MuerBT磁力搜索 BT种子搜索利器 免费下载BT种子,超5000万条种子数据

The RedTeam Blueprint - A Unique Guide To Ethical Hacking

磁力链接/BT种子名称

The RedTeam Blueprint - A Unique Guide To Ethical Hacking

磁力链接/BT种子简介

种子哈希:88f50a1a2658e73aa65df95203b5628697985566
文件大小: 6.84G
已经下载:1238次
下载速度:极快
收录时间:2024-08-18
最近下载:2025-08-29

移花宫入口

移花宫.com邀月.com怜星.com花无缺.comyhgbt.icuyhgbt.top

磁力链接下载

magnet:?xt=urn:btih:88F50A1A2658E73AA65DF95203B5628697985566
推荐使用PIKPAK网盘下载资源,10TB超大空间,不限制资源,无限次数离线下载,视频在线观看

下载BT种子文件

磁力链接 迅雷下载 PIKPAK在线播放 世界之窗 91视频 含羞草 欲漫涩 逼哩逼哩 成人快手 51品茶 抖阴破解版 极乐禁地 91短视频 她趣 TikTok成人版 PornHub 听泉鉴鲍 草榴社区 哆哔涩漫 呦乐园 萝莉岛

最近搜索

siberian mouse mom fuck scarlit 糖心vlogup主 gtj-099 丫头呀 小川あさ美 street fuck 电影 autocad real-764 camwhores 呦 coser nana_taipei けっこう仮面 ipx-750 director tong tora.tora.tora delight directortong 原创 后妈 ure-124-c のムチムチ美脚 vivian lo stilista kerowin f1.the.movie.2025.2160p.amzn.web-dl.ddp5.1.atmos.h czechar 美痴女

文件列表

  • 19. Exploitation/11. SQL Injection _ SQLMap.mp4 140.1 MB
  • 25. Job Hunting/6. Analyzing the Job Post.mp4 127.8 MB
  • 18. Reconnaissance/8. Active Recon - Port Scanning.mp4 115.8 MB
  • 4. The Windows Operating System/2. Windows at a Glance.mp4 109.5 MB
  • 19. Exploitation/5. Metasploit - Exploits and Payloads.mp4 85.5 MB
  • 16. Assembly Course/5. Arithmetic.mp4 81.2 MB
  • 19. Exploitation/14. Local File Inclusion.mp4 77.3 MB
  • 20. Post Exploitation/9. File Permissions.mp4 74.1 MB
  • 23. Reporting/1. The Format.mp4 72.2 MB
  • 20. Post Exploitation/10. MySQL.mp4 72.2 MB
  • 19. Exploitation/6. Metasploit - The Meterpreter.mp4 71.1 MB
  • 18. Reconnaissance/13. Active Recon - Working with NC.mp4 70.9 MB
  • 20. Post Exploitation/1. Stabilizing Shells.mp4 69.5 MB
  • 20. Post Exploitation/28. Pivoting.mp4 67.7 MB
  • 4. The Windows Operating System/6. Windows Internals - Permissions.mp4 65.4 MB
  • 20. Post Exploitation/13. Unquoted Service Path.mp4 64.2 MB
  • 16. Assembly Course/2. Hello World.mp4 62.6 MB
  • 19. Exploitation/1. Finding Exploits.mp4 62.0 MB
  • 20. Post Exploitation/7. OS Version.mp4 61.9 MB
  • 20. Post Exploitation/27. SSH Tunneling.mp4 59.9 MB
  • 20. Post Exploitation/8. Common Configuration Issues.mp4 59.5 MB
  • 5. The Linux Operating System/6. Linux Command Line - Working with Data.mp4 59.2 MB
  • 25. Job Hunting/5. Searching for the Job.mp4 59.0 MB
  • 7. Active Directory/8. Setting up Group Policies.mp4 57.1 MB
  • 5. The Linux Operating System/12. Linux Processes.mp4 56.8 MB
  • 4. The Windows Operating System/8. Windows Internals - API Calls.mp4 55.7 MB
  • 25. Job Hunting/4. Personal Brand.mp4 53.9 MB
  • 4. The Windows Operating System/12. Windows Internals - PE Files _ DLLs.mp4 52.9 MB
  • 19. Exploitation/10. The OWASP Top 10.mp4 52.5 MB
  • 4. The Windows Operating System/1. Installing _ Using VirtualBox for Lab Virtualization.mp4 51.9 MB
  • 15. Python Course/14. Inheritance.mp4 50.9 MB
  • 19. Exploitation/12. XSS.mp4 50.8 MB
  • 20. Post Exploitation/5. Linux Persistence.mp4 50.3 MB
  • 18. Reconnaissance/3. Passive Recon - Google.mp4 50.1 MB
  • 25. Job Hunting/1. The Resume.mp4 50.0 MB
  • 20. Post Exploitation/4. Windows Persistence.mp4 49.8 MB
  • 25. Job Hunting/3. Certifications.mp4 49.7 MB
  • 20. Post Exploitation/17. Pulling Hashes.mp4 49.6 MB
  • 25. Job Hunting/9. Salary Requirements.mp4 49.3 MB
  • 20. Post Exploitation/12. Relative Path Sudo Binary.mp4 48.9 MB
  • 16. Assembly Course/8. Reading Files.mp4 48.1 MB
  • 20. Post Exploitation/15. LinuxPrivChecker.mp4 47.4 MB
  • 19. Exploitation/8. Metasploit - MSFVenom.mp4 47.2 MB
  • 20. Post Exploitation/11. Sudo.mp4 46.8 MB
  • 20. Post Exploitation/14. Service Misconfigurations.mp4 45.5 MB
  • 18. Reconnaissance/9. Active Recon - DNS.mp4 45.0 MB
  • 25. Job Hunting/8. The Future Company.mp4 44.9 MB
  • 18. Reconnaissance/12. Active Recon - Sparta.mp4 44.8 MB
  • 4. The Windows Operating System/4. Windows Logs.mp4 44.4 MB
  • 19. Exploitation/7. Metasploit - Adding an Exploit to Metasploit.mp4 44.3 MB
  • 4. The Windows Operating System/3. The Windows File System.mp4 43.7 MB
  • 4. The Windows Operating System/18. Windows Command Line - Managing Windows.mp4 43.1 MB
  • 4. The Windows Operating System/16. Windows Command Line - Working with Pipes.mp4 42.9 MB
  • 18. Reconnaissance/7. Passive Recon - Job Posting.mp4 42.9 MB
  • 22. Covering Your Tracks/3. Clearing Linux Logs.mp4 42.5 MB
  • 20. Post Exploitation/22. Network Traffic.mp4 41.8 MB
  • 20. Post Exploitation/2. Breaking Out Of The Jail Shell.mp4 41.5 MB
  • 13. Configuring PFSense Firewalls/2. The Firewall UI.mp4 41.4 MB
  • 7. Active Directory/4. The AD Tree.mp4 41.0 MB
  • 5. The Linux Operating System/4. Linux Command Line - Working with Files and Directories.mp4 40.7 MB
  • 16. Assembly Course/7. Logic Control.mp4 40.5 MB
  • 7. Active Directory/3. Install AD DS.mp4 40.0 MB
  • 18. Reconnaissance/6. Passive Recon - Netcraft.mp4 39.5 MB
  • 3. Penetration Testing Process/3. Metrics _ Why They Are Important.mp4 39.2 MB
  • 18. Reconnaissance/14. Active Recon - Banner Grabbing.mp4 39.0 MB
  • 7. Active Directory/7. Adding Machine to the Domain.mp4 38.3 MB
  • 3. Penetration Testing Process/10. Building _ Working with an Enterprise Budget.mp4 38.1 MB
  • 24. Attacking Active Directory (Realistic Scenario)/6. Getting Domain Admin.mp4 37.9 MB
  • 22. Covering Your Tracks/5. Clearing Command History.mp4 37.5 MB
  • 18. Reconnaissance/2. Installing Kali.mp4 37.3 MB
  • 20. Post Exploitation/23. ARP Poisoning.mp4 37.0 MB
  • 4. The Windows Operating System/15. Windows Command Line - Working with Files and Directories.mp4 36.3 MB
  • 15. Python Course/7. IfElse.mp4 35.8 MB
  • 13. Configuring PFSense Firewalls/1. Installing PFSense.mp4 35.2 MB
  • 5. The Linux Operating System/14. Working with Open Files.mp4 34.7 MB
  • 7. Active Directory/2. Basic Windows Server Configuration.mp4 34.2 MB
  • 18. Reconnaissance/5. Passive Recon - Whois.mp4 34.2 MB
  • 6. Operating System Internals/1. The Kernel.mp4 34.0 MB
  • 16. Assembly Course/4. Saving States.mp4 33.9 MB
  • 18. Reconnaissance/10. Active Recon - Nikto.mp4 33.7 MB
  • 4. The Windows Operating System/14. Windows Command Line - Navigation.mp4 33.7 MB
  • 4. The Windows Operating System/7. Windows Internals - Alternate Data Streams.mp4 33.6 MB
  • 18. Reconnaissance/16. Active Recon - Browsing.mp4 33.5 MB
  • 3. Penetration Testing Process/9. Routine Assessments Part 6 - Building an Assessment Plan.mp4 32.7 MB
  • 4. The Windows Operating System/5. Windows Internals - UAC.mp4 32.7 MB
  • 7. Active Directory/5. OU_s and their Permissions.mp4 32.4 MB
  • 6. Operating System Internals/4. The CPU Registers.mp4 32.3 MB
  • 19. Exploitation/15. Remote File Inclusion.mp4 31.9 MB
  • 19. Exploitation/4. Metasploit - What is Metasploit.mp4 31.7 MB
  • 5. The Linux Operating System/10. Linux Command Line - Hex.mp4 31.7 MB
  • 2. The 3 Teams/2. The Red Team.mp4 30.7 MB
  • 10. Networking/3. TCPIP.mp4 30.3 MB
  • 15. Python Course/18. Sockets.mp4 30.2 MB
  • 21. Password Cracking/3. Hashcat.mp4 29.8 MB
  • 15. Python Course/13. Classes.mp4 28.5 MB
  • 24. Attacking Active Directory (Realistic Scenario)/4. Finding New Access.mp4 28.1 MB
  • 10. Networking/9. DNS.mp4 28.0 MB
  • 5. The Linux Operating System/7. Linux Command Line - Working with File Permissions.mp4 27.9 MB
  • 4. The Windows Operating System/10. Windows Internals - Tokens.mp4 27.9 MB
  • 15. Python Course/10. Lists.mp4 27.7 MB
  • 22. Covering Your Tracks/4. Quick Talk on Logging.mp4 27.5 MB
  • 13. Configuring PFSense Firewalls/3. Configuring a DMZ.mp4 27.2 MB
  • 3. Penetration Testing Process/6. Routine Assessments Part 3 - Quarterly Assessments.mp4 27.0 MB
  • 20. Post Exploitation/26. Password Spraying.mp4 26.6 MB
  • 20. Post Exploitation/19. SSH Keys.mp4 26.5 MB
  • 19. Exploitation/17. Broken Authentication and Session Management.mp4 26.4 MB
  • 20. Post Exploitation/6. What is Privilege Escalation.mp4 25.9 MB
  • 13. Configuring PFSense Firewalls/4. Configuring a VPN.mp4 25.7 MB
  • 18. Reconnaissance/11. Active Recon - Dirb.mp4 25.4 MB
  • 15. Python Course/9. The Dictionary.mp4 25.1 MB
  • 16. Assembly Course/10. Op Code.mp4 24.8 MB
  • 11. VPNs/2. What is IPSEC.mp4 24.7 MB
  • 18. Reconnaissance/17. Active Recon - Manual vs Automated.mp4 23.9 MB
  • 16. Assembly Course/9. Writing Files.mp4 23.9 MB
  • 25. Job Hunting/7. Applying for the Job.mp4 23.9 MB
  • 5. The Linux Operating System/15. Symbolic Links.mp4 23.7 MB
  • 4. The Windows Operating System/13. Windows Command Line - Accessing the Command Line.mp4 23.7 MB
  • 18. Reconnaissance/4. Passive Recon - Shodan.mp4 23.6 MB
  • 24. Attacking Active Directory (Realistic Scenario)/5. Moving Up In The World!.mp4 22.8 MB
  • 2. The 3 Teams/4. The Purple Team.mp4 22.8 MB
  • 16. Assembly Course/3. Variables.mp4 22.7 MB
  • 5. The Linux Operating System/11. Linux Command Line - Network Connections Recap.mp4 22.5 MB
  • 21. Password Cracking/2. John The Ripper.mp4 22.4 MB
  • 8. Kerberos/4. The Ticket Granting Server.mp4 22.2 MB
  • 15. Python Course/17. Error Handling.mp4 21.6 MB
  • 6. Operating System Internals/10. Debuggers.mp4 21.5 MB
  • 20. Post Exploitation/18. Pass The Hash.mp4 21.5 MB
  • 5. The Linux Operating System/19. Linux Logs.mp4 21.3 MB
  • 7. Active Directory/6. Managing Users and Groups.mp4 21.3 MB
  • 4. The Windows Operating System/11. Windows Internals - Named Pipes.mp4 21.1 MB
  • 15. Python Course/8. Loops.mp4 21.1 MB
  • 17. Scope Identification/2. Stability Considerations.mp4 20.9 MB
  • 3. Penetration Testing Process/2. Penetration Testing Methodology.mp4 20.7 MB
  • 10. Networking/6. Routers _ Gateways.mp4 20.5 MB
  • 6. Operating System Internals/7. The Stack.mp4 20.5 MB
  • 7. Active Directory/1. What is Active Directory.mp4 20.3 MB
  • 5. The Linux Operating System/13. What are INodes.mp4 20.2 MB
  • 25. Job Hunting/10. The Interview Process - The Screening Call.mp4 20.0 MB
  • 10. Networking/8. ICMP.mp4 20.0 MB
  • 10. Networking/2. The OSI Model.mp4 19.9 MB
  • 10. Networking/1. What is Networking.mp4 19.7 MB
  • 13. Configuring PFSense Firewalls/5. Backup _ Logging.mp4 19.6 MB
  • 19. Exploitation/16. The Authenticated Unauthenticated Pages.mp4 19.6 MB
  • 11. VPNs/3. What is IKE.mp4 19.5 MB
  • 24. Attacking Active Directory (Realistic Scenario)/3. Post Exploitation.mp4 19.3 MB
  • 10. Networking/10. DHCP.mp4 19.2 MB
  • 4. The Windows Operating System/9. Windows Internals - The SID.mp4 19.1 MB
  • 2. The 3 Teams/3. The Blue Team.mp4 19.0 MB
  • 20. Post Exploitation/25. Account Directory Attacks.mp4 18.8 MB
  • 15. Python Course/19. Threading.mp4 18.8 MB
  • 24. Attacking Active Directory (Realistic Scenario)/2. Exploitation.mp4 18.6 MB
  • 6. Operating System Internals/2. One Ring to Rule Them All.mp4 18.6 MB
  • 3. Penetration Testing Process/8. Routine Assessments Part 5 - Constant Assessments.mp4 18.5 MB
  • 15. Python Course/4. Variables.mp4 18.3 MB
  • 15. Python Course/3. Hello World.mp4 18.3 MB
  • 22. Covering Your Tracks/2. Clearing Windows Logs.mp4 18.3 MB
  • 19. Exploitation/13. Insecure Direct Object Reference.mp4 18.2 MB
  • 15. Python Course/12. Modules.mp4 17.9 MB
  • 17. Scope Identification/1. Goal _ Scope Identification.mp4 17.9 MB
  • 5. The Linux Operating System/3. Linux Command Line - Navigation.mp4 17.9 MB
  • 4. The Windows Operating System/17. Windows Command Line - Standard IOE.mp4 17.4 MB
  • 10. Networking/11. ARP.mp4 17.4 MB
  • 21. Password Cracking/4. Rainbow Tables.mp4 17.4 MB
  • 5. The Linux Operating System/8. Linux Command Line - Man Pages.mp4 17.3 MB
  • 3. Penetration Testing Process/5. Routine Assessments Part 2 - Yearly Assessments.mp4 17.1 MB
  • 5. The Linux Operating System/5. Linux Command Line - Standard IOE Recap.mp4 17.0 MB
  • 5. The Linux Operating System/9. Linux Command Line - Base64.mp4 16.9 MB
  • 22. Covering Your Tracks/6. Persistent Backdoors.mp4 16.6 MB
  • 10. Networking/13. What is an IPS.mp4 16.6 MB
  • 16. Assembly Course/6. Loops.mp4 16.5 MB
  • 15. Python Course/16. Logging.mp4 15.9 MB
  • 14. Program Theory/2. What is a Linker.mp4 15.8 MB
  • 12. Firewalls/1. What is a Firewall.mp4 15.8 MB
  • 6. Operating System Internals/12. A Quick Word About AntiVirus.mp4 15.8 MB
  • 5. The Linux Operating System/2. The Linux File System.mp4 15.7 MB
  • 18. Reconnaissance/15. Active Recon - Vulnerability Scanners.mp4 15.7 MB
  • 25. Job Hunting/2. Professional Email.mp4 15.4 MB
  • 10. Networking/14. What is HA.mp4 15.3 MB
  • 15. Python Course/2. Installing Python.mp4 15.3 MB
  • 5. The Linux Operating System/17. Linux Pipes.mp4 15.2 MB
  • 23. Reporting/3. Business Risks on Findings.mp4 15.1 MB
  • 7. Active Directory/9. Cached Credentials.mp4 15.0 MB
  • 9. Data Manipulation/3. Asymmetric Encryption.mp4 14.9 MB
  • 5. The Linux Operating System/16. The ID_s.mp4 14.8 MB
  • 9. Data Manipulation/8. SHA Hashing.mp4 14.7 MB
  • 10. Networking/17. Quick Talk on Databases.mp4 14.7 MB
  • 21. Password Cracking/1. What is Password Cracking.mp4 14.7 MB
  • 6. Operating System Internals/9. Extra information on Memory.mp4 14.5 MB
  • 9. Data Manipulation/10. Base64 Encoding.mp4 14.0 MB
  • 9. Data Manipulation/11. Hex Encoding.mp4 13.4 MB
  • 15. Python Course/15. Configuration Files.mp4 13.3 MB
  • 24. Attacking Active Directory (Realistic Scenario)/1. Reconnaissance.mp4 13.2 MB
  • 10. Networking/5. The Switch.mp4 13.2 MB
  • 20. Post Exploitation/16. Im Root Now What.mp4 13.2 MB
  • 5. The Linux Operating System/18. Linux Run Levels.mp4 12.6 MB
  • 19. Exploitation/3. Looking for 0 days.mp4 12.4 MB
  • 3. Penetration Testing Process/11. Specialties!.mp4 12.3 MB
  • 15. Python Course/5. Type Casting.mp4 12.2 MB
  • 23. Reporting/2. The Audience.mp4 12.1 MB
  • 22. Covering Your Tracks/1. Why Cover Your Tracks.mp4 12.0 MB
  • 14. Program Theory/1. What is a Compiler.mp4 11.9 MB
  • 3. Penetration Testing Process/4. Routine Assessments Part 1 - What Are Routine Assessments.mp4 11.6 MB
  • 6. Operating System Internals/8. The Heap.mp4 11.6 MB
  • 3. Penetration Testing Process/7. Routine Assessments Part 4- Monthly Assessments.mp4 11.5 MB
  • 19. Exploitation/2. Misconfigurations.mp4 11.4 MB
  • 9. Data Manipulation/2. Symmetric Encryption.mp4 11.4 MB
  • 6. Operating System Internals/6. What is Memory _ How does it work.mp4 11.4 MB
  • 15. Python Course/6. Operators.mp4 11.3 MB
  • 9. Data Manipulation/14. Lossless vs Lossy Compression.mp4 11.3 MB
  • 9. Data Manipulation/1. What is Encryption.mp4 11.0 MB
  • 9. Data Manipulation/6. What is Hashing.mp4 11.0 MB
  • 8. Kerberos/1. What is Kerberos.mp4 11.0 MB
  • 10. Networking/12. What is an IDS.mp4 11.0 MB
  • 15. Python Course/1. Why Python.mp4 10.9 MB
  • 5. The Linux Operating System/1. Where is the GUI!.mp4 10.7 MB
  • 10. Networking/4. UDP.mp4 10.7 MB
  • 15. Python Course/11. Tuples.mp4 10.5 MB
  • 17. Scope Identification/4. Prepping.mp4 10.5 MB
  • 22. Covering Your Tracks/7. The Clean Up.mp4 10.4 MB
  • 20. Post Exploitation/20. Checking Logs.mp4 10.3 MB
  • 20. Post Exploitation/24. Web Servers.mp4 10.3 MB
  • 11. VPNs/1. What is a VPN.mp4 10.3 MB
  • 18. Reconnaissance/1. What is Reconnaissance.mp4 10.2 MB
  • 8. Kerberos/3. The Authentication Server.mp4 10.1 MB
  • 3. Penetration Testing Process/12. The CIA Triangle.mp4 10.0 MB
  • 9. Data Manipulation/12. URL Encoding.mp4 10.0 MB
  • 1. Welcome! Who Is This Guy!/1. Introduction.mp4 9.7 MB
  • 6. Operating System Internals/3. What is a CPU.mp4 9.6 MB
  • 16. Assembly Course/11. Bit Operators.mp4 9.4 MB
  • 19. Exploitation/9. Metasploit - Hands On.mp4 9.4 MB
  • 19. Exploitation/18. Faulty Redirects.mp4 9.2 MB
  • 6. Operating System Internals/11. Taking a look at ASLR.mp4 9.2 MB
  • 20. Post Exploitation/21. Duel Homed Machines.mp4 9.2 MB
  • 10. Networking/15. Proxys.mp4 8.9 MB
  • 3. Penetration Testing Process/1. Module Overview - Penetration Testing Process.mp4 8.8 MB
  • 9. Data Manipulation/7. MD5 Hashing.mp4 8.6 MB
  • 9. Data Manipulation/13. What is Compression.mp4 8.4 MB
  • 10. Networking/16. The DMZ.mp4 8.2 MB
  • 23. Reporting/4. Remediation Options.mp4 8.1 MB
  • 6. Operating System Internals/5. The CPU Flags.mp4 7.9 MB
  • 12. Firewalls/3. Stateful Inspecting Firewalls.mp4 7.8 MB
  • 18. Reconnaissance/18. Reconnaissance Hands On.mp4 7.8 MB
  • 17. Scope Identification/3. Briefing Stake Holders.mp4 7.4 MB
  • 15. Python Course/20. Python Hands On.mp4 7.3 MB
  • 20. Post Exploitation/3. What is Persistence.mp4 6.9 MB
  • 9. Data Manipulation/15. LZ77 _ LZ78 Compression Algorithms.mp4 6.7 MB
  • 9. Data Manipulation/4. RSA Encryption.mp4 6.5 MB
  • 23. Reporting/5. Working With The Blue Team.mp4 6.4 MB
  • 12. Firewalls/4. Web Application Firewalls.mp4 6.3 MB
  • 17. Scope Identification/5. Scope Identification Hands On.mp4 5.8 MB
  • 9. Data Manipulation/9. What is Encoding.mp4 5.8 MB
  • 9. Data Manipulation/5. AES Encryption.mp4 5.7 MB
  • 13. Configuring PFSense Firewalls/6. PFsense Hands On.mp4 5.6 MB
  • 9. Data Manipulation/16. Data Manipulation - Hands On.mp4 5.6 MB
  • 16. Assembly Course/1. Why Assembly.mp4 5.4 MB
  • 10. Networking/7. What is a Protocol.mp4 5.3 MB
  • 8. Kerberos/2. Kerberos Realms.mp4 4.7 MB
  • 21. Password Cracking/5. Password Cracking Hands On.mp4 3.9 MB
  • 2. The 3 Teams/1. Module Overview - The 3 Teams.mp4 3.7 MB
  • 16. Assembly Course/12. Assembly Hands On.mp4 3.7 MB
  • 12. Firewalls/2. Packet Filtering Firewalls.mp4 3.5 MB
  • 22. Covering Your Tracks/8. Covering Your Tracks Hands On.mp4 2.1 MB
  • 6. Operating System Internals/10.2 Debugger.pptx 455.3 kB
  • 10. Networking/5.1 The Switch.pptx 414.7 kB
  • 4. The Windows Operating System/5.1 Windows UAC.pptx 167.9 kB
  • 4. The Windows Operating System/5.2 Windows UAC.pptx 167.9 kB
  • 4. The Windows Operating System/9.1 SID.pptx 138.8 kB
  • 5. The Linux Operating System/7.1 Linux File Permissions.pptx 137.3 kB
  • 6. Operating System Internals/1.1 The Kernel.pptx 122.7 kB
  • 6. Operating System Internals/4.1 Registers.pptx 122.4 kB
  • 4. The Windows Operating System/12.1 PE Files and DLLs.pptx 121.1 kB
  • 4. The Windows Operating System/12.2 PE Files and DLLs.pptx 121.1 kB
  • 5. The Linux Operating System/12.2 Processes.pptx 119.9 kB
  • 23. Reporting/1.1 Report Template.docx 114.6 kB
  • 9. Data Manipulation/10.2 Base64.pptx 112.6 kB
  • 3. Penetration Testing Process/6.1 Quarterly Assessments.pptx 111.7 kB
  • 5. The Linux Operating System/14.1 Open FIles.pptx 110.4 kB
  • 5. The Linux Operating System/2.2 The Linux File System.pptx 110.2 kB
  • 10. Networking/1.1 What is Networking.pptx 110.1 kB
  • 3. Penetration Testing Process/2.1 Penetration Testing Methodology.pptx 109.0 kB
  • 10. Networking/2.1 OSI Model.pptx 105.9 kB
  • 5. The Linux Operating System/15.1 Symbolic Links.pptx 105.3 kB
  • 6. Operating System Internals/2.1 One Ring to Rule Them All.pptx 104.8 kB
  • 8. Kerberos/4.1 The Ticket Granting Server.pptx 104.7 kB
  • 11. VPNs/2.1 What is a IPSEC.pptx 104.6 kB
  • 4. The Windows Operating System/10.1 Tokens.pptx 104.5 kB
  • 4. The Windows Operating System/3.1 The Windows File System.pptx 104.2 kB
  • 6. Operating System Internals/12.1 AntiVirus.pptx 104.1 kB
  • 6. Operating System Internals/9.1 More on Memory.pptx 104.1 kB
  • 9. Data Manipulation/3.1 Asymmetric Encryption.pptx 103.9 kB
  • 6. Operating System Internals/11.1 ASLR.pptx 103.8 kB
  • 11. VPNs/3.1 What is a IKE.pptx 103.3 kB
  • 3. Penetration Testing Process/1.1 Penetration Testing Process - Module Overview.pptx 103.1 kB
  • 10. Networking/10.1 DHCP.pptx 102.8 kB
  • 19. Exploitation/17.1 Broken Auth.pptx 102.8 kB
  • 10. Networking/3.1 TCPIP.pptx 102.7 kB
  • 4. The Windows Operating System/11.2 Windows Pipes.pptx 102.5 kB
  • 5. The Linux Operating System/18.1 Run Levels.pptx 102.2 kB
  • 5. The Linux Operating System/13.1 Inodes.pptx 101.9 kB
  • 21. Password Cracking/4.1 Rainbow Tables.pptx 101.7 kB
  • 10. Networking/9.1 DNS.pptx 101.4 kB
  • 21. Password Cracking/1.1 What is Password Cracking.pptx 101.2 kB
  • 3. Penetration Testing Process/12.1 CIA Triangle.pptx 101.0 kB
  • 6. Operating System Internals/7.1 The Stack.pptx 100.9 kB
  • 3. Penetration Testing Process/11.1 Specialties.pptx 100.7 kB
  • 6. Operating System Internals/3.1 What is a CPU.pptx 100.5 kB
  • 16. Assembly Course/11.1 Bit Operators.pptx 100.3 kB
  • 3. Penetration Testing Process/8.1 Constant Assessments.pptx 99.8 kB
  • 2. The 3 Teams/3.1 The Blue Team.pptx 99.8 kB
  • 2. The 3 Teams/2.1 The Red Team.pptx 99.7 kB
  • 17. Scope Identification/1.1 Goal and Scope Identification.pptx 99.6 kB
  • 8. Kerberos/3.1 The Authentication Sever.pptx 99.4 kB
  • 23. Reporting/3.1 Buisness Risk on Findings.pptx 99.3 kB
  • 2. The 3 Teams/4.1 The Purple Team.pptx 99.3 kB
  • 9. Data Manipulation/2.1 Symmetric Encryption.pptx 99.2 kB
  • 22. Covering Your Tracks/1.1 Why Cover Your Tracks.pptx 99.1 kB
  • 6. Operating System Internals/5.1 Flags.pptx 98.7 kB
  • 9. Data Manipulation/13.1 What is Compression.pptx 98.5 kB
  • 3. Penetration Testing Process/5.1 Yearly Assessments.pptx 98.5 kB
  • 6. Operating System Internals/6.1 Memory.pptx 98.4 kB
  • 3. Penetration Testing Process/7.1 Monthly Assessments.pptx 98.4 kB
  • 23. Reporting/2.1 The Audience.pptx 98.4 kB
  • 12. Firewalls/1.1 What is a Firewall.pptx 98.4 kB
  • 14. Program Theory/1.1 What is a Compiler.pptx 98.3 kB
  • 10. Networking/17.1 Quick Talk on Databases.pptx 98.3 kB
  • 10. Networking/8.1 ICMP.pptx 98.1 kB
  • 10. Networking/11.1 ARP.pptx 98.1 kB
  • 10. Networking/13.1 What is an IPS.pptx 98.1 kB
  • 17. Scope Identification/2.1 Stability Considerations.pptx 98.0 kB
  • 9. Data Manipulation/11.1 Hex.pptx 98.0 kB
  • 10. Networking/12.1 What is an IDS.pptx 97.9 kB
  • 8. Kerberos/1.1 What is Kerberos.pptx 97.8 kB
  • 18. Reconnaissance/15.2 Vuln Scanners.pptx 97.8 kB
  • 10. Networking/6.1 Routers and Gateways.pptx 97.8 kB
  • 5. The Linux Operating System/1.1 The GUI.pptx 97.8 kB
  • 20. Post Exploitation/3.1 What is Persistence.pptx 97.7 kB
  • 6. Operating System Internals/8.1 The Heap.pptx 97.6 kB
  • 7. Active Directory/1.1 What is Active Directory.pptx 97.4 kB
  • 25. Job Hunting/10.1 The Screening Call.pptx 97.3 kB
  • 19. Exploitation/2.1 Misconfigurations.pptx 97.1 kB
  • 4. The Windows Operating System/8.2 API Calls.pptx 97.0 kB
  • 12. Firewalls/3.1 Stateful Inspection Firewalls.pptx 96.8 kB
  • 3. Penetration Testing Process/4.1 What Are Routine Assessments.pptx 96.8 kB
  • 9. Data Manipulation/1.1 What is Encryption.pptx 96.8 kB
  • 9. Data Manipulation/9.1 What is Encoding.pptx 96.6 kB
  • 9. Data Manipulation/12.1 URL.pptx 96.5 kB
  • 8. Kerberos/2.1 Kerberos Realm.pptx 96.5 kB
  • 9. Data Manipulation/6.1 What is Hashing.pptx 96.5 kB
  • 14. Program Theory/2.1 What is a Linker.pptx 96.5 kB
  • 12. Firewalls/2.1 Packet Filtering Firewalls.pptx 96.3 kB
  • 10. Networking/14.1 What is HA.pptx 96.3 kB
  • 17. Scope Identification/3.1 Briefing Stake Holders.pptx 96.2 kB
  • 9. Data Manipulation/14.1 Lossless vs Lossy.pptx 96.0 kB
  • 15. Python Course/20.1 Hands On Python.pptx 95.9 kB
  • 18. Reconnaissance/1.1 What is Recon.pptx 95.7 kB
  • 9. Data Manipulation/15.2 LZ77 and LZ78.pptx 95.6 kB
  • 17. Scope Identification/5.1 Scope Identification Hands On.pptx 95.4 kB
  • 21. Password Cracking/5.1 Password Cracking Hands On.pptx 95.2 kB
  • 23. Reporting/5.1 Working With The Blue Team.pptx 95.2 kB
  • 12. Firewalls/4.1 Web Application Firewalls.pptx 95.0 kB
  • 10. Networking/15.1 Proxys.pptx 95.0 kB
  • 19. Exploitation/3.1 0Days.pptx 94.9 kB
  • 9. Data Manipulation/4.2 RSA.pptx 94.9 kB
  • 9. Data Manipulation/8.2 SHA.pptx 94.8 kB
  • 16. Assembly Course/1.1 Why ASM.pptx 94.8 kB
  • 9. Data Manipulation/5.2 AES.pptx 94.8 kB
  • 9. Data Manipulation/7.2 MD5.pptx 94.8 kB
  • 11. VPNs/1.1 What is a VPN.pptx 94.8 kB
  • 19. Exploitation/9.1 Metasploit Hands On.pptx 94.7 kB
  • 23. Reporting/4.1 Remediation Options.pptx 94.7 kB
  • 13. Configuring PFSense Firewalls/6.1 PFSense Hands On.pptx 94.5 kB
  • 16. Assembly Course/12.1 Assembly Hands On.pptx 94.4 kB
  • 2. The 3 Teams/1.1 The 3 Teams.pptx 93.7 kB
  • 10. Networking/7.1 What is a Protocol.pptx 93.7 kB
  • 9. Data Manipulation/16.1 Data Manipulation Hands On.pptx 93.7 kB
  • 15. Python Course/1.1 Why Python.pptx 93.5 kB
  • 10. Networking/16.1 DMZ.pptx 93.4 kB
  • 10. Networking/4.1 UDP.pptx 93.3 kB
  • 19. Exploitation/11. SQL Injection _ SQLMap.srt 40.4 kB
  • 3. Penetration Testing Process/3.1 Metrics.xlsx 37.6 kB
  • 25. Job Hunting/6. Analyzing the Job Post.srt 35.9 kB
  • 17. Scope Identification/4.1 Assessment Document Template.docx 34.7 kB
  • 4. The Windows Operating System/2. Windows at a Glance.srt 29.7 kB
  • 18. Reconnaissance/8. Active Recon - Port Scanning.srt 29.0 kB
  • 3. Penetration Testing Process/10.1 Budget Sample.xlsx 28.4 kB
  • 3. Penetration Testing Process/9.1 Assessment Template.xlsx 25.0 kB
  • 16. Assembly Course/5. Arithmetic.srt 24.6 kB
  • 3. Penetration Testing Process/10.2 Budget Template.xlsx 24.5 kB
  • 19. Exploitation/5. Metasploit - Exploits and Payloads.srt 22.0 kB
  • 4. The Windows Operating System/12. Windows Internals - PE Files _ DLLs.srt 21.7 kB
  • 16. Assembly Course/2. Hello World.srt 21.6 kB
  • 23. Reporting/1. The Format.srt 21.6 kB
  • 4. The Windows Operating System/6. Windows Internals - Permissions.srt 21.4 kB
  • 25. Job Hunting/1.1 Resume.docx 19.5 kB
  • 20. Post Exploitation/9. File Permissions.srt 19.4 kB
  • 20. Post Exploitation/13. Unquoted Service Path.srt 19.2 kB
  • 19. Exploitation/12. XSS.srt 19.1 kB
  • 19. Exploitation/6. Metasploit - The Meterpreter.srt 18.9 kB
  • 25. Job Hunting/3. Certifications.srt 18.9 kB
  • 15. Python Course/14. Inheritance.srt 18.6 kB
  • 25. Job Hunting/4. Personal Brand.srt 18.5 kB
  • 20. Post Exploitation/1. Stabilizing Shells.srt 18.5 kB
  • 5. The Linux Operating System/6. Linux Command Line - Working with Data.srt 18.4 kB
  • 20. Post Exploitation/28. Pivoting.srt 18.3 kB
  • 20. Post Exploitation/10. MySQL.srt 18.2 kB
  • 25. Job Hunting/5. Searching for the Job.srt 18.2 kB
  • 3. Penetration Testing Process/10. Building _ Working with an Enterprise Budget.srt 17.6 kB
  • 4. The Windows Operating System/18. Windows Command Line - Managing Windows.srt 17.4 kB
  • 18. Reconnaissance/13. Active Recon - Working with NC.srt 17.2 kB
  • 5. The Linux Operating System/12. Linux Processes.srt 17.1 kB
  • 7. Active Directory/8. Setting up Group Policies.srt 17.0 kB
  • 25. Job Hunting/9. Salary Requirements.srt 16.8 kB
  • 15. Python Course/7. IfElse.srt 16.6 kB
  • 4. The Windows Operating System/3. The Windows File System.srt 16.3 kB
  • 19. Exploitation/14. Local File Inclusion.srt 16.2 kB
  • 20. Post Exploitation/8. Common Configuration Issues.srt 16.0 kB
  • 3. Penetration Testing Process/3. Metrics _ Why They Are Important.srt 15.8 kB
  • 16. Assembly Course/8. Reading Files.srt 15.6 kB
  • 4. The Windows Operating System/8. Windows Internals - API Calls.srt 15.6 kB
  • 20. Post Exploitation/27. SSH Tunneling.srt 15.5 kB
  • 15. Python Course/13. Classes.srt 15.3 kB
  • 15. Python Course/18. Sockets.srt 15.0 kB
  • 6. Operating System Internals/1. The Kernel.srt 15.0 kB
  • 20. Post Exploitation/5. Linux Persistence.srt 15.0 kB
  • 4. The Windows Operating System/4. Windows Logs.srt 14.7 kB
  • 20. Post Exploitation/7. OS Version.srt 14.2 kB
  • 19. Exploitation/7. Metasploit - Adding an Exploit to Metasploit.srt 14.0 kB
  • 20. Post Exploitation/17. Pulling Hashes.srt 13.9 kB
  • 19. Exploitation/1. Finding Exploits.srt 13.9 kB
  • 20. Post Exploitation/4. Windows Persistence.srt 13.8 kB
  • 10. Networking/3. TCPIP.srt 13.8 kB
  • 16. Assembly Course/4. Saving States.srt 13.8 kB
  • 5. The Linux Operating System/7. Linux Command Line - Working with File Permissions.srt 13.8 kB
  • 13. Configuring PFSense Firewalls/2. The Firewall UI.srt 13.6 kB
  • 16. Assembly Course/7. Logic Control.srt 13.6 kB
  • 15. Python Course/10. Lists.srt 13.6 kB
  • 18. Reconnaissance/3. Passive Recon - Google.srt 13.4 kB
  • 4. The Windows Operating System/1. Installing _ Using VirtualBox for Lab Virtualization.srt 13.3 kB
  • 7. Active Directory/4. The AD Tree.srt 13.3 kB
  • 7. Active Directory/3. Install AD DS.srt 13.2 kB
  • 25. Job Hunting/8. The Future Company.srt 13.1 kB
  • 3. Penetration Testing Process/6. Routine Assessments Part 3 - Quarterly Assessments.srt 13.0 kB
  • 25. Job Hunting/10. The Interview Process - The Screening Call.srt 12.8 kB
  • 5. The Linux Operating System/4. Linux Command Line - Working with Files and Directories.srt 12.8 kB
  • 15. Python Course/9. The Dictionary.srt 12.6 kB
  • 18. Reconnaissance/12. Active Recon - Sparta.srt 12.4 kB
  • 11. VPNs/2. What is IPSEC.srt 12.3 kB
  • 3. Penetration Testing Process/8. Routine Assessments Part 5 - Constant Assessments.srt 12.3 kB
  • 2. The 3 Teams/2. The Red Team.srt 12.3 kB
  • 3. Penetration Testing Process/2. Penetration Testing Methodology.srt 12.2 kB
  • 19. Exploitation/17. Broken Authentication and Session Management.srt 12.1 kB
  • 10. Networking/1. What is Networking.srt 11.9 kB
  • 20. Post Exploitation/11. Sudo.srt 11.8 kB
  • 4. The Windows Operating System/16. Windows Command Line - Working with Pipes.srt 11.7 kB
  • 6. Operating System Internals/4. The CPU Registers.srt 11.7 kB
  • 25. Job Hunting/1. The Resume.srt 11.7 kB
  • 4. The Windows Operating System/5. Windows Internals - UAC.srt 11.6 kB
  • 22. Covering Your Tracks/5. Clearing Command History.srt 11.5 kB
  • 20. Post Exploitation/2. Breaking Out Of The Jail Shell.srt 11.5 kB
  • 17. Scope Identification/2. Stability Considerations.srt 11.4 kB
  • 18. Reconnaissance/14. Active Recon - Banner Grabbing.srt 11.3 kB
  • 10. Networking/9. DNS.srt 11.2 kB
  • 18. Reconnaissance/7. Passive Recon - Job Posting.srt 11.2 kB
  • 19. Exploitation/10. The OWASP Top 10.srt 11.2 kB
  • 13. Configuring PFSense Firewalls/3. Configuring a DMZ.srt 11.2 kB
  • 19. Exploitation/4. Metasploit - What is Metasploit.srt 11.1 kB
  • 19. Exploitation/8. Metasploit - MSFVenom.srt 11.0 kB
  • 20. Post Exploitation/22. Network Traffic.srt 10.8 kB
  • 15. Python Course/8. Loops.srt 10.8 kB
  • 18. Reconnaissance/9. Active Recon - DNS.srt 10.7 kB
  • 19. Exploitation/15. Remote File Inclusion.srt 10.6 kB
  • 20. Post Exploitation/12. Relative Path Sudo Binary.srt 10.5 kB
  • 4. The Windows Operating System/10. Windows Internals - Tokens.srt 10.4 kB
  • 24. Attacking Active Directory (Realistic Scenario)/6. Getting Domain Admin.srt 10.4 kB
  • 18. Reconnaissance/6. Passive Recon - Netcraft.srt 10.3 kB
  • 13. Configuring PFSense Firewalls/1. Installing PFSense.srt 10.3 kB
  • 3. Penetration Testing Process/9. Routine Assessments Part 6 - Building an Assessment Plan.srt 10.1 kB
  • 20. Post Exploitation/15. LinuxPrivChecker.srt 10.0 kB
  • 4. The Windows Operating System/7. Windows Internals - Alternate Data Streams.srt 10.0 kB
  • 13. Configuring PFSense Firewalls/4. Configuring a VPN.srt 10.0 kB
  • 18. Reconnaissance/5. Passive Recon - Whois.srt 9.9 kB
  • 15. Python Course/17. Error Handling.srt 9.8 kB
  • 20. Post Exploitation/23. ARP Poisoning.srt 9.8 kB
  • 2. The 3 Teams/4. The Purple Team.srt 9.7 kB
  • 18. Reconnaissance/16. Active Recon - Browsing.srt 9.7 kB
  • 15. Python Course/19. Threading.srt 9.7 kB
  • 20. Post Exploitation/14. Service Misconfigurations.srt 9.7 kB
  • 4. The Windows Operating System/15. Windows Command Line - Working with Files and Directories.srt 9.7 kB
  • 7. Active Directory/2. Basic Windows Server Configuration.srt 9.6 kB
  • 4. The Windows Operating System/14. Windows Command Line - Navigation.srt 9.6 kB
  • 11. VPNs/3. What is IKE.srt 9.5 kB
  • 8. Kerberos/4. The Ticket Granting Server.srt 9.5 kB
  • 15. Python Course/16. Logging.srt 9.4 kB
  • 17. Scope Identification/1. Goal _ Scope Identification.srt 9.2 kB
  • 24. Attacking Active Directory (Realistic Scenario)/4. Finding New Access.srt 9.1 kB
  • 15. Python Course/3. Hello World.srt 9.1 kB
  • 7. Active Directory/7. Adding Machine to the Domain.srt 9.0 kB
  • 5. The Linux Operating System/14. Working with Open Files.srt 9.0 kB
  • 21. Password Cracking/3. Hashcat.srt 9.0 kB
  • 15. Python Course/4. Variables.srt 8.9 kB
  • 16. Assembly Course/10. Op Code.srt 8.8 kB
  • 10. Networking/10. DHCP.srt 8.7 kB
  • 10. Networking/6. Routers _ Gateways.srt 8.6 kB
  • 18. Reconnaissance/2. Installing Kali.srt 8.6 kB
  • 18. Reconnaissance/10. Active Recon - Nikto.srt 8.6 kB
  • 4. The Windows Operating System/9. Windows Internals - The SID.srt 8.6 kB
  • 16. Assembly Course/9. Writing Files.srt 8.6 kB
  • 10. Networking/8. ICMP.srt 8.6 kB
  • 23. Reporting/3. Business Risks on Findings.srt 8.5 kB
  • 15. Python Course/12. Modules.srt 8.5 kB
  • 20. Post Exploitation/26. Password Spraying.srt 8.4 kB
  • 7. Active Directory/5. OU_s and their Permissions.srt 8.4 kB
  • 6. Operating System Internals/7. The Stack.srt 8.3 kB
  • 5. The Linux Operating System/15. Symbolic Links.srt 8.3 kB
  • 19. Exploitation/13. Insecure Direct Object Reference.srt 8.1 kB
  • 18. Reconnaissance/4. Passive Recon - Shodan.srt 7.9 kB
  • 22. Covering Your Tracks/3. Clearing Linux Logs.srt 7.9 kB
  • 6. Operating System Internals/2. One Ring to Rule Them All.srt 7.8 kB
  • 7. Active Directory/1. What is Active Directory.srt 7.8 kB
  • 5. The Linux Operating System/2. The Linux File System.srt 7.7 kB
  • 5. The Linux Operating System/10. Linux Command Line - Hex.srt 7.6 kB
  • 3. Penetration Testing Process/5. Routine Assessments Part 2 - Yearly Assessments.srt 7.6 kB
  • 22. Covering Your Tracks/4. Quick Talk on Logging.srt 7.6 kB
  • 4. The Windows Operating System/11. Windows Internals - Named Pipes.srt 7.6 kB
  • 10. Networking/2. The OSI Model.srt 7.6 kB
  • 9. Data Manipulation/3. Asymmetric Encryption.srt 7.5 kB
  • 6. Operating System Internals/12. A Quick Word About AntiVirus.srt 7.4 kB
  • 21. Password Cracking/4. Rainbow Tables.srt 7.4 kB
  • 6. Operating System Internals/10. Debuggers.srt 7.3 kB
  • 16. Assembly Course/3. Variables.srt 7.3 kB
  • 19. Exploitation/16. The Authenticated Unauthenticated Pages.srt 7.3 kB
  • 2. The 3 Teams/3. The Blue Team.srt 7.3 kB
  • 21. Password Cracking/2. John The Ripper.srt 7.2 kB
  • 18. Reconnaissance/15. Active Recon - Vulnerability Scanners.srt 7.1 kB
  • 25. Job Hunting/7. Applying for the Job.srt 7.1 kB
  • 21. Password Cracking/1. What is Password Cracking.srt 7.0 kB
  • 20. Post Exploitation/18. Pass The Hash.srt 7.0 kB
  • 18. Reconnaissance/11. Active Recon - Dirb.srt 6.9 kB
  • 13. Configuring PFSense Firewalls/5. Backup _ Logging.srt 6.9 kB
  • 20. Post Exploitation/19. SSH Keys.srt 6.9 kB
  • 25. Job Hunting/2. Professional Email.srt 6.9 kB
  • 10. Networking/14. What is HA.srt 6.8 kB
  • 4. The Windows Operating System/13. Windows Command Line - Accessing the Command Line.srt 6.7 kB
  • 20. Post Exploitation/6. What is Privilege Escalation.srt 6.6 kB
  • 22. Covering Your Tracks/1. Why Cover Your Tracks.srt 6.6 kB
  • 10. Networking/13. What is an IPS.srt 6.6 kB
  • 7. Active Directory/6. Managing Users and Groups.srt 6.5 kB
  • 14. Program Theory/2. What is a Linker.srt 6.5 kB
  • 15. Python Course/5. Type Casting.srt 6.5 kB
  • 3. Penetration Testing Process/7. Routine Assessments Part 4- Monthly Assessments.srt 6.4 kB
  • 16. Assembly Course/6. Loops.srt 6.4 kB
  • 9. Data Manipulation/8. SHA Hashing.srt 6.4 kB
  • 19. Exploitation/3. Looking for 0 days.srt 6.3 kB
  • 3. Penetration Testing Process/11. Specialties!.srt 6.3 kB
  • 10. Networking/11. ARP.srt 6.2 kB
  • 23. Reporting/2. The Audience.srt 6.2 kB
  • 15. Python Course/6. Operators.srt 6.1 kB
  • 15. Python Course/15. Configuration Files.srt 6.1 kB
  • 18. Reconnaissance/17. Active Recon - Manual vs Automated.srt 6.0 kB
  • 3. Penetration Testing Process/4. Routine Assessments Part 1 - What Are Routine Assessments.srt 6.0 kB
  • 12. Firewalls/1. What is a Firewall.srt 6.0 kB
  • 9. Data Manipulation/10. Base64 Encoding.srt 6.0 kB
  • 10. Networking/17. Quick Talk on Databases.srt 6.0 kB
  • 9. Data Manipulation/11. Hex Encoding.srt 5.9 kB
  • 5. The Linux Operating System/3. Linux Command Line - Navigation.srt 5.8 kB
  • 15. Python Course/1. Why Python.srt 5.8 kB
  • 4. The Windows Operating System/17. Windows Command Line - Standard IOE.srt 5.8 kB
  • 15. Python Course/2. Installing Python.srt 5.8 kB
  • 5. The Linux Operating System/13. What are INodes.srt 5.8 kB
  • 6. Operating System Internals/9. Extra information on Memory.srt 5.7 kB
  • 5. The Linux Operating System/1. Where is the GUI!.srt 5.7 kB
  • 20. Post Exploitation/25. Account Directory Attacks.srt 5.6 kB
  • 18. Reconnaissance/1. What is Reconnaissance.srt 5.6 kB
  • 10. Networking/5. The Switch.srt 5.6 kB
  • 19. Exploitation/2. Misconfigurations.srt 5.6 kB
  • 5. The Linux Operating System/5. Linux Command Line - Standard IOE Recap.srt 5.5 kB
  • 5. The Linux Operating System/11. Linux Command Line - Network Connections Recap.srt 5.5 kB
  • 15. Python Course/11. Tuples.srt 5.4 kB
  • 14. Program Theory/1. What is a Compiler.srt 5.3 kB
  • 19. Exploitation/18. Faulty Redirects.srt 5.3 kB
  • 5. The Linux Operating System/18. Linux Run Levels.srt 5.1 kB
  • 24. Attacking Active Directory (Realistic Scenario)/2. Exploitation.srt 5.1 kB
  • 10. Networking/15. Proxys.srt 5.0 kB
  • 8. Kerberos/1. What is Kerberos.srt 5.0 kB
  • 5. The Linux Operating System/8. Linux Command Line - Man Pages.srt 5.0 kB
  • 24. Attacking Active Directory (Realistic Scenario)/5. Moving Up In The World!.srt 5.0 kB
  • 17. Scope Identification/4. Prepping.srt 4.9 kB
  • 6. Operating System Internals/6. What is Memory _ How does it work.srt 4.9 kB
  • 9. Data Manipulation/2. Symmetric Encryption.srt 4.9 kB
  • 3. Penetration Testing Process/1. Module Overview - Penetration Testing Process.srt 4.9 kB
  • 10. Networking/12. What is an IDS.srt 4.8 kB
  • 8. Kerberos/3. The Authentication Server.srt 4.8 kB
  • 5. The Linux Operating System/19. Linux Logs.srt 4.8 kB
  • 23. Reporting/4. Remediation Options.srt 4.7 kB
  • 22. Covering Your Tracks/2. Clearing Windows Logs.srt 4.7 kB
  • 6. Operating System Internals/8. The Heap.srt 4.7 kB
  • 9. Data Manipulation/1. What is Encryption.srt 4.7 kB
  • 19. Exploitation/9. Metasploit - Hands On.srt 4.7 kB
  • 9. Data Manipulation/13. What is Compression.srt 4.6 kB
  • 22. Covering Your Tracks/7. The Clean Up.srt 4.6 kB
  • 22. Covering Your Tracks/6. Persistent Backdoors.srt 4.6 kB
  • 24. Attacking Active Directory (Realistic Scenario)/3. Post Exploitation.srt 4.6 kB
  • 16. Assembly Course/11. Bit Operators.srt 4.5 kB
  • 9. Data Manipulation/6. What is Hashing.srt 4.5 kB
  • 6. Operating System Internals/11. Taking a look at ASLR.srt 4.5 kB
  • 20. Post Exploitation/16. Im Root Now What.srt 4.4 kB
  • 9. Data Manipulation/14. Lossless vs Lossy Compression.srt 4.4 kB
  • 3. Penetration Testing Process/12. The CIA Triangle.srt 4.2 kB
  • 24. Attacking Active Directory (Realistic Scenario)/1. Reconnaissance.srt 4.2 kB
  • 9. Data Manipulation/12. URL Encoding.srt 4.1 kB
  • 20. Post Exploitation/3. What is Persistence.srt 4.0 kB
  • 5. The Linux Operating System/17. Linux Pipes.srt 3.9 kB
  • 5. The Linux Operating System/16. The ID_s.srt 3.9 kB
  • 12. Firewalls/3. Stateful Inspecting Firewalls.srt 3.9 kB
  • 7. Active Directory/9. Cached Credentials.srt 3.8 kB
  • 6. Operating System Internals/3. What is a CPU.srt 3.8 kB
  • 15. Python Course/20. Python Hands On.srt 3.7 kB
  • 11. VPNs/1. What is a VPN.srt 3.7 kB
  • 10. Networking/4. UDP.srt 3.6 kB
  • 17. Scope Identification/5. Scope Identification Hands On.srt 3.6 kB
  • 10. Networking/16. The DMZ.srt 3.5 kB
  • 9. Data Manipulation/7. MD5 Hashing.srt 3.5 kB
  • 17. Scope Identification/3. Briefing Stake Holders.srt 3.4 kB
  • 20. Post Exploitation/24. Web Servers.srt 3.4 kB
  • 6. Operating System Internals/5. The CPU Flags.srt 3.3 kB
  • 13. Configuring PFSense Firewalls/6. PFsense Hands On.srt 3.3 kB
  • 5. The Linux Operating System/9. Linux Command Line - Base64.srt 3.3 kB
  • 23. Reporting/5. Working With The Blue Team.srt 3.2 kB
  • 12. Firewalls/4. Web Application Firewalls.srt 3.2 kB
  • 20. Post Exploitation/21. Duel Homed Machines.srt 2.9 kB
  • 9. Data Manipulation/15. LZ77 _ LZ78 Compression Algorithms.srt 2.9 kB
  • 9. Data Manipulation/9. What is Encoding.srt 2.9 kB
  • 9. Data Manipulation/4. RSA Encryption.srt 2.9 kB
  • 16. Assembly Course/1. Why Assembly.srt 2.8 kB
  • 20. Post Exploitation/20. Checking Logs.srt 2.7 kB
  • 9. Data Manipulation/16. Data Manipulation - Hands On.srt 2.4 kB
  • 9. Data Manipulation/5. AES Encryption.srt 2.4 kB
  • 15. Python Course/6.1 Operators.py 2.4 kB
  • 18. Reconnaissance/18. Reconnaissance Hands On.srt 2.4 kB
  • 1. Welcome! Who Is This Guy!/1. Introduction.srt 2.3 kB
  • 15. Python Course/7.1 IfElse.py 2.3 kB
  • 8. Kerberos/2. Kerberos Realms.srt 2.3 kB
  • 21. Password Cracking/5. Password Cracking Hands On.srt 2.2 kB
  • 16. Assembly Course/5.1 Arithmetic.asm.zip 2.2 kB
  • 15. Python Course/9.1 Dictionary.py 2.0 kB
  • 12. Firewalls/2. Packet Filtering Firewalls.srt 2.0 kB
  • 16. Assembly Course/12. Assembly Hands On.srt 2.0 kB
  • 10. Networking/7. What is a Protocol.srt 1.9 kB
  • 2. The 3 Teams/1. Module Overview - The 3 Teams.srt 1.8 kB
  • 15. Python Course/14.1 Inheritance.py 1.7 kB
  • 15. Python Course/15.2 Configs.zip 1.6 kB
  • 16. Assembly Course/6.1 Loops.asm.zip 1.6 kB
  • 15. Python Course/10.1 Lists.py 1.6 kB
  • 22. Covering Your Tracks/8. Covering Your Tracks Hands On.srt 1.6 kB
  • 16. Assembly Course/8.1 ReadingFiles.asm.zip 1.5 kB
  • 16. Assembly Course/9.1 WritingFiles.asm.zip 1.4 kB
  • 15. Python Course/16.1 Logging.py 1.4 kB
  • 16. Assembly Course/4.1 SavingState.asm.zip 1.4 kB
  • 15. Python Course/13.1 Classes.py 1.4 kB
  • 15. Python Course/8.1 Loops.py 1.3 kB
  • 15. Python Course/17.1 ErrorHandling.py 1.3 kB
  • 15. Python Course/15.1 Configs.py 1.3 kB
  • 16. Assembly Course/7.1 Logic.asm.zip 1.3 kB
  • 16. Assembly Course/2.1 HelloWorld.asm.zip 1.2 kB
  • 15. Python Course/4.1 Variables.py 1.2 kB
  • 15. Python Course/18.2 SocketsServer.py 1.2 kB
  • 15. Python Course/11.1 Tuples.py 1.2 kB
  • 16. Assembly Course/3.1 DataTypes.asm.zip 1.1 kB
  • 15. Python Course/5.1 TypeCasting.py 1.0 kB
  • 15. Python Course/14.3 Account.py 961 Bytes
  • 15. Python Course/18.1 SocketsClient.py 929 Bytes
  • 15. Python Course/13.2 Person.py 878 Bytes
  • 15. Python Course/19.1 Threading.py 845 Bytes
  • 20. Post Exploitation/26.1 spray.py 831 Bytes
  • 15. Python Course/14.2 CheckingAccount.py 822 Bytes
  • 15. Python Course/12.1 Modules.py 810 Bytes
  • 15. Python Course/3.1 HelloWorld.py 583 Bytes
  • 19. Exploitation/13.1 idor.txt 496 Bytes
  • 25. Job Hunting/11. The Interview Process - Prepping for the Technical Interviews.srt 356 Bytes
  • 25. Job Hunting/12. The Interview Process - The Technical Screening Interview.srt 356 Bytes
  • 25. Job Hunting/13. The Interview Process - Prepping for the On Site Final Interview.srt 356 Bytes
  • 25. Job Hunting/14. The Interview Process - The Onsite.srt 356 Bytes
  • 25. Job Hunting/15. The Interview Process - The Offer.srt 356 Bytes
  • 25. Job Hunting/16. Congratulations!.srt 356 Bytes
  • 25. Job Hunting/13.1 Prepping for the on site Interview.pptx 345 Bytes
  • 25. Job Hunting/14.1 Onsite Interview.pptx 345 Bytes
  • 25. Job Hunting/15.1 The Offer.pptx 345 Bytes
  • 4. The Windows Operating System/5.1 UAC Microsoft Documents.html 182 Bytes
  • 4. The Windows Operating System/5.2 UAC Microsoft Documents.html 182 Bytes
  • 19. Exploitation/11.1 Installing DVWA in Kali Linux.html 179 Bytes
  • 21. Password Cracking/2.2 John The Ripper Linux Tutorial.html 162 Bytes
  • 18. Reconnaissance/15.3 Nessus Tutorial.html 161 Bytes
  • 20. Post Exploitation/14.1 AccessCheck Windows XP.html 147 Bytes
  • 19. Exploitation/10.2 OWASP Top 10.html 145 Bytes
  • 4. The Windows Operating System/2.1 Windows Registry.html 143 Bytes
  • 20. Post Exploitation/8.1 Windows Privilege Escalation Tutorial 1.html 142 Bytes
  • 19. Exploitation/10.1 CSRF.html 139 Bytes
  • 9. Data Manipulation/5.1 AES.html 138 Bytes
  • 18. Reconnaissance/2.1 Kali Iso Updated.html 137 Bytes
  • 21. Password Cracking/2.1 John The Ripper Windows Tutorial.html 135 Bytes
  • 4. The Windows Operating System/1.2 Windows Server 2016 ISO.html 132 Bytes
  • 18. Reconnaissance/13.2 Pentest Monkey.html 130 Bytes
  • 20. Post Exploitation/8.3 Linux Privilege Escalation Tutorial 2.html 130 Bytes
  • 4. The Windows Operating System/7.1 File Streams.html 129 Bytes
  • 4. The Windows Operating System/3.3 NTFS In More Detail.html 127 Bytes
  • 4. The Windows Operating System/3.4 NTFS In More Detail.html 127 Bytes
  • 20. Post Exploitation/8.4 Linux Privilege Escalation Tutorial 1.html 127 Bytes
  • 7. Active Directory/7.1 Windows 10 ISO.html 123 Bytes
  • 4. The Windows Operating System/3.2 NTFS Cluster.html 119 Bytes
  • 4. The Windows Operating System/3.3 NTFS Cluster.html 119 Bytes
  • 4. The Windows Operating System/12.1 PE Explorer.html 119 Bytes
  • 4. The Windows Operating System/12.2 PE Explorer.html 119 Bytes
  • 20. Post Exploitation/15.1 LinuxPrivChecker.html 118 Bytes
  • 5. The Linux Operating System/2.1 EXT4 Info.html 116 Bytes
  • 9. Data Manipulation/4.1 RSA.html 114 Bytes
  • 9. Data Manipulation/7.1 MD5.html 114 Bytes
  • 9. Data Manipulation/8.1 SHA.html 114 Bytes
  • 20. Post Exploitation/14.2 AccessCheck Windows Vista _ Up.html 114 Bytes
  • 4. The Windows Operating System/3.4 Journaling File System.html 113 Bytes
  • 4. The Windows Operating System/3.5 Journaling File System.html 113 Bytes
  • 4. The Windows Operating System/11.1 Microsoft PipeList.html 113 Bytes
  • 9. Data Manipulation/11.2 Hex.html 113 Bytes
  • 9. Data Manipulation/10.1 Base64.html 112 Bytes
  • 5. The Linux Operating System/12.1 Process Info.html 111 Bytes
  • 18. Reconnaissance/3.1 Google Hacking Database.html 111 Bytes
  • 4. The Windows Operating System/8.1 Dependency Walker.html 110 Bytes
  • 9. Data Manipulation/12.2 URL.html 110 Bytes
  • 18. Reconnaissance/13.1 NC For Windows.html 109 Bytes
  • 19. Exploitation/11.2 SQLInjection Tutorial.html 108 Bytes
  • 6. Operating System Internals/10.1 Immunity Debugger.html 107 Bytes
  • 20. Post Exploitation/8.2 Windows Privilege Escalation Tutorial 2.html 107 Bytes
  • 20. Post Exploitation/9.1 AccessCheck Tutorial.html 107 Bytes
  • 6. Operating System Internals/5.2 CPU Flags.html 105 Bytes
  • 9. Data Manipulation/15.1 LZ77 _ LZ78.html 104 Bytes
  • 4. The Windows Operating System/1.1 VirtualBox Download.html 102 Bytes
  • 19. Exploitation/1.1 Exploit-DB.html 102 Bytes
  • 18. Reconnaissance/15.1 Nessus Download.html 101 Bytes
  • 5. The Linux Operating System/1.2 Ubuntu ISO Updated.html 96 Bytes
  • 10. Networking/17.2 SQL Tutorial.html 96 Bytes
  • 13. Configuring PFSense Firewalls/1.1 PFSense Installer.html 94 Bytes
  • 15. Python Course/2.2 Python Installer.html 94 Bytes
  • 4. The Windows Operating System/3.2 NTFS Basics.html 92 Bytes
  • 4. The Windows Operating System/3.5 NTFS Basics.html 92 Bytes
  • 15. Python Course/2.1 Sublime IDE.html 90 Bytes
  • 18. Reconnaissance/5.1 Whois.html 87 Bytes
  • 18. Reconnaissance/6.1 Netcraft.html 86 Bytes
  • 18. Reconnaissance/4.1 Shodan.html 83 Bytes

随机展示

相关说明

本站不存储任何资源内容,只收集BT种子元数据(例如文件名和文件大小)和磁力链接(BT种子标识符),并提供查询服务,是一个完全合法的搜索引擎系统。 网站不提供种子下载服务,用户可以通过第三方链接或磁力链接获取到相关的种子资源。本站也不对BT种子真实性及合法性负责,请用户注意甄别!