TorBT - Torrents and Magnet Links Search Engine

Network Pen Testing with Python

File Name
Size
1. Course Overview/01. Course Overview.mp4
3.8 MB
1. Course Overview/01. Course Overview.vtt
1.7 kB
2. Initial Access and Network Scanning with Python/03. Demo - Crafting DNS and Ping Requests.mp4
11 MB
2. Initial Access and Network Scanning with Python/05. Demo - Performing Network and Port Scanning with Scapy.mp4
11 MB
2. Initial Access and Network Scanning with Python/06. Parsing PCAP Files with Scapy.mp4
9.2 MB
2. Initial Access and Network Scanning with Python/08. Demo - Performing ARP MitM with Scapy.mp4
9.2 MB
2. Initial Access and Network Scanning with Python/09. Abusing Common Network Protocols.mp4
7.7 MB
2. Initial Access and Network Scanning with Python/02. Getting Started with Scapy.mp4
6.4 MB
2. Initial Access and Network Scanning with Python/01. Introduction.mp4
6.4 MB
2. Initial Access and Network Scanning with Python/04. Performing Network Discovery with Scapy.mp4
5.7 MB
2. Initial Access and Network Scanning with Python/07. Overview of Man-in-the-Middle Attacks.mp4
4.4 MB
2. Initial Access and Network Scanning with Python/10. Summary.mp4
1.4 MB
2. Initial Access and Network Scanning with Python/05. Demo - Performing Network and Port Scanning with Scapy.vtt
5.9 kB
2. Initial Access and Network Scanning with Python/03. Demo - Crafting DNS and Ping Requests.vtt
5.4 kB
2. Initial Access and Network Scanning with Python/09. Abusing Common Network Protocols.vtt
4.5 kB
2. Initial Access and Network Scanning with Python/06. Parsing PCAP Files with Scapy.vtt
4.4 kB
2. Initial Access and Network Scanning with Python/02. Getting Started with Scapy.vtt
4.3 kB
2. Initial Access and Network Scanning with Python/01. Introduction.vtt
4.2 kB
2. Initial Access and Network Scanning with Python/08. Demo - Performing ARP MitM with Scapy.vtt
4.0 kB
2. Initial Access and Network Scanning with Python/04. Performing Network Discovery with Scapy.vtt
3.9 kB
2. Initial Access and Network Scanning with Python/07. Overview of Man-in-the-Middle Attacks.vtt
2.5 kB
2. Initial Access and Network Scanning with Python/10. Summary.vtt
1.0 kB
3. Post Exploitation with Python/04. Demo - Establishing Persistence via Windows Service.mp4
14 MB
3. Post Exploitation with Python/02. Interacting with Windows Internals.mp4
13 MB
3. Post Exploitation with Python/03. Demo - Identifying and Exploiting Local Scripts.mp4
10 MB
3. Post Exploitation with Python/01. Introduction.mp4
4.6 MB
3. Post Exploitation with Python/05. Summary.mp4
1.6 MB
3. Post Exploitation with Python/04. Demo - Establishing Persistence via Windows Service.vtt
6.1 kB
3. Post Exploitation with Python/03. Demo - Identifying and Exploiting Local Scripts.vtt
5.3 kB
3. Post Exploitation with Python/02. Interacting with Windows Internals.vtt
4.8 kB
3. Post Exploitation with Python/01. Introduction.vtt
3.2 kB
3. Post Exploitation with Python/05. Summary.vtt
1.1 kB
4. Actions on Objectives and Data Exfiltration with Python/06. Demo - Exfiltrating Data via Cloud Object Storage Services.mp4
18 MB
4. Actions on Objectives and Data Exfiltration with Python/02. Avoiding Signature Detections and DLP.mp4
12 MB
4. Actions on Objectives and Data Exfiltration with Python/04. Demo - Encrypting Data with Python.mp4
12 MB
4. Actions on Objectives and Data Exfiltration with Python/05. Demo - Exfiltrating Data via SMTP.mp4
7.9 MB
4. Actions on Objectives and Data Exfiltration with Python/01. Introduction.mp4
4.8 MB
4. Actions on Objectives and Data Exfiltration with Python/03. Demo - Encoding and Compressing Data with Python.mp4
4.6 MB
4. Actions on Objectives and Data Exfiltration with Python/07. Summary.mp4
3.7 MB
4. Actions on Objectives and Data Exfiltration with Python/06. Demo - Exfiltrating Data via Cloud Object Storage Services.vtt
7.7 kB
4. Actions on Objectives and Data Exfiltration with Python/02. Avoiding Signature Detections and DLP.vtt
6.2 kB
4. Actions on Objectives and Data Exfiltration with Python/04. Demo - Encrypting Data with Python.vtt
5.0 kB
4. Actions on Objectives and Data Exfiltration with Python/05. Demo - Exfiltrating Data via SMTP.vtt
4.0 kB
4. Actions on Objectives and Data Exfiltration with Python/03. Demo - Encoding and Compressing Data with Python.vtt
3.1 kB
4. Actions on Objectives and Data Exfiltration with Python/01. Introduction.vtt
2.9 kB
4. Actions on Objectives and Data Exfiltration with Python/07. Summary.vtt
2.6 kB
exercise.zip
7.8 MB
playlist.m3u
2.0 kB