种子简介
种子名称:
[FreeCourseSite.com] Udemy - Complete Ethical Hacking Bootcamp 2021 - Zero to Mastery
文件类型:
视频
文件数目:
205个文件
文件大小:
11.86 GB
收录时间:
2021-4-6 00:10
已经下载:
3次
资源热度:
162
最近下载:
2024-11-20 03:41
下载BT种子文件
下载Torrent文件(.torrent)
立即下载
磁力链接下载
magnet:?xt=urn:btih:a52f935429168362166fe20efdf754637c1557ce&dn=[FreeCourseSite.com] Udemy - Complete Ethical Hacking Bootcamp 2021 - Zero to Mastery
复制链接到迅雷、QQ旋风进行下载,或者使用百度云离线下载。
喜欢这个种子的人也喜欢
种子包含的文件
[FreeCourseSite.com] Udemy - Complete Ethical Hacking Bootcamp 2021 - Zero to Mastery.torrent
1. Introduction/1. Course Outline.mp495.93MB
1. Introduction/4. What Is Ethical Hacking .mp486.96MB
10. Gaining Access (Viruses, Trojans, Payloads ...)/1. Generating Basic Payload With Msfvenom.mp495.55MB
10. Gaining Access (Viruses, Trojans, Payloads ...)/2. Advance Msfvenom Usage Part 1.mp488.87MB
10. Gaining Access (Viruses, Trojans, Payloads ...)/3. Advance Msfvenom Usage Part 2.mp480.27MB
10. Gaining Access (Viruses, Trojans, Payloads ...)/4. Generating Powershell Payload Using Veil.mp4146.89MB
10. Gaining Access (Viruses, Trojans, Payloads ...)/5. TheFatRat Payload Creation.mp478.73MB
10. Gaining Access (Viruses, Trojans, Payloads ...)/7. Hexeditor & Antiviruses.mp448.36MB
10. Gaining Access (Viruses, Trojans, Payloads ...)/8. Making Our Payload Open An Image.mp477.68MB
11. Post Exploitation - Elevating Privileges, Extracting Data, Running Keyloggers/1. Post Exploitation Theory.mp453.16MB
11. Post Exploitation - Elevating Privileges, Extracting Data, Running Keyloggers/2. Meterpreter Basic Commands Part 1.mp4125.66MB
11. Post Exploitation - Elevating Privileges, Extracting Data, Running Keyloggers/3. Meterpreter Basic Commands Part 2.mp4107.82MB
11. Post Exploitation - Elevating Privileges, Extracting Data, Running Keyloggers/4. Elevating Privileges With Different Modules.mp4102.44MB
11. Post Exploitation - Elevating Privileges, Extracting Data, Running Keyloggers/5. Creating Persistence On The Target System.mp475.43MB
11. Post Exploitation - Elevating Privileges, Extracting Data, Running Keyloggers/6. Post Exploitation Modules.mp483.99MB
11. Post Exploitation - Elevating Privileges, Extracting Data, Running Keyloggers/7. Exploitation Recap.mp448.99MB
12. Python Coding Project #2 - Backdoor/1. What Are We Creating .mp433.59MB
12. Python Coding Project #2 - Backdoor/2. Connecting Server And Backdoor.mp459.32MB
12. Python Coding Project #2 - Backdoor/3. Processing Instructional Commands.mp443.2MB
12. Python Coding Project #2 - Backdoor/4. Sending and Receiving Data.mp440.53MB
12. Python Coding Project #2 - Backdoor/5. Executing Commands And Compiling The Program.mp4114.87MB
12. Python Coding Project #2 - Backdoor/6. Changing Directory Inside Of Our Backdoor.mp443.32MB
12. Python Coding Project #2 - Backdoor/7. Uploading & Downloading Files.mp472.43MB
12. Python Coding Project #2 - Backdoor/8. Testing All The Commands.mp480.28MB
13. Website Application Penetration Testing/1. Website Penetration Testing Theory.mp4138.65MB
13. Website Application Penetration Testing/10. HTML Injection.mp457.06MB
13. Website Application Penetration Testing/11. SQL Injection.mp4163.91MB
13. Website Application Penetration Testing/12. CSRF Vulnerability.mp497.82MB
13. Website Application Penetration Testing/13. Hydra Bruteforce Attack Example 1.mp461.16MB
13. Website Application Penetration Testing/14. Hydra Bruteforce Attack Example 2.mp463.34MB
13. Website Application Penetration Testing/15. Burpsuite Intruder.mp451.33MB
13. Website Application Penetration Testing/2. HTTP Request & Response.mp441.33MB
13. Website Application Penetration Testing/3. Information Gathering & Dirb Tool.mp468.01MB
13. Website Application Penetration Testing/4. Burpsuite Configuration.mp472.02MB
13. Website Application Penetration Testing/5. ShellShock Exploitation.mp4122.67MB
13. Website Application Penetration Testing/6. Command Injection Exploitation.mp4114.41MB
13. Website Application Penetration Testing/7. Getting Meterpreter Shell With Command Execution.mp474.23MB
13. Website Application Penetration Testing/8. Reflected XSS & Cookie Stealing.mp4111.16MB
13. Website Application Penetration Testing/9. Stored XSS.mp463.77MB
14. Python Coding Project #3 - Login Bruteforce, Directory Discovery/1. Creating 2 Programs.mp421.56MB
14. Python Coding Project #3 - Login Bruteforce, Directory Discovery/2. Bruteforcer In Python.mp4210.93MB
14. Python Coding Project #3 - Login Bruteforce, Directory Discovery/3. Hidden Directory Discovery.mp486.93MB
15. Man In The Middle - MITM/1. Theory - Man In The Middle Attack.mp499.21MB
15. Man In The Middle - MITM/2. Bettercap ARP Spoofing.mp4127.53MB
15. Man In The Middle - MITM/3. Ettercap Password Sniffing.mp463.55MB
15. Man In The Middle - MITM/4. Manually Poisoning Targets ARP Cache With Scapy.mp485.93MB
16. Bonus - Wireless Access Point Cracking/1. Wireless Cracking Theory.mp469.93MB
16. Bonus - Wireless Access Point Cracking/2. Putting Wireless Card In Monitor Mode.mp449.2MB
16. Bonus - Wireless Access Point Cracking/3. Deauthenticating Devices & Grabbing Password.mp4131.72MB
16. Bonus - Wireless Access Point Cracking/4. Aircrack Password Cracking.mp459.98MB
16. Bonus - Wireless Access Point Cracking/5. Hashcat Password Cracking.mp4100.92MB
17. Where To Go From Here/3. What is Next.mp435.17MB
18. Learn Python Basics/1. What Is A Programming Language.mp476.44MB
18. Learn Python Basics/2. Python Interpreter.mp478.22MB
18. Learn Python Basics/3. How To Run Python Code.mp452.91MB
18. Learn Python Basics/4. Our First Python Program.mp441.99MB
18. Learn Python Basics/5. Latest Version Of Python.mp410.68MB
18. Learn Python Basics/6. Python 2 vs Python 3.mp469.56MB
18. Learn Python Basics/7. Exercise How Does Python Work.mp423MB
19. Learn Python Intermediate/1. Learning Python.mp429.48MB
19. Learn Python Intermediate/10. Variables.mp479.11MB
19. Learn Python Intermediate/11. Expressions vs Statements.mp49.43MB
19. Learn Python Intermediate/12. Augmented Assignment Operator.mp413.37MB
19. Learn Python Intermediate/13. Strings.mp426.98MB
19. Learn Python Intermediate/14. String Concatenation.mp46.53MB
19. Learn Python Intermediate/15. Type Conversion.mp417.21MB
19. Learn Python Intermediate/16. Escape Sequences.mp419.92MB
19. Learn Python Intermediate/17. Formatted Strings.mp442.5MB
19. Learn Python Intermediate/18. String Indexes.mp442.5MB
19. Learn Python Intermediate/19. Immutability.mp417.9MB
19. Learn Python Intermediate/2. Python Data Types.mp425.18MB
19. Learn Python Intermediate/20. Built-In Functions + Methods.mp462.4MB
19. Learn Python Intermediate/21. Booleans.mp414.44MB
19. Learn Python Intermediate/22. Exercise Type Conversion.mp444.01MB
19. Learn Python Intermediate/23. DEVELOPER FUNDAMENTALS II.mp426.25MB
19. Learn Python Intermediate/24. Exercise Password Checker.mp445.19MB
19. Learn Python Intermediate/25. Lists.mp418.88MB
19. Learn Python Intermediate/26. List Slicing.mp442.91MB
19. Learn Python Intermediate/27. Matrix.mp417.06MB
19. Learn Python Intermediate/28. List Methods.mp454.13MB
19. Learn Python Intermediate/29. List Methods 2.mp424.67MB
19. Learn Python Intermediate/30. List Methods 3.mp424.49MB
19. Learn Python Intermediate/31. Common List Patterns.mp436.41MB
19. Learn Python Intermediate/32. List Unpacking.mp412.28MB
19. Learn Python Intermediate/33. None.mp47.12MB
19. Learn Python Intermediate/34. Dictionaries.mp428.65MB
19. Learn Python Intermediate/35. DEVELOPER FUNDAMENTALS III.mp421.5MB
19. Learn Python Intermediate/36. Dictionary Keys.mp417.51MB
19. Learn Python Intermediate/37. Dictionary Methods.mp423.62MB
19. Learn Python Intermediate/38. Dictionary Methods 2.mp437.4MB
19. Learn Python Intermediate/39. Tuples.mp422.05MB
19. Learn Python Intermediate/4. Numbers.mp463.79MB
19. Learn Python Intermediate/40. Tuples 2.mp415.2MB
19. Learn Python Intermediate/41. Sets.mp432.7MB
19. Learn Python Intermediate/42. Sets 2.mp455.99MB
19. Learn Python Intermediate/43. Breaking The Flow.mp420.34MB
19. Learn Python Intermediate/44. Conditional Logic.mp474.57MB
19. Learn Python Intermediate/45. Indentation In Python.mp428.01MB
19. Learn Python Intermediate/46. Truthy vs Falsey.mp442.75MB
19. Learn Python Intermediate/47. Ternary Operator.mp419.7MB
19. Learn Python Intermediate/48. Short Circuiting.mp419.39MB
19. Learn Python Intermediate/49. Logical Operators.mp428.32MB
19. Learn Python Intermediate/5. Math Functions.mp436.45MB
19. Learn Python Intermediate/50. Exercise Logical Operators.mp447.4MB
19. Learn Python Intermediate/51. is vs ==.mp433.57MB
19. Learn Python Intermediate/52. For Loops.mp434.33MB
19. Learn Python Intermediate/53. Iterables.mp443.21MB
19. Learn Python Intermediate/54. Exercise Tricky Counter.mp416.39MB
19. Learn Python Intermediate/55. range().mp428.35MB
19. Learn Python Intermediate/56. enumerate().mp424.81MB
19. Learn Python Intermediate/57. While Loops.mp428.32MB
19. Learn Python Intermediate/58. While Loops 2.mp425.93MB
19. Learn Python Intermediate/59. break, continue, pass.mp422.21MB
19. Learn Python Intermediate/6. DEVELOPER FUNDAMENTALS I.mp449.01MB
19. Learn Python Intermediate/60. Our First GUI.mp449.64MB
19. Learn Python Intermediate/61. DEVELOPER FUNDAMENTALS IV.mp450.23MB
19. Learn Python Intermediate/62. Exercise Find Duplicates.mp420.26MB
19. Learn Python Intermediate/63. Functions.mp448.64MB
19. Learn Python Intermediate/64. Parameters and Arguments.mp423.15MB
19. Learn Python Intermediate/65. Default Parameters and Keyword Arguments.mp438.15MB
19. Learn Python Intermediate/66. return.mp463.04MB
19. Learn Python Intermediate/67. Methods vs Functions.mp430.71MB
19. Learn Python Intermediate/68. Docstrings.mp417.33MB
19. Learn Python Intermediate/69. Clean Code.mp419.65MB
19. Learn Python Intermediate/7. Operator Precedence.mp412.43MB
19. Learn Python Intermediate/70. args and kwargs.mp443.03MB
19. Learn Python Intermediate/71. Exercise Functions.mp421.86MB
19. Learn Python Intermediate/72. Scope.mp420.12MB
19. Learn Python Intermediate/73. Scope Rules.mp437.69MB
19. Learn Python Intermediate/74. global Keyword.mp436.49MB
19. Learn Python Intermediate/75. nonlocal Keyword.mp418.26MB
19. Learn Python Intermediate/76. Why Do We Need Scope.mp419.19MB
19. Learn Python Intermediate/77. Modules in Python.mp494.27MB
19. Learn Python Intermediate/79. Optional PyCharm.mp453.06MB
19. Learn Python Intermediate/80. Packages in Python.mp472.36MB
19. Learn Python Intermediate/81. Different Ways To Import.mp447.94MB
19. Learn Python Intermediate/9. Optional bin() and complex.mp419.65MB
2. Setting Up Our Hacking Lab/1. What is A Virtual Machine .mp479.81MB
2. Setting Up Our Hacking Lab/10. 5 Stages Of A Penetration Test.mp490.3MB
2. Setting Up Our Hacking Lab/2. Why Linux .mp441.02MB
2. Setting Up Our Hacking Lab/3. Downloading Virtual Box & Kali Linux.mp443.54MB
2. Setting Up Our Hacking Lab/5. Creating Our First Virtual Machine.mp458.36MB
2. Setting Up Our Hacking Lab/6. Installing Kali Linux Operating System.mp451.13MB
2. Setting Up Our Hacking Lab/7. Update 1 - New & Old Versions of Kali Linux.mp427.73MB
2. Setting Up Our Hacking Lab/8. Full Screen Mode & Network Settings.mp490.31MB
20. Learn Python 3 Error Handling/1. Errors in Python.mp437.38MB
20. Learn Python 3 Error Handling/2. Error Handling.mp451.5MB
20. Learn Python 3 Error Handling/3. Error Handling 2.mp435.62MB
20. Learn Python 3 Error Handling/4. Exercises Error Handling.mp437.21MB
20. Learn Python 3 Error Handling/5. Error Handling 3.mp422.77MB
21. Learn Python 4 File IO/1. Working With Files In Python.mp447.18MB
21. Learn Python 4 File IO/2. Read, Write, Append.mp455.65MB
21. Learn Python 4 File IO/3. File Paths.mp452.13MB
21. Learn Python 4 File IO/4. File IO Errors.mp415.3MB
21. Learn Python 4 File IO/5. Exercise Translator.mp483.6MB
3. Linux Operating System/1. Navigating Through Linux System.mp473.11MB
3. Linux Operating System/2. Creating Files & Managing Directories.mp488.19MB
3. Linux Operating System/3. Network Commands & Sudo Privileges In Kali.mp482.33MB
4. Reconnaissance & Information Gathering/1. What is Information Gathering .mp456.35MB
4. Reconnaissance & Information Gathering/2. Obtaining IP Address, Physical Address Using Whois Tool.mp481.71MB
4. Reconnaissance & Information Gathering/3. Whatweb Stealthy Scan.mp495.77MB
4. Reconnaissance & Information Gathering/4. Aggressive Website Technology Discovering on IP Range.mp498.61MB
4. Reconnaissance & Information Gathering/6. Gathering Emails Using theHarvester & Hunter.io.mp467.67MB
4. Reconnaissance & Information Gathering/7. How To Download Tools Online.mp491.92MB
4. Reconnaissance & Information Gathering/8. Finding Usernames With Sherlock.mp476.27MB
4. Reconnaissance & Information Gathering/9. Bonus - Email Scraper Tool In Python 3.mp455.26MB
5. Scanning/1. Theory Behind Scanning.mp488.37MB
5. Scanning/10. What is a FirewallIDS .mp430.72MB
5. Scanning/11. Using Decoys and Packet Fragmentation.mp490.15MB
5. Scanning/12. Security Evasion Nmap Options.mp432.81MB
5. Scanning/2. TCP & UDP.mp450.68MB
5. Scanning/3. Installing Vulnerable Virtual Machine.mp447.31MB
5. Scanning/4. Netdiscover.mp444.59MB
5. Scanning/5. Performing First Nmap Scan.mp476.36MB
5. Scanning/6. Different Nmap Scan Types.mp492.83MB
5. Scanning/7. Discovering Target Operating System.mp455.63MB
5. Scanning/8. Detecting Version Of Service Running On An Open Port.mp443.08MB
5. Scanning/9. Filtering Port Range & Output Of Scan Results.mp4125.25MB
6. Python Coding Project #1 - Portscanner/3. Coding a Portscanner in Python 3.mp4160.79MB
7. Vulnerability Analysis/1. Finding First Vulnerability With Nmap Scripts.mp4160.37MB
7. Vulnerability Analysis/2. Manual Vulnerability Analysis & Searchsploit.mp482.44MB
7. Vulnerability Analysis/3. Nessus Installation.mp443.49MB
7. Vulnerability Analysis/4. Discovering Vulnerabilities With Nessus.mp474.84MB
7. Vulnerability Analysis/5. Scanning Windows 7 Machine With Nessus.mp427.9MB
7. Vulnerability Analysis/6. Lets cool down for a bit!.mp416.38MB
8. Exploitation & Gaining Access/1. What is Exploitation .mp489.34MB
8. Exploitation & Gaining Access/10. Attacking SSH - Bruteforce Attack.mp4113.3MB
8. Exploitation & Gaining Access/11. Exploitation Challenge - 5 Different Exploits.mp4172.56MB
8. Exploitation & Gaining Access/12. Explaining Windows 7 Setup.mp466.23MB
8. Exploitation & Gaining Access/13. Eternal Blue Attack - Windows 7 Exploitation.mp4128.23MB
8. Exploitation & Gaining Access/14. DoublePulsar Attack - Windows Exploit.mp4112.69MB
8. Exploitation & Gaining Access/15. BlueKeep Vulnerability - Windows Exploit.mp491.73MB
8. Exploitation & Gaining Access/17. Update 2 - Routersploit.mp464.57MB
8. Exploitation & Gaining Access/18. Update 3 - Router Default Credentials.mp456.9MB
8. Exploitation & Gaining Access/2. What is a Vulnerability .mp470.91MB
8. Exploitation & Gaining Access/3. Reverse Shells, Bind Shells ...mp433.65MB
8. Exploitation & Gaining Access/4. Metasploit Framework Structure.mp491.92MB
8. Exploitation & Gaining Access/5. Msfconsole Basic Commands.mp4156.22MB
8. Exploitation & Gaining Access/6. Our First Exploit - vsftp 2.3.4 Exploitation.mp469.54MB
8. Exploitation & Gaining Access/7. Misconfigurations Happen - Bindshell Exploitation.mp445.1MB
8. Exploitation & Gaining Access/8. Information Disclosure - Telnet Exploit.mp436.23MB
8. Exploitation & Gaining Access/9. Software Vulnerability - Samba Exploitation.mp494.68MB
9. SMBGhost CVE 2020-0796 - Windows 10 Manual Exploitation/2. Setting Up Vulnerable Windows 10.mp467.65MB
9. SMBGhost CVE 2020-0796 - Windows 10 Manual Exploitation/3. Crashing Windows 10 Machine Remotely.mp462.09MB
9. SMBGhost CVE 2020-0796 - Windows 10 Manual Exploitation/4. Exploiting Windows 10 Machine Remotely.mp4151.98MB