TorBT - Torrents and Magnet Links Search Engine
PacktPub - Offensive Hacking Unfolded - Become a Pro Pentester in 2023
- Date: 2024-08-04
- Size: 3.1 GB
- Files: 104
File Name
Size
1. Opening Lectures/1. Introduction to the Course - Do Not Skip.mp4
30 MB
1. Opening Lectures/1. Introduction to the Course - Do Not Skip.srt
9.7 kB
1. Opening Lectures/2. Disclaimer.html
1.6 kB
1. Opening Lectures/3. Thankyou for taking this course. What should you expect.html
2.5 kB
1. Opening Lectures/4. What can you do to get the most out of this course.mp4
22 MB
1. Opening Lectures/4. What can you do to get the most out of this course.srt
6.7 kB
1. Opening Lectures/5. How to get answers to your questions and help with problems.mp4
23 MB
1. Opening Lectures/5. How to get answers to your questions and help with problems.srt
7.1 kB
2. Fundamentals/1. Lab Setup using the VMware Player.mp4
57 MB
2. Fundamentals/1. Lab Setup using the VMware Player.srt
18 kB
2. Fundamentals/1.1 First Target Machine Basic PenTesting 1.html
114 B
2. Fundamentals/1.2 Kali Linux Virtual Machine File - OHU.html
133 B
2. Fundamentals/2. Terminal - Few Survival Commands to know (Optional).html
6.5 kB
2. Fundamentals/3. Terminal - Tips and Tricks you should apply now (Optional).html
2.0 kB
2. Fundamentals/4. Theoretical Basics [EXTREMELY IMPORTANT].mp4
129 MB
2. Fundamentals/4. Theoretical Basics [EXTREMELY IMPORTANT].srt
37 kB
3. Information Gathering/1. Passive Reconnaissance - Part 1.mp4
68 MB
3. Information Gathering/1. Passive Reconnaissance - Part 1.srt
15 kB
3. Information Gathering/2. Passive Reconnaissance - Part 2.mp4
82 MB
3. Information Gathering/2. Passive Reconnaissance - Part 2.srt
16 kB
3. Information Gathering/3. Passive Reconnaissance - Part 3.mp4
76 MB
3. Information Gathering/3. Passive Reconnaissance - Part 3.srt
15 kB
3. Information Gathering/4. Store Passive Data in the Right Way.html
4.0 kB
3. Information Gathering/5. Active Reconnaissance - Part 1.mp4
54 MB
3. Information Gathering/5. Active Reconnaissance - Part 1.srt
13 kB
3. Information Gathering/6. Active Reconnaissance - Part 2.mp4
65 MB
3. Information Gathering/6. Active Reconnaissance - Part 2.srt
17 kB
3. Information Gathering/7. Active Reconnaissance - Part 3.mp4
49 MB
3. Information Gathering/7. Active Reconnaissance - Part 3.srt
14 kB
3. Information Gathering/8. Store Active Data in the Right Way.html
662 B
3. Information Gathering/8.1 Target DB.xlsx
10 kB
4. Vulnerability Analysis/1. What is a Vulnerability Assessment.html
995 B
4. Vulnerability Analysis/2. Manually Identify, Analyze and Rank Vulnerabilities.mp4
147 MB
4. Vulnerability Analysis/2. Manually Identify, Analyze and Rank Vulnerabilities.srt
34 kB
4. Vulnerability Analysis/3. Automated Vulnerability Assessment using Nessus.mp4
95 MB
4. Vulnerability Analysis/3. Automated Vulnerability Assessment using Nessus.srt
29 kB
4. Vulnerability Analysis/4. Automated Vulnerability Assessment - Nmap & VEGA.mp4
40 MB
4. Vulnerability Analysis/4. Automated Vulnerability Assessment - Nmap & VEGA.srt
13 kB
5. Exploitation/1. LAB 1 - Exploitation with Metasploit Framework.mp4
152 MB
5. Exploitation/1. LAB 1 - Exploitation with Metasploit Framework.srt
42 kB
5. Exploitation/2. LAB 2 - Exploitation using Manual Public Exploits.mp4
138 MB
5. Exploitation/2. LAB 2 - Exploitation using Manual Public Exploits.srt
39 kB
5. Exploitation/3. Essential Things You Should Know.html
1.1 kB
6. Web Penetration Test/1. CMS Hacking - Initial Information Gathering.mp4
66 MB
6. Web Penetration Test/1. CMS Hacking - Initial Information Gathering.srt
19 kB
6. Web Penetration Test/2. CMS Hacking - Directory Busting and CMS Scanning.mp4
68 MB
6. Web Penetration Test/2. CMS Hacking - Directory Busting and CMS Scanning.srt
18 kB
6. Web Penetration Test/3. CMS Hacking - General Brute Forcing & Exploitation.mp4
144 MB
6. Web Penetration Test/3. CMS Hacking - General Brute Forcing & Exploitation.srt
34 kB
6. Web Penetration Test/4. Do you know the Power of Version Numbers - Part 1.mp4
105 MB
6. Web Penetration Test/4. Do you know the Power of Version Numbers - Part 1.srt
25 kB
6. Web Penetration Test/5. Do you know the Power of Version Numbers - Part 2.mp4
77 MB
6. Web Penetration Test/5. Do you know the Power of Version Numbers - Part 2.srt
19 kB
6. Web Penetration Test/6. Important Specific Vulnerabilities such as SQL Injection in-depth.mp4
122 MB
6. Web Penetration Test/6. Important Specific Vulnerabilities such as SQL Injection in-depth.srt
35 kB
6. Web Penetration Test/7. Important Specific Vulnerabilities such as XSS in-depth.mp4
86 MB
6. Web Penetration Test/7. Important Specific Vulnerabilities such as XSS in-depth.srt
22 kB
6. Web Penetration Test/8. Important Specific Vulnerabilities such as File Upload & Command Injection.mp4
74 MB
6. Web Penetration Test/8. Important Specific Vulnerabilities such as File Upload & Command Injection.srt
19 kB
6. Web Penetration Test/9. Part 1 Web Server Hacking Intro & Enumeration Ideas.mp4
66 MB
6. Web Penetration Test/9. Part 1 Web Server Hacking Intro & Enumeration Ideas.srt
16 kB
6. Web Penetration Test/10. Part 2 Web Server Hacking Risky PUT & DELETE Methods.mp4
72 MB
6. Web Penetration Test/10. Part 2 Web Server Hacking Risky PUT & DELETE Methods.srt
18 kB
6. Web Penetration Test/11. Part 3 Web Server Hacking SSH Brute Forcing w Hydra.mp4
40 MB
6. Web Penetration Test/11. Part 3 Web Server Hacking SSH Brute Forcing w Hydra.srt
12 kB
7. Network PenTesting/1. Upcoming Lectures with their Exact Release Date!.html
1.5 kB
7. Network PenTesting/2. The Core of Network Testing - Part 1.mp4
74 MB
7. Network PenTesting/2. The Core of Network Testing - Part 1.srt
22 kB
7. Network PenTesting/3. The Core of Network Testing - Part 2.mp4
122 MB
7. Network PenTesting/3. The Core of Network Testing - Part 2.srt
23 kB
7. Network PenTesting/4. The Core of Network Testing - Part 3.mp4
61 MB
7. Network PenTesting/4. The Core of Network Testing - Part 3.srt
14 kB
7. Network PenTesting/5. Post Exploitation using Metasploit - Part 1.mp4
70 MB
7. Network PenTesting/5. Post Exploitation using Metasploit - Part 1.srt
18 kB
7. Network PenTesting/6. Post Exploitation using Metasploit - Part 2.mp4
52 MB
7. Network PenTesting/6. Post Exploitation using Metasploit - Part 2.srt
15 kB
7. Network PenTesting/7. Post Exploitation using Metasploit - Part 3.mp4
48 MB
7. Network PenTesting/7. Post Exploitation using Metasploit - Part 3.srt
14 kB
7. Network PenTesting/8. Privilege Escalation Techniques - Part 1.mp4
91 MB
7. Network PenTesting/8. Privilege Escalation Techniques - Part 1.srt
23 kB
7. Network PenTesting/9. Privilege Escalation Techniques - Part 2.mp4
87 MB
7. Network PenTesting/9. Privilege Escalation Techniques - Part 2.srt
22 kB
7. Network PenTesting/10. Privilege Escalation Techniques - Part 3.mp4
34 MB
7. Network PenTesting/10. Privilege Escalation Techniques - Part 3.srt
10 kB
7. Network PenTesting/11. Privilege Escalation Techniques - Part 4.mp4
99 MB
7. Network PenTesting/11. Privilege Escalation Techniques - Part 4.srt
20 kB
7. Network PenTesting/13. Spawning Stable Shells.html
2.3 kB
8. Security Controls Evasion/1. Upcoming Lectures with their Exact Release Date!.html
1.0 kB
8. Security Controls Evasion/2. Introduction to Virus and Antivirus Software.html
3.1 kB
8. Security Controls Evasion/3. #1 Bypass Antivirus - Making the Base Payload.mp4
42 MB
8. Security Controls Evasion/3. #1 Bypass Antivirus - Making the Base Payload.srt
14 kB
8. Security Controls Evasion/4. #2 Bypass Antivirus - The Actual Evasion Technique!.mp4
101 MB
8. Security Controls Evasion/4. #2 Bypass Antivirus - The Actual Evasion Technique!.srt
28 kB
9. Writing Great Reports/1. Clean Documentation in a Professional Test.srt
33 kB
9. Writing Great Reports/1.mp4
98 MB
9. Writing Great Reports/2. Report Writing with Perfect Examples.html
990 B
9. Writing Great Reports/2.1 PenTest Report (OHU).docx
974 kB
9. Writing Great Reports/2.2 PenTest Report (OHU).pdf
813 kB
10. Happy Ending Lectures/1. How to go more advanced with this course.html
3.0 kB
10. Happy Ending Lectures/2. Unlock your certificate and upgrade your LinkedIn profile using this course!.mp4
10 MB
10. Happy Ending Lectures/2. Unlock your certificate and upgrade your LinkedIn profile using this course!.srt
2.9 kB
10. Happy Ending Lectures/3. What's your next step after doing this course.html
1.2 kB
10. Happy Ending Lectures/4. Thank you very much for completing this course!.mp4
4.2 MB
10. Happy Ending Lectures/4. Thank you very much for completing this course!.srt
3.1 kB