TorBT - Torrents and Magnet Links Search Engine
The Complete Penetration Testing Bootcamp
- Date: 2026-03-25
- Size: 3.6 GB
- Files: 128
File Name
Size
01 - Introduction/001 Welcome!.mp4
39 MB
01 - Introduction/001 Welcome!_en.srt
8.9 kB
02 - Setting Up Your Environment/001 How To Setup A Virtual Penetration Testing Environment.mp4
394 MB
02 - Setting Up Your Environment/001 Section-1-Links.txt
163 B
02 - Setting Up Your Environment/002 Downloading and installing Metasploitable2.mp4
25 MB
02 - Setting Up Your Environment/002 Downloading and installing Metasploitable2_en.srt
14 kB
02 - Setting Up Your Environment/002 Section-1-Links.txt
163 B
02 - Setting Up Your Environment/003 Installing VMware.mp4
10 MB
02 - Setting Up Your Environment/004 How To Install Kali Linux On VMware.mp4
42 MB
02 - Setting Up Your Environment/004 How To Install Kali Linux On VMware_en.srt
29 kB
03 - Anonymity/001 How To Setup Proxychains On Kali Linux.mp4
33 MB
03 - Anonymity/001 How To Setup Proxychains On Kali Linux_en.srt
14 kB
03 - Anonymity/002 How to setup Anonsurf on Kali Linux.mp4
48 MB
03 - Anonymity/002 How to setup Anonsurf on Kali Linux_en.srt
12 kB
03 - Anonymity/003 How to use a VPN with Proxychains - Maximum anonymity.mp4
142 MB
03 - Anonymity/003 How to use a VPN with Proxychains - Maximum anonymity_en.srt
12 kB
03 - Anonymity/004 The Complete DNS guide - How to change your DNS.mp4
33 MB
03 - Anonymity/004 The Complete DNS guide - How to change your DNS_en.srt
20 kB
04 - Getting started with Linux/001 Adding Users & Changing Passwords.mp4
14 MB
04 - Getting started with Linux/001 Adding Users & Changing Passwords_en.srt
12 kB
04 - Getting started with Linux/002 System Services.mp4
10 MB
04 - Getting started with Linux/002 System Services_en.srt
12 kB
04 - Getting started with Linux/003 The Aptitude Package Manager - Installing & Updating packages.mp4
34 MB
04 - Getting started with Linux/003 The Aptitude Package Manager - Installing & Updating packages_en.srt
12 kB
04 - Getting started with Linux/004 Linux File System.mp4
35 MB
04 - Getting started with Linux/004 Linux File System_en.srt
34 kB
04 - Getting started with Linux/005 Installing Terminator - Terminal Emulator & Multiplexer.mp4
11 MB
05 - Networking Fundamentals/001 Understanding the OSI Model.mp4
13 MB
05 - Networking Fundamentals/001 Understanding the OSI Model_en.srt
4.4 kB
05 - Networking Fundamentals/002 The Network Layer.mp4
18 MB
05 - Networking Fundamentals/002 The Network Layer_en.srt
8.0 kB
05 - Networking Fundamentals/003 The Transport Layer.mp4
18 MB
05 - Networking Fundamentals/003 The Transport Layer_en.srt
10 kB
05 - Networking Fundamentals/004 The TCP 3 Way Handshake.mp4
27 MB
05 - Networking Fundamentals/004 The TCP 3 Way Handshake_en.srt
8.3 kB
06 - Passive Information Gathering/001 Information Gathering - Whois Lookup & DNS Reconnaisance.mp4
49 MB
06 - Passive Information Gathering/001 Information Gathering - Whois Lookup & DNS Reconnaisance_en.srt
11 kB
06 - Passive Information Gathering/001 Links.txt
67 B
06 - Passive Information Gathering/002 Gathering Emails - theharvester.mp4
67 MB
06 - Passive Information Gathering/002 Gathering Emails - theharvester_en.srt
11 kB
06 - Passive Information Gathering/003 Whois Lookup.mp4
39 MB
06 - Passive Information Gathering/003 Whois Lookup_en.srt
6.9 kB
06 - Passive Information Gathering/004 Netcraft - Passive Information Gathering.mp4
41 MB
06 - Passive Information Gathering/004 Netcraft - Passive Information Gathering_en.srt
12 kB
07 - Active Information Gathering/001 DNS Enumeration.mp4
6.4 MB
07 - Active Information Gathering/001 DNS Enumeration_en.srt
7.9 kB
07 - Active Information Gathering/002 DNSRecon.mp4
20 MB
07 - Active Information Gathering/003 Installing Nmap on Windows.mp4
95 MB
07 - Active Information Gathering/003 Installing Nmap on Windows_en.srt
12 kB
07 - Active Information Gathering/003 Nmap-Download-Link-Windows.txt
30 B
07 - Active Information Gathering/004 Installing Nmap on Linux.mp4
18 MB
07 - Active Information Gathering/004 Installing Nmap on Linux_en.srt
7.7 kB
07 - Active Information Gathering/005 Installing Zenmap on Linux.mp4
10 MB
07 - Active Information Gathering/005 Installing Zenmap on Linux_en.srt
6.3 kB
07 - Active Information Gathering/006 Scanning a single target.mp4
9.4 MB
07 - Active Information Gathering/006 Scanning a single target_en.srt
8.1 kB
07 - Active Information Gathering/007 Scanning multiple targets.mp4
9.5 MB
07 - Active Information Gathering/007 Scanning multiple targets_en.srt
8.3 kB
07 - Active Information Gathering/008 Scanning an IP range.mp4
15 MB
07 - Active Information Gathering/008 Scanning an IP range_en.srt
12 kB
07 - Active Information Gathering/009 Scanning an entire subnet.mp4
5.6 MB
07 - Active Information Gathering/009 Scanning an entire subnet_en.srt
5.7 kB
07 - Active Information Gathering/010 Scanning a list of targets.mp4
9.2 MB
07 - Active Information Gathering/010 Scanning a list of targets_en.srt
8.5 kB
07 - Active Information Gathering/011 Excluding targets from a scan.mp4
7.6 MB
07 - Active Information Gathering/011 Excluding targets from a scan_en.srt
8.2 kB
07 - Active Information Gathering/012 Excluding targets with a list.mp4
6.4 MB
07 - Active Information Gathering/012 Excluding targets with a list_en.srt
7.5 kB
07 - Active Information Gathering/013 Aggressive scanning & OS Detection.mp4
31 MB
07 - Active Information Gathering/014 Nmap Syn Scan.mp4
8.9 MB
07 - Active Information Gathering/014 Nmap Syn Scan_en.srt
5.3 kB
07 - Active Information Gathering/015 Nmap UDP Scan.mp4
6.0 MB
07 - Active Information Gathering/015 Nmap UDP Scan_en.srt
4.6 kB
07 - Active Information Gathering/016 Output Scan Results.mp4
22 MB
07 - Active Information Gathering/016 Output Scan Results_en.srt
8.7 kB
07 - Active Information Gathering/017 Nmap Scripts.mp4
26 MB
07 - Active Information Gathering/017 Nmap Scripts_en.srt
9.3 kB
08 - Netcat/001 Banner Grabbing With Netcat.mp4
14 MB
08 - Netcat/002 Transferring Data With Netcat.mp4
23 MB
08 - Netcat/002 Transferring Data With Netcat_en.srt
17 kB
08 - Netcat/003 Reverse Shell With Netcat.mp4
18 MB
08 - Netcat/003 Reverse Shell With Netcat_en.srt
11 kB
09 - Getting started with Metasploit/001 Metasploit for beginners - Modules, Exploits and Payloads.mp4
222 MB
09 - Getting started with Metasploit/001 Metasploit for beginners - Modules, Exploits and Payloads_en.srt
36 kB
09 - Getting started with Metasploit/002 Metasploit for beginners - Understanding Metasploit Modules.mp4
44 MB
09 - Getting started with Metasploit/002 Metasploit for beginners - Understanding Metasploit Modules_en.srt
31 kB
09 - Getting started with Metasploit/003 Metasploit for beginners - Information gathering - Auxiliary scanners.mp4
32 MB
09 - Getting started with Metasploit/003 Metasploit for beginners - Information gathering - Auxiliary scanners_en.srt
19 kB
09 - Getting started with Metasploit/004 Metasploit for beginners - Basic Exploitation.mp4
23 MB
09 - Getting started with Metasploit/004 Metasploit for beginners - Basic Exploitation_en.srt
20 kB
09 - Getting started with Metasploit/005 Metasploit community Web GUI - Installation and Overview.mp4
29 MB
10 - Web Server Hacking/001 Web server hacking with Metasploit - Gaining Access.mp4
149 MB
10 - Web Server Hacking/001 Web server hacking with Metasploit - Gaining Access_en.srt
23 kB
10 - Web Server Hacking/002 Web server hacking with Metasploit - FTP backdoor command execution.mp4
37 MB
10 - Web Server Hacking/002 Web server hacking with Metasploit - FTP backdoor command execution_en.srt
15 kB
10 - Web Server Hacking/003 Web server hacking with Metasploit - Metasploit payloads.mp4
33 MB
10 - Web Server Hacking/003 Web server hacking with Metasploit - Metasploit payloads_en.srt
14 kB
10 - Web Server Hacking/004 Nikto - Web Vulnerability Scanner.mp4
41 MB
10 - Web Server Hacking/004 Nikto - Web Vulnerability Scanner_en.srt
17 kB
11 - Exploitation/001 WordPress hacking with WPScan.mp4
162 MB
11 - Exploitation/001 WordPress hacking with WPScan_en.srt
22 kB
11 - Exploitation/002 Password cracking with John The Ripper.mp4
38 MB
11 - Exploitation/002 Password cracking with John The Ripper_en.srt
21 kB
11 - Exploitation/003 Bruteforce password cracking with Hydra - SSH.mp4
43 MB
11 - Exploitation/003 Bruteforce password cracking with Hydra - SSH_en.srt
23 kB
11 - Exploitation/004 Bruteforce password cracking with Medusa.mp4
76 MB
11 - Exploitation/004 Bruteforce password cracking with Medusa_en.srt
12 kB
11 - Exploitation/005 BeEF browser exploitation - Client side attacks.mp4
230 MB
11 - Exploitation/005 BeEF browser exploitation - Client side attacks_en.srt
32 kB
11 - Exploitation/006 Armitage - Scanning and Exploitation.mp4
42 MB
11 - Exploitation/006 Armitage - Scanning and Exploitation_en.srt
24 kB
11 - Exploitation/007 Veil Evasion - How to generate undetectable payloads.mp4
184 MB
11 - Exploitation/007 Veil Evasion - How to generate undetectable payloads_en.srt
28 kB
11 - Exploitation/008 How to generate wordlists with Crunch.mp4
34 MB
11 - Exploitation/008 How to generate wordlists with Crunch_en.srt
19 kB
12 - Wired and WIreless attacks/001 MITM - ARP spoofing with arpspoof.mp4
192 MB
12 - Wired and WIreless attacks/001 MITM - ARP spoofing with arpspoof_en.srt
15 kB
12 - Wired and WIreless attacks/002 MITM - ARP Poisoning with Ettercap.mp4
77 MB
12 - Wired and WIreless attacks/002 MITM - ARP Poisoning with Ettercap_en.srt
13 kB
12 - Wired and WIreless attacks/003 WPAWPA2 Hacking & Exploitation With Aircrack-ng & airgeddon Pixie Dust Attack.mp4
269 MB
12 - Wired and WIreless attacks/003 WPAWPA2 Hacking & Exploitation With Aircrack-ng & airgeddon Pixie Dust Attack_en.srt
65 kB
12 - Wired and WIreless attacks/004 DDoS Attacks with Xerxes - The most powerful DDoS tool.mp4
34 MB
12 - Wired and WIreless attacks/004 DDoS Attacks with Xerxes - The most powerful DDoS tool_en.srt
15 kB
12 - Wired and WIreless attacks/004 Xerxes-Download-Link.txt
37 B
13 - Post Exploitation & Privilege Escalation/001 The Complete Meterpreter guide - Privilege escalation and clearning tracks.mp4
96 MB
13 - Post Exploitation & Privilege Escalation/001 The Complete Meterpreter guide - Privilege escalation and clearning tracks_en.srt
33 kB
13 - Post Exploitation & Privilege Escalation/002 Generating a PHP backdoor with Weevely - Post exploitation.mp4
57 MB
13 - Post Exploitation & Privilege Escalation/002 Generating a PHP backdoor with Weevely - Post exploitation_en.srt
15 kB