TorBT - Torrents and Magnet Links Search Engine
Security+ 701 - Hands-On Cybersecurity Lab Series
- Date: 2026-03-19
- Size: 10 GB
- Files: 330
File Name
Size
z.Security-701---Hands-On-Cybersecurity-Lab-Series-main/Module-5/27_Basic-Keylogger.py
0 B
Module 6 Custom Labs Practice Scenarios/002. Red Team Capstone Advanced Execution and Reporting.mp4
578 MB
Course Introduction/002. What Will We Cover In this Course.en.srt
4.5 kB
Course Introduction/002. What Will We Cover In this Course.mp4
32 MB
Module 1 Information Gathering & Basic Tools/001. IPCONFIG.en.srt
20 kB
Module 1 Information Gathering & Basic Tools/001. IPCONFIG.mp4
56 MB
Module 1 Information Gathering & Basic Tools/002. IFCONFIG - IPADDR SHOW.en.srt
21 kB
Module 1 Information Gathering & Basic Tools/002. IFCONFIG - IPADDR SHOW.mp4
61 MB
Module 1 Information Gathering & Basic Tools/003. PING - Part1.en.srt
17 kB
Module 1 Information Gathering & Basic Tools/003. PING - Part1.mp4
42 MB
Module 1 Information Gathering & Basic Tools/004. PING - Part2.en.srt
16 kB
Module 1 Information Gathering & Basic Tools/004. PING - Part2.mp4
62 MB
Module 1 Information Gathering & Basic Tools/005. TRACERT OR TRACEROUTE.en.srt
17 kB
Module 1 Information Gathering & Basic Tools/005. TRACERT OR TRACEROUTE.mp4
43 MB
Module 1 Information Gathering & Basic Tools/006. Kali Linux Setup Part-1.en.srt
17 kB
Module 1 Information Gathering & Basic Tools/006. Kali Linux Setup Part-1.mp4
44 MB
Module 1 Information Gathering & Basic Tools/007. Kali Linux Setup Part-2.en.srt
12 kB
Module 1 Information Gathering & Basic Tools/007. Kali Linux Setup Part-2.mp4
31 MB
Module 1 Information Gathering & Basic Tools/008. Kali Linux Setup Part-3.en.srt
16 kB
Module 1 Information Gathering & Basic Tools/008. Kali Linux Setup Part-3.mp4
65 MB
Module 1 Information Gathering & Basic Tools/009. NSLOOKUP.en.srt
17 kB
Module 1 Information Gathering & Basic Tools/009. NSLOOKUP.mp4
41 MB
Module 1 Information Gathering & Basic Tools/010. DIG.en.srt
17 kB
Module 1 Information Gathering & Basic Tools/010. DIG.mp4
53 MB
Module 1 Information Gathering & Basic Tools/011. CURL Part-1.en.srt
13 kB
Module 1 Information Gathering & Basic Tools/011. CURL Part-1.mp4
90 MB
Module 1 Information Gathering & Basic Tools/012. CURL Part-2.en.srt
9.5 kB
Module 1 Information Gathering & Basic Tools/012. CURL Part-2.mp4
20 MB
Module 1 Information Gathering & Basic Tools/013. SSH - Part 1.en.srt
15 kB
Module 1 Information Gathering & Basic Tools/013. SSH - Part 1.mp4
40 MB
Module 1 Information Gathering & Basic Tools/014. SSH - Part 2.en.srt
24 kB
Module 1 Information Gathering & Basic Tools/014. SSH - Part 2.mp4
78 MB
Module 1 Information Gathering & Basic Tools/015. HPING3.en.srt
18 kB
Module 1 Information Gathering & Basic Tools/015. HPING3.mp4
66 MB
Module 1 Information Gathering & Basic Tools/016. PUTTY.en.srt
9.7 kB
Module 1 Information Gathering & Basic Tools/016. PUTTY.mp4
46 MB
Module 1 Information Gathering & Basic Tools/017. NMAP - Part 1.en.srt
15 kB
Module 1 Information Gathering & Basic Tools/017. NMAP - Part 1.mp4
50 MB
Module 1 Information Gathering & Basic Tools/018. NMAP - Part 2.en.srt
14 kB
Module 1 Information Gathering & Basic Tools/018. NMAP - Part 2.mp4
58 MB
Module 1 Information Gathering & Basic Tools/019. NMAP - Part 3.en.srt
15 kB
Module 1 Information Gathering & Basic Tools/019. NMAP - Part 3.mp4
99 MB
Module 1 Information Gathering & Basic Tools/020. RECON-NG.en.srt
15 kB
Module 1 Information Gathering & Basic Tools/020. RECON-NG.mp4
59 MB
Module 1 Information Gathering & Basic Tools/021. The Harverster.en.srt
18 kB
Module 1 Information Gathering & Basic Tools/021. The Harverster.mp4
79 MB
Module 1 Information Gathering & Basic Tools/022. GOOGLE DORKING.en.srt
16 kB
Module 1 Information Gathering & Basic Tools/022. GOOGLE DORKING.mp4
72 MB
Module 1 Information Gathering & Basic Tools/023. Banner Grabbing with Telnet and Netcat.en.srt
17 kB
Module 1 Information Gathering & Basic Tools/023. Banner Grabbing with Telnet and Netcat.mp4
73 MB
Module 1 Information Gathering & Basic Tools/024. SHODAN.IO.en.srt
17 kB
Module 1 Information Gathering & Basic Tools/024. SHODAN.IO.mp4
63 MB
Module 1 Information Gathering & Basic Tools/025. BURPSUITE - PART 1.en.srt
19 kB
Module 1 Information Gathering & Basic Tools/025. BURPSUITE - PART 1.mp4
47 MB
Module 1 Information Gathering & Basic Tools/026. BURPSUITE - PART 2.en.srt
16 kB
Module 1 Information Gathering & Basic Tools/026. BURPSUITE - PART 2.mp4
52 MB
Module 1 Information Gathering & Basic Tools/027. CROSS SITE SCRIPTING (XSS).en.srt
18 kB
Module 1 Information Gathering & Basic Tools/027. CROSS SITE SCRIPTING (XSS).mp4
48 MB
Module 1 Information Gathering & Basic Tools/028. CREDENTIAL HARVESTING USING SITE CLONING.en.srt
17 kB
Module 1 Information Gathering & Basic Tools/028. CREDENTIAL HARVESTING USING SITE CLONING.mp4
60 MB
Module 1 Information Gathering & Basic Tools/029. DICTIONARY ATTACK USING HYDRA.en.srt
18 kB
Module 1 Information Gathering & Basic Tools/029. DICTIONARY ATTACK USING HYDRA.mp4
56 MB
Module 1 Information Gathering & Basic Tools/030. EVIL TWIN ATTACK WITH AIRGEDDON.en.srt
19 kB
Module 1 Information Gathering & Basic Tools/030. EVIL TWIN ATTACK WITH AIRGEDDON.mp4
54 MB
Module 1 Information Gathering & Basic Tools/031. DNS-ZONE- TRANSFER.en.srt
14 kB
Module 1 Information Gathering & Basic Tools/031. DNS-ZONE- TRANSFER.mp4
47 MB
Module 2 Network Scanning, Recon, and Vulnerabilities/001. Using Netstat.en.srt
19 kB
Module 2 Network Scanning, Recon, and Vulnerabilities/001. Using Netstat.mp4
54 MB
Module 2 Network Scanning, Recon, and Vulnerabilities/002. Netcat.en.srt
17 kB
Module 2 Network Scanning, Recon, and Vulnerabilities/002. Netcat.mp4
47 MB
Module 2 Network Scanning, Recon, and Vulnerabilities/003. Using ARP.en.srt
18 kB
Module 2 Network Scanning, Recon, and Vulnerabilities/003. Using ARP.mp4
49 MB
Module 2 Network Scanning, Recon, and Vulnerabilities/004. Using Route.en.srt
16 kB
Module 2 Network Scanning, Recon, and Vulnerabilities/004. Using Route.mp4
50 MB
Module 2 Network Scanning, Recon, and Vulnerabilities/005. IP-SCANNERS.en.srt
17 kB
Module 2 Network Scanning, Recon, and Vulnerabilities/005. IP-SCANNERS.mp4
64 MB
Module 2 Network Scanning, Recon, and Vulnerabilities/006. Scanless.en.srt
13 kB
Module 2 Network Scanning, Recon, and Vulnerabilities/006. Scanless.mp4
49 MB
Module 2 Network Scanning, Recon, and Vulnerabilities/007. Using DNSENUM.en.srt
16 kB
Module 2 Network Scanning, Recon, and Vulnerabilities/007. Using DNSENUM.mp4
70 MB
Module 2 Network Scanning, Recon, and Vulnerabilities/008. How to connect to an internal network using OpenVPN.en.srt
11 kB
Module 2 Network Scanning, Recon, and Vulnerabilities/008. How to connect to an internal network using OpenVPN.mp4
30 MB
Module 2 Network Scanning, Recon, and Vulnerabilities/009. Using Hashcat.en.srt
18 kB
Module 2 Network Scanning, Recon, and Vulnerabilities/009. Using Hashcat.mp4
63 MB
Module 2 Network Scanning, Recon, and Vulnerabilities/010. Using fuzzing.en.srt
16 kB
Module 2 Network Scanning, Recon, and Vulnerabilities/010. Using fuzzing.mp4
56 MB
Module 2 Network Scanning, Recon, and Vulnerabilities/011. Macchanger.en.srt
14 kB
Module 2 Network Scanning, Recon, and Vulnerabilities/011. Macchanger.mp4
48 MB
Module 2 Network Scanning, Recon, and Vulnerabilities/012. Using wpscan.en.srt
16 kB
Module 2 Network Scanning, Recon, and Vulnerabilities/012. Using wpscan.mp4
69 MB
Module 2 Network Scanning, Recon, and Vulnerabilities/013. Reaver.en.srt
10 kB
Module 2 Network Scanning, Recon, and Vulnerabilities/013. Reaver.mp4
31 MB
Module 2 Network Scanning, Recon, and Vulnerabilities/014. Gobuster.en.srt
18 kB
Module 2 Network Scanning, Recon, and Vulnerabilities/014. Gobuster.mp4
72 MB
Module 2 Network Scanning, Recon, and Vulnerabilities/015. CSRF.en.srt
16 kB
Module 2 Network Scanning, Recon, and Vulnerabilities/015. CSRF.mp4
42 MB
Module 2 Network Scanning, Recon, and Vulnerabilities/016. Burp Suite Intruder.en.srt
21 kB
Module 2 Network Scanning, Recon, and Vulnerabilities/016. Burp Suite Intruder.mp4
83 MB
Module 2 Network Scanning, Recon, and Vulnerabilities/017. Manual SQL Injection.en.srt
18 kB
Module 2 Network Scanning, Recon, and Vulnerabilities/017. Manual SQL Injection.mp4
54 MB
Module 2 Network Scanning, Recon, and Vulnerabilities/018. AUTO-SQLInjection-SQLMAP.en.srt
18 kB
Module 2 Network Scanning, Recon, and Vulnerabilities/018. AUTO-SQLInjection-SQLMAP.mp4
69 MB
Module 2 Network Scanning, Recon, and Vulnerabilities/019. DIRECTORY-TRAVERSAL.en.srt
16 kB
Module 2 Network Scanning, Recon, and Vulnerabilities/019. DIRECTORY-TRAVERSAL.mp4
60 MB
Module 2 Network Scanning, Recon, and Vulnerabilities/020. Broken Access Control.en.srt
18 kB
Module 2 Network Scanning, Recon, and Vulnerabilities/020. Broken Access Control.mp4
57 MB
Module 2 Network Scanning, Recon, and Vulnerabilities/021. Masscan for High-Speed Scanning.en.srt
14 kB
Module 2 Network Scanning, Recon, and Vulnerabilities/021. Masscan for High-Speed Scanning.mp4
46 MB
Module 2 Network Scanning, Recon, and Vulnerabilities/022. NESSUS-ESSENTIALS - PART 1.en.srt
14 kB
Module 2 Network Scanning, Recon, and Vulnerabilities/022. NESSUS-ESSENTIALS - PART 1.mp4
48 MB
Module 2 Network Scanning, Recon, and Vulnerabilities/023. NESSUS-ESSENTIALS - PART 2.en.srt
21 kB
Module 2 Network Scanning, Recon, and Vulnerabilities/023. NESSUS-ESSENTIALS - PART 2.mp4
62 MB
Module 2 Network Scanning, Recon, and Vulnerabilities/024. VULNERS-NMAP.en.srt
20 kB
Module 2 Network Scanning, Recon, and Vulnerabilities/024. VULNERS-NMAP.mp4
101 MB
Module 2 Network Scanning, Recon, and Vulnerabilities/025. NIKTO.en.srt
15 kB
Module 2 Network Scanning, Recon, and Vulnerabilities/025. NIKTO.mp4
66 MB
Module 3 Web Exploitation and Shell Access/001. Linux Fundamentals Part 1.en.srt
20 kB
Module 3 Web Exploitation and Shell Access/001. Linux Fundamentals Part 1.mp4
57 MB
Module 3 Web Exploitation and Shell Access/002. Linux Fundamentals Part 2.en.srt
23 kB
Module 3 Web Exploitation and Shell Access/002. Linux Fundamentals Part 2.mp4
66 MB
Module 3 Web Exploitation and Shell Access/003. Linux Files Operations.en.srt
21 kB
Module 3 Web Exploitation and Shell Access/003. Linux Files Operations.mp4
55 MB
Module 3 Web Exploitation and Shell Access/004. Linux Advanced Operations.en.srt
22 kB
Module 3 Web Exploitation and Shell Access/004. Linux Advanced Operations.mp4
103 MB
Module 3 Web Exploitation and Shell Access/005. Sysinternals Process Explorer.en.srt
17 kB
Module 3 Web Exploitation and Shell Access/005. Sysinternals Process Explorer.mp4
70 MB
Module 3 Web Exploitation and Shell Access/006. Checksum for Files in Windows.en.srt
22 kB
Module 3 Web Exploitation and Shell Access/006. Checksum for Files in Windows.mp4
67 MB
Module 3 Web Exploitation and Shell Access/007. Nikto for SSL TLS Misconfigurations.en.srt
19 kB
Module 3 Web Exploitation and Shell Access/007. Nikto for SSL TLS Misconfigurations.mp4
92 MB
Module 3 Web Exploitation and Shell Access/008. File Inclusion Attacks.en.srt
15 kB
Module 3 Web Exploitation and Shell Access/008. File Inclusion Attacks.mp4
35 MB
Module 3 Web Exploitation and Shell Access/009. Getting a Shell Through a File Upload.en.srt
20 kB
Module 3 Web Exploitation and Shell Access/009. Getting a Shell Through a File Upload.mp4
77 MB
Module 3 Web Exploitation and Shell Access/010. Wireshark Part 1.en.srt
20 kB
Module 3 Web Exploitation and Shell Access/010. Wireshark Part 1.mp4
53 MB
Module 3 Web Exploitation and Shell Access/011. Wireshark Part 2.en.srt
21 kB
Module 3 Web Exploitation and Shell Access/011. Wireshark Part 2.mp4
134 MB
Module 3 Web Exploitation and Shell Access/012. Wireshark Part 3.en.srt
24 kB
Module 3 Web Exploitation and Shell Access/012. Wireshark Part 3.mp4
151 MB
Module 3 Web Exploitation and Shell Access/013. TCPDump Part 1.en.srt
24 kB
Module 3 Web Exploitation and Shell Access/013. TCPDump Part 1.mp4
89 MB
Module 3 Web Exploitation and Shell Access/014. TCPDump Part 2.en.srt
18 kB
Module 3 Web Exploitation and Shell Access/014. TCPDump Part 2.mp4
99 MB
Module 3 Web Exploitation and Shell Access/015. OWASP ZAP.en.srt
22 kB
Module 3 Web Exploitation and Shell Access/015. OWASP ZAP.mp4
106 MB
Module 3 Web Exploitation and Shell Access/016. BeEF Browser Exploitation Framework.en.srt
20 kB
Module 3 Web Exploitation and Shell Access/016. BeEF Browser Exploitation Framework.mp4
59 MB
Module 3 Web Exploitation and Shell Access/017. Responder.en.srt
19 kB
Module 3 Web Exploitation and Shell Access/017. Responder.mp4
61 MB
Module 3 Web Exploitation and Shell Access/018. Detecting Backdoors with Netcat.en.srt
17 kB
Module 3 Web Exploitation and Shell Access/018. Detecting Backdoors with Netcat.mp4
54 MB
Module 3 Web Exploitation and Shell Access/019. Exploring OWASP Top 10.en.srt
19 kB
Module 3 Web Exploitation and Shell Access/019. Exploring OWASP Top 10.mp4
83 MB
Module 3 Web Exploitation and Shell Access/020. SN1PER.en.srt
18 kB
Module 3 Web Exploitation and Shell Access/020. SN1PER.mp4
96 MB
Module 3 Web Exploitation and Shell Access/021. Kismet.en.srt
20 kB
Module 3 Web Exploitation and Shell Access/021. Kismet.mp4
50 MB
Module 3 Web Exploitation and Shell Access/022. Wifite.en.srt
9.9 kB
Module 3 Web Exploitation and Shell Access/022. Wifite.mp4
26 MB
Module 3 Web Exploitation and Shell Access/023. Aircrack-ng Suite Part 1.en.srt
19 kB
Module 3 Web Exploitation and Shell Access/023. Aircrack-ng Suite Part 1.mp4
66 MB
Module 3 Web Exploitation and Shell Access/024. Aircrack-ng Suite Part 2.en.srt
23 kB
Module 3 Web Exploitation and Shell Access/024. Aircrack-ng Suite Part 2.mp4
62 MB
Module 4 Shells, Scripting, and Metasploit/001. Advanced File Operations Part 1.en.srt
15 kB
Module 4 Shells, Scripting, and Metasploit/001. Advanced File Operations Part 1.mp4
39 MB
Module 4 Shells, Scripting, and Metasploit/002. Advanced File Operations Part 2.en.srt
22 kB
Module 4 Shells, Scripting, and Metasploit/002. Advanced File Operations Part 2.mp4
85 MB
Module 4 Shells, Scripting, and Metasploit/003. Introduction to Bash Scripting Part 1.en.srt
18 kB
Module 4 Shells, Scripting, and Metasploit/003. Introduction to Bash Scripting Part 1.mp4
51 MB
Module 4 Shells, Scripting, and Metasploit/004. Introduction to Bash Scripting Part 2.en.srt
22 kB
Module 4 Shells, Scripting, and Metasploit/004. Introduction to Bash Scripting Part 2.mp4
58 MB
Module 4 Shells, Scripting, and Metasploit/005. Introduction to Bash Scripting Part 3.en.srt
21 kB
Module 4 Shells, Scripting, and Metasploit/005. Introduction to Bash Scripting Part 3.mp4
44 MB
Module 4 Shells, Scripting, and Metasploit/006. More Bash Scripting.en.srt
19 kB
Module 4 Shells, Scripting, and Metasploit/006. More Bash Scripting.mp4
44 MB
Module 4 Shells, Scripting, and Metasploit/007. John the Ripper Basic Hashes.en.srt
22 kB
Module 4 Shells, Scripting, and Metasploit/007. John the Ripper Basic Hashes.mp4
83 MB
Module 4 Shells, Scripting, and Metasploit/008. John the Ripper Advanced Hashes.en.srt
22 kB
Module 4 Shells, Scripting, and Metasploit/008. John the Ripper Advanced Hashes.mp4
96 MB
Module 4 Shells, Scripting, and Metasploit/009. More Advanced Uses of John the Ripper.en.srt
15 kB
Module 4 Shells, Scripting, and Metasploit/009. More Advanced Uses of John the Ripper.mp4
71 MB
Module 4 Shells, Scripting, and Metasploit/010. Establishing a Reverse Shell with Netcat.en.srt
15 kB
Module 4 Shells, Scripting, and Metasploit/010. Establishing a Reverse Shell with Netcat.mp4
44 MB
Module 4 Shells, Scripting, and Metasploit/011. Establishing a Bind Shell with Netcat.en.srt
11 kB
Module 4 Shells, Scripting, and Metasploit/011. Establishing a Bind Shell with Netcat.mp4
24 MB
Module 4 Shells, Scripting, and Metasploit/012. Stabilizing a Netcat Shell.en.srt
18 kB
Module 4 Shells, Scripting, and Metasploit/012. Stabilizing a Netcat Shell.mp4
53 MB
Module 4 Shells, Scripting, and Metasploit/013. Reverse Shell with Socat.en.srt
14 kB
Module 4 Shells, Scripting, and Metasploit/013. Reverse Shell with Socat.mp4
32 MB
Module 4 Shells, Scripting, and Metasploit/014. Bind Shell with Socat.en.srt
10 kB
Module 4 Shells, Scripting, and Metasploit/014. Bind Shell with Socat.mp4
29 MB
Module 4 Shells, Scripting, and Metasploit/015. Stabilizing a Socat Shell.en.srt
12 kB
Module 4 Shells, Scripting, and Metasploit/015. Stabilizing a Socat Shell.mp4
41 MB
Module 4 Shells, Scripting, and Metasploit/016. MSFVENOM.en.srt
21 kB
Module 4 Shells, Scripting, and Metasploit/016. MSFVENOM.mp4
64 MB
Module 4 Shells, Scripting, and Metasploit/017. Creating Metasploit Payloads with MSFVenom.en.srt
18 kB
Module 4 Shells, Scripting, and Metasploit/017. Creating Metasploit Payloads with MSFVenom.mp4
54 MB
Module 4 Shells, Scripting, and Metasploit/018. Reverse Shell Using MSFVenom.en.srt
24 kB
Module 4 Shells, Scripting, and Metasploit/018. Reverse Shell Using MSFVenom.mp4
68 MB
Module 4 Shells, Scripting, and Metasploit/019. Bind Shell Using MSFVenom.en.srt
16 kB
Module 4 Shells, Scripting, and Metasploit/019. Bind Shell Using MSFVenom.mp4
47 MB
Module 4 Shells, Scripting, and Metasploit/020. Basic Meterpreter Commands.en.srt
18 kB
Module 4 Shells, Scripting, and Metasploit/020. Basic Meterpreter Commands.mp4
61 MB
Module 4 Shells, Scripting, and Metasploit/021. Advanced Meterpreter Commands.en.srt
21 kB
Module 4 Shells, Scripting, and Metasploit/021. Advanced Meterpreter Commands.mp4
80 MB
Module 4 Shells, Scripting, and Metasploit/022. Upgrading a Limited Shell to a Meterpreter Shell.en.srt
14 kB
Module 4 Shells, Scripting, and Metasploit/022. Upgrading a Limited Shell to a Meterpreter Shell.mp4
52 MB
Module 4 Shells, Scripting, and Metasploit/023. Exploiting a Vulnerable FTP Service to Gain Shell Access.en.srt
16 kB
Module 4 Shells, Scripting, and Metasploit/023. Exploiting a Vulnerable FTP Service to Gain Shell Access.mp4
63 MB
Module 4 Shells, Scripting, and Metasploit/024. Exploiting EternalBlue Vulnerability with Metasploit Part 1.en.srt
16 kB
Module 4 Shells, Scripting, and Metasploit/024. Exploiting EternalBlue Vulnerability with Metasploit Part 1.mp4
49 MB
Module 4 Shells, Scripting, and Metasploit/025. Exploiting EternalBlue Vulnerability with Metasploit Part 2.en.srt
13 kB
Module 4 Shells, Scripting, and Metasploit/025. Exploiting EternalBlue Vulnerability with Metasploit Part 2.mp4
51 MB
Module 4 Shells, Scripting, and Metasploit/026. Scheduled Task Persistence Detect and Remediate.en.srt
23 kB
Module 4 Shells, Scripting, and Metasploit/026. Scheduled Task Persistence Detect and Remediate.mp4
46 MB
Module 5 Privilege Escalation, OWASP, and Scripting/001. Advanced Bash Script Part 1.en.srt
17 kB
Module 5 Privilege Escalation, OWASP, and Scripting/001. Advanced Bash Script Part 1.mp4
37 MB
Module 5 Privilege Escalation, OWASP, and Scripting/002. Advanced Bash Script Part 2.en.srt
24 kB
Module 5 Privilege Escalation, OWASP, and Scripting/002. Advanced Bash Script Part 2.mp4
71 MB
Module 5 Privilege Escalation, OWASP, and Scripting/003. Advanced Bash Script Part 3.en.srt
6.3 kB
Module 5 Privilege Escalation, OWASP, and Scripting/003. Advanced Bash Script Part 3.mp4
19 MB
Module 5 Privilege Escalation, OWASP, and Scripting/004. Introduction to PowerShell Scripting Part 1.en.srt
20 kB
Module 5 Privilege Escalation, OWASP, and Scripting/004. Introduction to PowerShell Scripting Part 1.mp4
68 MB
Module 5 Privilege Escalation, OWASP, and Scripting/005. Introduction to PowerShell Scripting Part 2.en.srt
20 kB
Module 5 Privilege Escalation, OWASP, and Scripting/005. Introduction to PowerShell Scripting Part 2.mp4
40 MB
Module 5 Privilege Escalation, OWASP, and Scripting/006. Introduction to PowerShell Scripting Part 3.en.srt
24 kB
Module 5 Privilege Escalation, OWASP, and Scripting/006. Introduction to PowerShell Scripting Part 3.mp4
55 MB
Module 5 Privilege Escalation, OWASP, and Scripting/007. Advanced PowerShell Script Part 1.en.srt
21 kB
Module 5 Privilege Escalation, OWASP, and Scripting/007. Advanced PowerShell Script Part 1.mp4
47 MB
Module 5 Privilege Escalation, OWASP, and Scripting/008. Advanced PowerShell Script Part 2.en.srt
22 kB
Module 5 Privilege Escalation, OWASP, and Scripting/008. Advanced PowerShell Script Part 2.mp4
62 MB
Module 5 Privilege Escalation, OWASP, and Scripting/009. Advanced PowerShell Script Part 3.en.srt
21 kB
Module 5 Privilege Escalation, OWASP, and Scripting/009. Advanced PowerShell Script Part 3.mp4
67 MB
Module 5 Privilege Escalation, OWASP, and Scripting/010. Introduction to Python Scripting Part 1.en.srt
16 kB
Module 5 Privilege Escalation, OWASP, and Scripting/010. Introduction to Python Scripting Part 1.mp4
29 MB
Module 5 Privilege Escalation, OWASP, and Scripting/011. Introduction to Python Scripting Part 2.en.srt
24 kB
Module 5 Privilege Escalation, OWASP, and Scripting/011. Introduction to Python Scripting Part 2.mp4
57 MB
Module 5 Privilege Escalation, OWASP, and Scripting/012. Introduction to Python Scripting Part 3.en.srt
32 kB
Module 5 Privilege Escalation, OWASP, and Scripting/012. Introduction to Python Scripting Part 3.mp4
79 MB
Module 5 Privilege Escalation, OWASP, and Scripting/013. Introduction to Python Scripting Part 4.en.srt
24 kB
Module 5 Privilege Escalation, OWASP, and Scripting/013. Introduction to Python Scripting Part 4.mp4
59 MB
Module 5 Privilege Escalation, OWASP, and Scripting/014. Introduction to Python Scripting Part 5.en.srt
28 kB
Module 5 Privilege Escalation, OWASP, and Scripting/014. Introduction to Python Scripting Part 5.mp4
61 MB
Module 5 Privilege Escalation, OWASP, and Scripting/015. More Advanced Python Scripting Part 1.en.srt
20 kB
Module 5 Privilege Escalation, OWASP, and Scripting/015. More Advanced Python Scripting Part 1.mp4
47 MB
Module 5 Privilege Escalation, OWASP, and Scripting/016. More Advanced Python Scripting Part 2.en.srt
20 kB
Module 5 Privilege Escalation, OWASP, and Scripting/016. More Advanced Python Scripting Part 2.mp4
49 MB
Module 5 Privilege Escalation, OWASP, and Scripting/017. More Advanced Python Scripting Part 3.en.srt
22 kB
Module 5 Privilege Escalation, OWASP, and Scripting/017. More Advanced Python Scripting Part 3.mp4
66 MB
Module 5 Privilege Escalation, OWASP, and Scripting/018. Establishing a Session with Python Scripting Part 1.en.srt
20 kB
Module 5 Privilege Escalation, OWASP, and Scripting/018. Establishing a Session with Python Scripting Part 1.mp4
48 MB
Module 5 Privilege Escalation, OWASP, and Scripting/019. Establishing a Session with Python Scripting Part 2.en.srt
19 kB
Module 5 Privilege Escalation, OWASP, and Scripting/019. Establishing a Session with Python Scripting Part 2.mp4
49 MB
Module 5 Privilege Escalation, OWASP, and Scripting/020. Establishing a Meterpreter Shell on Windows Using SET.en.srt
20 kB
Module 5 Privilege Escalation, OWASP, and Scripting/020. Establishing a Meterpreter Shell on Windows Using SET.mp4
71 MB
Module 5 Privilege Escalation, OWASP, and Scripting/021. Migration to a Different Process on the Target Machine.en.srt
8.6 kB
Module 5 Privilege Escalation, OWASP, and Scripting/021. Migration to a Different Process on the Target Machine.mp4
26 MB
Module 5 Privilege Escalation, OWASP, and Scripting/022. Using Mimikatz to Extract Passwords from Windows.en.srt
16 kB
Module 5 Privilege Escalation, OWASP, and Scripting/022. Using Mimikatz to Extract Passwords from Windows.mp4
47 MB
Module 5 Privilege Escalation, OWASP, and Scripting/023. WINPEAS for Privilege Escalation on Windows.en.srt
23 kB
Module 5 Privilege Escalation, OWASP, and Scripting/023. WINPEAS for Privilege Escalation on Windows.mp4
95 MB
Module 5 Privilege Escalation, OWASP, and Scripting/024. LINPEAS for Privilege Escalation on Linux.en.srt
20 kB
Module 5 Privilege Escalation, OWASP, and Scripting/024. LINPEAS for Privilege Escalation on Linux.mp4
100 MB
Module 5 Privilege Escalation, OWASP, and Scripting/025. SUID Privilege Escalation on Linux.en.srt
17 kB
Module 5 Privilege Escalation, OWASP, and Scripting/025. SUID Privilege Escalation on Linux.mp4
54 MB
Module 5 Privilege Escalation, OWASP, and Scripting/026. Token Impersonation with Rogue Potato on Windows.en.srt
34 kB
Module 5 Privilege Escalation, OWASP, and Scripting/026. Token Impersonation with Rogue Potato on Windows.mp4
114 MB
Module 5 Privilege Escalation, OWASP, and Scripting/027. Basic Python Keylogger.en.srt
20 kB
Module 5 Privilege Escalation, OWASP, and Scripting/027. Basic Python Keylogger.mp4
45 MB
Module 5 Privilege Escalation, OWASP, and Scripting/028. A1 Command Injection OWASP Top 10.en.srt
13 kB
Module 5 Privilege Escalation, OWASP, and Scripting/028. A1 Command Injection OWASP Top 10.mp4
44 MB
Module 5 Privilege Escalation, OWASP, and Scripting/029. A2 Broken Authentication OWASP Top 10.en.srt
11 kB
Module 5 Privilege Escalation, OWASP, and Scripting/029. A2 Broken Authentication OWASP Top 10.mp4
37 MB
Module 5 Privilege Escalation, OWASP, and Scripting/030. A3 Sensitive Information Disclosure OWASP Top 10.en.srt
13 kB
Module 5 Privilege Escalation, OWASP, and Scripting/030. A3 Sensitive Information Disclosure OWASP Top 10.mp4
57 MB
Module 5 Privilege Escalation, OWASP, and Scripting/031. A4 XML External Entity Injection OWASP Top 10.en.srt
14 kB
Module 5 Privilege Escalation, OWASP, and Scripting/031. A4 XML External Entity Injection OWASP Top 10.mp4
52 MB
Module 5 Privilege Escalation, OWASP, and Scripting/032. A5 Broken Access Control OWASP Top 10.en.srt
11 kB
Module 5 Privilege Escalation, OWASP, and Scripting/032. A5 Broken Access Control OWASP Top 10.mp4
44 MB
Module 5 Privilege Escalation, OWASP, and Scripting/033. A6 Security Misconfiguration OWASP Top 10.en.srt
10 kB
Module 5 Privilege Escalation, OWASP, and Scripting/033. A6 Security Misconfiguration OWASP Top 10.mp4
29 MB
Module 5 Privilege Escalation, OWASP, and Scripting/034. A7 Cross Site Scripting OWASP Top 10.en.srt
8.0 kB
Module 5 Privilege Escalation, OWASP, and Scripting/034. A7 Cross Site Scripting OWASP Top 10.mp4
28 MB
Module 5 Privilege Escalation, OWASP, and Scripting/035. A8 Insecure Deserialized Objects OWASP Top 10.en.srt
19 kB
Module 5 Privilege Escalation, OWASP, and Scripting/035. A8 Insecure Deserialized Objects OWASP Top 10.mp4
65 MB
Module 5 Privilege Escalation, OWASP, and Scripting/036. A9 Components with Known Vulnerabilities OWASP Top 10.en.srt
8.7 kB
Module 5 Privilege Escalation, OWASP, and Scripting/036. A9 Components with Known Vulnerabilities OWASP Top 10.mp4
26 MB
Module 5 Privilege Escalation, OWASP, and Scripting/037. A10 Unvalidated Redirects and Forwards OWASP Top 10.en.srt
6.8 kB
Module 5 Privilege Escalation, OWASP, and Scripting/037. A10 Unvalidated Redirects and Forwards OWASP Top 10.mp4
18 MB
Module 5 Privilege Escalation, OWASP, and Scripting/038. Basic Reverse Engineering Part 1.en.srt
14 kB
Module 5 Privilege Escalation, OWASP, and Scripting/038. Basic Reverse Engineering Part 1.mp4
39 MB
Module 5 Privilege Escalation, OWASP, and Scripting/039. Basic Reverse Engineering Part 2.en.srt
29 kB
Module 5 Privilege Escalation, OWASP, and Scripting/039. Basic Reverse Engineering Part 2.mp4
100 MB
Module 6 Custom Labs Practice Scenarios/001. Red Team Capstone Planning, Executing, and Reporting.en.srt
79 kB
Module 6 Custom Labs Practice Scenarios/001. Red Team Capstone Planning, Executing, and Reporting.mp4
273 MB
Module 6 Custom Labs Practice Scenarios/002. Red Team Capstone Advanced Execution and Reporting.en.srt
129 kB
Course Introduction/001. Course Trailer.mp4
16 MB
Module 6 Custom Labs Practice Scenarios/003. Red Team Capstone Final Analysis and Lessons Learned.en.srt
71 kB
Module 6 Custom Labs Practice Scenarios/003. Red Team Capstone Final Analysis and Lessons Learned.mp4
241 MB
Module 6 Custom Labs Practice Scenarios/004. Walmart Attack Incident Response Tabletop Exercise.en.srt
94 kB
Module 6 Custom Labs Practice Scenarios/004. Walmart Attack Incident Response Tabletop Exercise.mp4
372 MB
Module 6 Custom Labs Practice Scenarios/005. Blue Team Capstone Log Analysis and Detection.en.srt
78 kB
Module 6 Custom Labs Practice Scenarios/005. Blue Team Capstone Log Analysis and Detection.mp4
509 MB
Module 6 Custom Labs Practice Scenarios/006. Scripting Capstone YARA Rule Engineering.en.srt
43 kB
Module 6 Custom Labs Practice Scenarios/006. Scripting Capstone YARA Rule Engineering.mp4
118 MB
z.Security-701---Hands-On-Cybersecurity-Lab-Series-main/LICENSE
1.0 kB
z.Security-701---Hands-On-Cybersecurity-Lab-Series-main/README.md
1.9 kB
z.Security-701---Hands-On-Cybersecurity-Lab-Series-main/Module-1/DNS-Zone-Transfer-Lab-Handout.pdf
7.9 kB
z.Security-701---Hands-On-Cybersecurity-Lab-Series-main/Module-1/NMAP-Progressive-Scanning-Commands.md
692 B
z.Security-701---Hands-On-Cybersecurity-Lab-Series-main/Module-1/theHarvester-Requirements.txt
121 B
z.Security-701---Hands-On-Cybersecurity-Lab-Series-main/Module-2/DNS-Record-Types i.md
2.4 kB
z.Security-701---Hands-On-Cybersecurity-Lab-Series-main/Module-2/Netstat-Utility-Useful-Tags.md
623 B
z.Security-701---Hands-On-Cybersecurity-Lab-Series-main/Module-3/Sn1per-Modes.md
2.2 kB
z.Security-701---Hands-On-Cybersecurity-Lab-Series-main/Module-5/1-3_Bash Script_ Tiny-Recon.sh
1.5 kB
z.Security-701---Hands-On-Cybersecurity-Lab-Series-main/Module-5/7-9_PowerShell Script_ System-Checker.ps1
3.2 kB
z.Security-701---Hands-On-Cybersecurity-Lab-Series-main/Module-5/11-14_Introduction-To-Python.py
2.0 kB
z.Security-701---Hands-On-Cybersecurity-Lab-Series-main/Module-5/15-17_Python Script_ Basic-Port-Scanner.py
2.0 kB
z.Security-701---Hands-On-Cybersecurity-Lab-Series-main/Module-5/18_Establishing-Session-Python_ SERVER.py
1.6 kB
z.Security-701---Hands-On-Cybersecurity-Lab-Series-main/Module-5/19_Establishing-Session-Python_ CLIENT.py
1.2 kB
Course Introduction/001. Course Trailer.en.srt
48 B
z.Security-701---Hands-On-Cybersecurity-Lab-Series-main/Module-6/4. Walmart Attack - Incident response report summary.pdf
171 kB
z.Security-701---Hands-On-Cybersecurity-Lab-Series-main/Module-6/PCAP-FILES for BLUE TEAM CAPSTONE/ANALYZED/.gitattributes
273 B
z.Security-701---Hands-On-Cybersecurity-Lab-Series-main/Module-6/PCAP-FILES for BLUE TEAM CAPSTONE/ANALYZED/0800 - Analyzed ✅.pcap
131 B
z.Security-701---Hands-On-Cybersecurity-Lab-Series-main/Module-6/PCAP-FILES for BLUE TEAM CAPSTONE/ANALYZED/1130 - Analyzed ✅.pcap
130 B
z.Security-701---Hands-On-Cybersecurity-Lab-Series-main/Module-6/PCAP-FILES for BLUE TEAM CAPSTONE/ANALYZED/1415 - Analyzed ✅.pcap
131 B
z.Security-701---Hands-On-Cybersecurity-Lab-Series-main/Module-6/PCAP-FILES for BLUE TEAM CAPSTONE/ANALYZED/Analyzed PCAP_S - FINDINGS.txt
638 B
z.Security-701---Hands-On-Cybersecurity-Lab-Series-main/Module-6/PCAP-FILES for BLUE TEAM CAPSTONE/CHALLENGE/.gitattributes
56 B
z.Security-701---Hands-On-Cybersecurity-Lab-Series-main/Module-6/PCAP-FILES for BLUE TEAM CAPSTONE/CHALLENGE/MITM-CHALLENGE.pcap
134 B
z.Security-701---Hands-On-Cybersecurity-Lab-Series-main/Module-6/PCAP-FILES for BLUE TEAM CAPSTONE/CHALLENGE/MITM-CHALLENGE-QUESTIONS.docx
23 kB