TorBT - Torrents and Magnet Links Search Engine

Udemy - Cloud-Based Hacking Hack Logins, Computers & More (3.2024)

File Name
Size
01 - Introduction to Cloud Computing For Hackers/001 Teaser.mp4
39 MB
01 - Introduction to Cloud Computing For Hackers/001 Teaser.srt
9.8 kB
01 - Introduction to Cloud Computing For Hackers/002 Introduction to Hacking Using the Cloud.mp4
52 MB
01 - Introduction to Cloud Computing For Hackers/002 Introduction to Hacking Using the Cloud.srt
6.1 kB
01 - Introduction to Cloud Computing For Hackers/003 What is The Cloud.mp4
24 MB
01 - Introduction to Cloud Computing For Hackers/003 What is The Cloud.srt
7.0 kB
01 - Introduction to Cloud Computing For Hackers/003 What-is-the-cloud.pdf
1.1 MB
01 - Introduction to Cloud Computing For Hackers/004 Why Learn Cloud Computing as a Hacker.mp4
7.7 MB
01 - Introduction to Cloud Computing For Hackers/004 Why Learn Cloud Computing as a Hacker.srt
3.8 kB
02 - Cloud Basics/005 Introduction to Cloud Basics.mp4
12 MB
02 - Cloud Basics/005 Introduction to Cloud Basics.srt
785 B
02 - Cloud Basics/006 AWS-Home-Page.url
46 B
02 - Cloud Basics/006 Signing Up With AWS.mp4
44 MB
02 - Cloud Basics/006 Signing Up With AWS.srt
5.9 kB
02 - Cloud Basics/007 Installing Kali Linux On The Cloud.mp4
185 MB
02 - Cloud Basics/007 Installing Kali Linux On The Cloud.srt
14 kB
02 - Cloud Basics/008 Communicating With Cloud Computers Remotely Using SSH.mp4
91 MB
02 - Cloud Basics/008 Communicating With Cloud Computers Remotely Using SSH.srt
10 kB
02 - Cloud Basics/009 Command-Explainer.url
49 B
02 - Cloud Basics/009 Linux Terminal Basics.mp4
160 MB
02 - Cloud Basics/009 Linux Terminal Basics.srt
12 kB
02 - Cloud Basics/009 List-of-Linux-Commands.url
85 B
02 - Cloud Basics/external-links.txt
190 B
03 - Phishing/010 Introduction to Phishing.mp4
58 MB
03 - Phishing/010 Introduction to Phishing.srt
3.8 kB
03 - Phishing/010 Phishing-DNS-https.pdf
1.7 MB
03 - Phishing/011 File Hosting & Firewall Settings.mp4
336 MB
03 - Phishing/011 File Hosting & Firewall Settings.srt
17 kB
03 - Phishing/012 Cloning Websites & Uploading Them to The Cloud.mp4
61 MB
03 - Phishing/012 Cloning Websites & Uploading Them to The Cloud.srt
13 kB
03 - Phishing/013 Creating a Fake Login Page On The Cloud.mp4
123 MB
03 - Phishing/013 Creating a Fake Login Page On The Cloud.srt
7.6 kB
03 - Phishing/014 Modifying the Page to Steal Login Information.mp4
250 MB
03 - Phishing/014 Modifying the Page to Steal Login Information.srt
12 kB
03 - Phishing/015 Stealing Facebook Login Using an Identical Fake Login Page.mp4
223 MB
03 - Phishing/015 Stealing Facebook Login Using an Identical Fake Login Page.srt
14 kB
03 - Phishing/016 Domain Name & DNS Basics.mp4
54 MB
03 - Phishing/016 Domain Name & DNS Basics.srt
13 kB
03 - Phishing/017 Linking Domain Names to Phishing Pages.mp4
94 MB
03 - Phishing/017 Linking Domain Names to Phishing Pages.srt
11 kB
03 - Phishing/018 Introduction to HTTPS.mp4
28 MB
03 - Phishing/018 Introduction to HTTPS.srt
8.2 kB
03 - Phishing/019 Enabling HTTPS on Phishing Pages.mp4
152 MB
03 - Phishing/019 Enabling HTTPS on Phishing Pages.srt
11 kB
04 - Phishing - Bypassing 2 Multi Factor Authentication (2FA MFA)/020 Bypassing-2FA-EvilginX2.pdf
544 kB
04 - Phishing - Bypassing 2 Multi Factor Authentication (2FA MFA)/020 EvilGinX-Download-Page.url
61 B
04 - Phishing - Bypassing 2 Multi Factor Authentication (2FA MFA)/020 Introduction to Evilginx.mp4
140 MB
04 - Phishing - Bypassing 2 Multi Factor Authentication (2FA MFA)/020 Introduction to Evilginx.srt
11 kB
04 - Phishing - Bypassing 2 Multi Factor Authentication (2FA MFA)/021 Another-Phishlets-Link.url
77 B
04 - Phishing - Bypassing 2 Multi Factor Authentication (2FA MFA)/021 Installing Evilginx on the Cloud.mp4
192 MB
04 - Phishing - Bypassing 2 Multi Factor Authentication (2FA MFA)/021 Installing Evilginx on the Cloud.srt
11 kB
04 - Phishing - Bypassing 2 Multi Factor Authentication (2FA MFA)/021 Phishlets-Link.url
71 B
04 - Phishing - Bypassing 2 Multi Factor Authentication (2FA MFA)/022 Bypassing 2FA MFA.mp4
204 MB
04 - Phishing - Bypassing 2 Multi Factor Authentication (2FA MFA)/022 Bypassing 2FA MFA.srt
13 kB
04 - Phishing - Bypassing 2 Multi Factor Authentication (2FA MFA)/022 Cookie-Manager.url
85 B
04 - Phishing - Bypassing 2 Multi Factor Authentication (2FA MFA)/external-links.txt
310 B
05 - Accessing Cloud Server Desktop/023 Introduction and Main Setup.mp4
19 MB
05 - Accessing Cloud Server Desktop/023 Introduction and Main Setup.srt
5.7 kB
05 - Accessing Cloud Server Desktop/023 VNC.pdf
244 kB
05 - Accessing Cloud Server Desktop/024 Accessing The Desktop of Cloud Servers.mp4
230 MB
05 - Accessing Cloud Server Desktop/024 Accessing The Desktop of Cloud Servers.srt
15 kB
05 - Accessing Cloud Server Desktop/024 Remote-Ripple-Download-Page.url
58 B
05 - Accessing Cloud Server Desktop/external-links.txt
71 B
06 - BitB - Browser In Browser Attack/025 Bypassing-2FA-BIB.pdf
599 kB
06 - BitB - Browser In Browser Attack/025 Introduction to Browser in Browser Attack.mp4
172 MB
06 - BitB - Browser In Browser Attack/025 Introduction to Browser in Browser Attack.srt
11 kB
06 - BitB - Browser In Browser Attack/026 Polishing the Connection & Installing a Browser.mp4
103 MB
06 - BitB - Browser In Browser Attack/026 Polishing the Connection & Installing a Browser.srt
6.4 kB
06 - BitB - Browser In Browser Attack/027 Building a Malicious Browser.mp4
91 MB
06 - BitB - Browser In Browser Attack/027 Building a Malicious Browser.srt
12 kB
06 - BitB - Browser In Browser Attack/028 Enhancing the URL.mp4
102 MB
06 - BitB - Browser In Browser Attack/028 Enhancing the URL.srt
7.8 kB
06 - BitB - Browser In Browser Attack/029 Hacking Gmail & Bypassing 2FA MFA.mp4
56 MB
06 - BitB - Browser In Browser Attack/029 Hacking Gmail & Bypassing 2FA MFA.srt
9.9 kB
06 - BitB - Browser In Browser Attack/030 Hacking Whatsapp.mp4
25 MB
06 - BitB - Browser In Browser Attack/030 Hacking Whatsapp.srt
4.3 kB
07 - Mobile BitB - Mobile Friendly Phishing & 2FA Bypass/031 Mobile Friendly Phishing Pages.mp4
120 MB
07 - Mobile BitB - Mobile Friendly Phishing & 2FA Bypass/031 Mobile Friendly Phishing Pages.srt
12 kB
07 - Mobile BitB - Mobile Friendly Phishing & 2FA Bypass/032 Hiding the Cursor.mp4
228 MB
07 - Mobile BitB - Mobile Friendly Phishing & 2FA Bypass/032 Hiding the Cursor.srt
13 kB
07 - Mobile BitB - Mobile Friendly Phishing & 2FA Bypass/033 Installing & Configuring a Virtual Keyboard.mp4
159 MB
07 - Mobile BitB - Mobile Friendly Phishing & 2FA Bypass/033 Installing & Configuring a Virtual Keyboard.srt
9.5 kB
07 - Mobile BitB - Mobile Friendly Phishing & 2FA Bypass/034 Hacking Gmail on Mobile Devices & Bypassing 2FA.mp4
81 MB
07 - Mobile BitB - Mobile Friendly Phishing & 2FA Bypass/034 Hacking Gmail on Mobile Devices & Bypassing 2FA.srt
10 kB
08 - Multi-BitB Attack/035 Establishing Multiple Independent Connections.mp4
143 MB
08 - Multi-BitB Attack/035 Establishing Multiple Independent Connections.srt
14 kB
08 - Multi-BitB Attack/036 Creating Independent User Sessions.mp4
130 MB
08 - Multi-BitB Attack/036 Creating Independent User Sessions.srt
9.7 kB
08 - Multi-BitB Attack/037 Stealing Gmail & Facebook Logins From Multiple Devices.mp4
133 MB
08 - Multi-BitB Attack/037 Stealing Gmail & Facebook Logins From Multiple Devices.srt
14 kB
09 - Hacking Web Browsers/038 Hacking-Web-Browsers.pdf
129 kB
09 - Hacking Web Browsers/038 Introduction to Browser Hacking.mp4
37 MB
09 - Hacking Web Browsers/038 Introduction to Browser Hacking.srt
2.4 kB
09 - Hacking Web Browsers/039 Installing Needed Software.mp4
246 MB
09 - Hacking Web Browsers/039 Installing Needed Software.srt
18 kB
09 - Hacking Web Browsers/040 Embedding Evil Code in Cloned Websites.mp4
268 MB
09 - Hacking Web Browsers/040 Embedding Evil Code in Cloned Websites.srt
14 kB
09 - Hacking Web Browsers/041 Enabling HTTPS on Malicous Pages.mp4
304 MB
09 - Hacking Web Browsers/041 Enabling HTTPS on Malicous Pages.srt
17 kB
09 - Hacking Web Browsers/042 Windows & Apple Mac OS Web Browser Hacking.mp4
103 MB
09 - Hacking Web Browsers/042 Windows & Apple Mac OS Web Browser Hacking.srt
7.9 kB
09 - Hacking Web Browsers/043 Programming Custom Evil Pages to Access the Target's Location & OS.mp4
185 MB
09 - Hacking Web Browsers/043 Programming Custom Evil Pages to Access the Target's Location & OS.srt
9.5 kB
09 - Hacking Web Browsers/044 Automatically Storing Gathered Information on the Cloud.mp4
349 MB
09 - Hacking Web Browsers/044 Automatically Storing Gathered Information on the Cloud.srt
18 kB
09 - Hacking Web Browsers/045 URL Manipulation.mp4
21 MB
09 - Hacking Web Browsers/045 URL Manipulation.srt
8.1 kB
10 - Command & Control Servers (C2 C&C)/046 C2-intro.pdf
582 kB
10 - Command & Control Servers (C2 C&C)/046 Introduction to Command & Control Servers.mp4
35 MB
10 - Command & Control Servers (C2 C&C)/046 Introduction to Command & Control Servers.srt
2.3 kB
10 - Command & Control Servers (C2 C&C)/047 The-C2-Matrix.url
54 B
10 - Command & Control Servers (C2 C&C)/047 What is a C2 & Which is the best.mp4
177 MB
10 - Command & Control Servers (C2 C&C)/047 What is a C2 & Which is the best.srt
12 kB
10 - Command & Control Servers (C2 C&C)/external-links.txt
53 B
11 - Hacking Windows, Linux & Apple Mac OS From the Cloud/048 Empire-Github-Repo.url
61 B
11 - Hacking Windows, Linux & Apple Mac OS From the Cloud/048 Empire-Wiki.url
77 B
11 - Hacking Windows, Linux & Apple Mac OS From the Cloud/048 Introduction to Empire & Starkiller.mp4
294 MB
11 - Hacking Windows, Linux & Apple Mac OS From the Cloud/048 Introduction to Empire & Starkiller.srt
17 kB
11 - Hacking Windows, Linux & Apple Mac OS From the Cloud/049 Interacting with Starkiller.mp4
115 MB
11 - Hacking Windows, Linux & Apple Mac OS From the Cloud/049 Interacting with Starkiller.srt
9.3 kB
11 - Hacking Windows, Linux & Apple Mac OS From the Cloud/050 Receiving Backdoor Connections From the Cloud.mp4
56 MB
11 - Hacking Windows, Linux & Apple Mac OS From the Cloud/050 Receiving Backdoor Connections From the Cloud.srt
16 kB
11 - Hacking Windows, Linux & Apple Mac OS From the Cloud/051 Creating a Windows Backdoor Using Starkiller.mp4
35 MB
11 - Hacking Windows, Linux & Apple Mac OS From the Cloud/051 Creating a Windows Backdoor Using Starkiller.srt
12 kB
11 - Hacking Windows, Linux & Apple Mac OS From the Cloud/052 Hacking & Controlling Windows 11 Through the Cloud.mp4
69 MB
11 - Hacking Windows, Linux & Apple Mac OS From the Cloud/052 Hacking & Controlling Windows 11 Through the Cloud.srt
7.6 kB
11 - Hacking Windows, Linux & Apple Mac OS From the Cloud/external-links.txt
139 B
12 - Post Exploitation With StarKiller/053 File System Access & System Command Execution.mp4
109 MB
12 - Post Exploitation With StarKiller/053 File System Access & System Command Execution.srt
14 kB
12 - Post Exploitation With StarKiller/054 StarKiller Modules Basics.mp4
153 MB
12 - Post Exploitation With StarKiller/054 StarKiller Modules Basics.srt
11 kB
12 - Post Exploitation With StarKiller/055 Finding Sensitive Data on Windows & Module Filtering.mp4
76 MB
12 - Post Exploitation With StarKiller/055 Finding Sensitive Data on Windows & Module Filtering.srt
9.2 kB
12 - Post Exploitation With StarKiller/056 Stealing Windows Passwords.mp4
33 MB
12 - Post Exploitation With StarKiller/056 Stealing Windows Passwords.srt
7.4 kB
12 - Post Exploitation With StarKiller/057 Capturing Keystrikes & Copied Passwords.mp4
24 MB
12 - Post Exploitation With StarKiller/057 Capturing Keystrikes & Copied Passwords.srt
6.7 kB
12 - Post Exploitation With StarKiller/058 Launching a Ransomeware Attack.mp4
55 MB
12 - Post Exploitation With StarKiller/058 Launching a Ransomeware Attack.srt
12 kB
13 - Hacking Windows Using Discord as a C2/059 C2-Distopia.pdf
1.8 MB
13 - Hacking Windows Using Discord as a C2/059 Distopia-C2-Git-Repo.url
60 B
13 - Hacking Windows Using Discord as a C2/059 Introduction & Setup.mp4
143 MB
13 - Hacking Windows Using Discord as a C2/059 Introduction & Setup.srt
8.0 kB
13 - Hacking Windows Using Discord as a C2/060 Creating a Discord Server.mp4
170 MB
13 - Hacking Windows Using Discord as a C2/060 Creating a Discord Server.srt
9.0 kB
13 - Hacking Windows Using Discord as a C2/060 Distopia-Wiki.url
65 B
13 - Hacking Windows Using Discord as a C2/061 Weaponising Discord Servers.mp4
55 MB
13 - Hacking Windows Using Discord as a C2/061 Weaponising Discord Servers.srt
6.7 kB
13 - Hacking Windows Using Discord as a C2/062 Hacking Windows 11 Through Discord.mp4
66 MB
13 - Hacking Windows Using Discord as a C2/062 Hacking Windows 11 Through Discord.srt
12 kB
13 - Hacking Windows Using Discord as a C2/external-links.txt
130 B
14 - Windows Post Exploitation via Discord/063 Getting Computer info, Location & Stored Passwords.mp4
104 MB
14 - Windows Post Exploitation via Discord/063 Getting Computer info, Location & Stored Passwords.srt
9.7 kB
14 - Windows Post Exploitation via Discord/064 Remotely Executing System Commands & Getting a Reverse Shell.mp4
107 MB
14 - Windows Post Exploitation via Discord/064 Remotely Executing System Commands & Getting a Reverse Shell.srt
12 kB
14 - Windows Post Exploitation via Discord/065 Remote File System Management With Upload & Download.mp4
86 MB
14 - Windows Post Exploitation via Discord/065 Remote File System Management With Upload & Download.srt
9.2 kB
14 - Windows Post Exploitation via Discord/066 Remote Webcam & Keyboard Access.mp4
26 MB
14 - Windows Post Exploitation via Discord/066 Remote Webcam & Keyboard Access.srt
6.4 kB
15 - Creating Windows Trojans/067 Introduction to Trojans.mp4
20 MB
15 - Creating Windows Trojans/067 Introduction to Trojans.srt
1.4 kB
15 - Creating Windows Trojans/068 Creating a Basic Trojan.mp4
171 MB
15 - Creating Windows Trojans/068 Creating a Basic Trojan.srt
15 kB
15 - Creating Windows Trojans/069 Bat-2-EXE-Download-Link.url
93 B
15 - Creating Windows Trojans/069 Improving Torjan's Icon & Behaviour.mp4
22 MB
15 - Creating Windows Trojans/069 Improving Torjan's Icon & Behaviour.srt
5.1 kB
15 - Creating Windows Trojans/external-links.txt
102 B
16 - Creating Apple Mac OS & Linux Trojans/070 Generating a Basic Apple and Linux Backdoor.mp4
127 MB
16 - Creating Apple Mac OS & Linux Trojans/070 Generating a Basic Apple and Linux Backdoor.srt
9.4 kB
16 - Creating Apple Mac OS & Linux Trojans/071 Hacking Apple Mac OS Using a Trojan.mp4
159 MB
16 - Creating Apple Mac OS & Linux Trojans/071 Hacking Apple Mac OS Using a Trojan.srt
17 kB
16 - Creating Apple Mac OS & Linux Trojans/072 Hacking Linux Using a Trojan.mp4
311 MB
16 - Creating Apple Mac OS & Linux Trojans/072 Hacking Linux Using a Trojan.srt
16 kB
16 - Creating Apple Mac OS & Linux Trojans/072 Ubuntu-Packages.url
51 B
16 - Creating Apple Mac OS & Linux Trojans/external-links.txt
52 B
17 - Advanced Malware Delivery/073 Introduction to Advanced Delivery Methods.mp4
16 MB
17 - Advanced Malware Delivery/073 Introduction to Advanced Delivery Methods.srt
1.1 kB
17 - Advanced Malware Delivery/073 Malware-Delivery.pdf
320 kB
17 - Advanced Malware Delivery/074 Introduction to self-hosting + Demo.mp4
42 MB
17 - Advanced Malware Delivery/074 Introduction to self-hosting + Demo.srt
9.9 kB
17 - Advanced Malware Delivery/074 PWNdrop-Git-Repo.url
59 B
17 - Advanced Malware Delivery/075 Installing a File Sharing Service on The Cloud.mp4
152 MB
17 - Advanced Malware Delivery/075 Installing a File Sharing Service on The Cloud.srt
8.9 kB
17 - Advanced Malware Delivery/076 Manipulating Shared Files on The Cloud.mp4
54 MB
17 - Advanced Malware Delivery/076 Manipulating Shared Files on The Cloud.srt
12 kB
17 - Advanced Malware Delivery/077 Hiding Replacing File Type & Extension.mp4
19 MB
17 - Advanced Malware Delivery/077 Hiding Replacing File Type & Extension.srt
4.3 kB
17 - Advanced Malware Delivery/078 Manually Enabling HTTPS.mp4
95 MB
17 - Advanced Malware Delivery/078 Manually Enabling HTTPS.srt
10 kB
17 - Advanced Malware Delivery/079 Cross-Platform Malware Delivery.mp4
136 MB
17 - Advanced Malware Delivery/079 Cross-Platform Malware Delivery.srt
14 kB
17 - Advanced Malware Delivery/external-links.txt
61 B
18 - Bonus Section/080 Bonus Lecture.html
15 kB