TorBT - Torrents and Magnet Links Search Engine

Pentester Academy - Powershell For Pentesters (2020) [En]

File Name
Size
Information Gathering.mp4
50 MB
Advanced Operators.mp4
14 MB
Advanced Scripting with Powershell.mp4
17 MB
Arrays in Powershell.mp4
13 MB
Backdoors Part 1.mp4
44 MB
Backdoors Part 2.mp4
41 MB
Basics of Powershell Scripting.mp4
17 MB
Bruteforce Part 1.mp4
28 MB
Bruteforce Part 2.mp4
26 MB
Client Side Attacks Part 1.mp4
28 MB
Client Side Attacks Part 2.mp4
30 MB
Client Side Attacks Part 3.mp4
32 MB
Client Side Attacks Part 4.mp4
36 MB
COM and Powershell.mp4
29 MB
Conditional Statements in Powershell.mp4
18 MB
Course Conclusion.mp4
19 MB
Course Introduction.mp4
15 MB
CSRF - Custom Code is Always a Target! (solution).mp4
27 MB
CSRF - Custom Code is Always a Target!.mp4
4.3 MB
CSRF - How about a POST (solution).mp4
28 MB
CSRF - How about a POST.mp4
3.5 MB
CSRF - If only all Pentests were this Easy! (solution).mp4
12 MB
CSRF - If only all Pentests were this Easy!.mp4
4.1 MB
CSRF - Mutual Exclusivity is Important for Secrecy! (solution).mp4
39 MB
CSRF - Mutual Exclusivity is Important for Secrecy!.mp4
3.1 MB
CSRF - No he won't click your links! (solution).mp4
20 MB
CSRF - No he won't click your links!.mp4
2.3 MB
CSRF - Not All Links are Clickable (solution).mp4
44 MB
CSRF - Not All Links are Clickable.mp4
3.3 MB
CSRF - O! Token Where do you hide (solution).mp4
29 MB
CSRF - O! Token Where do you hide.mp4
1.5 MB
CSRF - The Web is Cross Domain -) (solution).mp4
35 MB
CSRF - The Web is Cross Domain -).mp4
2.9 MB
CSRF - We only hire after Reference Checks! (solution).mp4
25 MB
CSRF - We only hire after Reference Checks!.mp4
1.9 MB
CSRF - What's in a Name (solution).mp4
30 MB
CSRF - What's in a Name.mp4
2.4 MB
CSRF - Would hate a predictable life! (solution).mp4
26 MB
CSRF - Would hate a predictable life!.mp4
2.3 MB
CSRF - Wow! This just got hard! (solution).mp4
26 MB
CSRF - Wow! This just got hard!.mp4
2.3 MB
Defense with Powershell.mp4
17 MB
Domain Enumeration Part 1.mp4
30 MB
Domain Enumeration Part 2.mp4
42 MB
Dumping System Secrets Part 1.mp4
31 MB
Dumping System Secrets Part 2.mp4
20 MB
Exploitation Executing Scripts on MySQL.mp4
28 MB
Exploring and using Cmdlets.mp4
38 MB
Functions in Powershell Part 1.mp4
15 MB
Functions in Powershell Part 2.mp4
13 MB
Functions in Powershell Part 3.mp4
20 MB
Advanced Functions in Powershell.mp4
24 MB
Introduction to Powershell.mp4
30 MB
Jobs in Powershell.mp4
29 MB
Loop Statements in Powershell.mp4
16 MB
Metasploit Part 1.mp4
48 MB
Metasploit Part 2.mp4
37 MB
Module in Powershell Part 1.mp4
18 MB
Modules in Powershell Part 2.mp4
18 MB
Modules in Powershell Part 3.mp4
22 MB
Operators.mp4
20 MB
Output Formatting.mp4
26 MB
Pentest Methodology.mp4
18 MB
Persistence.mp4
36 MB
PHPMyAdmin Part 1.mp4
22 MB
PHPMyAdmin Part 2.mp4
30 MB
Porting Exploits Part 1.mp4
27 MB
Porting Exploits Part 2.mp4
25 MB
Porting Exploits Part 3.mp4
31 MB
POSHing the Hashes.mp4
23 MB
PowerShell and HID.mp4
26 MB
Powershell Remoting Part 3.mp4
23 MB
Powershell Remoting Part 4.mp4
34 MB
Powershell Remoting Part 5.mp4
26 MB
Powershell Remoting Part 6.mp4
18 MB
Powershell with other Security Tools.mp4
24 MB
Privilege Escalation Part 1.mp4
28 MB
Privilege Escalation Part 2.mp4
24 MB
Privilege Escalation Part 3.mp4
23 MB
Recon and Scanning Part 1.mp4
23 MB
Recon and Scanning Part 2.mp4
35 MB
Registry and Powershell Part 1.mp4
23 MB
Registry and Powershell Part 2.mp4
26 MB
Registry and Powershell Part 3.mp4
26 MB
Remoting Part 1.mp4
19 MB
Remoting Part 2.mp4
14 MB
Remoting Revisited.mp4
19 MB
Types in Powershell.mp4
15 MB
Using .NET in Powershell Part 1.mp4
31 MB
Using .NET in Powershell Part 2.mp4
18 MB
Using .NET in Powershell Part 3.mp4
18 MB
Using .NET in Powershell Part 4.mp4
29 MB
Using .NET in Powershell Part 5.mp4
24 MB
Using WMI in Powershell Part 1.mp4
39 MB
Using WMI in Powershell Part 2.mp4
26 MB
Using WMI in Powershell Part 3.mp4
28 MB
Vulnerability Scanning and Analysis.mp4
30 MB
Web Shells.mp4
35 MB