dns-exploration.mp4
26 MB
execution-persistence-privilege-escalation-and-evasion/02_python-for-persistence/01_python-for-persistence/01_05_hijacked-execution-flow.mp4
26 MB
execution-persistence-privilege-escalation-and-evasion/02_python-for-persistence/01_python-for-persistence/01_03_registry-autorun.mp4
28 MB
python-for-active-defense/03_python-for-active-defense-monitoring/01_monitoring/01_07_behavioral-analytics.mp4
28 MB
python-for-active-defense/02_python-for-active-defense-network/01_network/01_05_protocol-decoding.mp4
30 MB
pythonforcybersecurity-introduction/02_python-for-pre-att-ck/01_python-for-pre-att-ck/01_04_network-scanning.mp4
31 MB
credential-access-discovery-lateral-movement--collection/01_python-for-credential-access/01_python-for-credential-access/01_05_network-sniffing.mp4
40 MB
command-and-control-exfiltration-and-impact/02_python-for-exfiltration/01_python-for-exfiltration/01_03_alternative-protocol.mp4
59 MB