TorBT - Torrents and Magnet Links Search Engine
LinuxAcademy - Kali Linux Deep Dive
- Date: 2025-09-03
- Size: 10 GB
- Files: 106
File Name
Size
22. Don't Be an Easy Target!.mp4
207 MB
2. About the Author.mp4
20 MB
3. About the Course.mp4
37 MB
4. Course Prerequisites.mp4
63 MB
5. Community and Support.mp4
47 MB
6. Disclaimer It Is Not Like in the Movies! (1).mp4
54 MB
6. Disclaimer It Is Not Like in the Movies!.mp4
54 MB
7. What Is What.mp4
136 MB
8. Where Is What.mp4
106 MB
9. Linux Command Line Review.mp4
114 MB
10. Services.mp4
100 MB
11. Firewalls.mp4
83 MB
12. Users.mp4
59 MB
13. Introduction.mp4
37 MB
14. Installing Kali Linux — Part 1.mp4
83 MB
15. Installing Kali Linux — Part 2.mp4
16 MB
16. Building a Custom Kali Linux Image.mp4
148 MB
17. Creating a Live USB.mp4
44 MB
18. Booting from a Live USB.mp4
34 MB
19. Adding Encrypted Persistent Storage .mp4
85 MB
20. Finalizing and Testing the Live USB.mp4
125 MB
21. What Is Social Engineering.mp4
178 MB
1. An Important Note About A Cloud Guru and Linux Academy Courses.mp4
52 MB
23. Circles of Trust.mp4
94 MB
24. Keyloggers.mp4
98 MB
25. ATMs and Banks.mp4
61 MB
26. Physical Access to Devices.mp4
139 MB
27. Real Anonymity vs. Perceived Anonymity.mp4
134 MB
28. Common Pitfalls.mp4
143 MB
29. What Is a VPN.mp4
95 MB
30. Setting Up a VPN Server Side — Part 1.mp4
140 MB
31. Setting Up a VPN Server Side — Part 2.mp4
162 MB
32. Setting Up a VPN Server Side — Part 3.mp4
122 MB
33. Setting Up a VPN Client Side.mp4
151 MB
34. Connecting to a VPN.mp4
60 MB
35. What Is Tor.mp4
124 MB
36. Tor Browser.mp4
168 MB
37. The Tor Service.mp4
147 MB
38. What Is a Proxy.mp4
56 MB
39. Setting Up a SOCKS5 Proxy.mp4
113 MB
40. Connecting to a Proxy.mp4
86 MB
41. Introduction to Phishing and Tracking.mp4
65 MB
42. Setting Up Email Tracking.mp4
106 MB
43. Let's Go Phishing!.mp4
126 MB
44. ARP Spoofing.mp4
197 MB
45. MAC Address Spoofing.mp4
83 MB
46. DHCP Starvation.mp4
110 MB
47. Google Dorks.mp4
91 MB
48. WHOIS and GeoIP Lookup.mp4
106 MB
49. Nmap.mp4
102 MB
50. Host Discovery.mp4
103 MB
51. Open Port Discovery.mp4
164 MB
52. Network Mapping.mp4
75 MB
53. Service and Service Version Detection.mp4
54 MB
54. Identifying the Operating System.mp4
48 MB
55. Vulnerability Scans.mp4
165 MB
56. What Are DoS and DDoS Attacks.mp4
110 MB
57. Famous DDoS Attacks.mp4
83 MB
58. Scanning Networks, Capturing a Handshake, and Deauthenticating Clients.mp4
144 MB
59. Password Cracking Math, Common Sense, and Limits.mp4
85 MB
60. Setting Up the Environment and Installing GPU Drivers.mp4
139 MB
61. Using Hashcat and Password Masks.mp4
174 MB
62. Hashcat Wrap-Up.mp4
45 MB
63. What Is Buffer Overflow.mp4
119 MB
64. Using Buffer Overflow to Bypass Authentication.mp4
85 MB
65. What Is Reverse Engineering.mp4
110 MB
66. Setting Up an IDE to Compile a Keylogger.mp4
69 MB
67. Getting, Importing, and Compiling the Source Code.mp4
65 MB
68. Compiling and Customizing the Source Code.mp4
106 MB
69. Testing Out the Keylogger.mp4
36 MB
70. Detecting Process Abnormalities in the Task Manager.mp4
180 MB
71. Analyzing Processes with Cheat Engine.mp4
172 MB
72. Determining What an Unknown Program Is Doing — Part 1.mp4
150 MB
73. Determining What an Unknown Program Is Doing — Part 2.mp4
80 MB
74. Analyzing an Executable with a Decompiler .mp4
159 MB
75. Decompiling Function Parameters and Variables.mp4
141 MB
76. Reverse Engineering Function Logic with a Decompiler — Part 1.mp4
181 MB
77. Reverse Engineering Function Logic with a Decompiler — Part 2.mp4
123 MB
78. Reverse Engineering Function Logic with a Decompiler — Part 3.mp4
150 MB
79. Finding Salts in Decompiled Code.mp4
156 MB
80. Writing a Decryption Program from Pseudocode — Part 1.mp4
119 MB
81. Writing a Decryption Program from Pseudocode — Part 2.mp4
136 MB
82. Writing a Decryption Program from Pseudocode — Part 3.mp4
43 MB
83. Reverse Engineering Wrap-Up.mp4
62 MB
84. What Is Metasploit.mp4
104 MB
85. Basic Commands.mp4
106 MB
86. Other Useful Metasploit Commands.mp4
114 MB
87. Database Setup and ExploitDB.mp4
114 MB
88. Exploit Usage.mp4
54 MB
89. The Post-Exploitation Phase.mp4
88 MB
90. Armitage.mp4
80 MB
91. Shellshock.mp4
81 MB
92. Executing Code Remotely with Shellshock.mp4
104 MB
93. Writing an NSE Script Headers.mp4
65 MB
94. Writing an NSE Script Rules.mp4
124 MB
95. Writing an NSE Script Actions.mp4
123 MB
96. Debugging an NSE Script — Part 1.mp4
153 MB
97. Debugging an NSE Script — Part 2.mp4
53 MB
98. Examining a Metasploit Module .mp4
98 MB
99. Module Script Outline.mp4
133 MB
100. Loading a Module into Metasploit and Performing a Syntax Check.mp4
87 MB
101. Deploying and Testing a Script.mp4
129 MB
102. What's Next .mp4
55 MB
Resources/274_Kali-Linux-Deep-Dive_Reverse-Engineering_1552067412.pdf
853 kB
Resources/274_Kali-Linux_Deep-Dive_Study-Guide_1567788781.pdf
1.6 MB
Resources/linkstochartskali_1552431038
1019 B