TorBT - Torrents and Magnet Links Search Engine
[ WebToolTip.com ] Udemy - Windows Exploitation - 45 Ethical Hacks and Exploits
- Date: 2026-04-15
- Size: 3.7 GB
- Files: 90
File Name
Size
Get Bonus Downloads Here.url
180 B
~Get Your Files Here !/1 - Course Overview/1 - Introduction.mp4
20 MB
~Get Your Files Here !/2 - Building Your Lab Envirorment/1 - Installing Oracle VirtualBox on Windows 10_11.mp4
35 MB
~Get Your Files Here !/2 - Building Your Lab Envirorment/1 - LABINS~1.DOC
356 kB
~Get Your Files Here !/2 - Building Your Lab Envirorment/2 - Installing the VirtualBox Extension Pack.mp4
22 MB
~Get Your Files Here !/2 - Building Your Lab Envirorment/3 - Creating a Virtaul Install of Kali Linux.mp4
87 MB
~Get Your Files Here !/2 - Building Your Lab Envirorment/3 - LAB-CR~1.PDF
815 kB
~Get Your Files Here !/2 - Building Your Lab Envirorment/4 - Creating a Virtaul Install of Windows 10.mp4
57 MB
~Get Your Files Here !/2 - Building Your Lab Envirorment/4 - LABINS~1.DOC
356 kB
~Get Your Files Here !/2 - Building Your Lab Envirorment/5 - Creating a Virtual Install of Metasploitable3 (W2k08).mp4
51 MB
~Get Your Files Here !/2 - Building Your Lab Envirorment/5 - LAB-CR~1.PDF
652 kB
~Get Your Files Here !/2 - Building Your Lab Envirorment/5 - REACTI~1.TXT
625 B
~Get Your Files Here !/2 - Building Your Lab Envirorment/6 - Creating a Virtual install of Server 2016.mp4
126 MB
~Get Your Files Here !/2 - Building Your Lab Envirorment/6 - LAB-CR~1.PDF
796 kB
~Get Your Files Here !/3 - Reconnaissance & Scanning/1 - Introduction to Nmap Basics.mp4
223 MB
~Get Your Files Here !/3 - Reconnaissance & Scanning/1 - Lab - Introduction to Nmap.pdf
1.2 MB
~Get Your Files Here !/3 - Reconnaissance & Scanning/2 - Service & OS Detection Using Nmap.mp4
57 MB
~Get Your Files Here !/3 - Reconnaissance & Scanning/3 - Nmap Service and Open Port scan.mp4
25 MB
~Get Your Files Here !/3 - Reconnaissance & Scanning/4 - Nmap Host Detection.mp4
52 MB
~Get Your Files Here !/3 - Reconnaissance & Scanning/5 - Lab - Using the Nmap Scripting Engine (NSE).pdf
917 kB
~Get Your Files Here !/3 - Reconnaissance & Scanning/5 - Nmap NSE for Windows Services.mp4
209 MB
~Get Your Files Here !/3 - Reconnaissance & Scanning/6 - Installing OpenVAS Using Docker.mp4
134 MB
~Get Your Files Here !/3 - Reconnaissance & Scanning/6 - Lab - Installing OpenVAS Using Docker.pdf
831 kB
~Get Your Files Here !/3 - Reconnaissance & Scanning/7 - Lab - Perform a Vulnerability Scan Using OpenVAS.pdf
1.2 MB
~Get Your Files Here !/3 - Reconnaissance & Scanning/7 - Vulnerability Scanning with OpenVAS.mp4
100 MB
~Get Your Files Here !/3 - Reconnaissance & Scanning/8 - LABUSI~1.PDF
427 kB
~Get Your Files Here !/3 - Reconnaissance & Scanning/8 - Using Shodan to Find Exposed Systems.mp4
151 MB
~Get Your Files Here !/3 - Reconnaissance & Scanning/9 - Creating A Bash Script For Scanning Vulnerable Ports.mp4
214 MB
~Get Your Files Here !/3 - Reconnaissance & Scanning/9 - LABB-C~1.PDF
838 kB
~Get Your Files Here !/4 - Enumeration & Information Gathering/1 - Banner Grabbing & Service Fingerprinting.mp4
53 MB
~Get Your Files Here !/4 - Enumeration & Information Gathering/1 - LAB-US~1.PDF
527 kB
~Get Your Files Here !/4 - Enumeration & Information Gathering/2 - Lab - Enumerating Windows 10 Using WinPEAS.pdf
549 kB
~Get Your Files Here !/4 - Enumeration & Information Gathering/2 - Local Enumeration with WinPEAS.mp4
71 MB
~Get Your Files Here !/4 - Enumeration & Information Gathering/3 - Credential Dumping with netsh (Wi-Fi).mp4
12 MB
~Get Your Files Here !/4 - Enumeration & Information Gathering/3 - LAB-DU~1.PDF
132 kB
~Get Your Files Here !/4 - Enumeration & Information Gathering/4 - LAB-GA~1.PDF
1.2 MB
~Get Your Files Here !/4 - Enumeration & Information Gathering/4 - Recon-ng for Windows Infrastructure.mp4
144 MB
~Get Your Files Here !/4 - Enumeration & Information Gathering/5 - Enumerate DNS Records Us.PDF
1.4 MB
~Get Your Files Here !/4 - Enumeration & Information Gathering/5 - Enumerate DNS Records Using DNSRecon.mp4
86 MB
~Get Your Files Here !/5 - Exploitation/1 - Lab - Use Msfvenom to Create a Reverse TCP Payload.pdf
753 kB
~Get Your Files Here !/5 - Exploitation/1 - Use Msfvenom to Create a Reverse TCP Payload.mp4
51 MB
~Get Your Files Here !/5 - Exploitation/2 - Lab - Use Msfvenom to Create an HTTPS Payload.pdf
764 kB
~Get Your Files Here !/5 - Exploitation/2 - Use Msfvenom to Create an HTTPS Payload.mp4
51 MB
~Get Your Files Here !/5 - Exploitation/3 - LAB-US~1.PDF
608 kB
~Get Your Files Here !/5 - Exploitation/3 - Use Msfvenom to Create Hidden Bind TCP Payload.mp4
38 MB
~Get Your Files Here !/5 - Exploitation/4 - Use Msfvenom to Create a BIND Shell Payload.mp4
59 MB
~Get Your Files Here !/5 - Exploitation/5 - HTML Smuggling Attack.mp4
80 MB
~Get Your Files Here !/5 - Exploitation/5 - Lab - HTML Smuggling Attack.pdf
680 kB
~Get Your Files Here !/5 - Exploitation/6 - Exploiting SQL Injection on Windows Sqlmap.mp4
141 MB
~Get Your Files Here !/5 - Exploitation/6 - Lab - SQL Injection Attack using SQLMap.pdf
417 kB
~Get Your Files Here !/5 - Exploitation/7 - Exploiting the UNIX_Linux rlogin Vulnerability.mp4
28 MB
~Get Your Files Here !/5 - Exploitation/8 - Exploiting VSFTPD v2.3.4 Using Metasploit.mp4
27 MB
~Get Your Files Here !/5 - Exploitation/9 - Lab - Pentesting with Netcat.pdf
346 kB
~Get Your Files Here !/5 - Exploitation/9 - Pentesting with Netcat.mp4
59 MB
~Get Your Files Here !/6 - Post-Exploitation & Persistence/1 - LABCRE~1.PDF
1.1 MB
~Get Your Files Here !/6 - Post-Exploitation & Persistence/1 - Persistent Backdoor Using Service Persistence.mp4
116 MB
~Get Your Files Here !/6 - Post-Exploitation & Persistence/2 - LABCRE~1.PDF
396 kB
~Get Your Files Here !/6 - Post-Exploitation & Persistence/2 - Remote Access via PowerShell Reverse Shell.mp4
53 MB
~Get Your Files Here !/6 - Post-Exploitation & Persistence/3 - LAB-LA~1.PDF
754 kB
~Get Your Files Here !/6 - Post-Exploitation & Persistence/3 - Launch an Automated Meterpreter Session.mp4
70 MB
~Get Your Files Here !/6 - Post-Exploitation & Persistence/4 - Disable UAC on Windows using PowerShell.mp4
18 MB
~Get Your Files Here !/6 - Post-Exploitation & Persistence/4 - LABDIS~1.PDF
182 kB
~Get Your Files Here !/7 - Privilege Escalation on Windows/1 - Disable UAC on Windows 10 Using Powershell.mp4
18 MB
~Get Your Files Here !/7 - Privilege Escalation on Windows/2 - Verify Windows Privilege Escalation Unquoted Service Path.mp4
112 MB
~Get Your Files Here !/7 - Privilege Escalation on Windows/3 - LAB-WI~1.PDF
115 kB
~Get Your Files Here !/7 - Privilege Escalation on Windows/3 - Windows Privilege Escalation - Unquoted Service Path.mp4
128 MB
~Get Your Files Here !/8 - Credential Attacks/1 - Lab - Using Hydra to Brute Force a Password.docx
382 kB
~Get Your Files Here !/8 - Credential Attacks/1 - Password Cracking with Hydra.mp4
46 MB
~Get Your Files Here !/8 - Credential Attacks/2 - Lab – Password Cracking Using Medusa.pdf
613 kB
~Get Your Files Here !/8 - Credential Attacks/2 - Password Cracking with Medusa.mp4
65 MB
~Get Your Files Here !/8 - Credential Attacks/3 - Lab - Password Cracking Using Mimikatz.pdf
1.1 MB
~Get Your Files Here !/8 - Credential Attacks/3 - Password Cracking with Mimikatz.mp4
155 MB
~Get Your Files Here !/8 - Credential Attacks/4 - Lab - Using Hydra to Brute Force a Password.docx
382 kB
~Get Your Files Here !/8 - Credential Attacks/4 - Password Cracking with Hydra.mp4
46 MB
~Get Your Files Here !/8 - Credential Attacks/5 - Brute-Forcing Windows Services (RDPSMB).mp4
100 MB
~Get Your Files Here !/8 - Credential Attacks/5 - Lab - Performing an RDP Brute Force Attack.pdf
928 kB
~Get Your Files Here !/8 - Credential Attacks/6 - Brute Force the SMB Password.mp4
88 MB
~Get Your Files Here !/8 - Credential Attacks/6 - Lab – Brute Force the SMB Password on a Windows Server.pdf
496 kB
~Get Your Files Here !/8 - Credential Attacks/7 - Advanced Password Hacking Techniques with Metasploit.mp4
80 MB
~Get Your Files Here !/8 - Credential Attacks/7 - LABADV~1.PDF
1.2 MB
~Get Your Files Here !/9 - Wireless & Network Attacks/1 - Lab – Quickly Transfer files Using Python.pdf
259 kB
~Get Your Files Here !/9 - Wireless & Network Attacks/1 - Quickly Transfer files Using Python's SimpleHTTPServer.mp4
44 MB
~Get Your Files Here !/9 - Wireless & Network Attacks/2 - Web Application Firewall Detection Using WAFW00F.mp4
17 MB
~Get Your Files Here !/9 - Wireless & Network Attacks/3 - Lab - Spoof Fake TCPIP Packets Using Hping3.pdf
499 kB
~Get Your Files Here !/9 - Wireless & Network Attacks/3 - Spoof Fake TCP IP Packets Using Hping3.mp4
54 MB
~Get Your Files Here !/9 - Wireless & Network Attacks/4 - PERFOR~1.PDF
503 kB
~Get Your Files Here !/9 - Wireless & Network Attacks/4 - Perform a Vulnerability Scan Using OWASP ZAP Attack Proxy.mp4
54 MB
~Get Your Files Here !/9 - Wireless & Network Attacks/5 - Exploiting HTTP PUT.mp4
76 MB
~Get Your Files Here !/9 - Wireless & Network Attacks/5 - Lab - Exploiting HTTP PUT.pdf
850 kB
~Get Your Files Here !/Bonus Resources.txt
70 B