TorBT - Torrents and Magnet Links Search Engine

Udemy Learn Ethical Hacking From Scratch

File Name
Size
01 Introduction/001 Introduction-en.srt
7.9 kB
01 Introduction/002 Teaser-en.srt
9.0 kB
01 Introduction/003 What is Programming What is Hacking Why Learn Them-en.srt
8.2 kB
01 Introduction/004 Lab Overview Needed Software-en.srt
4.9 kB
01 Introduction/004 Virtual-Box-Download-Page.txt
84 B
01 Introduction/005 How-to-Fix-Blank-Screen-After-Starting-Kali.txt
196 B
01 Introduction/005 How-to-Fix-Missing-Nat-Network-Issue.txt
88 B
01 Introduction/005 Installing Kali as a virtual Machine-en.srt
11 kB
01 Introduction/005 Kali-Linux-Download-Page.txt
180 B
01 Introduction/006 Basic Overview of Kali Linux-en.srt
6.5 kB
01 Introduction/007 The Terminal Linux Commands-en.srt
14 kB
01 Introduction/008 Python 2 VS Python 3 Writing Our First Program-en.srt
12 kB
01 Introduction/009 Installing Using a Python IDE-en.srt
11 kB
01 Introduction/Lesson 1. Introduction.mp4
142 MB
01 Introduction/Lesson 2. Teaser.mp4
102 MB
01 Introduction/Lesson 3. What is Programming, What is Hacking & Why Learn Them.mp4
140 MB
01 Introduction/Lesson 4. Lab Overview & Needed Software.mp4
57 MB
01 Introduction/Lesson 5. Installing Kali as a virtual Machine.mp4
104 MB
01 Introduction/Lesson 6. Basic Overview of Kali Linux.mp4
107 MB
01 Introduction/Lesson 7. The Terminal & Linux Commands.mp4
224 MB
01 Introduction/Lesson 8. Python 2 VS Python 3 & Writing Our First Program.mp4
194 MB
01 Introduction/Lesson 9. Installing & Using a Python IDE.mp4
116 MB
02 Writing a MAC Address Changer - Python Basics/010 What is MAC Address How To Change it-en.srt
9.3 kB
02 Writing a MAC Address Changer - Python Basics/010 mac-changer.pdf
980 kB
02 Writing a MAC Address Changer - Python Basics/011 Subprocess-Module-Documentation.txt
100 B
02 Writing a MAC Address Changer - Python Basics/011 Using Python Modules Executing System Commands-en.srt
12 kB
02 Writing a MAC Address Changer - Python Basics/012 Implementing a Very Basic MAC Changer-en.srt
6.7 kB
02 Writing a MAC Address Changer - Python Basics/013 Variables Strings-en.srt
12 kB
02 Writing a MAC Address Changer - Python Basics/014 Using Variables in MAC Changer-en.srt
5.7 kB
02 Writing a MAC Address Changer - Python Basics/015 Getting Input From The User-en.srt
7.7 kB
02 Writing a MAC Address Changer - Python Basics/016 Handling User Input-en.srt
12 kB
02 Writing a MAC Address Changer - Python Basics/017 Handling Command-line Arguments-en.srt
12 kB
02 Writing a MAC Address Changer - Python Basics/017 Optparse-Documentation-Page.txt
96 B
02 Writing a MAC Address Changer - Python Basics/018 Initialising Variables Based on Command-line Arguments-en.srt
9.1 kB
02 Writing a MAC Address Changer - Python Basics/019 Functions-en.srt
12 kB
02 Writing a MAC Address Changer - Python Basics/020 Returning Values From Functions-en.srt
8.5 kB
02 Writing a MAC Address Changer - Python Basics/021 Conditional Statements - Theory-en.srt
9.0 kB
02 Writing a MAC Address Changer - Python Basics/022 Using Conditional Statements in MAC Changer-en.srt
11 kB
02 Writing a MAC Address Changer - Python Basics/Lesson 10. What is MAC Address & How To Change it.mp4
105 MB
02 Writing a MAC Address Changer - Python Basics/Lesson 11. Using Python Modules & Executing System Commands.mp4
22 MB
02 Writing a MAC Address Changer - Python Basics/Lesson 12. Implementing a Very Basic MAC Changer.mp4
9.4 MB
02 Writing a MAC Address Changer - Python Basics/Lesson 13. Variables & Strings.mp4
20 MB
02 Writing a MAC Address Changer - Python Basics/Lesson 14. Using Variables in MAC Changer.mp4
9.1 MB
02 Writing a MAC Address Changer - Python Basics/Lesson 15. Getting Input From The User.mp4
12 MB
02 Writing a MAC Address Changer - Python Basics/Lesson 16. Handling User Input.mp4
15 MB
02 Writing a MAC Address Changer - Python Basics/Lesson 17. Handling Command-line Arguments.mp4
18 MB
02 Writing a MAC Address Changer - Python Basics/Lesson 18. Initialising Variables Based on Command-line Arguments.mp4
12 MB
02 Writing a MAC Address Changer - Python Basics/Lesson 19. Functions.mp4
22 MB
02 Writing a MAC Address Changer - Python Basics/Lesson 20. Returning Values From Functions.mp4
11 MB
02 Writing a MAC Address Changer - Python Basics/Lesson 21. Decision Making - Theory.mp4
17 MB
02 Writing a MAC Address Changer - Python Basics/Lesson 22. Using Conditional Statements in MAC Changer.mp4
20 MB
03 MAC Changer - Algorithm Design/023 What is an Algorithm-en.srt
4.5 kB
03 MAC Changer - Algorithm Design/024 Check-call-Manuall-Page.txt
100 B
03 MAC Changer - Algorithm Design/024 Reading Output Returned By System Commands-en.srt
8.4 kB
03 MAC Changer - Algorithm Design/025 Pythex.org.txt
40 B
03 MAC Changer - Algorithm Design/025 Regular Expressions (Regex)-en.srt
10 kB
03 MAC Changer - Algorithm Design/026 Extracting a Substring Using Regex-en.srt
8.1 kB
03 MAC Changer - Algorithm Design/026 Re-Module-Manual-Page.txt
84 B
03 MAC Changer - Algorithm Design/027 Refactoring Housekeeping-en.srt
15 kB
03 MAC Changer - Algorithm Design/028 Implementing The Algorithm to Check The Mac Did Change-en.srt
8.2 kB
03 MAC Changer - Algorithm Design/Lesson 23. What is an Algorithm.mp4
7.0 MB
03 MAC Changer - Algorithm Design/Lesson 24. Reading Output Returned By System Commands.mp4
14 MB
03 MAC Changer - Algorithm Design/Lesson 25. Regular Expressions (Regex).mp4
18 MB
03 MAC Changer - Algorithm Design/Lesson 26. Extracting a Substring Using Regex.mp4
16 MB
03 MAC Changer - Algorithm Design/Lesson 27. Refactoring & Housekeeping.mp4
18 MB
03 MAC Changer - Algorithm Design/Lesson 28. Implementing The Algorithm to Check The Mac Did Change.mp4
13 MB
04 Programming a Network Scanner/029 ADAPTER-LINKS-ADAPTER-LINKS.txt
36 B
04 Programming a Network Scanner/029 Introduction Teaser-en.srt
12 kB
04 Programming a Network Scanner/029 network-scanner.pdf
719 kB
04 Programming a Network Scanner/030 Installing Windows as a Virtual Machine-en.srt
4.8 kB
04 Programming a Network Scanner/031 What is ARP What its Used For-en.srt
12 kB
04 Programming a Network Scanner/032 Designing an Algorithm To Discover Clients Connected To The Same Network-en.srt
5.0 kB
04 Programming a Network Scanner/033 Scapy-Documentation.txt
96 B
04 Programming a Network Scanner/033 Using Scapy To Create an ARP Request-en.srt
8.4 kB
04 Programming a Network Scanner/034 Combining Frames To Broadcast Packets-en.srt
11 kB
04 Programming a Network Scanner/035 Scapy-Documentation.txt
96 B
04 Programming a Network Scanner/035 Sending Receiving Packets-en.srt
9.1 kB
04 Programming a Network Scanner/036 Lists-en.srt
11 kB
04 Programming a Network Scanner/036 More-info-about-python-lists.txt
110 B
04 Programming a Network Scanner/037 Iterating Over Lists Analysing Packet-en.srt
13 kB
04 Programming a Network Scanner/038 Using Escape Characters To Enhance Program Output-en.srt
8.1 kB
04 Programming a Network Scanner/039 Dictionaries-en.srt
13 kB
04 Programming a Network Scanner/040 Improving the Program Using a List of Dictionaries-en.srt
11 kB
04 Programming a Network Scanner/040 More-info-about-python-dictionaries.txt
120 B
04 Programming a Network Scanner/041 Refactoring Housekeeping-en.srt
9.3 kB
04 Programming a Network Scanner/042 Python 3 Compatibility-en.srt
9.3 kB
04 Programming a Network Scanner/Lesson 29. Introduction & Teaser.mp4
110 MB
04 Programming a Network Scanner/Lesson 30. Installing Windows as a Virtual Machine.mp4
61 MB
04 Programming a Network Scanner/Lesson 31. What is ARP & What its Used For.mp4
17 MB
04 Programming a Network Scanner/Lesson 32. Designing an Algorithm To Discover Clients Connected To The Same Network.mp4
12 MB
04 Programming a Network Scanner/Lesson 33. Using Scapy To Create an ARP Request.mp4
12 MB
04 Programming a Network Scanner/Lesson 34. Combining Frames To Broadcast Packets.mp4
21 MB
04 Programming a Network Scanner/Lesson 35. Sending & Receiving Packets.mp4
11 MB
04 Programming a Network Scanner/Lesson 36. Lists.mp4
19 MB
04 Programming a Network Scanner/Lesson 37. Iterating Over Lists & Analysing Packet.mp4
18 MB
04 Programming a Network Scanner/Lesson 38. Using Escape Characters To Enhance Program Output.mp4
11 MB
04 Programming a Network Scanner/Lesson 39. Dictionaries.mp4
15 MB
04 Programming a Network Scanner/Lesson 40. Improving the Program Using a List of Dictionaries.mp4
15 MB
04 Programming a Network Scanner/Lesson 41. Refactoring & Housekeeping.mp4
13 MB
04 Programming a Network Scanner/Lesson 42. Python 3 Compatibility.mp4
13 MB
05 Writing an ARP Spoofer/043 What is ARP Spoofing-en.srt
7.0 kB
05 Writing an ARP Spoofer/043 arp-spoof.pdf
709 kB
05 Writing an ARP Spoofer/044 Redirecting the Flow of Packets in a Network Using arpspoof-en.srt
6.1 kB
05 Writing an ARP Spoofer/045 Creating an ARP Response-en.srt
8.8 kB
05 Writing an ARP Spoofer/046 Sending ARP Responses-en.srt
7.0 kB
05 Writing an ARP Spoofer/047 Extracting MAC Address From Responses-en.srt
8.3 kB
05 Writing an ARP Spoofer/048 Loops-en.srt
11 kB
05 Writing an ARP Spoofer/049 Using an Infinite Loop To Prominently Redirect Packets-en.srt
11 kB
05 Writing an ARP Spoofer/050 Dynamic Printing-en.srt
8.7 kB
05 Writing an ARP Spoofer/051 Handling Exceptions-en.srt
6.8 kB
05 Writing an ARP Spoofer/052 Implementing a Restore Function-en.srt
15 kB
05 Writing an ARP Spoofer/053 Restoring ARP Tables When an Exception Occures-en.srt
6.3 kB
05 Writing an ARP Spoofer/Lesson 43. What is ARP Spoofing.mp4
112 MB
05 Writing an ARP Spoofer/Lesson 44. Redirecting the Flow of Packets in a Network Using arpspoof.mp4
57 MB
05 Writing an ARP Spoofer/Lesson 45. Creating an ARP Response.mp4
11 MB
05 Writing an ARP Spoofer/Lesson 46. Sending ARP Responses.mp4
9.0 MB
05 Writing an ARP Spoofer/Lesson 47. Extracting MAC Address From Responses.mp4
11 MB
05 Writing an ARP Spoofer/Lesson 48. Loops.mp4
17 MB
05 Writing an ARP Spoofer/Lesson 49. Using an Infinite Loop To Prominently Redirect Packets.mp4
12 MB
05 Writing an ARP Spoofer/Lesson 50. Dynamic Printing.mp4
10 MB
05 Writing an ARP Spoofer/Lesson 51. Handling Exceptions.mp4
7.8 MB
05 Writing an ARP Spoofer/Lesson 52. Implementing a Restore Function.mp4
20 MB
05 Writing an ARP Spoofer/Lesson 53. Restoring ARP Tables When an Exception Occures.mp4
9.3 MB
06 Writing a Packet Sniffer/054 Introduction Teaser-en.srt
6.1 kB
06 Writing a Packet Sniffer/054 Sniffer.pdf
556 kB
06 Writing a Packet Sniffer/055 Sniffing Packets Using Scapy-en.srt
10 kB
06 Writing a Packet Sniffer/056 Berkeley-Packet-Filter-BPF-syntax.txt
68 B
06 Writing a Packet Sniffer/056 Extracting data From a Specific Layer-en.srt
8.2 kB
06 Writing a Packet Sniffer/056 Scapy-http-Git-Repo.txt
82 B
06 Writing a Packet Sniffer/057 Analysing Sniffed Packets Extracting Fields From Layers-en.srt
14 kB
06 Writing a Packet Sniffer/058 Analysing Fields Extracting Passwords-en.srt
14 kB
06 Writing a Packet Sniffer/059 Extracting URLs-en.srt
9.1 kB
06 Writing a Packet Sniffer/060 Capturing Passwords From Any Computer Connected to the Same Network-en.srt
9.5 kB
06 Writing a Packet Sniffer/Lesson 54. Introduction & Teaser.mp4
86 MB
06 Writing a Packet Sniffer/Lesson 55. Sniffing Packets Using Scapy.mp4
12 MB
06 Writing a Packet Sniffer/Lesson 56. Extracting data From a Specific Layer.mp4
16 MB
06 Writing a Packet Sniffer/Lesson 57. Analysing Sniffed Packets & Extracting Fields From Layers.mp4
29 MB
06 Writing a Packet Sniffer/Lesson 58. Analysing Fields & Extracting Passwords.mp4
21 MB
06 Writing a Packet Sniffer/Lesson 59. Extracting URLs.mp4
20 MB
06 Writing a Packet Sniffer/Lesson 60. Capturing Passwords From Any Computer Connected to the Same Network.mp4
15 MB
07 Writing a DNS Spoofer/061 Intercepting Packets - Creating a Proxy-en.srt
16 kB
07 Writing a DNS Spoofer/061 interceptor.pdf
1.8 MB
07 Writing a DNS Spoofer/062 Converting Packets to Scapy Packets-en.srt
11 kB
07 Writing a DNS Spoofer/063 What is DNS Spoofing-en.srt
8.5 kB
07 Writing a DNS Spoofer/064 Analysing DNS Responses-en.srt
7.9 kB
07 Writing a DNS Spoofer/065 Crafting a Custom DNS Response-en.srt
9.8 kB
07 Writing a DNS Spoofer/066 Modifying Packets On The Fly-en.srt
9.4 kB
07 Writing a DNS Spoofer/067 Redirecting DNS Responses-en.srt
6.7 kB
07 Writing a DNS Spoofer/Lesson 61. Intercepting Packets - Creating a Proxy.mp4
155 MB
07 Writing a DNS Spoofer/Lesson 62. Converting Packets to Scapy Packets.mp4
84 MB
07 Writing a DNS Spoofer/Lesson 63. What is DNS Spoofing.mp4
124 MB
07 Writing a DNS Spoofer/Lesson 64. Analysing DNS Responses.mp4
71 MB
07 Writing a DNS Spoofer/Lesson 65. Crafting a Custom DNS Response.mp4
80 MB
07 Writing a DNS Spoofer/Lesson 66. Modifying Packets On The Fly.mp4
87 MB
07 Writing a DNS Spoofer/Lesson 67. Redirecting DNS Responses.mp4
61 MB
08 Writing a File Interceptor/068 Introduction Teaser-en.srt
5.5 kB
08 Writing a File Interceptor/069 Filtering Traffic Based on the Port Used-en.srt
11 kB
08 Writing a File Interceptor/070 Analysing HTTP Requests-en.srt
6.8 kB
08 Writing a File Interceptor/071 Modifying HTTP Requests on the Fly-en.srt
12 kB
08 Writing a File Interceptor/072 Replacing HTTP Requests-en.srt
13 kB
08 Writing a File Interceptor/073 Intercepting Replacing Downloads on The Network-en.srt
11 kB
08 Writing a File Interceptor/Lesson 68. Introduction & Teaser.mp4
73 MB
08 Writing a File Interceptor/Lesson 69. Filtering Traffic Based on the Port Used.mp4
93 MB
08 Writing a File Interceptor/Lesson 70. Analysing HTTP Requests.mp4
56 MB
08 Writing a File Interceptor/Lesson 71. Modifying HTTP Requests on the Fly.mp4
104 MB
08 Writing a File Interceptor/Lesson 72. Replacing HTTP Requests.mp4
103 MB
08 Writing a File Interceptor/Lesson 73. Intercepting & Replacing Downloads on The Network.mp4
100 MB
09 Writing a Code Injector/074 Introduction Teaser-en.srt
1.6 kB
09 Writing a Code Injector/075 Analysing HTTP Responses-en.srt
8.2 kB
09 Writing a Code Injector/076 Replacing a Substring Using Regex-en.srt
8.2 kB
09 Writing a Code Injector/077 Decoding HTTP Responses-en.srt
12 kB
09 Writing a Code Injector/078 Modifying HTTP Responses Injecting Javascript Code in HTML Pages-en.srt
10 kB
09 Writing a Code Injector/079 Refactoring Housekeeping-en.srt
11 kB
09 Writing a Code Injector/080 Debugging Issues-en.srt
7.6 kB
09 Writing a Code Injector/081 Using Groups None-capturing Regex-en.srt
11 kB
09 Writing a Code Injector/082 Recalculating Content Length-en.srt
13 kB
09 Writing a Code Injector/083 BeEF Overview Basic Hook Method-en.srt
8.1 kB
09 Writing a Code Injector/084 Hooking Computers Using code_injector-en.srt
7.0 kB
09 Writing a Code Injector/085 Basic BeEF Commands-en.srt
6.0 kB
09 Writing a Code Injector/086 Delivering Malware Using BeEF-en.srt
7.5 kB
09 Writing a Code Injector/Lesson 74. Introduction & Teaser.mp4
30 MB
09 Writing a Code Injector/Lesson 75. Analysing HTTP Responses.mp4
78 MB
09 Writing a Code Injector/Lesson 76. Replacing a Substring Using Regex.mp4
65 MB
09 Writing a Code Injector/Lesson 77. Decoding HTTP Responses.mp4
104 MB
09 Writing a Code Injector/Lesson 78. Modifying HTTP Responses & Injecting Javascript Code in HTML Pages.mp4
113 MB
09 Writing a Code Injector/Lesson 79. Refactoring & Housekeeping.mp4
79 MB
09 Writing a Code Injector/Lesson 80. Debugging Issues.mp4
75 MB
09 Writing a Code Injector/Lesson 81. Using Groups & None-capturing Regex.mp4
93 MB
09 Writing a Code Injector/Lesson 82. Recalculating Content Length.mp4
124 MB
09 Writing a Code Injector/Lesson 83. BeEF Overview & Basic Hook Method.mp4
107 MB
09 Writing a Code Injector/Lesson 84. Hooking Computers Using code_injector.mp4
48 MB
09 Writing a Code Injector/Lesson 85. Basic BeEF Commands.mp4
53 MB
09 Writing a Code Injector/Lesson 86. Delivering Malware Using BeEF.mp4
70 MB
10 Bypassing HTTPS/087 How to Bypass HTTPS-en.srt
13 kB
10 Bypassing HTTPS/087 Moxie-explaining-how-SSLstrip-works.txt
104 B
10 Bypassing HTTPS/088 Bypassing HTTPS Sniffing Login Credentials-en.srt
9.7 kB
10 Bypassing HTTPS/089 Replacing Downloads on HTTPS Pages-en.srt
13 kB
10 Bypassing HTTPS/090 Injecting Code in HTTPS Pages-en.srt
9.8 kB
10 Bypassing HTTPS/Lesson 87. How to Bypass HTTPS.mp4
164 MB
10 Bypassing HTTPS/Lesson 88. Bypassing HTTPS & Sniffing Login Credentials.mp4
68 MB
10 Bypassing HTTPS/Lesson 89. Replacing Downloads on HTTPS Pages.mp4
116 MB
10 Bypassing HTTPS/Lesson 90. Injecting Code in HTTPS Pages.mp4
100 MB
11 Writing an ARP Spoof Detector/091 Running Python Programs on Windows-en.srt
12 kB
11 Writing an ARP Spoof Detector/092 Capturing Analysing ARP Responses-en.srt
8.0 kB
11 Writing an ARP Spoof Detector/093 Detecting ARP Spoofing Attacks-en.srt
9.0 kB
11 Writing an ARP Spoof Detector/Lesson 91. Running Python Programs on Windows.mp4
107 MB
11 Writing an ARP Spoof Detector/Lesson 92. Capturing & Analysing ARP Responses.mp4
56 MB
11 Writing an ARP Spoof Detector/Lesson 93. Detecting ARP Spoofing Attacks.mp4
68 MB
12 Writing Malware/094 Evil-Files.pdf
1.3 MB
12 Writing Malware/094 Introduction Teaser-en.srt
2.3 kB
12 Writing Malware/095 Execute System Command Payload-en.srt
12 kB
12 Writing Malware/096 Sending Reports By Email-en.srt
14 kB
12 Writing Malware/097 Filtering Command Output Using Regex-en.srt
13 kB
12 Writing Malware/098 Stealing WiFi Passwords Saved on a Computer-en.srt
12 kB
12 Writing Malware/099 Downloading Files From Program-en.srt
10 kB
12 Writing Malware/100 File-Modes-In-Python.txt
116 B
12 Writing Malware/100 Writing Files on Disk-en.srt
14 kB
12 Writing Malware/101 LaZagne-Git-Repo.txt
96 B
12 Writing Malware/101 Password Recovery Basics-en.srt
11 kB
12 Writing Malware/102 Using all the Above to Steal Saved Passwords Remotely-en.srt
10 kB
12 Writing Malware/103 Interacting With The File System-en.srt
12 kB
12 Writing Malware/103 OS-Library-Documentation.txt
84 B
12 Writing Malware/Lesson 100. Writing Files on Disk.mp4
69 MB
12 Writing Malware/Lesson 101. Password Recovery Basics.mp4
94 MB
12 Writing Malware/Lesson 102. Using all the Above to Steal Saved Passwords Remotely.mp4
63 MB
12 Writing Malware/Lesson 103. Interacting With The File System.mp4
77 MB
12 Writing Malware/Lesson 94. Introduction & Teaser.mp4
44 MB
12 Writing Malware/Lesson 95. Execute System Command Payload.mp4
91 MB
12 Writing Malware/Lesson 96. Sending Reports By Email.mp4
90 MB
12 Writing Malware/Lesson 97. Filtering Command Output Using Regex.mp4
91 MB
12 Writing Malware/Lesson 98. Stealing WiFi Passwords Saved on a Computer.mp4
118 MB
12 Writing Malware/Lesson 99. Downloading Files From Program.mp4
90 MB
13 Writing Malware - Keylogger/104 Introduction Teaser-en.srt
4.6 kB
13 Writing Malware - Keylogger/105 Pynput-Documentation.txt
66 B
13 Writing Malware - Keylogger/105 Writing a Basic Local Keylogger-en.srt
13 kB
13 Writing Malware - Keylogger/106 Global Variables-en.srt
10 kB
13 Writing Malware - Keylogger/107 Logging Special Keys-en.srt
8.2 kB
13 Writing Malware - Keylogger/108 Threading Recursion-en.srt
14 kB
13 Writing Malware - Keylogger/109 OOP - Object Oriented Programming Basics-en.srt
19 kB
13 Writing Malware - Keylogger/110 Constructor Methods Instance Variables-en.srt
9.4 kB
13 Writing Malware - Keylogger/111 Logging Key-strikes and Reporting Them By Email-en.srt
15 kB
13 Writing Malware - Keylogger/Lesson 104. Introduction & Teaser.mp4
63 MB
13 Writing Malware - Keylogger/Lesson 105. Writing a Basic Local Keylogger.mp4
78 MB
13 Writing Malware - Keylogger/Lesson 106. Global Variables.mp4
55 MB
13 Writing Malware - Keylogger/Lesson 107. Logging Special Keys.mp4
55 MB
13 Writing Malware - Keylogger/Lesson 108. Threading & Recursion.mp4
84 MB
13 Writing Malware - Keylogger/Lesson 109. OOP - Object Oriented Programming Basics.mp4
116 MB
13 Writing Malware - Keylogger/Lesson 110. Constructor Methods & Instance Variables.mp4
66 MB
13 Writing Malware - Keylogger/Lesson 111. Logging Key-strikes and Reporting Them By Email.mp4
84 MB
14 Writing Malware - Backdoors/112 Introduction Teaser-en.srt
7.3 kB
14 Writing Malware - Backdoors/113 Client - Server Communication Connection Types-en.srt
9.9 kB
14 Writing Malware - Backdoors/114 Connecting Two Remote Computers Using Sockets-en.srt
13 kB
14 Writing Malware - Backdoors/114 Sockets-Official-Documentation.txt
92 B
14 Writing Malware - Backdoors/114 Tutorials-Point-Socket-Documentation.txt
120 B
14 Writing Malware - Backdoors/115 Sending Receiving Data Over TCP-en.srt
6.4 kB
14 Writing Malware - Backdoors/116 Executing System Commands Remotely-en.srt
12 kB
14 Writing Malware - Backdoors/117 Implementing a Server-en.srt
10 kB
14 Writing Malware - Backdoors/118 Implementing Skeleton For Server - Client Communication-en.srt
8.6 kB
14 Writing Malware - Backdoors/119 Refactoring - Creating a Listener Class-en.srt
9.5 kB
14 Writing Malware - Backdoors/120 Refactoring - Creating a Backdoor Class-en.srt
6.8 kB
14 Writing Malware - Backdoors/121 Serialisation - Theory-en.srt
14 kB
14 Writing Malware - Backdoors/122 Serialisation - Implementing Reliable Methods to Send Receive Data Over TCP-en.srt
9.4 kB
14 Writing Malware - Backdoors/123 Serialisation - Reliably Sending Receiving Data-en.srt
7.2 kB
14 Writing Malware - Backdoors/124 Sending Commands as List Implementing Exit Command-en.srt
10 kB
14 Writing Malware - Backdoors/125 Interacting With the File System - Implementing cd Command-en.srt
11 kB
14 Writing Malware - Backdoors/126 Reading Files-en.srt
8.9 kB
14 Writing Malware - Backdoors/127 Writing Files-en.srt
8.1 kB
14 Writing Malware - Backdoors/128 Downloading Files From Hacked Computer-en.srt
8.3 kB
14 Writing Malware - Backdoors/129 Implementing Upload Functionality in Listener-en.srt
8.9 kB
14 Writing Malware - Backdoors/130 Implementing Upload Functionality in Backdoor-en.srt
7.1 kB
14 Writing Malware - Backdoors/131 Handling Unknown Exceptions-en.srt
12 kB
14 Writing Malware - Backdoors/132 Using the Backdoor to Hack Windows Linux OS X-en.srt
15 kB
14 Writing Malware - Backdoors/Lesson 112. Introduction & Teaser.mp4
77 MB
14 Writing Malware - Backdoors/Lesson 113. Client - Server Communication & Connection Types.mp4
120 MB
14 Writing Malware - Backdoors/Lesson 114. Connecting Two Remote Computers Using Sockets.mp4
67 MB
14 Writing Malware - Backdoors/Lesson 115. Sending & Receiving Data Over TCP.mp4
32 MB
14 Writing Malware - Backdoors/Lesson 116. Executing System Commands Remotely.mp4
73 MB
14 Writing Malware - Backdoors/Lesson 117. Implementing a Server.mp4
52 MB
14 Writing Malware - Backdoors/Lesson 118. Implementing Skeleton For Server - Client Communication.mp4
55 MB
14 Writing Malware - Backdoors/Lesson 119. Refactoring - Creating a Listener Class.mp4
72 MB
14 Writing Malware - Backdoors/Lesson 120. Refactoring - Creating a Backdoor Class.mp4
43 MB
14 Writing Malware - Backdoors/Lesson 121. Serialisation - Theory.mp4
164 MB
14 Writing Malware - Backdoors/Lesson 122. Serialisation - Implementing Reliable Methods to Send & Receive Data Over TCP.mp4
82 MB
14 Writing Malware - Backdoors/Lesson 123. Serialisation - Reliably Sending & Receiving Data.mp4
59 MB
14 Writing Malware - Backdoors/Lesson 124. Sending Commands as List & Implementing Exit Command.mp4
73 MB
14 Writing Malware - Backdoors/Lesson 125. Interacting With the File System - Implementing cd Command.mp4
78 MB
14 Writing Malware - Backdoors/Lesson 126. Reading Files.mp4
74 MB
14 Writing Malware - Backdoors/Lesson 127. Writing Files.mp4
57 MB
14 Writing Malware - Backdoors/Lesson 128. Downloading Files From Hacked Computer.mp4
77 MB
14 Writing Malware - Backdoors/Lesson 129. Implementing Upload Functionality in Listener.mp4
98 MB
14 Writing Malware - Backdoors/Lesson 130. Implementing Upload Functionality in Backdoor.mp4
62 MB
14 Writing Malware - Backdoors/Lesson 131. Handling Unknown Exceptions.mp4
98 MB
14 Writing Malware - Backdoors/Lesson 132. Using the Backdoor to Hack Windows, Linux & OS X.mp4
127 MB
15 Writing Malware - Packaging/133 Introduction Teaser-en.srt
4.1 kB
15 Writing Malware - Packaging/134 Converting Python Programs To Windows Binary Executables-en.srt
8.2 kB
15 Writing Malware - Packaging/135 Running Executables Silentely-en.srt
8.3 kB
15 Writing Malware - Packaging/136 Installing Windows Pyinstaller on Linux-en.srt
9.1 kB
15 Writing Malware - Packaging/137 Packaging Programs For Windows From Linux-en.srt
10 kB
15 Writing Malware - Packaging/138 Persistence Idea-en.srt
9.8 kB
15 Writing Malware - Packaging/139 Python-OS-Library-Documentation.txt
84 B
15 Writing Malware - Packaging/139 Python-Shutil-Library-Documentation.txt
92 B
15 Writing Malware - Packaging/139 Running Programs on Startup-en.srt
17 kB
15 Writing Malware - Packaging/140 Creating a Basic Trojan Using Download Execute Payload-en.srt
13 kB
15 Writing Malware - Packaging/141 Creating a Trojan By Embedding Files In Program Code-en.srt
10 kB
15 Writing Malware - Packaging/141 Pyinstaller-Documentation.txt
120 B
15 Writing Malware - Packaging/142 Bypassing Anti-Virus Programs - Theory-en.srt
6.6 kB
15 Writing Malware - Packaging/143 Bypassing Anti-Virus Programs - Practical-en.srt
10 kB
15 Writing Malware - Packaging/144 Adding an Icons to Generated Executables-en.srt
6.0 kB
15 Writing Malware - Packaging/144 Easyicon-a-website-to-convert-images-to-icons.txt
90 B
15 Writing Malware - Packaging/144 Iconfinder-a-website-to-download-icons.txt
56 B
15 Writing Malware - Packaging/145 Spoofing File Extension-en.srt
11 kB
15 Writing Malware - Packaging/146 Converting Python Programs To OS X Executables-en.srt
11 kB
15 Writing Malware - Packaging/147 Converting Python Programs to Linux Executables-en.srt
9.7 kB
15 Writing Malware - Packaging/Lesson 133. Introduction & Teaser.mp4
68 MB
15 Writing Malware - Packaging/Lesson 134. Converting Python Programs To Windows Binary Executables.mp4
82 MB
15 Writing Malware - Packaging/Lesson 135. Running Executables Silentely.mp4
66 MB
15 Writing Malware - Packaging/Lesson 136. Installing Windows Pyinstaller on Linux.mp4
67 MB
15 Writing Malware - Packaging/Lesson 137. Packaging Programs For Windows From Linux.mp4
58 MB
15 Writing Malware - Packaging/Lesson 138. Persistence Idea.mp4
104 MB
15 Writing Malware - Packaging/Lesson 139. Running Programs on Startup.mp4
119 MB
15 Writing Malware - Packaging/Lesson 140. Creating a Basic Trojan Using Download & Execute Payload.mp4
94 MB
15 Writing Malware - Packaging/Lesson 141. Creating a Trojan By Embedding Files In Program Code.mp4
62 MB
15 Writing Malware - Packaging/Lesson 142. Bypassing Anti-Virus Programs - Theory.mp4
81 MB
15 Writing Malware - Packaging/Lesson 143. Bypassing Anti-Virus Programs - Practical.mp4
81 MB
15 Writing Malware - Packaging/Lesson 144. Adding an Icons to Generated Executables.mp4
44 MB
15 Writing Malware - Packaging/Lesson 145. Spoofing File Extension.mp4
146 MB
15 Writing Malware - Packaging/Lesson 146. Converting Python Programs To OS X Executables.mp4
104 MB
15 Writing Malware - Packaging/Lesson 147. Converting Python Programs to Linux Executables.mp4
62 MB
16 Website Web Application Hacking/148 Introduction Teaser-en.srt
9.0 kB
16 Website Web Application Hacking/148 Website-Hacking.pdf
346 kB
16 Website Web Application Hacking/149 What is a Website-en.srt
5.4 kB
16 Website Web Application Hacking/150 How to Hack a Website-en.srt
7.9 kB
16 Website Web Application Hacking/151 Sending GET Requests To Web Servers-en.srt
12 kB
16 Website Web Application Hacking/Lesson 148. Introduction & Teaser.mp4
136 MB
16 Website Web Application Hacking/Lesson 149. What is a Website.mp4
86 MB
16 Website Web Application Hacking/Lesson 150. How to Hack a Website.mp4
103 MB
17 Website Hacking - Writing a Crawler/152 Discovering Subdomains-en.srt
13 kB
17 Website Hacking - Writing a Crawler/153 Discovering Hidden Paths in Websites-en.srt
13 kB
17 Website Hacking - Writing a Crawler/154 Reading Response Content-en.srt
7.6 kB
17 Website Hacking - Writing a Crawler/155 Extracting Useful Data From Response-en.srt
8.3 kB
17 Website Hacking - Writing a Crawler/156 Filtering Rsults-en.srt
8.5 kB
17 Website Hacking - Writing a Crawler/157 Extracting Unique Links Storing Them In a List-en.srt
7.7 kB
17 Website Hacking - Writing a Crawler/158 Recursively Discovering All Paths On a Target Website-en.srt
12 kB
17 Website Hacking - Writing a Crawler/Lesson 151. Sending GET Requests To Web Servers.mp4
94 MB
17 Website Hacking - Writing a Crawler/Lesson 152. Discovering Subdomains.mp4
101 MB
17 Website Hacking - Writing a Crawler/Lesson 153. Discovering Hidden Paths in Websites.mp4
137 MB
17 Website Hacking - Writing a Crawler/Lesson 154. Reading Response Content.mp4
91 MB
17 Website Hacking - Writing a Crawler/Lesson 155. Extracting Useful Data From Response.mp4
113 MB
17 Website Hacking - Writing a Crawler/Lesson 156. Filtering Rsults.mp4
112 MB
17 Website Hacking - Writing a Crawler/Lesson 157. Extracting Unique Links & Storing Them In a List.mp4
96 MB
17 Website Hacking - Writing a Crawler/Lesson 158. Recursively Discovering All Paths On a Target Website.mp4
106 MB
18 Writing a Program To Guess Login Information/159 Sending Post Requests to Websites-en.srt
14 kB
18 Writing a Program To Guess Login Information/160 Guessing Login Information on Login Pages-en.srt
11 kB
18 Writing a Program To Guess Login Information/Lesson 159. Sending Post Requests to Websites.mp4
106 MB
18 Writing a Program To Guess Login Information/Lesson 160. Guessing Login Information on Login Pages.mp4
92 MB
19 Writing a Vulnerability Scanner/161 Introduction Teaser-en.srt
3.3 kB
19 Writing a Vulnerability Scanner/162 HTTP Requests - POST VS GET-en.srt
8.0 kB
19 Writing a Vulnerability Scanner/163 Parsing HTML Code-en.srt
8.8 kB
19 Writing a Vulnerability Scanner/164 Extracting HTML Attributes-en.srt
12 kB
19 Writing a Vulnerability Scanner/165 Posting Forms-en.srt
11 kB
19 Writing a Vulnerability Scanner/166 Building Basic Structure For Vulnerability Scanner-en.srt
14 kB
19 Writing a Vulnerability Scanner/167 Using Default Parameters-en.srt
6.0 kB
19 Writing a Vulnerability Scanner/168 Sending Requests in a Session-en.srt
10 kB
19 Writing a Vulnerability Scanner/169 Extracting Submitting Forms Automatically-en.srt
11 kB
19 Writing a Vulnerability Scanner/170 Implementing a Method To Run The Scanner-en.srt
7.0 kB
19 Writing a Vulnerability Scanner/171 Discovering XSS Vulnerabilities-en.srt
12 kB
19 Writing a Vulnerability Scanner/172 Exploiting XSS Vulnerabilities-en.srt
6.1 kB
19 Writing a Vulnerability Scanner/173 Implementing Code To Discover XSS in Forms-en.srt
8.6 kB
19 Writing a Vulnerability Scanner/174 Implementing Code To Discover XSS in Parameters-en.srt
8.4 kB
19 Writing a Vulnerability Scanner/175 Automatically Discovering Vulnerabilities Using the Vulnerability Scanner-en.srt
10 kB
19 Writing a Vulnerability Scanner/Lesson 161. Introduction & Teaser.mp4
44 MB
19 Writing a Vulnerability Scanner/Lesson 162. HTTP Requests - POST VS GET.mp4
89 MB
19 Writing a Vulnerability Scanner/Lesson 163. Parsing HTML Code.mp4
95 MB
19 Writing a Vulnerability Scanner/Lesson 164. Extracting HTML Attributes.mp4
138 MB
19 Writing a Vulnerability Scanner/Lesson 165. Posting Forms.mp4
136 MB
19 Writing a Vulnerability Scanner/Lesson 166. Building Basic Structure For Vulnerability Scanner.mp4
119 MB
19 Writing a Vulnerability Scanner/Lesson 167. Using Default Parameters.mp4
41 MB
19 Writing a Vulnerability Scanner/Lesson 168. Sending Requests in a Session.mp4
83 MB
19 Writing a Vulnerability Scanner/Lesson 169. Extracting & Submitting Forms Automatically.mp4
125 MB
19 Writing a Vulnerability Scanner/Lesson 170. Implementing a Method To Run The Scanner.mp4
59 MB
19 Writing a Vulnerability Scanner/Lesson 171. Discovering XSS Vulnerabilities.mp4
148 MB
19 Writing a Vulnerability Scanner/Lesson 172. Exploiting XSS Vulnerabilities.mp4
96 MB
19 Writing a Vulnerability Scanner/Lesson 173. Implementing Code To Discover XSS in Forms.mp4
95 MB
19 Writing a Vulnerability Scanner/Lesson 174. Implementing Code To Discover XSS in Parameters.mp4
72 MB
19 Writing a Vulnerability Scanner/Lesson 175. Automatically Discovering Vulnerabilities Using the Vulnerability Scanner.mp4
90 MB