TorBT - Torrents and Magnet Links Search Engine
[FreeCourseSite.com] Udemy - Learn Social Engineering From Scratch 2024
- Date: 2025-07-03
- Size: 4.7 GB
- Files: 371
File Name
Size
0. Websites you may like/[CourseClub.Me].url
122 B
0. Websites you may like/[FreeCourseSite.com].url
127 B
01 - Introduction/0. Websites you may like/[CourseClub.Me].url
122 B
01 - Introduction/0. Websites you may like/[FreeCourseSite.com].url
127 B
01 - Introduction/001 Teaser - Hacking An Android Phone & Accessing The Camera.mp4
19 MB
01 - Introduction/001 Teaser - Hacking An Android Phone & Accessing The Camera_en.srt
8.2 kB
01 - Introduction/002 Introduction to Social Engineering.mp4
13 MB
01 - Introduction/002 Introduction to Social Engineering_en.srt
4.6 kB
01 - Introduction/002 What-is-Social-Engineering.pdf
99 kB
01 - Introduction/003 00-Intro-Perperation.pdf
364 kB
01 - Introduction/003 Course Overview.mp4
18 MB
01 - Introduction/003 Course Overview_en.srt
6.1 kB
01 - Introduction/[CourseClub.Me].url
122 B
01 - Introduction/[FreeCourseSite.com].url
127 B
02 - Preparation - Creating a Penetration Testing Lab/0. Websites you may like/[CourseClub.Me].url
122 B
02 - Preparation - Creating a Penetration Testing Lab/0. Websites you may like/[FreeCourseSite.com].url
127 B
02 - Preparation - Creating a Penetration Testing Lab/001 Update Notice.mp4
11 MB
02 - Preparation - Creating a Penetration Testing Lab/001 Update Notice_en.srt
3.0 kB
02 - Preparation - Creating a Penetration Testing Lab/002 01-The-Lab.pdf
461 kB
02 - Preparation - Creating a Penetration Testing Lab/002 Lab Overview & Needed Software.mp4
19 MB
02 - Preparation - Creating a Penetration Testing Lab/002 Lab Overview & Needed Software_en.srt
7.6 kB
02 - Preparation - Creating a Penetration Testing Lab/003 Initial Preparation.mp4
55 MB
02 - Preparation - Creating a Penetration Testing Lab/003 Initial Preparation_en.srt
12 kB
02 - Preparation - Creating a Penetration Testing Lab/003 Kali-2024-Download-Page.url
67 B
02 - Preparation - Creating a Penetration Testing Lab/004 7-zip-Download-page.url
46 B
02 - Preparation - Creating a Penetration Testing Lab/004 Installing Kali Linux as a VM on Windows.mp4
36 MB
02 - Preparation - Creating a Penetration Testing Lab/004 Installing Kali Linux as a VM on Windows_en.srt
13 kB
02 - Preparation - Creating a Penetration Testing Lab/004 Kali-2024-Download-Page.url
67 B
02 - Preparation - Creating a Penetration Testing Lab/004 VMware-Player-Download-Page.url
67 B
02 - Preparation - Creating a Penetration Testing Lab/005 Installing Kali Linux as a VM on Apple Mac OS (Intel & Silicon Chips).mp4
63 MB
02 - Preparation - Creating a Penetration Testing Lab/005 Installing Kali Linux as a VM on Apple Mac OS (Intel & Silicon Chips)_en.srt
14 kB
02 - Preparation - Creating a Penetration Testing Lab/005 Kali-2024-Download-Page.url
67 B
02 - Preparation - Creating a Penetration Testing Lab/005 VMware-Player-Download-Page.url
67 B
02 - Preparation - Creating a Penetration Testing Lab/005 VMware-key.txt
29 B
02 - Preparation - Creating a Penetration Testing Lab/006 Installing Kali Linux as a VM on Linux.mp4
132 MB
02 - Preparation - Creating a Penetration Testing Lab/006 Installing Kali Linux as a VM on Linux_en.srt
15 kB
02 - Preparation - Creating a Penetration Testing Lab/006 Kali-2024-Download-Page.url
67 B
02 - Preparation - Creating a Penetration Testing Lab/006 VMware-Player-Download-Page.url
67 B
02 - Preparation - Creating a Penetration Testing Lab/[CourseClub.Me].url
122 B
02 - Preparation - Creating a Penetration Testing Lab/[FreeCourseSite.com].url
127 B
02 - Preparation - Creating a Penetration Testing Lab/external-links.txt
595 B
03 - Preparation - Linux Basics/0. Websites you may like/[CourseClub.Me].url
122 B
03 - Preparation - Linux Basics/0. Websites you may like/[FreeCourseSite.com].url
127 B
03 - Preparation - Linux Basics/001 Kali Linux Basics.mp4
22 MB
03 - Preparation - Linux Basics/001 Kali Linux Basics_en.srt
7.3 kB
03 - Preparation - Linux Basics/002 ExplainShell.url
49 B
03 - Preparation - Linux Basics/002 Linux-Commands-List.url
85 B
03 - Preparation - Linux Basics/002 The Linux Terminal & Basic Linux Commands.mp4
52 MB
03 - Preparation - Linux Basics/002 The Linux Terminal & Basic Linux Commands_en.srt
17 kB
03 - Preparation - Linux Basics/[CourseClub.Me].url
122 B
03 - Preparation - Linux Basics/[FreeCourseSite.com].url
127 B
03 - Preparation - Linux Basics/external-links.txt
137 B
04 - Information Gathering/0. Websites you may like/[CourseClub.Me].url
122 B
04 - Information Gathering/0. Websites you may like/[FreeCourseSite.com].url
127 B
04 - Information Gathering/001 02-Information-Gathering.pdf
88 kB
04 - Information Gathering/001 Introduction.mp4
10 MB
04 - Information Gathering/001 Introduction_en.srt
2.6 kB
04 - Information Gathering/[CourseClub.Me].url
122 B
04 - Information Gathering/[FreeCourseSite.com].url
127 B
05 - Information Gathering - Gathering Info About A CompanyWebsite/0. Websites you may like/[CourseClub.Me].url
122 B
05 - Information Gathering - Gathering Info About A CompanyWebsite/0. Websites you may like/[FreeCourseSite.com].url
127 B
05 - Information Gathering - Gathering Info About A CompanyWebsite/001 How-to-fix-Maltego-if-its-not-starting.url
52 B
05 - Information Gathering - Gathering Info About A CompanyWebsite/001 Maltego Overview.mp4
31 MB
05 - Information Gathering - Gathering Info About A CompanyWebsite/001 Maltego Overview_en.srt
9.8 kB
05 - Information Gathering - Gathering Info About A CompanyWebsite/001 Request-a-trial-using-this-link.url
61 B
05 - Information Gathering - Gathering Info About A CompanyWebsite/002 Discovering Domain Info & Emails Associated With Target.mp4
24 MB
05 - Information Gathering - Gathering Info About A CompanyWebsite/002 Discovering Domain Info & Emails Associated With Target_en.srt
9.5 kB
05 - Information Gathering - Gathering Info About A CompanyWebsite/003 Discovering Information About Hosting Company, Support Team Emails & Admin Email.mp4
32 MB
05 - Information Gathering - Gathering Info About A CompanyWebsite/003 Discovering Information About Hosting Company, Support Team Emails & Admin Email_en.srt
8.5 kB
05 - Information Gathering - Gathering Info About A CompanyWebsite/004 Discovering Files, Links, Websites & Other Companies Related To Target.mp4
27 MB
05 - Information Gathering - Gathering Info About A CompanyWebsite/004 Discovering Files, Links, Websites & Other Companies Related To Target_en.srt
6.0 kB
05 - Information Gathering - Gathering Info About A CompanyWebsite/005 Using The Gathered Info To Build An Attack Strategy.mp4
20 MB
05 - Information Gathering - Gathering Info About A CompanyWebsite/005 Using The Gathered Info To Build An Attack Strategy_en.srt
6.0 kB
05 - Information Gathering - Gathering Info About A CompanyWebsite/[CourseClub.Me].url
122 B
05 - Information Gathering - Gathering Info About A CompanyWebsite/[FreeCourseSite.com].url
127 B
05 - Information Gathering - Gathering Info About A CompanyWebsite/external-links.txt
154 B
06 - Information Gathering - Gathering Info About A Person/0. Websites you may like/[CourseClub.Me].url
122 B
06 - Information Gathering - Gathering Info About A Person/0. Websites you may like/[FreeCourseSite.com].url
127 B
06 - Information Gathering - Gathering Info About A Person/001 Discovering Websites, Links & Social Networking Accounts.mp4
35 MB
06 - Information Gathering - Gathering Info About A Person/001 Discovering Websites, Links & Social Networking Accounts_en.srt
14 kB
06 - Information Gathering - Gathering Info About A Person/002 Discovering Twitter Friends & Associated Accounts.mp4
21 MB
06 - Information Gathering - Gathering Info About A Person/002 Discovering Twitter Friends & Associated Accounts_en.srt
6.5 kB
06 - Information Gathering - Gathering Info About A Person/003 Discovering Emails Of The Target's Friends.mp4
21 MB
06 - Information Gathering - Gathering Info About A Person/003 Discovering Emails Of The Target's Friends_en.srt
5.9 kB
06 - Information Gathering - Gathering Info About A Person/004 Analysing The Gathered Info & Building An Attack Strategy.mp4
30 MB
06 - Information Gathering - Gathering Info About A Person/004 Analysing The Gathered Info & Building An Attack Strategy_en.srt
12 kB
06 - Information Gathering - Gathering Info About A Person/[CourseClub.Me].url
122 B
06 - Information Gathering - Gathering Info About A Person/[FreeCourseSite.com].url
127 B
07 - Windows Malware/0. Websites you may like/[CourseClub.Me].url
122 B
07 - Windows Malware/0. Websites you may like/[FreeCourseSite.com].url
127 B
07 - Windows Malware/001 03-Generating-Evil-Files-For-Windows.pdf
692 kB
07 - Windows Malware/001 Introduction to Windows Malware.mp4
5.8 MB
07 - Windows Malware/001 Introduction to Windows Malware_en.srt
1.7 kB
07 - Windows Malware/002 Alternative-Download-Link.url
94 B
07 - Windows Malware/002 Installing Windows As a Virtual Machine.mp4
23 MB
07 - Windows Malware/002 Installing Windows As a Virtual Machine_en.srt
7.6 kB
07 - Windows Malware/002 Win10-VM.torrent
68 kB
07 - Windows Malware/002 Windows-10-VM-Download-Link.url
93 B
07 - Windows Malware/003 Installing Windows as a Virtual Machine on Apple Silicon Computers.mp4
21 MB
07 - Windows Malware/003 Installing Windows as a Virtual Machine on Apple Silicon Computers_en.srt
7.1 kB
07 - Windows Malware/003 Windows-11-64-bit-Silicon.torrent
70 kB
07 - Windows Malware/003 Windows-11-VM-Download-Link-For-Apple-Silicon.url
106 B
07 - Windows Malware/[CourseClub.Me].url
122 B
07 - Windows Malware/[FreeCourseSite.com].url
127 B
07 - Windows Malware/external-links.txt
348 B
08 - Windows Malware - Generating Undetectable Backdoors/0. Websites you may like/[CourseClub.Me].url
122 B
08 - Windows Malware - Generating Undetectable Backdoors/0. Websites you may like/[FreeCourseSite.com].url
127 B
08 - Windows Malware - Generating Undetectable Backdoors/001 Backdoors and Payloads Basics.mp4
43 MB
08 - Windows Malware - Generating Undetectable Backdoors/001 Backdoors and Payloads Basics_en.srt
17 kB
08 - Windows Malware - Generating Undetectable Backdoors/002 Creating Your Own Backdoor.mp4
38 MB
08 - Windows Malware - Generating Undetectable Backdoors/002 Creating Your Own Backdoor_en.srt
12 kB
08 - Windows Malware - Generating Undetectable Backdoors/003 Listening for Backdoor Connections.mp4
14 MB
08 - Windows Malware - Generating Undetectable Backdoors/003 Listening for Backdoor Connections_en.srt
5.7 kB
08 - Windows Malware - Generating Undetectable Backdoors/004 Hacking Windows 11 Using Your Own Backdoor.mp4
21 MB
08 - Windows Malware - Generating Undetectable Backdoors/004 Hacking Windows 11 Using Your Own Backdoor_en.srt
9.1 kB
08 - Windows Malware - Generating Undetectable Backdoors/005 Introduction to The Fat Rat.mp4
87 MB
08 - Windows Malware - Generating Undetectable Backdoors/005 Introduction to The Fat Rat_en.srt
8.2 kB
08 - Windows Malware - Generating Undetectable Backdoors/005 The-Fat-Rat-Git-Repo.url
62 B
08 - Windows Malware - Generating Undetectable Backdoors/006 Alternative-to-NoDistribute.url
44 B
08 - Windows Malware - Generating Undetectable Backdoors/006 Another-Alternative-to-NoDistribute.url
51 B
08 - Windows Malware - Generating Undetectable Backdoors/006 Generating An Undetectable Backdoor For Windows - Method 2.mp4
356 MB
08 - Windows Malware - Generating Undetectable Backdoors/006 Generating An Undetectable Backdoor For Windows - Method 2_en.srt
14 kB
08 - Windows Malware - Generating Undetectable Backdoors/007 Empire-Git-Repo.url
61 B
08 - Windows Malware - Generating Undetectable Backdoors/007 Introduction to Empire.mp4
90 MB
08 - Windows Malware - Generating Undetectable Backdoors/007 Introduction to Empire_en.srt
12 kB
08 - Windows Malware - Generating Undetectable Backdoors/008 Creating a Windows Powershell Stager & Hacking Windows 10.mp4
28 MB
08 - Windows Malware - Generating Undetectable Backdoors/008 Creating a Windows Powershell Stager & Hacking Windows 10_en.srt
11 kB
08 - Windows Malware - Generating Undetectable Backdoors/009 Alternative-to-NoDistribute.url
44 B
08 - Windows Malware - Generating Undetectable Backdoors/009 Another-Alternative-to-NoDistribute.url
51 B
08 - Windows Malware - Generating Undetectable Backdoors/009 Modifying Backdoor Source To Bypass All Anti-virus Programs.mp4
59 MB
08 - Windows Malware - Generating Undetectable Backdoors/009 Modifying Backdoor Source To Bypass All Anti-virus Programs_en.srt
11 kB
08 - Windows Malware - Generating Undetectable Backdoors/[CourseClub.Me].url
122 B
08 - Windows Malware - Generating Undetectable Backdoors/[FreeCourseSite.com].url
127 B
08 - Windows Malware - Generating Undetectable Backdoors/external-links.txt
388 B
09 - Windows Malware - Spying/0. Websites you may like/[CourseClub.Me].url
122 B
09 - Windows Malware - Spying/0. Websites you may like/[FreeCourseSite.com].url
127 B
09 - Windows Malware - Spying/001 Introduction to Keyloggers.mp4
16 MB
09 - Windows Malware - Spying/001 Introduction to Keyloggers_en.srt
8.6 kB
09 - Windows Malware - Spying/001 ZLogger-Git-Repo.url
55 B
09 - Windows Malware - Spying/002 Creating A Remote Keylogger.mp4
29 MB
09 - Windows Malware - Spying/002 Creating A Remote Keylogger_en.srt
13 kB
09 - Windows Malware - Spying/003 Using A Remote Keylogger To Capture Key Strikes Including Passwords.mp4
21 MB
09 - Windows Malware - Spying/003 Using A Remote Keylogger To Capture Key Strikes Including Passwords_en.srt
9.1 kB
09 - Windows Malware - Spying/004 LaZagne-Git-Repo.url
60 B
09 - Windows Malware - Spying/004 Password Recovery Basics.mp4
26 MB
09 - Windows Malware - Spying/004 Password Recovery Basics_en.srt
9.8 kB
09 - Windows Malware - Spying/005 Recovering Saved Passwords From Local Machine.mp4
26 MB
09 - Windows Malware - Spying/005 Recovering Saved Passwords From Local Machine_en.srt
3.9 kB
09 - Windows Malware - Spying/006 Recovering Saved Passwords From A Remote Machine.mp4
95 MB
09 - Windows Malware - Spying/006 Recovering Saved Passwords From A Remote Machine_en.srt
16 kB
09 - Windows Malware - Spying/006 run-laZagne.txt
862 B
09 - Windows Malware - Spying/[CourseClub.Me].url
122 B
09 - Windows Malware - Spying/[FreeCourseSite.com].url
127 B
09 - Windows Malware - Spying/external-links.txt
119 B
10 - Windows Malware - Enhancing Malware/0. Websites you may like/[CourseClub.Me].url
122 B
10 - Windows Malware - Enhancing Malware/0. Websites you may like/[FreeCourseSite.com].url
127 B
10 - Windows Malware - Enhancing Malware/001 Bypassing All Anti-Virus Programs By Modifying Hex Vales.mp4
42 MB
10 - Windows Malware - Enhancing Malware/001 Bypassing All Anti-Virus Programs By Modifying Hex Vales_en.srt
13 kB
10 - Windows Malware - Enhancing Malware/002 Download & Execute Payload.mp4
40 MB
10 - Windows Malware - Enhancing Malware/002 Download & Execute Payload_en.srt
8.6 kB
10 - Windows Malware - Enhancing Malware/002 download-and-execute.txt
210 B
10 - Windows Malware - Enhancing Malware/003 Creating The Perfect Spying Tool.mp4
30 MB
10 - Windows Malware - Enhancing Malware/003 Creating The Perfect Spying Tool_en.srt
9.1 kB
10 - Windows Malware - Enhancing Malware/[CourseClub.Me].url
122 B
10 - Windows Malware - Enhancing Malware/[FreeCourseSite.com].url
127 B
11 - Windows Malware - Creating Trojans/0. Websites you may like/[CourseClub.Me].url
122 B
11 - Windows Malware - Creating Trojans/0. Websites you may like/[FreeCourseSite.com].url
127 B
11 - Windows Malware - Creating Trojans/001 Embedding Malware With Any File Type Like An Image Or PDF.mp4
47 MB
11 - Windows Malware - Creating Trojans/001 Embedding Malware With Any File Type Like An Image Or PDF_en.srt
14 kB
11 - Windows Malware - Creating Trojans/002 Bat-To-EXE-Download-Link.url
93 B
11 - Windows Malware - Creating Trojans/002 Running Malware Silently In The Background.mp4
29 MB
11 - Windows Malware - Creating Trojans/002 Running Malware Silently In The Background_en.srt
10 kB
11 - Windows Malware - Creating Trojans/003 Alternative-Icon-Converter.url
59 B
11 - Windows Malware - Creating Trojans/003 Changing Trojan's Icon.mp4
22 MB
11 - Windows Malware - Creating Trojans/003 Changing Trojan's Icon_en.srt
9.4 kB
11 - Windows Malware - Creating Trojans/003 Icons-Website-iconarchive.com.url
51 B
11 - Windows Malware - Creating Trojans/003 PNG-To-ICO-Converter..url
55 B
11 - Windows Malware - Creating Trojans/004 Spoofing File Extension from .exe to anything else (pdf, png, etc.).mp4
28 MB
11 - Windows Malware - Creating Trojans/004 Spoofing File Extension from .exe to anything else (pdf, png, etc.)_en.srt
14 kB
11 - Windows Malware - Creating Trojans/005 Download & Execute Payload (Method 2).mp4
121 MB
11 - Windows Malware - Creating Trojans/005 Download & Execute Payload (Method 2)_en.srt
8.6 kB
11 - Windows Malware - Creating Trojans/005 autoit-download-and-execute.txt
513 B
11 - Windows Malware - Creating Trojans/006 Embedding Malware With Any File Type Like An Image Or PDF (Method 2).mp4
91 MB
11 - Windows Malware - Creating Trojans/006 Embedding Malware With Any File Type Like An Image Or PDF (Method 2)_en.srt
9.0 kB
11 - Windows Malware - Creating Trojans/006 Image-to-Icon-Converter.url
64 B
11 - Windows Malware - Creating Trojans/007 Embedding a Backdoor in Microsoft Office Document.mp4
152 MB
11 - Windows Malware - Creating Trojans/007 Embedding a Backdoor in Microsoft Office Document_en.srt
10 kB
11 - Windows Malware - Creating Trojans/008 Embedding Any Malware in a Microsoft Office Document.mp4
79 MB
11 - Windows Malware - Creating Trojans/008 Embedding Any Malware in a Microsoft Office Document_en.srt
13 kB
11 - Windows Malware - Creating Trojans/008 download-and-execute-macro.txt
483 B
11 - Windows Malware - Creating Trojans/[CourseClub.Me].url
122 B
11 - Windows Malware - Creating Trojans/[FreeCourseSite.com].url
127 B
11 - Windows Malware - Creating Trojans/external-links.txt
375 B
12 - Apple Mac OS Malware/0. Websites you may like/[CourseClub.Me].url
122 B
12 - Apple Mac OS Malware/0. Websites you may like/[FreeCourseSite.com].url
127 B
12 - Apple Mac OS Malware/001 04-Generating-Evil-Files-For-Mac-OS-X.pdf
142 kB
12 - Apple Mac OS Malware/001 Introduction.mp4
12 MB
12 - Apple Mac OS Malware/001 Introduction_en.srt
4.0 kB
12 - Apple Mac OS Malware/002 Hacking Mac OS X Using A Meterpreter Backdoor.mp4
41 MB
12 - Apple Mac OS Malware/002 Hacking Mac OS X Using A Meterpreter Backdoor_en.srt
14 kB
12 - Apple Mac OS Malware/003 Hacking Mac OS X Using An Empire Stager.mp4
18 MB
12 - Apple Mac OS Malware/003 Hacking Mac OS X Using An Empire Stager_en.srt
8.9 kB
12 - Apple Mac OS Malware/004 Converting Basic Backdoor To An Executable.mp4
18 MB
12 - Apple Mac OS Malware/004 Converting Basic Backdoor To An Executable_en.srt
4.3 kB
12 - Apple Mac OS Malware/005 Embedding A Normal File With Backdoor.mp4
135 MB
12 - Apple Mac OS Malware/005 Embedding A Normal File With Backdoor_en.srt
12 kB
12 - Apple Mac OS Malware/006 Generating a Basic Trojan For Mac OS X.mp4
115 MB
12 - Apple Mac OS Malware/006 Generating a Basic Trojan For Mac OS X_en.srt
9.2 kB
12 - Apple Mac OS Malware/007 Changing Trojan's Icon.mp4
85 MB
12 - Apple Mac OS Malware/007 Changing Trojan's Icon_en.srt
7.8 kB
12 - Apple Mac OS Malware/007 Icon-Converter.url
60 B
12 - Apple Mac OS Malware/008 Configuring The Trojan To Run Silently.mp4
35 MB
12 - Apple Mac OS Malware/008 Configuring The Trojan To Run Silently_en.srt
7.5 kB
12 - Apple Mac OS Malware/[CourseClub.Me].url
122 B
12 - Apple Mac OS Malware/[FreeCourseSite.com].url
127 B
12 - Apple Mac OS Malware/external-links.txt
60 B
13 - Linux Malware/0. Websites you may like/[CourseClub.Me].url
122 B
13 - Linux Malware/0. Websites you may like/[FreeCourseSite.com].url
127 B
13 - Linux Malware/001 Installing Ubuntu As a Virtual Machine.mp4
13 MB
13 - Linux Malware/001 Installing Ubuntu As a Virtual Machine_en.srt
8.2 kB
13 - Linux Malware/001 Ubuntu-Download-Link.url
63 B
13 - Linux Malware/002 05-Generating-Evil-Files-For-Linux.pdf
247 kB
13 - Linux Malware/002 Hacking Into Linux-Like Systems Using One Command.mp4
30 MB
13 - Linux Malware/002 Hacking Into Linux-Like Systems Using One Command_en.srt
12 kB
13 - Linux Malware/003 More Advanced Linux Backdoor.mp4
16 MB
13 - Linux Malware/003 More Advanced Linux Backdoor_en.srt
8.5 kB
13 - Linux Malware/004 Using A Remote Keylogger To Capture Key Strikes Including Passwords.mp4
24 MB
13 - Linux Malware/004 Using A Remote Keylogger To Capture Key Strikes Including Passwords_en.srt
12 kB
13 - Linux Malware/004 ZLogger-Git-Repo.url
55 B
13 - Linux Malware/005 LaZagne-Git-Repo.url
62 B
13 - Linux Malware/005 Recovering Saved Passwords From A Local Machine.mp4
58 MB
13 - Linux Malware/005 Recovering Saved Passwords From A Local Machine_en.srt
8.9 kB
13 - Linux Malware/006 Execute & Report Payload.mp4
44 MB
13 - Linux Malware/006 Execute & Report Payload_en.srt
9.3 kB
13 - Linux Malware/006 ZReporter-Git-Repo.url
57 B
13 - Linux Malware/007 Recovering Saved Passwords From A Remote Machine.mp4
73 MB
13 - Linux Malware/007 Recovering Saved Passwords From A Remote Machine_en.srt
8.7 kB
13 - Linux Malware/008 Embedding Malware in a Legitimate Linux Package - Part 1.mp4
54 MB
13 - Linux Malware/008 Embedding Malware in a Legitimate Linux Package - Part 1_en.srt
18 kB
13 - Linux Malware/008 Ubuntu-Packages-Download-Page.url
51 B
13 - Linux Malware/009 Embedding Malware in a Legitimate Linux Package - Part 2.mp4
40 MB
13 - Linux Malware/009 Embedding Malware in a Legitimate Linux Package - Part 2_en.srt
6.4 kB
13 - Linux Malware/010 Backdooring Android Apps.mp4
74 MB
13 - Linux Malware/010 Backdooring Android Apps_en.srt
14 kB
13 - Linux Malware/[CourseClub.Me].url
122 B
13 - Linux Malware/[FreeCourseSite.com].url
127 B
13 - Linux Malware/external-links.txt
317 B
14 - Delivery Methods/0. Websites you may like/[CourseClub.Me].url
122 B
14 - Delivery Methods/0. Websites you may like/[FreeCourseSite.com].url
127 B
14 - Delivery Methods/001 06-Delivery-Methods.pdf
127 kB
14 - Delivery Methods/001 Introduction.mp4
7.6 MB
14 - Delivery Methods/001 Introduction_en.srt
2.6 kB
14 - Delivery Methods/002 Mail Deliver - Setting up an SMTP Server.mp4
20 MB
14 - Delivery Methods/002 Mail Deliver - Setting up an SMTP Server_en.srt
8.5 kB
14 - Delivery Methods/003 Mail Delivery - Spoofing Emails.mp4
20 MB
14 - Delivery Methods/003 Mail Delivery - Spoofing Emails_en.srt
9.1 kB
14 - Delivery Methods/004 Mail Delivery - Spoofing Email Name.mp4
30 MB
14 - Delivery Methods/004 Mail Delivery - Spoofing Email Name_en.srt
8.7 kB
14 - Delivery Methods/005 Mail Delivery - Spoofing Emails (method 2).mp4
105 MB
14 - Delivery Methods/005 Mail Delivery - Spoofing Emails (method 2)_en.srt
15 kB
14 - Delivery Methods/005 mailer-make-sure-you-rename-this-file-to-send.php.txt
1.7 kB
14 - Delivery Methods/006 Hacking OS X & Linux Using Pure Social Engineering Without Sending Any Files.mp4
166 MB
14 - Delivery Methods/006 Hacking OS X & Linux Using Pure Social Engineering Without Sending Any Files_en.srt
14 kB
14 - Delivery Methods/007 Creating A Replica Of Any Website Login Page.mp4
50 MB
14 - Delivery Methods/007 Creating A Replica Of Any Website Login Page_en.srt
7.6 kB
14 - Delivery Methods/007 Web-Scrapbook-Download-Page.url
84 B
14 - Delivery Methods/008 Stealing Login Info Using Fake A Login Page.mp4
90 MB
14 - Delivery Methods/008 Stealing Login Info Using Fake A Login Page_en.srt
14 kB
14 - Delivery Methods/009 BeEF Overview & Basic Hook Method.mp4
47 MB
14 - Delivery Methods/009 BeEF Overview & Basic Hook Method_en.srt
9.4 kB
14 - Delivery Methods/010 Injecting BeEF's Hook In Any Webpage.mp4
47 MB
14 - Delivery Methods/010 Injecting BeEF's Hook In Any Webpage_en.srt
6.0 kB
14 - Delivery Methods/011 Domain-Obfuscator.url
70 B
14 - Delivery Methods/011 TinyURL.url
48 B
14 - Delivery Methods/011 URL Manipulation.mp4
43 MB
14 - Delivery Methods/011 URL Manipulation_en.srt
13 kB
14 - Delivery Methods/012 Luring Targets Into Accessing Malware Without Direct Interaction.mp4
118 MB
14 - Delivery Methods/012 Luring Targets Into Accessing Malware Without Direct Interaction_en.srt
14 kB
14 - Delivery Methods/013 Basic BeEF Commands.mp4
18 MB
14 - Delivery Methods/013 Basic BeEF Commands_en.srt
6.0 kB
14 - Delivery Methods/014 Stealing CredentialsPasswords Using A Fake Login Prompt.mp4
14 MB
14 - Delivery Methods/014 Stealing CredentialsPasswords Using A Fake Login Prompt_en.srt
3.2 kB
14 - Delivery Methods/015 Hacking Windows 10 Using A Fake Update.mp4
35 MB
14 - Delivery Methods/015 Hacking Windows 10 Using A Fake Update_en.srt
6.2 kB
14 - Delivery Methods/016 Hacking Mac OS X Using A Fake Update.mp4
21 MB
14 - Delivery Methods/016 Hacking Mac OS X Using A Fake Update_en.srt
5.8 kB
14 - Delivery Methods/017 Hacking Linux Using A Fake Update.mp4
12 MB
14 - Delivery Methods/017 Hacking Linux Using A Fake Update_en.srt
5.8 kB
14 - Delivery Methods/[CourseClub.Me].url
122 B
14 - Delivery Methods/[FreeCourseSite.com].url
127 B
14 - Delivery Methods/external-links.txt
211 B
15 - Using The Above Attacks Outside The Local Network/0. Websites you may like/[CourseClub.Me].url
122 B
15 - Using The Above Attacks Outside The Local Network/0. Websites you may like/[FreeCourseSite.com].url
127 B
15 - Using The Above Attacks Outside The Local Network/001 Overview of the Setup.mp4
28 MB
15 - Using The Above Attacks Outside The Local Network/001 Overview of the Setup_en.srt
9.2 kB
15 - Using The Above Attacks Outside The Local Network/001 Port-Forwarding-Without-Router-Access.url
67 B
15 - Using The Above Attacks Outside The Local Network/002 Ex1 - Generating a Backdoor That Works Outside The Network.mp4
24 MB
15 - Using The Above Attacks Outside The Local Network/002 Ex1 - Generating a Backdoor That Works Outside The Network_en.srt
7.4 kB
15 - Using The Above Attacks Outside The Local Network/003 Configuring The Router To Forward Connections To Kali.mp4
22 MB
15 - Using The Above Attacks Outside The Local Network/003 Configuring The Router To Forward Connections To Kali_en.srt
8.8 kB
15 - Using The Above Attacks Outside The Local Network/004 Ex2 - Using BeEF Outside The Network.mp4
18 MB
15 - Using The Above Attacks Outside The Local Network/004 Ex2 - Using BeEF Outside The Network_en.srt
7.2 kB
15 - Using The Above Attacks Outside The Local Network/[CourseClub.Me].url
122 B
15 - Using The Above Attacks Outside The Local Network/[FreeCourseSite.com].url
127 B
15 - Using The Above Attacks Outside The Local Network/external-links.txt
90 B
16 - Post Exploitation/0. Websites you may like/[CourseClub.Me].url
122 B
16 - Post Exploitation/0. Websites you may like/[FreeCourseSite.com].url
127 B
16 - Post Exploitation/001 Introduction.mp4
8.9 MB
16 - Post Exploitation/001 Introduction_en.srt
3.2 kB
16 - Post Exploitation/002 Upgrading Basic Shell Access To A MeterpreterEmpire Access.mp4
15 MB
16 - Post Exploitation/002 Upgrading Basic Shell Access To A MeterpreterEmpire Access_en.srt
12 kB
16 - Post Exploitation/[CourseClub.Me].url
122 B
16 - Post Exploitation/[FreeCourseSite.com].url
127 B
17 - Post Exploitation - Meterpreter/0. Websites you may like/[CourseClub.Me].url
122 B
17 - Post Exploitation - Meterpreter/0. Websites you may like/[FreeCourseSite.com].url
127 B
17 - Post Exploitation - Meterpreter/001 Meterpreter Basics.mp4
18 MB
17 - Post Exploitation - Meterpreter/001 Meterpreter Basics_en.srt
7.7 kB
17 - Post Exploitation - Meterpreter/002 File System Commands.mp4
15 MB
17 - Post Exploitation - Meterpreter/002 File System Commands_en.srt
5.6 kB
17 - Post Exploitation - Meterpreter/003 Maintaining Access (Persistence).mp4
27 MB
17 - Post Exploitation - Meterpreter/003 Maintaining Access (Persistence)_en.srt
11 kB
17 - Post Exploitation - Meterpreter/004 Spying - Capturing Key Strikes & Taking Screen Shots.mp4
6.8 MB
17 - Post Exploitation - Meterpreter/004 Spying - Capturing Key Strikes & Taking Screen Shots_en.srt
3.3 kB
17 - Post Exploitation - Meterpreter/005 Pivoting - Theory (What is Pivoting).mp4
68 MB
17 - Post Exploitation - Meterpreter/005 Pivoting - Theory (What is Pivoting)_en.srt
7.7 kB
17 - Post Exploitation - Meterpreter/006 Pivoting - Exploiting Devices on The Same Network As a Hacked Computer.mp4
48 MB
17 - Post Exploitation - Meterpreter/006 Pivoting - Exploiting Devices on The Same Network As a Hacked Computer_en.srt
10 kB
17 - Post Exploitation - Meterpreter/007 Controlling Android Phone & Accessing Mic, Camera, Messages, File System & More.mp4
57 MB
17 - Post Exploitation - Meterpreter/007 Controlling Android Phone & Accessing Mic, Camera, Messages, File System & More_en.srt
12 kB
17 - Post Exploitation - Meterpreter/008 Maintaining Access On OS X.mp4
86 MB
17 - Post Exploitation - Meterpreter/008 Maintaining Access On OS X_en.srt
13 kB
17 - Post Exploitation - Meterpreter/[CourseClub.Me].url
122 B
17 - Post Exploitation - Meterpreter/[FreeCourseSite.com].url
127 B
18 - Post Exploitation - Empire/0. Websites you may like/[CourseClub.Me].url
122 B
18 - Post Exploitation - Empire/0. Websites you may like/[FreeCourseSite.com].url
127 B
18 - Post Exploitation - Empire/001 Basics Of Empire Agents.mp4
15 MB
18 - Post Exploitation - Empire/001 Basics Of Empire Agents_en.srt
9.5 kB
18 - Post Exploitation - Empire/002 File System Commands.mp4
20 MB
18 - Post Exploitation - Empire/002 File System Commands_en.srt
8.0 kB
18 - Post Exploitation - Empire/003 Upload & Execute Shell Commands.mp4
12 MB
18 - Post Exploitation - Empire/003 Upload & Execute Shell Commands_en.srt
5.6 kB
18 - Post Exploitation - Empire/004 Injecting a Backdoor In a System Processes.mp4
24 MB
18 - Post Exploitation - Empire/004 Injecting a Backdoor In a System Processes_en.srt
13 kB
18 - Post Exploitation - Empire/005 2 Methods to Escalating Privileges On OS X.mp4
94 MB
18 - Post Exploitation - Empire/005 2 Methods to Escalating Privileges On OS X_en.srt
9.1 kB
18 - Post Exploitation - Empire/006 Maintaining Access On OS X.mp4
61 MB
18 - Post Exploitation - Empire/006 Maintaining Access On OS X_en.srt
7.0 kB
18 - Post Exploitation - Empire/[CourseClub.Me].url
122 B
18 - Post Exploitation - Empire/[FreeCourseSite.com].url
127 B
19 - Security/0. Websites you may like/[CourseClub.Me].url
122 B
19 - Security/0. Websites you may like/[FreeCourseSite.com].url
127 B
19 - Security/001 Detecting FakeSpoofed Emails.mp4
16 MB
19 - Security/001 Detecting FakeSpoofed Emails_en.srt
8.7 kB
19 - Security/001 Security.pdf
100 kB
19 - Security/002 How to Protect Against BeEF & Other Browser Exploits.mp4
16 MB
19 - Security/002 How to Protect Against BeEF & Other Browser Exploits_en.srt
5.3 kB
19 - Security/003 Detecting Trojans Manually.mp4
17 MB
19 - Security/003 Detecting Trojans Manually_en.srt
6.5 kB
19 - Security/004 Detecting Trojans Using a Sandbox.mp4
12 MB
19 - Security/004 Detecting Trojans Using a Sandbox_en.srt
4.2 kB
19 - Security/004 Hybrid-Analysis.url
56 B
19 - Security/[CourseClub.Me].url
122 B
19 - Security/[FreeCourseSite.com].url
127 B
19 - Security/external-links.txt
57 B
20 - Bonus Section/0. Websites you may like/[CourseClub.Me].url
122 B
20 - Bonus Section/0. Websites you may like/[FreeCourseSite.com].url
127 B
20 - Bonus Section/001 Bonus Lecture - What's next.html
15 kB
20 - Bonus Section/[CourseClub.Me].url
122 B
20 - Bonus Section/[FreeCourseSite.com].url
127 B
[CourseClub.Me].url
122 B
[FreeCourseSite.com].url
127 B