TorBT - Torrents and Magnet Links Search Engine
Udemy - Learn Python & Ethical Hacking From Scratch (5.2024)
- Date: 2026-05-08
- Size: 8.4 GB
- Files: 402
File Name
Size
01 - Introduction/001 Teaser.mp4
85 MB
01 - Introduction/001 Teaser.srt
0 B
01 - Introduction/002 Course Introduction.mp4
72 MB
01 - Introduction/002 Course Introduction.srt
8.0 kB
01 - Introduction/003 Introduction to Python Programming & Ethical Hacking.mp4
109 MB
01 - Introduction/003 Introduction to Python Programming & Ethical Hacking.srt
8.6 kB
01 - Introduction/004 Initial Overview.mp4
16 MB
01 - Introduction/004 Initial Overview.srt
7.6 kB
01 - Introduction/004 The-Lab.pdf
347 kB
01 - Introduction/005 Initial Preparation.mp4
146 MB
01 - Introduction/005 Initial Preparation.srt
12 kB
01 - Introduction/005 Kali-2024-Download-Page.url
67 B
01 - Introduction/006 7-zip-Download-page.url
46 B
01 - Introduction/006 Installing Kali Linux as a VM on Windows.mp4
122 MB
01 - Introduction/006 Installing Kali Linux as a VM on Windows.srt
13 kB
01 - Introduction/006 Kali-2024-Download-Page.url
67 B
01 - Introduction/006 VMware-Player-Download-Page.url
67 B
01 - Introduction/007 Installing Kali Linux as a VM on Apple Mac OS (Intel & Silicon Chips).mp4
115 MB
01 - Introduction/007 Installing Kali Linux as a VM on Apple Mac OS (Intel & Silicon Chips).srt
14 kB
01 - Introduction/007 Kali-2024-Download-Page.url
67 B
01 - Introduction/007 VMware-key.txt
29 B
01 - Introduction/007 VMware-Player-Download-Page.url
67 B
01 - Introduction/008 Installing Kali Linux as a VM on Linux.mp4
148 MB
01 - Introduction/008 Installing Kali Linux as a VM on Linux.srt
15 kB
01 - Introduction/008 Kali-2024-Download-Page.url
67 B
01 - Introduction/008 VMware-Player-Download-Page.url
67 B
01 - Introduction/009 Basic Overview of Kali Linux.mp4
20 MB
01 - Introduction/009 Basic Overview of Kali Linux.srt
7.3 kB
01 - Introduction/010 Explain-Shell.url
49 B
01 - Introduction/010 Linux-Commands-List.url
85 B
01 - Introduction/010 The Terminal & Linux Commands.mp4
218 MB
01 - Introduction/010 The Terminal & Linux Commands.srt
17 kB
01 - Introduction/011 Python 2 VS Python 3 & Writing Our First Program.mp4
28 MB
01 - Introduction/011 Python 2 VS Python 3 & Writing Our First Program.srt
12 kB
01 - Introduction/012 Installing & Using a Python IDE.mp4
29 MB
01 - Introduction/012 Installing & Using a Python IDE.srt
12 kB
01 - Introduction/012 Pycharm-Download-Link.url
81 B
01 - Introduction/external-links.txt
821 B
02 - Writing a MAC Address Changer - Python Basics/001 mac-changer.pdf
980 kB
02 - Writing a MAC Address Changer - Python Basics/001 What is MAC Address & How To Change it.mp4
91 MB
02 - Writing a MAC Address Changer - Python Basics/001 What is MAC Address & How To Change it.srt
9.6 kB
02 - Writing a MAC Address Changer - Python Basics/002 Subprocess-Module-Documentation.url
73 B
02 - Writing a MAC Address Changer - Python Basics/002 Using Python Modules & Executing System Commands.mp4
60 MB
02 - Writing a MAC Address Changer - Python Basics/002 Using Python Modules & Executing System Commands.srt
12 kB
02 - Writing a MAC Address Changer - Python Basics/003 Implementing a Very Basic MAC Changer.mp4
10 MB
02 - Writing a MAC Address Changer - Python Basics/003 Implementing a Very Basic MAC Changer.srt
6.9 kB
02 - Writing a MAC Address Changer - Python Basics/004 More-info-About-Strings-in-Python.url
80 B
02 - Writing a MAC Address Changer - Python Basics/004 More-info-About-Variables-in-Python.url
87 B
02 - Writing a MAC Address Changer - Python Basics/004 Variables & Strings.mp4
21 MB
02 - Writing a MAC Address Changer - Python Basics/004 Variables & Strings.srt
13 kB
02 - Writing a MAC Address Changer - Python Basics/005 Using Variables in MAC Changer.mp4
15 MB
02 - Writing a MAC Address Changer - Python Basics/005 Using Variables in MAC Changer.srt
5.7 kB
02 - Writing a MAC Address Changer - Python Basics/006 Getting Input From The User.mp4
27 MB
02 - Writing a MAC Address Changer - Python Basics/006 Getting Input From The User.srt
8.1 kB
02 - Writing a MAC Address Changer - Python Basics/006 More-info-about-Python-Built-in-Functions.url
82 B
02 - Writing a MAC Address Changer - Python Basics/007 Handling User Input.mp4
53 MB
02 - Writing a MAC Address Changer - Python Basics/007 Handling User Input.srt
12 kB
02 - Writing a MAC Address Changer - Python Basics/008 Handling Command-line Arguments.mp4
39 MB
02 - Writing a MAC Address Changer - Python Basics/008 Handling Command-line Arguments.srt
12 kB
02 - Writing a MAC Address Changer - Python Basics/008 Optparse-Documentation-Page.url
71 B
02 - Writing a MAC Address Changer - Python Basics/009 Initialising Variables Based on Command-line Arguments.mp4
39 MB
02 - Writing a MAC Address Changer - Python Basics/009 Initialising Variables Based on Command-line Arguments.srt
9.3 kB
02 - Writing a MAC Address Changer - Python Basics/010 More-info-on-Python-Functions.url
82 B
02 - Writing a MAC Address Changer - Python Basics/010 Python Functions.mp4
79 MB
02 - Writing a MAC Address Changer - Python Basics/010 Python Functions.srt
13 kB
02 - Writing a MAC Address Changer - Python Basics/011 Returning Values From Functions.mp4
22 MB
02 - Writing a MAC Address Changer - Python Basics/011 Returning Values From Functions.srt
8.7 kB
02 - Writing a MAC Address Changer - Python Basics/012 Decision Making in Python.mp4
27 MB
02 - Writing a MAC Address Changer - Python Basics/012 Decision Making in Python.srt
9.2 kB
02 - Writing a MAC Address Changer - Python Basics/012 More-info-on-Decision-Making.url
88 B
02 - Writing a MAC Address Changer - Python Basics/013 Using Conditional Statements in MAC Changer.mp4
53 MB
02 - Writing a MAC Address Changer - Python Basics/013 Using Conditional Statements in MAC Changer.srt
12 kB
02 - Writing a MAC Address Changer - Python Basics/external-links.txt
689 B
03 - MAC Changer - Algorithm Design/001 Introduction to Algorithms.mp4
30 MB
03 - MAC Changer - Algorithm Design/001 Introduction to Algorithms.srt
4.6 kB
03 - MAC Changer - Algorithm Design/002 Check-call-Manuall-Page.url
73 B
03 - MAC Changer - Algorithm Design/002 Reading Output Returned By System Commands.mp4
32 MB
03 - MAC Changer - Algorithm Design/002 Reading Output Returned By System Commands.srt
8.7 kB
03 - MAC Changer - Algorithm Design/003 Introduction to Regular Expressions (Regex).mp4
18 MB
03 - MAC Changer - Algorithm Design/003 Introduction to Regular Expressions (Regex).srt
11 kB
03 - MAC Changer - Algorithm Design/003 More-info-on-Regular-Expressions.url
88 B
03 - MAC Changer - Algorithm Design/003 Pythex.org.url
43 B
03 - MAC Changer - Algorithm Design/004 Extracting a Substring Using Regex.mp4
34 MB
03 - MAC Changer - Algorithm Design/004 Extracting a Substring Using Regex.srt
8.7 kB
03 - MAC Changer - Algorithm Design/004 Re-Module-Manual-Page.url
65 B
03 - MAC Changer - Algorithm Design/005 Refactoring & Housekeeping.mp4
37 MB
03 - MAC Changer - Algorithm Design/005 Refactoring & Housekeeping.srt
16 kB
03 - MAC Changer - Algorithm Design/006 Implementing The Validation Algorithm.mp4
40 MB
03 - MAC Changer - Algorithm Design/006 Implementing The Validation Algorithm.srt
8.6 kB
03 - MAC Changer - Algorithm Design/007 Python 3 Compatibility.mp4
16 MB
03 - MAC Changer - Algorithm Design/007 Python 3 Compatibility.srt
8.4 kB
03 - MAC Changer - Algorithm Design/external-links.txt
299 B
04 - Programming a Network Scanner/001 Best-Wireless-Adapters-To-Use-With-Kali.url
67 B
04 - Programming a Network Scanner/001 Introduction & Teaser.mp4
76 MB
04 - Programming a Network Scanner/001 Introduction & Teaser.srt
13 kB
04 - Programming a Network Scanner/001 network-scanner.pdf
719 kB
04 - Programming a Network Scanner/001 Website-That-Sells-Supported-Wireless-Adapters.url
51 B
04 - Programming a Network Scanner/002 Alternative-Download-Link.url
94 B
04 - Programming a Network Scanner/002 Installing Windows as a Virtual Machine.mp4
28 MB
04 - Programming a Network Scanner/002 Installing Windows as a Virtual Machine.srt
7.6 kB
04 - Programming a Network Scanner/002 Win10-VM.torrent
68 kB
04 - Programming a Network Scanner/002 Windows-10-VM-Download-Link.url
93 B
04 - Programming a Network Scanner/003 Installing Windows as a Virtual Machine on Apple Silicon Computers.mp4
81 MB
04 - Programming a Network Scanner/003 Installing Windows as a Virtual Machine on Apple Silicon Computers.srt
7.1 kB
04 - Programming a Network Scanner/004 Introduction to ARP.mp4
30 MB
04 - Programming a Network Scanner/004 Introduction to ARP.srt
12 kB
04 - Programming a Network Scanner/005 Designing an Algorithm To Discover Clients on The Same Network.mp4
15 MB
04 - Programming a Network Scanner/005 Designing an Algorithm To Discover Clients on The Same Network.srt
5.0 kB
04 - Programming a Network Scanner/006 Using Scapy To Create an ARP Request.mp4
18 MB
04 - Programming a Network Scanner/006 Using Scapy To Create an ARP Request.srt
8.7 kB
04 - Programming a Network Scanner/007 Combining Frames To Broadcast Packets.mp4
25 MB
04 - Programming a Network Scanner/007 Combining Frames To Broadcast Packets.srt
12 kB
04 - Programming a Network Scanner/008 Sending & Receiving Packets.mp4
23 MB
04 - Programming a Network Scanner/008 Sending & Receiving Packets.srt
9.2 kB
04 - Programming a Network Scanner/009 Introduction Lists in Python.mp4
27 MB
04 - Programming a Network Scanner/009 Introduction Lists in Python.srt
11 kB
04 - Programming a Network Scanner/010 Iterating Over Lists & Analysing Packet.mp4
73 MB
04 - Programming a Network Scanner/010 Iterating Over Lists & Analysing Packet.srt
13 kB
04 - Programming a Network Scanner/011 Using Escape Characters To Improve Program Output.mp4
21 MB
04 - Programming a Network Scanner/011 Using Escape Characters To Improve Program Output.srt
8.6 kB
04 - Programming a Network Scanner/012 Introduction to Dictionaries in Python.mp4
34 MB
04 - Programming a Network Scanner/012 Introduction to Dictionaries in Python.srt
14 kB
04 - Programming a Network Scanner/013 Improving the Program Using a List of Dictionaries.mp4
23 MB
04 - Programming a Network Scanner/013 Improving the Program Using a List of Dictionaries.srt
12 kB
04 - Programming a Network Scanner/014 Iterating Over Nested Data Structures.mp4
46 MB
04 - Programming a Network Scanner/014 Iterating Over Nested Data Structures.srt
9.7 kB
04 - Programming a Network Scanner/015 Testing The Network Scanner With Python 3.mp4
22 MB
04 - Programming a Network Scanner/015 Testing The Network Scanner With Python 3.srt
6.5 kB
04 - Programming a Network Scanner/external-links.txt
386 B
05 - Writing an ARP Spoofer/001 What is ARP Spoofing.mp4
24 MB
05 - Writing an ARP Spoofer/001 What is ARP Spoofing.srt
7.0 kB
05 - Writing an ARP Spoofer/002 Intercepting Data in a Network Using arpspoof.mp4
18 MB
05 - Writing an ARP Spoofer/002 Intercepting Data in a Network Using arpspoof.srt
6.1 kB
05 - Writing an ARP Spoofer/003 Creating an ARP Response.mp4
20 MB
05 - Writing an ARP Spoofer/003 Creating an ARP Response.srt
9.2 kB
05 - Writing an ARP Spoofer/004 Sending ARP Responses.mp4
30 MB
05 - Writing an ARP Spoofer/004 Sending ARP Responses.srt
7.1 kB
05 - Writing an ARP Spoofer/005 Extracting MAC Address From Responses.mp4
45 MB
05 - Writing an ARP Spoofer/005 Extracting MAC Address From Responses.srt
8.7 kB
05 - Writing an ARP Spoofer/006 Introduction to Loops in Python.mp4
68 MB
05 - Writing an ARP Spoofer/006 Introduction to Loops in Python.srt
11 kB
05 - Writing an ARP Spoofer/007 More on Loops & Counters.mp4
21 MB
05 - Writing an ARP Spoofer/007 More on Loops & Counters.srt
11 kB
05 - Writing an ARP Spoofer/008 Dynamic Printing.mp4
18 MB
05 - Writing an ARP Spoofer/008 Dynamic Printing.srt
9.0 kB
05 - Writing an ARP Spoofer/009 Exception Handling in Python.mp4
27 MB
05 - Writing an ARP Spoofer/009 Exception Handling in Python.srt
7.1 kB
05 - Writing an ARP Spoofer/010 Implementing a Restore Function.mp4
40 MB
05 - Writing an ARP Spoofer/010 Implementing a Restore Function.srt
15 kB
05 - Writing an ARP Spoofer/011 Restoring ARP Tables on Exception.mp4
22 MB
05 - Writing an ARP Spoofer/011 Restoring ARP Tables on Exception.srt
6.7 kB
06 - Writing a Packet Sniffer/001 Introduction & Teaser.mp4
76 MB
06 - Writing a Packet Sniffer/001 Introduction & Teaser.srt
6.2 kB
06 - Writing a Packet Sniffer/002 Sniffing Packets Using Scapy.mp4
33 MB
06 - Writing a Packet Sniffer/002 Sniffing Packets Using Scapy.srt
10 kB
06 - Writing a Packet Sniffer/003 Extracting data From a Specific Layer.mp4
50 MB
06 - Writing a Packet Sniffer/003 Extracting data From a Specific Layer.srt
8.4 kB
06 - Writing a Packet Sniffer/004 Analysing Sniffed Packets & Extracting Fields From Layers.mp4
91 MB
06 - Writing a Packet Sniffer/004 Analysing Sniffed Packets & Extracting Fields From Layers.srt
15 kB
06 - Writing a Packet Sniffer/005 Analysing Fields & Extracting Passwords.mp4
73 MB
06 - Writing a Packet Sniffer/005 Analysing Fields & Extracting Passwords.srt
15 kB
06 - Writing a Packet Sniffer/006 Extracting URLs.mp4
77 MB
06 - Writing a Packet Sniffer/006 Extracting URLs.srt
9.7 kB
06 - Writing a Packet Sniffer/007 Capturing Passwords From Any Computer Connected to the Same Network.mp4
20 MB
06 - Writing a Packet Sniffer/007 Capturing Passwords From Any Computer Connected to the Same Network.srt
10 kB
06 - Writing a Packet Sniffer/008 Strings & Bytes in Python 3.mp4
50 MB
06 - Writing a Packet Sniffer/008 Strings & Bytes in Python 3.srt
9.5 kB
07 - Writing a DNS Spoofer/001 Intercepting Packets - Creating a Proxy.mp4
42 MB
07 - Writing a DNS Spoofer/001 Intercepting Packets - Creating a Proxy.srt
16 kB
07 - Writing a DNS Spoofer/002 Converting Packets to Scapy Packets.mp4
34 MB
07 - Writing a DNS Spoofer/002 Converting Packets to Scapy Packets.srt
11 kB
07 - Writing a DNS Spoofer/003 Introduction to DNS Spoofing.mp4
69 MB
07 - Writing a DNS Spoofer/003 Introduction to DNS Spoofing.srt
8.9 kB
07 - Writing a DNS Spoofer/004 Filtering DNS Responses.mp4
22 MB
07 - Writing a DNS Spoofer/004 Filtering DNS Responses.srt
8.0 kB
07 - Writing a DNS Spoofer/005 Analysing & Creating a Custom DNS Response.mp4
23 MB
07 - Writing a DNS Spoofer/005 Analysing & Creating a Custom DNS Response.srt
9.8 kB
07 - Writing a DNS Spoofer/006 Modifying Packets On The Fly.mp4
24 MB
07 - Writing a DNS Spoofer/006 Modifying Packets On The Fly.srt
9.7 kB
07 - Writing a DNS Spoofer/007 Redirecting DNS Responses.mp4
51 MB
07 - Writing a DNS Spoofer/007 Redirecting DNS Responses.srt
7.2 kB
08 - Writing a File Interceptor/001 Introduction & Teaser.mp4
65 MB
08 - Writing a File Interceptor/001 Introduction & Teaser.srt
5.5 kB
08 - Writing a File Interceptor/002 Filtering Traffic Based on the Port Used.mp4
78 MB
08 - Writing a File Interceptor/002 Filtering Traffic Based on the Port Used.srt
11 kB
08 - Writing a File Interceptor/003 Analysing HTTP Requests.mp4
41 MB
08 - Writing a File Interceptor/003 Analysing HTTP Requests.srt
6.8 kB
08 - Writing a File Interceptor/004 Intercepting HTTP Requests.mp4
73 MB
08 - Writing a File Interceptor/004 Intercepting HTTP Requests.srt
12 kB
08 - Writing a File Interceptor/005 Modifying HTTP Responses on The Fly.mp4
88 MB
08 - Writing a File Interceptor/005 Modifying HTTP Responses on The Fly.srt
13 kB
08 - Writing a File Interceptor/006 Intercepting & Replacing Downloads on The Network.mp4
25 MB
08 - Writing a File Interceptor/006 Intercepting & Replacing Downloads on The Network.srt
13 kB
09 - Writing a Code Injector/001 Introduction & Teaser.mp4
28 MB
09 - Writing a Code Injector/001 Introduction & Teaser.srt
1.7 kB
09 - Writing a Code Injector/002 Analysing HTTP Responses.mp4
61 MB
09 - Writing a Code Injector/002 Analysing HTTP Responses.srt
8.3 kB
09 - Writing a Code Injector/003 Replacing a Substring Using Regex.mp4
40 MB
09 - Writing a Code Injector/003 Replacing a Substring Using Regex.srt
8.4 kB
09 - Writing a Code Injector/004 Decoding HTTP Responses.mp4
90 MB
09 - Writing a Code Injector/004 Decoding HTTP Responses.srt
12 kB
09 - Writing a Code Injector/005 Modifying HTTP Responses & Injecting Javascript Code in HTML Pages.mp4
68 MB
09 - Writing a Code Injector/005 Modifying HTTP Responses & Injecting Javascript Code in HTML Pages.srt
11 kB
09 - Writing a Code Injector/006 Refactoring & Housekeeping.mp4
50 MB
09 - Writing a Code Injector/006 Refactoring & Housekeeping.srt
11 kB
09 - Writing a Code Injector/007 Debugging Issues in Python.mp4
68 MB
09 - Writing a Code Injector/007 Debugging Issues in Python.srt
7.7 kB
09 - Writing a Code Injector/008 Using Groups & None-capturing Regex.mp4
71 MB
09 - Writing a Code Injector/008 Using Groups & None-capturing Regex.srt
11 kB
09 - Writing a Code Injector/009 Recalculating Content Length.mp4
76 MB
09 - Writing a Code Injector/009 Recalculating Content Length.srt
14 kB
09 - Writing a Code Injector/010 BeEF Overview & Basic Hook Method.mp4
148 MB
09 - Writing a Code Injector/010 BeEF Overview & Basic Hook Method.srt
15 kB
09 - Writing a Code Injector/011 Hooking Computers Using code_injector.mp4
32 MB
09 - Writing a Code Injector/011 Hooking Computers Using code_injector.srt
7.1 kB
09 - Writing a Code Injector/012 Basic BeEF Commands.mp4
11 MB
09 - Writing a Code Injector/012 Basic BeEF Commands.srt
6.2 kB
09 - Writing a Code Injector/013 Delivering Malware Using BeEF.mp4
20 MB
09 - Writing a Code Injector/013 Delivering Malware Using BeEF.srt
7.8 kB
10 - Bypassing HTTPS/001 How to Bypass HTTPS.mp4
146 MB
10 - Bypassing HTTPS/001 How to Bypass HTTPS.srt
13 kB
10 - Bypassing HTTPS/002 Bypassing HTTPS & Sniffing Login Credentials.mp4
44 MB
10 - Bypassing HTTPS/002 Bypassing HTTPS & Sniffing Login Credentials.srt
7.6 kB
10 - Bypassing HTTPS/003 Replacing Downloads on HTTPS Pages.mp4
53 MB
10 - Bypassing HTTPS/003 Replacing Downloads on HTTPS Pages.srt
10 kB
10 - Bypassing HTTPS/004 Injecting Code in HTTPS Pages.mp4
57 MB
10 - Bypassing HTTPS/004 Injecting Code in HTTPS Pages.srt
10 kB
11 - Writing an ARP Spoof Detector/001 Running Python Programs on Windows.mp4
36 MB
11 - Writing an ARP Spoof Detector/001 Running Python Programs on Windows.srt
13 kB
11 - Writing an ARP Spoof Detector/002 Capturing & Analysing ARP Responses.mp4
18 MB
11 - Writing an ARP Spoof Detector/002 Capturing & Analysing ARP Responses.srt
8.5 kB
11 - Writing an ARP Spoof Detector/003 Detecting ARP Spoofing Attacks Using Python.mp4
43 MB
11 - Writing an ARP Spoof Detector/003 Detecting ARP Spoofing Attacks Using Python.srt
9.2 kB
12 - Writing Malware/001 Introduction & Teaser.mp4
43 MB
12 - Writing Malware/001 Introduction & Teaser.srt
2.4 kB
12 - Writing Malware/002 Execute System Command Payload.mp4
27 MB
12 - Writing Malware/002 Execute System Command Payload.srt
13 kB
12 - Writing Malware/003 Sending Emails Using Python.mp4
34 MB
12 - Writing Malware/003 Sending Emails Using Python.srt
16 kB
12 - Writing Malware/004 Filtering Command Output Using Regex.mp4
24 MB
12 - Writing Malware/004 Filtering Command Output Using Regex.srt
13 kB
12 - Writing Malware/005 Stealing WiFi Passwords Saved on a Computer.mp4
42 MB
12 - Writing Malware/005 Stealing WiFi Passwords Saved on a Computer.srt
13 kB
12 - Writing Malware/006 Downloading Files Using Python.mp4
55 MB
12 - Writing Malware/006 Downloading Files Using Python.srt
10 kB
12 - Writing Malware/007 Writing Files on Disk.mp4
52 MB
12 - Writing Malware/007 Writing Files on Disk.srt
14 kB
12 - Writing Malware/008 Password Recovery Basics.mp4
70 MB
12 - Writing Malware/008 Password Recovery Basics.srt
11 kB
12 - Writing Malware/009 Stealing Saved Passwords From Remote Computers.mp4
38 MB
12 - Writing Malware/009 Stealing Saved Passwords From Remote Computers.srt
10 kB
12 - Writing Malware/010 Interacting With The File System Using Python.mp4
28 MB
12 - Writing Malware/010 Interacting With The File System Using Python.srt
12 kB
13 - Writing Malware - Keylogger/001 Introduction & Teaser.mp4
56 MB
13 - Writing Malware - Keylogger/001 Introduction & Teaser.srt
4.8 kB
13 - Writing Malware - Keylogger/002 Writing a Basic Local Keylogger Using Python.mp4
26 MB
13 - Writing Malware - Keylogger/002 Writing a Basic Local Keylogger Using Python.srt
14 kB
13 - Writing Malware - Keylogger/003 Introduction to Global Variables.mp4
42 MB
13 - Writing Malware - Keylogger/003 Introduction to Global Variables.srt
10 kB
13 - Writing Malware - Keylogger/004 Logging Special Keys.mp4
21 MB
13 - Writing Malware - Keylogger/004 Logging Special Keys.srt
8.8 kB
13 - Writing Malware - Keylogger/005 Introduction to Threading & Recursion in Python.mp4
30 MB
13 - Writing Malware - Keylogger/005 Introduction to Threading & Recursion in Python.srt
14 kB
13 - Writing Malware - Keylogger/006 Introduction Object Oriented Programming.mp4
43 MB
13 - Writing Malware - Keylogger/006 Introduction Object Oriented Programming.srt
20 kB
13 - Writing Malware - Keylogger/007 Constructor Methods & Instance Variables.mp4
24 MB
13 - Writing Malware - Keylogger/007 Constructor Methods & Instance Variables.srt
9.9 kB
13 - Writing Malware - Keylogger/008 Logging Key-strikes and Reporting Them By Email.mp4
34 MB
13 - Writing Malware - Keylogger/008 Logging Key-strikes and Reporting Them By Email.srt
15 kB
14 - Writing Malware - Backdoors/001 Introduction & Teaser.mp4
64 MB
14 - Writing Malware - Backdoors/001 Introduction & Teaser.srt
7.4 kB
14 - Writing Malware - Backdoors/002 Client - Server Communication & Connection Types.mp4
22 MB
14 - Writing Malware - Backdoors/002 Client - Server Communication & Connection Types.srt
10 kB
14 - Writing Malware - Backdoors/003 Connecting Two Remote Computers Using Sockets.mp4
17 MB
14 - Writing Malware - Backdoors/003 Connecting Two Remote Computers Using Sockets.srt
14 kB
14 - Writing Malware - Backdoors/004 Sending & Receiving Data Over TCP.mp4
9.6 MB
14 - Writing Malware - Backdoors/004 Sending & Receiving Data Over TCP.srt
6.5 kB
14 - Writing Malware - Backdoors/005 Executing System Commands Remotely.mp4
27 MB
14 - Writing Malware - Backdoors/005 Executing System Commands Remotely.srt
13 kB
14 - Writing Malware - Backdoors/006 Implementing a Server.mp4
15 MB
14 - Writing Malware - Backdoors/006 Implementing a Server.srt
11 kB
14 - Writing Malware - Backdoors/007 Implementing Skeleton For Server - Client Communication.mp4
15 MB
14 - Writing Malware - Backdoors/007 Implementing Skeleton For Server - Client Communication.srt
8.9 kB
14 - Writing Malware - Backdoors/008 Refactoring - Creating a Listener Class.mp4
25 MB
14 - Writing Malware - Backdoors/008 Refactoring - Creating a Listener Class.srt
9.8 kB
14 - Writing Malware - Backdoors/009 Refactoring - Creating a Backdoor Class.mp4
16 MB
14 - Writing Malware - Backdoors/009 Refactoring - Creating a Backdoor Class.srt
7.5 kB
14 - Writing Malware - Backdoors/010 Serialisation - Theory.mp4
96 MB
14 - Writing Malware - Backdoors/010 Serialisation - Theory.srt
14 kB
14 - Writing Malware - Backdoors/011 Serialisation - Implementing Reliable Methods to Send & Receive Data Over TCP.mp4
26 MB
14 - Writing Malware - Backdoors/011 Serialisation - Implementing Reliable Methods to Send & Receive Data Over TCP.srt
9.5 kB
14 - Writing Malware - Backdoors/012 Serialisation - Reliably Sending & Receiving Data.mp4
24 MB
14 - Writing Malware - Backdoors/012 Serialisation - Reliably Sending & Receiving Data.srt
7.4 kB
14 - Writing Malware - Backdoors/013 Sending Commands as List & Implementing Exit Command.mp4
25 MB
14 - Writing Malware - Backdoors/013 Sending Commands as List & Implementing Exit Command.srt
11 kB
14 - Writing Malware - Backdoors/014 Interacting With the File System - Implementing cd Command.mp4
32 MB
14 - Writing Malware - Backdoors/014 Interacting With the File System - Implementing cd Command.srt
11 kB
14 - Writing Malware - Backdoors/015 Reading Files Using Python.mp4
46 MB
14 - Writing Malware - Backdoors/015 Reading Files Using Python.srt
9.1 kB
14 - Writing Malware - Backdoors/016 Writing Files Using Python.mp4
26 MB
14 - Writing Malware - Backdoors/016 Writing Files Using Python.srt
8.4 kB
14 - Writing Malware - Backdoors/017 Downloading Files From Hacked Computer.mp4
59 MB
14 - Writing Malware - Backdoors/017 Downloading Files From Hacked Computer.srt
8.9 kB
14 - Writing Malware - Backdoors/018 Implementing Upload Functionality in Listener.mp4
29 MB
14 - Writing Malware - Backdoors/018 Implementing Upload Functionality in Listener.srt
9.3 kB
14 - Writing Malware - Backdoors/019 Implementing Upload Functionality in Backdoor.mp4
38 MB
14 - Writing Malware - Backdoors/019 Implementing Upload Functionality in Backdoor.srt
7.5 kB
14 - Writing Malware - Backdoors/020 Handling Unknown Exceptions.mp4
74 MB
14 - Writing Malware - Backdoors/020 Handling Unknown Exceptions.srt
12 kB
14 - Writing Malware - Backdoors/021 Using the Backdoor to Hack Windows, Linux & OS X.mp4
107 MB
14 - Writing Malware - Backdoors/021 Using the Backdoor to Hack Windows, Linux & OS X.srt
15 kB
14 - Writing Malware - Backdoors/022 Testing The Backdoor With Python 3.mp4
91 MB
14 - Writing Malware - Backdoors/022 Testing The Backdoor With Python 3.srt
20 kB
15 - Writing Malware - Packaging/001 Introduction & Teaser.mp4
66 MB
15 - Writing Malware - Packaging/001 Introduction & Teaser.srt
4.2 kB
15 - Writing Malware - Packaging/002 Converting Python Programs To Windows Binary Executables.mp4
48 MB
15 - Writing Malware - Packaging/002 Converting Python Programs To Windows Binary Executables.srt
8.4 kB
15 - Writing Malware - Packaging/003 Running Executables Silentely.mp4
42 MB
15 - Writing Malware - Packaging/003 Running Executables Silentely.srt
8.8 kB
15 - Writing Malware - Packaging/004 Installing Windows Pyinstaller on Linux.mp4
27 MB
15 - Writing Malware - Packaging/004 Installing Windows Pyinstaller on Linux.srt
9.4 kB
15 - Writing Malware - Packaging/005 Packaging Programs For Windows From Linux.mp4
25 MB
15 - Writing Malware - Packaging/005 Packaging Programs For Windows From Linux.srt
10 kB
15 - Writing Malware - Packaging/006 Introduction to Persistence.mp4
31 MB
15 - Writing Malware - Packaging/006 Introduction to Persistence.srt
9.8 kB
15 - Writing Malware - Packaging/007 Running Programs on Startup.mp4
98 MB
15 - Writing Malware - Packaging/007 Running Programs on Startup.srt
17 kB
15 - Writing Malware - Packaging/008 Creating a Basic Trojan Using Download & Execute Payload.mp4
32 MB
15 - Writing Malware - Packaging/008 Creating a Basic Trojan Using Download & Execute Payload.srt
13 kB
15 - Writing Malware - Packaging/009 Creating a Trojan By Embedding Files In Program Code.mp4
26 MB
15 - Writing Malware - Packaging/009 Creating a Trojan By Embedding Files In Program Code.srt
10 kB
15 - Writing Malware - Packaging/010 Bypassing Anti-Virus Programs - Theory.mp4
15 MB
15 - Writing Malware - Packaging/010 Bypassing Anti-Virus Programs - Theory.srt
6.7 kB
15 - Writing Malware - Packaging/011 Bypassing Anti-Virus Programs - Practical.mp4
49 MB
15 - Writing Malware - Packaging/011 Bypassing Anti-Virus Programs - Practical.srt
11 kB
15 - Writing Malware - Packaging/012 Adding an Icon to Generated Executables.mp4
11 MB
15 - Writing Malware - Packaging/012 Adding an Icon to Generated Executables.srt
6.3 kB
15 - Writing Malware - Packaging/013 Spoofing File Extension.mp4
35 MB
15 - Writing Malware - Packaging/013 Spoofing File Extension.srt
11 kB
15 - Writing Malware - Packaging/014 Converting Python Programs To OS X Executables.mp4
76 MB
15 - Writing Malware - Packaging/014 Converting Python Programs To OS X Executables.srt
11 kB
15 - Writing Malware - Packaging/015 Converting Python Programs to Linux Executables.mp4
25 MB
15 - Writing Malware - Packaging/015 Converting Python Programs to Linux Executables.srt
9.8 kB
16 - Website Web Application Hacking/001 Introduction & Teaser.mp4
115 MB
16 - Website Web Application Hacking/001 Introduction & Teaser.srt
9.3 kB
16 - Website Web Application Hacking/002 What is a Website.mp4
51 MB
16 - Website Web Application Hacking/002 What is a Website.srt
5.6 kB
16 - Website Web Application Hacking/003 How to Hack a Website.mp4
22 MB
16 - Website Web Application Hacking/003 How to Hack a Website.srt
8.0 kB
17 - Website Hacking - Writing a Crawler/001 Sending GET Requests To Web Servers.mp4
23 MB
17 - Website Hacking - Writing a Crawler/001 Sending GET Requests To Web Servers.srt
12 kB
17 - Website Hacking - Writing a Crawler/002 Discovering Website Subdomains Using Python.mp4
33 MB
17 - Website Hacking - Writing a Crawler/002 Discovering Website Subdomains Using Python.srt
13 kB
17 - Website Hacking - Writing a Crawler/003 Discovering Hidden Paths in Websites.mp4
68 MB
17 - Website Hacking - Writing a Crawler/003 Discovering Hidden Paths in Websites.srt
13 kB
17 - Website Hacking - Writing a Crawler/004 Reading Response Content.mp4
69 MB
17 - Website Hacking - Writing a Crawler/004 Reading Response Content.srt
7.8 kB
17 - Website Hacking - Writing a Crawler/005 Extracting Useful Data From Response.mp4
85 MB
17 - Website Hacking - Writing a Crawler/005 Extracting Useful Data From Response.srt
8.6 kB
17 - Website Hacking - Writing a Crawler/006 Filtering Results.mp4
37 MB
17 - Website Hacking - Writing a Crawler/006 Filtering Results.srt
8.6 kB
17 - Website Hacking - Writing a Crawler/007 Extracting Unique Links & Storing Them In a List.mp4
61 MB
17 - Website Hacking - Writing a Crawler/007 Extracting Unique Links & Storing Them In a List.srt
7.9 kB
17 - Website Hacking - Writing a Crawler/008 Recursively Discovering All Paths On a Target Website.mp4
57 MB
17 - Website Hacking - Writing a Crawler/008 Recursively Discovering All Paths On a Target Website.srt
12 kB
17 - Website Hacking - Writing a Crawler/009 Testing The Crawler With Python 3.mp4
33 MB
17 - Website Hacking - Writing a Crawler/009 Testing The Crawler With Python 3.srt
8.8 kB
18 - Writing a Program To Guess Login Information/001 Sending Post Requests to Websites.mp4
73 MB
18 - Writing a Program To Guess Login Information/001 Sending Post Requests to Websites.srt
14 kB
18 - Writing a Program To Guess Login Information/002 Guessing Login Information on Login Pages.mp4
62 MB
18 - Writing a Program To Guess Login Information/002 Guessing Login Information on Login Pages.srt
11 kB
19 - Writing a Vulnerability Scanner/001 Introduction & Teaser.mp4
10 MB
19 - Writing a Vulnerability Scanner/001 Introduction & Teaser.srt
3.3 kB
19 - Writing a Vulnerability Scanner/002 HTTP Requests - POST VS GET.mp4
25 MB
19 - Writing a Vulnerability Scanner/002 HTTP Requests - POST VS GET.srt
8.2 kB
19 - Writing a Vulnerability Scanner/003 Parsing HTML Code Using Python.mp4
50 MB
19 - Writing a Vulnerability Scanner/003 Parsing HTML Code Using Python.srt
9.3 kB
19 - Writing a Vulnerability Scanner/004 Extracting HTML Attributes.mp4
97 MB
19 - Writing a Vulnerability Scanner/004 Extracting HTML Attributes.srt
12 kB
19 - Writing a Vulnerability Scanner/005 Posting Forms.mp4
40 MB
19 - Writing a Vulnerability Scanner/005 Posting Forms.srt
11 kB
19 - Writing a Vulnerability Scanner/006 Building Basic Structure For a Vulnerability Scanner.mp4
42 MB
19 - Writing a Vulnerability Scanner/006 Building Basic Structure For a Vulnerability Scanner.srt
14 kB
19 - Writing a Vulnerability Scanner/007 Using Default Parameters.mp4
24 MB
19 - Writing a Vulnerability Scanner/007 Using Default Parameters.srt
6.1 kB
19 - Writing a Vulnerability Scanner/008 Sending Requests in a Session.mp4
58 MB
19 - Writing a Vulnerability Scanner/008 Sending Requests in a Session.srt
11 kB
19 - Writing a Vulnerability Scanner/009 Extracting & Submitting Forms Automatically.mp4
90 MB
19 - Writing a Vulnerability Scanner/009 Extracting & Submitting Forms Automatically.srt
12 kB
19 - Writing a Vulnerability Scanner/010 Implementing a Method To Run The Scanner.mp4
20 MB
19 - Writing a Vulnerability Scanner/010 Implementing a Method To Run The Scanner.srt
7.2 kB
19 - Writing a Vulnerability Scanner/011 Discovering XSS Vulnerabilities.mp4
34 MB
19 - Writing a Vulnerability Scanner/011 Discovering XSS Vulnerabilities.srt
12 kB
19 - Writing a Vulnerability Scanner/012 Exploiting XSS Vulnerabilities.mp4
22 MB
19 - Writing a Vulnerability Scanner/012 Exploiting XSS Vulnerabilities.srt
6.7 kB
19 - Writing a Vulnerability Scanner/013 Implementing Code To Discover XSS in Forms.mp4
28 MB
19 - Writing a Vulnerability Scanner/013 Implementing Code To Discover XSS in Forms.srt
9.1 kB
19 - Writing a Vulnerability Scanner/014 Implementing Code To Discover XSS in Parameters.mp4
41 MB
19 - Writing a Vulnerability Scanner/014 Implementing Code To Discover XSS in Parameters.srt
8.8 kB
19 - Writing a Vulnerability Scanner/015 Automatically Discovering Vulnerabilities Using the Vulnerability Scanner.mp4
35 MB
19 - Writing a Vulnerability Scanner/015 Automatically Discovering Vulnerabilities Using the Vulnerability Scanner.srt
10 kB
20 - Bonus Section/001 Bonus Lecture - What's next.html
12 kB