TorBT - Torrents and Magnet Links Search Engine
Ethical Hacking Course 2025 & 2024
- Date: 2026-03-17
- Size: 9.7 GB
- Files: 278
File Name
Size
2024/Chapter 1- Introduction/1. Introduction.mp4
5.6 MB
2024/Chapter 1- Introduction/1. Introduction.srt
1.4 kB
2024/Chapter 1- Introduction/2. Why learn ethical hacking!.mp4
7.0 MB
2024/Chapter 1- Introduction/2. Why learn ethical hacking!.srt
1.5 kB
2024/Chapter 10- Enable Monitor Mode/18. Connecting a Wireless Network Adapter.mp4
23 MB
2024/Chapter 10- Enable Monitor Mode/18. Connecting a Wireless Network Adapter.srt
6.7 kB
2024/Chapter 10- Enable Monitor Mode/19. Enable moniter Mode on your Network Adapter.mp4
17 MB
2024/Chapter 10- Enable Monitor Mode/19. Enable moniter Mode on your Network Adapter.srt
4.9 kB
2024/Chapter 10- Enable Monitor Mode/20. How to enable Moniter Mode Manual Method.mp4
18 MB
2024/Chapter 10- Enable Monitor Mode/20. How to enable Moniter Mode Manual Method.srt
5.2 kB
2024/Chapter 11- Footprinting with Nmap and External Resources/21. Nmap-1.mp4
53 MB
2024/Chapter 11- Footprinting with Nmap and External Resources/21. Nmap-1.srt
12 kB
2024/Chapter 11- Footprinting with Nmap and External Resources/22. Nmap Advanced Scanning.mp4
44 MB
2024/Chapter 11- Footprinting with Nmap and External Resources/22. Nmap Advanced Scanning.srt
8.1 kB
2024/Chapter 12- Breaking WPA WPA2 encryption WiFi hacking and wifi hacker training/23. WiFi Hacking Introduction.mp4
21 MB
2024/Chapter 12- Breaking WPA WPA2 encryption WiFi hacking and wifi hacker training/23. WiFi Hacking Introduction.srt
6.1 kB
2024/Chapter 12- Breaking WPA WPA2 encryption WiFi hacking and wifi hacker training/24. Attack WiFi with Fern Wifi Hacker.mp4
45 MB
2024/Chapter 12- Breaking WPA WPA2 encryption WiFi hacking and wifi hacker training/24. Attack WiFi with Fern Wifi Hacker.srt
14 kB
2024/Chapter 12- Breaking WPA WPA2 encryption WiFi hacking and wifi hacker training/25. Word Lists-Bopscrk.mp4
37 MB
2024/Chapter 12- Breaking WPA WPA2 encryption WiFi hacking and wifi hacker training/25. Word Lists-Bopscrk.srt
8.0 kB
2024/Chapter 12- Breaking WPA WPA2 encryption WiFi hacking and wifi hacker training/26. Creating Worlists-rockyou.mp4
57 MB
2024/Chapter 12- Breaking WPA WPA2 encryption WiFi hacking and wifi hacker training/26. Creating Worlists-rockyou.srt
14 kB
2024/Chapter 12- Breaking WPA WPA2 encryption WiFi hacking and wifi hacker training/27. Use Aircrack_ng.mp4
72 MB
2024/Chapter 12- Breaking WPA WPA2 encryption WiFi hacking and wifi hacker training/27. Use Aircrack_ng.srt
16 kB
2024/Chapter 13- Jam WIFI Signals Denial of Service (DoS) attacks demonstrated and explained/28. DoS attack demonstration --(Denial of Service attacks--).mp4
53 MB
2024/Chapter 13- Jam WIFI Signals Denial of Service (DoS) attacks demonstrated and explained/28. DoS attack demonstration --(Denial of Service attacks--).srt
12 kB
2024/Chapter 14- How to increase the Privacy in Kali Linux/29. Who Am I - Increase your Anonymity.mp4
32 MB
2024/Chapter 14- How to increase the Privacy in Kali Linux/29. Who Am I - Increase your Anonymity.srt
8.6 kB
2024/Chapter 15- Check if there are any rootkits on your Kali Linux/30. RootKit-CHK ROOKT KIT Checker.mp4
57 MB
2024/Chapter 15- Check if there are any rootkits on your Kali Linux/30. RootKit-CHK ROOKT KIT Checker.srt
11 kB
2024/Chapter 16- The Internet of Things Shodan.io/31. What is Shodan.io and get connected to IoT.mp4
50 MB
2024/Chapter 16- The Internet of Things Shodan.io/31. What is Shodan.io and get connected to IoT.srt
12 kB
2024/Chapter 17- Install Beelogger and attack Windows 10/32. --(Keylogger--)-Use Beelogger and get the Key Strokes.mp4
117 MB
2024/Chapter 17- Install Beelogger and attack Windows 10/32. --(Keylogger--)-Use Beelogger and get the Key Strokes.srt
21 kB
2024/Chapter 17- Install Beelogger and attack Windows 10/33. Retried---(Key Logger--)-Beelogger..mp4
84 MB
2024/Chapter 17- Install Beelogger and attack Windows 10/33. Retried---(Key Logger--)-Beelogger..srt
19 kB
2024/Chapter 18- Saint SpyWare/34. Saint Spyware.mp4
32 MB
2024/Chapter 18- Saint SpyWare/34. Saint Spyware.srt
10 kB
2024/Chapter 19- Gain Access Metasploit for Beginners The Basics Modules Exploits and Payloads/35. Metasploit-1.mp4
48 MB
2024/Chapter 19- Gain Access Metasploit for Beginners The Basics Modules Exploits and Payloads/35. Metasploit-1.srt
10 kB
2024/Chapter 19- Gain Access Metasploit for Beginners The Basics Modules Exploits and Payloads/36. Use Metasploit Payload and Gain Access to Android devices.mp4
83 MB
2024/Chapter 19- Gain Access Metasploit for Beginners The Basics Modules Exploits and Payloads/37. Use AndroRat and gain access to android device!.mp4
75 MB
2024/Chapter 19- Gain Access Metasploit for Beginners The Basics Modules Exploits and Payloads/37. Use AndroRat and gain access to android device!.srt
20 kB
2024/Chapter 19- Gain Access Metasploit for Beginners The Basics Modules Exploits and Payloads/38. Access windows through curl.mp4
38 MB
2024/Chapter 19- Gain Access Metasploit for Beginners The Basics Modules Exploits and Payloads/38. Access windows through curl.srt
9.3 kB
2024/Chapter 19- Gain Access Metasploit for Beginners The Basics Modules Exploits and Payloads/39. Msf Venom Gain Control.mp4
36 MB
2024/Chapter 19- Gain Access Metasploit for Beginners The Basics Modules Exploits and Payloads/39. Msf Venom Gain Control.srt
7.8 kB
2024/Chapter 2- Basic Terms you will want to know getting started/3. Basic terminology such as White Hat,Black Hat and Grey Hat Hacking..mp4
27 MB
2024/Chapter 2- Basic Terms you will want to know getting started/3. Basic terminology such as White Hat,Black Hat and Grey Hat Hacking..srt
5.7 kB
2024/Chapter 2- Basic Terms you will want to know getting started/4. Basic Terminology including SQL injections,VPN--'S,Malware, Virus and key loggers.mp4
16 MB
2024/Chapter 2- Basic Terms you will want to know getting started/4. Basic Terminology including SQL injections,VPN--'S,Malware, Virus and key loggers.srt
3.8 kB
2024/Chapter 20- The Complete PGP Encryption/40. Encryption In Windows 10 PGP.mp4
103 MB
2024/Chapter 20- The Complete PGP Encryption/40. Encryption In Windows 10 PGP.srt
23 kB
2024/Chapter 20- The Complete PGP Encryption/41. Kali Linux-GNU.mp4
37 MB
2024/Chapter 20- The Complete PGP Encryption/41. Kali Linux-GNU.srt
12 kB
2024/Chapter 21- Hands on with Wireshark Network Scanning/42. Installing Wireshark and the Command Line Tool.mp4
40 MB
2024/Chapter 21- Hands on with Wireshark Network Scanning/42. Installing Wireshark and the Command Line Tool.srt
9.0 kB
2024/Chapter 22- How can you earn money legally with your ethical hacking skills online/43. Freelancing on UpWork --& LinkedIn.mp4
36 MB
2024/Chapter 22- How can you earn money legally with your ethical hacking skills online/43. Freelancing on UpWork --& LinkedIn.srt
7.8 kB
2024/Chapter 3- Build your Hacking Environment/Additional_Files/Get-Kali-Ready-Course.pdf
2.5 MB
2024/Chapter 3- Build your Hacking Environment/5. Needed Software.mp4
14 MB
2024/Chapter 3- Build your Hacking Environment/5. Needed Software.srt
3.5 kB
2024/Chapter 3- Build your Hacking Environment/6. Installing Virtual Box on Windows 10.mp4
18 MB
2024/Chapter 3- Build your Hacking Environment/6. Installing Virtual Box on Windows 10.srt
5.5 kB
2024/Chapter 3- Build your Hacking Environment/7. Kali Linux installation within a virtual environment..mp4
26 MB
2024/Chapter 3- Build your Hacking Environment/7. Kali Linux installation within a virtual environment..srt
7.5 kB
2024/Chapter 3- Build your Hacking Environment/8. Install and configure Kali Linux.mp4
24 MB
2024/Chapter 3- Build your Hacking Environment/8. Install and configure Kali Linux.srt
10 kB
2024/Chapter 4- Linux Terminal Including Basic Functionalities and CLI/10. Introduction to Kali Linux Terminal.mp4
24 MB
2024/Chapter 4- Linux Terminal Including Basic Functionalities and CLI/10. Introduction to Kali Linux Terminal.srt
7.6 kB
2024/Chapter 5- What is TOR How_ an you use it to protect your anonymity online/11. Learn to Install TOR on Kali Linux.mp4
23 MB
2024/Chapter 5- What is TOR How_ an you use it to protect your anonymity online/11. Learn to Install TOR on Kali Linux.srt
7.7 kB
2024/Chapter 5- What is TOR How_ an you use it to protect your anonymity online/12. Using Tor to Access The Hidden Wiki and Dark Web.mp4
54 MB
2024/Chapter 5- What is TOR How_ an you use it to protect your anonymity online/12. Using Tor to Access The Hidden Wiki and Dark Web.srt
14 kB
2024/Chapter 6- Use Anonsurf to increase Anonymity/13. Install Anonsurf and start using it!.mp4
66 MB
2024/Chapter 6- Use Anonsurf to increase Anonymity/13. Install Anonsurf and start using it!.srt
16 kB
2024/Chapter 7- What is Virtual Private Network (VPN) and how you can use it to stay anonymous/14. Install and use VPN in Kali Linux.mp4
46 MB
2024/Chapter 7- What is Virtual Private Network (VPN) and how you can use it to stay anonymous/14. Install and use VPN in Kali Linux.srt
11 kB
2024/Chapter 8- ProxyChains for using proxy servers hiding your IP and obtaining access/15. ProxyChains.mp4
45 MB
2024/Chapter 8- ProxyChains for using proxy servers hiding your IP and obtaining access/15. ProxyChains.srt
13 kB
2024/Chapter 9- What is MAC Changer How you can use it to change your MAC Address/16. Macchanger.mp4
32 MB
2024/Chapter 9- What is MAC Changer How you can use it to change your MAC Address/16. Macchanger.srt
7.4 kB
2024/Chapter 9- What is MAC Changer How you can use it to change your MAC Address/17. Change the Network Adapter MAC Address.mp4
22 MB
2024/Chapter 9- What is MAC Changer How you can use it to change your MAC Address/17. Change the Network Adapter MAC Address.srt
5.6 kB
2024/FULL torrents Info.txt
6.3 kB
2025/01. Introduction to Cybersecurity/1. Introduction.mp4
30 MB
2025/01. Introduction to Cybersecurity/1. Introduction.vtt
17 kB
2025/01. Introduction to Cybersecurity/2. Center for Internet Security.mp4
79 MB
2025/01. Introduction to Cybersecurity/2. Center for Internet Security.vtt
50 kB
2025/01. Introduction to Cybersecurity/3. Learn the Cyber Attack Chain.mp4
117 MB
2025/01. Introduction to Cybersecurity/3. Learn the Cyber Attack Chain.vtt
8.6 kB
2025/02. Installation/1. Kali Linux installation.mp4
45 MB
2025/02. Installation/1. Kali Linux installation.vtt
8.3 kB
2025/02. Installation/2. Weaponizing Windows.mp4
125 MB
2025/02. Installation/2. Weaponizing Windows.vtt
16 kB
2025/02. Installation/3. NGROK Connecting Servers To Internet.mp4
38 MB
2025/02. Installation/3. NGROK Connecting Servers To Internet.vtt
4.7 kB
2025/02. Installation/4. Kali Linux Installation in AWS.mp4
146 MB
2025/02. Installation/4. Kali Linux Installation in AWS.vtt
16 kB
2025/03. Kali Linux/1. Kali Linux features and functions for ethical hacking.mp4
190 MB
2025/03. Kali Linux/1. Kali Linux features and functions for ethical hacking.vtt
23 kB
2025/03. Kali Linux/2. Install Kali Linux on Windows.mp4
12 MB
2025/03. Kali Linux/2. Install Kali Linux on Windows.vtt
5.1 kB
2025/04. Scanning/1. NMAP.mp4
126 MB
2025/04. Scanning/1. NMAP.vtt
44 kB
2025/04. Scanning/1. nmap101.pdf
1.5 MB
2025/04. Scanning/2. Scan for Network Devices.mp4
70 MB
2025/04. Scanning/2. Scan for Network Devices.vtt
7.1 kB
2025/04. Scanning/3. Uncover Devices.mp4
21 MB
2025/04. Scanning/3. Uncover Devices.vtt
7.8 kB
2025/04. Scanning/4. Detect Web Application Firewalls.mp4
19 MB
2025/04. Scanning/4. Detect Web Application Firewalls.vtt
6.4 kB
2025/04. Scanning/5. Recon-ng.mp4
29 MB
2025/04. Scanning/5. Recon-ng.vtt
9.0 kB
2025/04. Scanning/6. Recon-ng 2021.mp4
91 MB
2025/04. Scanning/6. Recon-ng 2021.vtt
10 kB
2025/04. Scanning/7. Maltego.mp4
28 MB
2025/04. Scanning/7. Maltego.vtt
9.1 kB
2025/05. Mobile Hacking/1. Android Studio.mp4
31 MB
2025/05. Mobile Hacking/1. Android Studio.vtt
11 kB
2025/05. Mobile Hacking/10. Sensitive Data Exposure.mp4
35 MB
2025/05. Mobile Hacking/10. Sensitive Data Exposure.vtt
9.1 kB
2025/05. Mobile Hacking/11. Mobile App Username and Password.mp4
50 MB
2025/05. Mobile Hacking/11. Mobile App Username and Password.vtt
8.6 kB
2025/05. Mobile Hacking/12. SQL Injection on Mobile App.mp4
108 MB
2025/05. Mobile Hacking/12. SQL Injection on Mobile App.vtt
8.8 kB
2025/05. Mobile Hacking/13. Invoke Mobile Apps Externally.mp4
46 MB
2025/05. Mobile Hacking/13. Invoke Mobile Apps Externally.vtt
5.8 kB
2025/05. Mobile Hacking/14. Control Android with Kali Linux.mp4
29 MB
2025/05. Mobile Hacking/14. Control Android with Kali Linux.vtt
3.6 kB
2025/05. Mobile Hacking/15. Get Phone's GPS.mp4
20 MB
2025/05. Mobile Hacking/15. Get Phone's GPS.vtt
6.9 kB
2025/05. Mobile Hacking/16. Ghost Framework.mp4
68 MB
2025/05. Mobile Hacking/16. Ghost Framework.vtt
8.2 kB
2025/05. Mobile Hacking/17. Reset Android Without Password.mp4
51 MB
2025/05. Mobile Hacking/17. Reset Android Without Password.vtt
14 kB
2025/05. Mobile Hacking/2. Run Android Apps.mp4
11 MB
2025/05. Mobile Hacking/2. Run Android Apps.vtt
6.0 kB
2025/05. Mobile Hacking/3. Android Debug Bridge.mp4
87 MB
2025/05. Mobile Hacking/3. Android Debug Bridge.vtt
10 kB
2025/05. Mobile Hacking/4. Control Android Remotely.mp4
27 MB
2025/05. Mobile Hacking/4. Control Android Remotely.vtt
9.0 kB
2025/05. Mobile Hacking/5. Access Phone's SMS Remotely.mp4
33 MB
2025/05. Mobile Hacking/5. Access Phone's SMS Remotely.vtt
14 kB
2025/05. Mobile Hacking/6. Get Shell on Android.mp4
77 MB
2025/05. Mobile Hacking/6. Get Shell on Android.vtt
11 kB
2025/05. Mobile Hacking/7. Hide Mobile App.mp4
42 MB
2025/05. Mobile Hacking/7. Hide Mobile App.vtt
12 kB
2025/05. Mobile Hacking/8. Reverse Engineering Mobile Apps.mp4
38 MB
2025/05. Mobile Hacking/8. Reverse Engineering Mobile Apps.vtt
7.5 kB
2025/05. Mobile Hacking/9. Reverse Engineering Mobile Apps on Data Storage.mp4
179 MB
2025/05. Mobile Hacking/9. Reverse Engineering Mobile Apps on Data Storage.vtt
21 kB
2025/06. System Hacking/1. Metasploit basics.mp4
177 MB
2025/06. System Hacking/1. Metasploit basics.vtt
40 kB
2025/06. System Hacking/10. Hiding Shells.mp4
43 MB
2025/06. System Hacking/10. Hiding Shells.vtt
9.5 kB
2025/06. System Hacking/11. CVE Vulnhub.mp4
54 MB
2025/06. System Hacking/11. CVE Vulnhub.vtt
7.4 kB
2025/06. System Hacking/12. ARP Spoofing.mp4
117 MB
2025/06. System Hacking/12. ARP Spoofing.vtt
12 kB
2025/06. System Hacking/13. Reset Windows Without Password.mp4
105 MB
2025/06. System Hacking/13. Reset Windows Without Password.vtt
12 kB
2025/06. System Hacking/14. RDP Brute Force Attack.mp4
46 MB
2025/06. System Hacking/15. File Sharing Hacking.mp4
152 MB
2025/06. System Hacking/15. File Sharing Hacking.vtt
17 kB
2025/06. System Hacking/16. Fully Undetectable Payloads.mp4
124 MB
2025/06. System Hacking/16. Fully Undetectable Payloads.vtt
10 kB
2025/06. System Hacking/17. Recover Deleted Files in Windows.mp4
73 MB
2025/06. System Hacking/17. Recover Deleted Files in Windows.vtt
9.7 kB
2025/06. System Hacking/18. cmd and powershell bypass.mp4
125 MB
2025/06. System Hacking/18. cmd and powershell bypass.vtt
12 kB
2025/06. System Hacking/2. Metasploit Post-Exploitation.mp4
226 MB
2025/06. System Hacking/2. Metasploit Post-Exploitation.vtt
45 kB
2025/06. System Hacking/3. Keylogging.mp4
93 MB
2025/06. System Hacking/3. Keylogging.vtt
9.0 kB
2025/06. System Hacking/4. Screen Monitoring.mp4
80 MB
2025/06. System Hacking/4. Screen Monitoring.vtt
6.8 kB
2025/06. System Hacking/5. NMAP Scanning.mp4
135 MB
2025/06. System Hacking/5. NMAP Scanning.vtt
12 kB
2025/06. System Hacking/6. Bypass Login Screens.mp4
48 MB
2025/06. System Hacking/6. Bypass Login Screens.vtt
14 kB
2025/06. System Hacking/7. Shellshock Hacking.mp4
161 MB
2025/06. System Hacking/7. Shellshock Hacking.vtt
14 kB
2025/06. System Hacking/8. Empire Framework for Hacking.mp4
109 MB
2025/06. System Hacking/8. Empire Framework for Hacking.vtt
11 kB
2025/06. System Hacking/9. DefaultUser0 in Windows.mp4
15 MB
2025/06. System Hacking/9. DefaultUser0 in Windows.vtt
7.4 kB
2025/07. Web Application Penetration Testing/1. SQL Injection.mp4
270 MB
2025/07. Web Application Penetration Testing/1. SQL Injection.vtt
37 kB
2025/07. Web Application Penetration Testing/10. OWASP JavaScript.mp4
97 MB
2025/07. Web Application Penetration Testing/10. OWASP JavaScript.vtt
12 kB
2025/07. Web Application Penetration Testing/11. Hacking with Web Developer.mp4
34 MB
2025/07. Web Application Penetration Testing/11. Hacking with Web Developer.vtt
7.8 kB
2025/07. Web Application Penetration Testing/12. Create Admin Accounts.mp4
52 MB
2025/07. Web Application Penetration Testing/13. OWASP ZAP.mp4
100 MB
2025/07. Web Application Penetration Testing/13. OWASP ZAP.vtt
12 kB
2025/07. Web Application Penetration Testing/14. Hack Databases With Metasploit.mp4
157 MB
2025/07. Web Application Penetration Testing/14. Hack Databases With Metasploit.vtt
15 kB
2025/07. Web Application Penetration Testing/15. Hackazon SQLMAP.mp4
71 MB
2025/07. Web Application Penetration Testing/15. Hackazon SQLMAP.vtt
14 kB
2025/07. Web Application Penetration Testing/15. SQLMAP.pdf
2.8 MB
2025/07. Web Application Penetration Testing/16. SMB Exploit From Web To System.mp4
73 MB
2025/07. Web Application Penetration Testing/16. SMB Exploit From Web To System.vtt
8.6 kB
2025/07. Web Application Penetration Testing/17. Json Web Token SQL Hacking.mp4
94 MB
2025/07. Web Application Penetration Testing/17. Json Web Token SQL Hacking.vtt
10 kB
2025/07. Web Application Penetration Testing/18. WebGoat SQL Injection with SQLMap.mp4
156 MB
2025/07. Web Application Penetration Testing/18. WebGoat SQL Injection with SQLMap.vtt
15 kB
2025/07. Web Application Penetration Testing/2. Cross-Site Scripting.mp4
103 MB
2025/07. Web Application Penetration Testing/2. Cross-Site Scripting.vtt
24 kB
2025/07. Web Application Penetration Testing/3. Cross-Site Request Forgery.mp4
88 MB
2025/07. Web Application Penetration Testing/3. Cross-Site Request Forgery.vtt
12 kB
2025/07. Web Application Penetration Testing/4. Web Cookies via Java Web Tokens.mp4
126 MB
2025/07. Web Application Penetration Testing/4. Web Cookies via Java Web Tokens.vtt
15 kB
2025/07. Web Application Penetration Testing/5. Hack Databases.mp4
132 MB
2025/07. Web Application Penetration Testing/5. Hack Databases.vtt
10 kB
2025/07. Web Application Penetration Testing/6. OWASP Juice Shop Authentication Bypass.mp4
41 MB
2025/07. Web Application Penetration Testing/6. OWASP Juice Shop Authentication Bypass.vtt
8.2 kB
2025/07. Web Application Penetration Testing/7. OWASP on Mutillidae.mp4
24 MB
2025/07. Web Application Penetration Testing/7. OWASP on Mutillidae.vtt
7.9 kB
2025/07. Web Application Penetration Testing/8. OWASP Path Traversal.mp4
43 MB
2025/07. Web Application Penetration Testing/8. OWASP Path Traversal.vtt
11 kB
2025/07. Web Application Penetration Testing/9. View Other Users' Details.mp4
66 MB
2025/07. Web Application Penetration Testing/9. View Other Users' Details.vtt
13 kB
2025/08. Wireless Hacking/1. Setup Wireless On Kali Linux.mp4
30 MB
2025/08. Wireless Hacking/1. Setup Wireless On Kali Linux.vtt
9.0 kB
2025/08. Wireless Hacking/2. Wireless Hacking with Bettercap.mp4
25 MB
2025/08. Wireless Hacking/2. Wireless Hacking with Bettercap.vtt
5.5 kB
2025/08. Wireless Hacking/3. WiFi Pineapple Setup.mp4
97 MB
2025/08. Wireless Hacking/3. WiFi Pineapple Setup.vtt
10 kB
2025/08. Wireless Hacking/4. WiFi Pineapple.mp4
91 MB
2025/08. Wireless Hacking/4. WiFi Pineapple.vtt
12 kB
2025/08. Wireless Hacking/5. Capture and Crack WiFi Passwords.mp4
107 MB
2025/08. Wireless Hacking/5. Capture and Crack WiFi Passwords.vtt
14 kB
2025/09. Open Source Intelligence/1. Google hacking.mp4
104 MB
2025/09. Open Source Intelligence/1. Google hacking.vtt
12 kB
2025/10. Social Engineering/1. Social Engineering Toolkit.mp4
40 MB
2025/10. Social Engineering/1. Social Engineering Toolkit.vtt
9.2 kB
2025/10. Social Engineering/2. Browser Exploitation Framework.mp4
70 MB
2025/10. Social Engineering/2. Browser Exploitation Framework.vtt
10 kB
2025/10. Social Engineering/3. Dark Web.mp4
49 MB
2025/10. Social Engineering/3. Dark Web.vtt
7.0 kB
2025/10. Social Engineering/4. Phishing Sites.mp4
135 MB
2025/10. Social Engineering/4. Phishing Sites.vtt
14 kB
2025/11. Client Side Attacks/1. Hack with HTA.mp4
32 MB
2025/11. Client Side Attacks/1. Hack with HTA.vtt
7.0 kB
2025/11. Client Side Attacks/2. Hack with Psexec.mp4
72 MB
2025/11. Client Side Attacks/2. Hack with Psexec.vtt
7.3 kB
2025/11. Client Side Attacks/3. Unicorn for MS Words Hack.mp4
74 MB
2025/11. Client Side Attacks/3. Unicorn for MS Words Hack.vtt
10 kB
2025/11. Client Side Attacks/4. Powershell BAT.mp4
71 MB
2025/11. Client Side Attacks/4. Powershell BAT.vtt
17 kB
2025/11. Client Side Attacks/5. Hack Firefox For Usernames And Passwords.mp4
116 MB
2025/11. Client Side Attacks/5. Hack Firefox For Usernames And Passwords.vtt
14 kB
2025/11. Client Side Attacks/6. Create Virus With BAT File.mp4
57 MB
2025/11. Client Side Attacks/6. Create Virus With BAT File.vtt
10 kB
2025/11. Client Side Attacks/7. GPS Location Via Browser Attack.mp4
58 MB
2025/11. Client Side Attacks/7. GPS Location Via Browser Attack.vtt
8.1 kB
2025/11. Client Side Attacks/8. Crack RAR File.mp4
58 MB
2025/11. Client Side Attacks/8. Crack RAR File.vtt
7.3 kB
2025/12. Defense/1. SNORT for Network Intrustion Detection.mp4
148 MB
2025/12. Defense/1. SNORT for Network Intrustion Detection.vtt
14 kB
2025/12. Defense/2. SNORT for Windows.mp4
31 MB
2025/12. Defense/2. SNORT for Windows.vtt
8.6 kB
2025/12. Defense/3. SNORT Rules Creation.mp4
104 MB
2025/12. Defense/3. SNORT Rules Creation.vtt
18 kB
2025/12. Defense/4. Wireshark for Packet Sniffing.mp4
163 MB
2025/12. Defense/4. Wireshark for Packet Sniffing.vtt
18 kB
2025/12. Defense/5. Check If Your Computers Has been Hacked.mp4
92 MB
2025/12. Defense/5. Check If Your Computers Has been Hacked.vtt
14 kB
2025/12. Defense/6. Check If Your Phone Has Been Hacked.mp4
92 MB
2025/12. Defense/6. Check If Your Phone Has Been Hacked.vtt
12 kB
2025/12. Defense/7. Maltrail.mp4
86 MB
2025/12. Defense/7. Maltrail.vtt
13 kB
2025/12. Defense/8. Wazuh.mp4
457 MB
2025/12. Defense/8. Wazuh.vtt
50 kB
2025/FULL torrents Info.txt
6.3 kB
info.nfo
3.1 kB
INFO.txt
3.2 kB