MuerBT磁力搜索 BT种子搜索利器 免费下载BT种子,超5000万条种子数据

the-redteam-blueprint

磁力链接/BT种子名称

the-redteam-blueprint

磁力链接/BT种子简介

种子哈希:9724b2731d4dce0440c490ec7e13db424c18e8b7
文件大小: 16.29G
已经下载:1224次
下载速度:极快
收录时间:2021-03-20
最近下载:2025-08-26

移花宫入口

移花宫.com邀月.com怜星.com花无缺.comyhgbt.icuyhgbt.top

磁力链接下载

magnet:?xt=urn:btih:9724B2731D4DCE0440C490EC7E13DB424C18E8B7
推荐使用PIKPAK网盘下载资源,10TB超大空间,不限制资源,无限次数离线下载,视频在线观看

下载BT种子文件

磁力链接 迅雷下载 PIKPAK在线播放 世界之窗 91视频 含羞草 欲漫涩 逼哩逼哩 成人快手 51品茶 抖阴破解版 极乐禁地 91短视频 她趣 TikTok成人版 PornHub 听泉鉴鲍 草榴社区 哆哔涩漫 呦乐园 萝莉岛

最近搜索

百度云泄密 爱可 外国小萝莉 国外小萝莉 avop-062 院的 濃厚 玩高跟 伦大神 包臀 打脸 高慢 网红美女 大乳头少妇 机智的监狱生活 站着 黑逼自慰 两对 爆力 高清特写 【源源】 骚鸡巴 fc2+ppv 黑喷 一半 小年 腿腿姐 【-faye-】 美姐 礼物

文件列表

  • 04 The Windows Operating System/002 Windows at a Glance.mp4 420.0 MB
  • 19 Exploitation/011 SQL Injection & SQLMap.mp4 395.9 MB
  • 18 Reconnaissance/008 Active Recon - Port Scanning.mp4 321.0 MB
  • 25 Job Hunting/006 Analyzing the Job Post.mp4 301.2 MB
  • 20 Post Exploitation/001 Stabilizing Shells.mp4 268.4 MB
  • 04 The Windows Operating System/006 Windows Internals - Permissions.mp4 264.0 MB
  • 18 Reconnaissance/013 Active Recon - Working with NC.mp4 260.6 MB
  • 16 Assembly Course/005 Arithmetic.mp4 241.4 MB
  • 23 Reporting/001 The Format.mp4 234.6 MB
  • 20 Post Exploitation/007 OS Version.mp4 213.9 MB
  • 19 Exploitation/005 Metasploit - Exploits and Payloads.mp4 193.7 MB
  • 04 The Windows Operating System/016 Windows Command Line - Working with Pipes.mp4 192.0 MB
  • 20 Post Exploitation/009 File Permissions.mp4 188.6 MB
  • 20 Post Exploitation/008 Common Configuration Issues.mp4 175.5 MB
  • 20 Post Exploitation/002 Breaking Out Of The Jail Shell.mp4 175.1 MB
  • 16 Assembly Course/002 Hello World.mp4 173.7 MB
  • 07 Active Directory/008 Setting up Group Policies.mp4 167.2 MB
  • 19 Exploitation/001 Finding Exploits.mp4 163.9 MB
  • 19 Exploitation/014 Local File Inclusion.mp4 156.7 MB
  • 19 Exploitation/006 Metasploit - The Meterpreter.mp4 156.5 MB
  • 04 The Windows Operating System/015 Windows Command Line - Working with Files and Directories.mp4 155.4 MB
  • 25 Job Hunting/004 Personal Brand.mp4 152.6 MB
  • 20 Post Exploitation/014 Service Misconfigurations.mp4 149.1 MB
  • 04 The Windows Operating System/007 Windows Internals - Alternate Data Streams.mp4 147.0 MB
  • 18 Reconnaissance/012 Active Recon - Sparta.mp4 144.0 MB
  • 04 The Windows Operating System/001 Installing & Using VirtualBox for Lab Virtualization.mp4 143.4 MB
  • 04 The Windows Operating System/014 Windows Command Line - Navigation.mp4 142.7 MB
  • 04 The Windows Operating System/008 Windows Internals - API Calls.mp4 142.2 MB
  • 25 Job Hunting/005 Searching for the Job.mp4 142.0 MB
  • 04 The Windows Operating System/004 Windows Logs.mp4 141.8 MB
  • 25 Job Hunting/001 The Resume.mp4 140.2 MB
  • 04 The Windows Operating System/018 Windows Command Line - Managing Windows.mp4 139.1 MB
  • 16 Assembly Course/008 Reading Files.mp4 136.5 MB
  • 20 Post Exploitation/010 MySQL.mp4 131.5 MB
  • 20 Post Exploitation/013 Unquoted Service Path.mp4 130.6 MB
  • 20 Post Exploitation/028 Pivoting.mp4 130.2 MB
  • 18 Reconnaissance/003 Passive Recon - Google.mp4 127.7 MB
  • 25 Job Hunting/009 Salary Requirements.mp4 125.9 MB
  • 19 Exploitation/012 XSS.mp4 124.2 MB
  • 04 The Windows Operating System/003 The Windows File System.mp4 123.4 MB
  • 25 Job Hunting/003 Certifications.mp4 123.0 MB
  • 07 Active Directory/007 Adding Machine to the Domain.mp4 121.1 MB
  • 25 Job Hunting/012 The Interview Process - The Technical Screening Interview.mp4 121.0 MB
  • 18 Reconnaissance/002 Installing Kali.mp4 120.9 MB
  • 19 Exploitation/010 The OWASP Top 10.mp4 120.7 MB
  • 16 Assembly Course/007 Logic Control.mp4 117.3 MB
  • 20 Post Exploitation/017 Pulling Hashes.mp4 112.6 MB
  • 19 Exploitation/004 Metasploit - What is Metasploit_.mp4 111.3 MB
  • 05 The Linux Operating System/012 Linux Processes.mp4 111.0 MB
  • 18 Reconnaissance/006 Passive Recon - Netcraft.mp4 109.7 MB
  • 25 Job Hunting/008 The Future Company.mp4 107.6 MB
  • 18 Reconnaissance/007 Passive Recon - Job Posting.mp4 105.9 MB
  • 13 Configuring PFSense Firewalls/004 Configuring a VPN.mp4 103.8 MB
  • 04 The Windows Operating System/012 Windows Internals - PE Files & DLLs.mp4 103.1 MB
  • 13 Configuring PFSense Firewalls/001 Installing PFSense.mp4 102.5 MB
  • 13 Configuring PFSense Firewalls/003 Configuring a DMZ.mp4 100.5 MB
  • 18 Reconnaissance/005 Passive Recon - Whois.mp4 100.4 MB
  • 03 Penetration Testing Process/003 Metrics & Why They Are Important.mp4 99.9 MB
  • 20 Post Exploitation/004 Windows Persistence.mp4 98.9 MB
  • 16 Assembly Course/004 Saving States.mp4 98.1 MB
  • 19 Exploitation/008 Metasploit - MSFVenom.mp4 97.4 MB
  • 20 Post Exploitation/015 LinuxPrivChecker.mp4 97.2 MB
  • 20 Post Exploitation/027 SSH Tunneling.mp4 96.9 MB
  • 19 Exploitation/015 Remote File Inclusion.mp4 96.5 MB
  • 20 Post Exploitation/012 Relative Path Sudo Binary.mp4 96.3 MB
  • 13 Configuring PFSense Firewalls/002 The Firewall UI.mp4 95.6 MB
  • 18 Reconnaissance/014 Active Recon - Banner Grabbing.mp4 95.3 MB
  • 07 Active Directory/003 Install AD DS.mp4 94.6 MB
  • 19 Exploitation/007 Metasploit - Adding an Exploit to Metasploit.mp4 94.0 MB
  • 25 Job Hunting/011 The Interview Process - Prepping for the Technical Interviews.mp4 92.5 MB
  • 07 Active Directory/005 OU's and their Permissions.mp4 92.3 MB
  • 04 The Windows Operating System/013 Windows Command Line - Accessing the Command Line.mp4 91.6 MB
  • 18 Reconnaissance/010 Active Recon - Nikto.mp4 91.5 MB
  • 05 The Linux Operating System/006 Linux Command Line - Working with Data.mp4 91.5 MB
  • 18 Reconnaissance/016 Active Recon - Browsing.mp4 87.6 MB
  • 24 Attacking Active Directory (Realistic Scenario)/006 Getting Domain Admin.mp4 86.7 MB
  • 22 Covering Your Tracks/003 Clearing Linux Logs.mp4 86.1 MB
  • 20 Post Exploitation/006 What is Privilege Escalation_.mp4 84.8 MB
  • 03 Penetration Testing Process/010 Building & Working with an Enterprise Budget.mp4 84.7 MB
  • 20 Post Exploitation/022 Network Traffic.mp4 84.6 MB
  • 20 Post Exploitation/019 SSH Keys.mp4 83.6 MB
  • 07 Active Directory/002 Basic Windows Server Configuration.mp4 81.1 MB
  • 07 Active Directory/004 The AD Tree.mp4 80.8 MB
  • 05 The Linux Operating System/004 Linux Command Line - Working with Files and Directories.mp4 80.7 MB
  • 20 Post Exploitation/011 Sudo.mp4 80.2 MB
  • 04 The Windows Operating System/005 Windows Internals - UAC.mp4 80.1 MB
  • 18 Reconnaissance/017 Active Recon - Manual vs Automated.mp4 79.7 MB
  • 03 Penetration Testing Process/009 Routine Assessments Part 6 - Building an Assessment Plan.mp4 79.5 MB
  • 18 Reconnaissance/009 Active Recon - DNS.mp4 77.8 MB
  • 20 Post Exploitation/023 ARP Poisoning.mp4 77.1 MB
  • 16 Assembly Course/009 Writing Files.mp4 71.4 MB
  • 24 Attacking Active Directory (Realistic Scenario)/004 Finding New Access.mp4 71.4 MB
  • 15 Python Course/007 If_Else.mp4 70.2 MB
  • 16 Assembly Course/010 Op Code.mp4 68.0 MB
  • 18 Reconnaissance/011 Active Recon - Dirb.mp4 66.6 MB
  • 16 Assembly Course/003 Variables.mp4 66.0 MB
  • 18 Reconnaissance/004 Passive Recon - Shodan.mp4 65.4 MB
  • 20 Post Exploitation/005 Linux Persistence.mp4 64.8 MB
  • 05 The Linux Operating System/014 Working with Open Files.mp4 63.6 MB
  • 22 Covering Your Tracks/004 Quick Talk on Logging.mp4 63.3 MB
  • 22 Covering Your Tracks/005 Clearing Command History.mp4 60.4 MB
  • 15 Python Course/014 Inheritance.mp4 59.2 MB
  • 21 Password Cracking/003 Hashcat.mp4 59.2 MB
  • 25 Job Hunting/007 Applying for the Job.mp4 59.0 MB
  • 20 Post Exploitation/016 Im Root Now What_.mp4 58.1 MB
  • 04 The Windows Operating System/017 Windows Command Line - Standard I_O_E.mp4 54.8 MB
  • 24 Attacking Active Directory (Realistic Scenario)/005 Moving Up In The World!.mp4 54.1 MB
  • 15 Python Course/018 Sockets.mp4 52.1 MB
  • 22 Covering Your Tracks/002 Clearing Windows Logs.mp4 51.2 MB
  • 07 Active Directory/009 Cached Credentials.mp4 50.2 MB
  • 06 Operating System Internals/010 Debuggers.mp4 49.7 MB
  • 15 Python Course/002 Installing Python.mp4 49.4 MB
  • 10 Networking/003 TCP_IP.mp4 49.0 MB
  • 15 Python Course/010 Lists.mp4 48.6 MB
  • 16 Assembly Course/006 Loops.mp4 48.0 MB
  • 15 Python Course/009 The Dictionary.mp4 47.6 MB
  • 19 Exploitation/016 The Authenticated Unauthenticated Pages.mp4 47.4 MB
  • 06 Operating System Internals/001 The Kernel.mp4 47.1 MB
  • 05 The Linux Operating System/017 Linux Pipes.mp4 46.8 MB
  • 22 Covering Your Tracks/007 The Clean Up.mp4 46.7 MB
  • 25 Job Hunting/015 The Interview Process - The Offer.mp4 46.7 MB
  • 05 The Linux Operating System/007 Linux Command Line - Working with File Permissions.mp4 46.3 MB
  • 13 Configuring PFSense Firewalls/005 Backup & Logging.mp4 45.8 MB
  • 24 Attacking Active Directory (Realistic Scenario)/003 Post Exploitation.mp4 44.3 MB
  • 02 The 3 Teams/002 The Red Team.mp4 44.1 MB
  • 10 Networking/009 DNS.mp4 44.1 MB
  • 15 Python Course/013 Classes.mp4 43.9 MB
  • 04 The Windows Operating System/011 Windows Internals - Named Pipes.mp4 43.9 MB
  • 05 The Linux Operating System/010 Linux Command Line - Hex.mp4 43.9 MB
  • 06 Operating System Internals/004 The CPU Registers.mp4 43.3 MB
  • 04 The Windows Operating System/010 Windows Internals - Tokens.mp4 42.5 MB
  • 20 Post Exploitation/026 Password Spraying.mp4 42.1 MB
  • 19 Exploitation/017 Broken Authentication and Session Management.mp4 42.0 MB
  • 03 Penetration Testing Process/006 Routine Assessments Part 3 - Quarterly Assessments_.mp4 42.0 MB
  • 05 The Linux Operating System/011 Linux Command Line - Network Connections Recap.mp4 41.8 MB
  • 15 Python Course/003 Hello World.mp4 41.8 MB
  • 15 Python Course/019 Threading.mp4 41.6 MB
  • 21 Password Cracking/002 John The Ripper.mp4 41.6 MB
  • 24 Attacking Active Directory (Realistic Scenario)/002 Exploitation.mp4 40.7 MB
  • 11 VPNs/002 What is IPSEC_.mp4 40.1 MB
  • 15 Python Course/017 Error Handling.mp4 39.9 MB
  • 19 Exploitation/013 Insecure Direct Object Reference.mp4 39.2 MB
  • 05 The Linux Operating System/015 Symbolic Links.mp4 39.0 MB
  • 20 Post Exploitation/018 Pass The Hash.mp4 38.9 MB
  • 07 Active Directory/001 What is Active Directory.mp4 37.8 MB
  • 10 Networking/001 What is Networking_.mp4 37.2 MB
  • 08 Kerberos/004 The Ticket Granting Server.mp4 36.9 MB
  • 03 Penetration Testing Process/002 Penetration Testing Methodology.mp4 35.7 MB
  • 21 Password Cracking/004 Rainbow Tables.mp4 34.7 MB
  • 15 Python Course/008 Loops.mp4 34.2 MB
  • 15 Python Course/004 Variables.mp4 34.1 MB
  • 17 Scope Identification/002 Stability Considerations.mp4 33.9 MB
  • 25 Job Hunting/010 The Interview Process - The Screening Call.mp4 33.6 MB
  • 04 The Windows Operating System/009 Windows Internals - The SID.mp4 33.3 MB
  • 07 Active Directory/006 Managing Users and Groups.mp4 33.2 MB
  • 24 Attacking Active Directory (Realistic Scenario)/001 Reconnaissance.mp4 32.5 MB
  • 05 The Linux Operating System/019 Linux Logs.mp4 32.0 MB
  • 10 Networking/006 Routers & Gateways.mp4 31.8 MB
  • 05 The Linux Operating System/003 Linux Command Line - Navigation.mp4 31.6 MB
  • 18 Reconnaissance/018 Reconnaissance Hands On.mp4 31.5 MB
  • 20 Post Exploitation/025 Account Directory Attacks.mp4 31.5 MB
  • 03 Penetration Testing Process/008 Routine Assessments Part 5 - Constant Assessments_.mp4 31.4 MB
  • 05 The Linux Operating System/005 Linux Command Line - Standard I_O_E Recap.mp4 31.2 MB
  • 11 VPNs/003 What is IKE_.mp4 30.5 MB
  • 10 Networking/010 DHCP.mp4 29.9 MB
  • 05 The Linux Operating System/013 What are INodes_.mp4 29.7 MB
  • 10 Networking/008 ICMP.mp4 29.5 MB
  • 01 Welcome! Who Is This Guy_!/001 Introduction.mp4 28.8 MB
  • 15 Python Course/012 Modules.mp4 28.7 MB
  • 17 Scope Identification/001 Goal & Scope Identification.mp4 28.7 MB
  • 06 Operating System Internals/007 The Stack.mp4 27.7 MB
  • 06 Operating System Internals/002 One Ring to Rule Them All.mp4 27.7 MB
  • 05 The Linux Operating System/009 Linux Command Line - Base64.mp4 27.1 MB
  • 02 The 3 Teams/004 The Purple Team.mp4 27.0 MB
  • 03 Penetration Testing Process/005 Routine Assessments Part 2 - Yearly Assessments.mp4 26.9 MB
  • 05 The Linux Operating System/016 The ID's.mp4 26.9 MB
  • 15 Python Course/016 Logging.mp4 26.2 MB
  • 10 Networking/011 ARP.mp4 26.2 MB
  • 10 Networking/013 What is an IPS.mp4 25.9 MB
  • 25 Job Hunting/014 The Interview Process - The Onsite.mp4 25.6 MB
  • 18 Reconnaissance/015 Active Recon - Vulnerability Scanners.mp4 24.9 MB
  • 02 The 3 Teams/003 The Blue Team.mp4 24.9 MB
  • 23 Reporting/003 Business Risks on Findings.mp4 24.9 MB
  • 05 The Linux Operating System/008 Linux Command Line - Man Pages.mp4 24.4 MB
  • 10 Networking/017 Quick Talk on Databases.mp4 23.7 MB
  • 20 Post Exploitation/020 Checking Logs.mp4 23.6 MB
  • 05 The Linux Operating System/002 The Linux File System.mp4 23.5 MB
  • 22 Covering Your Tracks/006 Persistent Backdoors.mp4 23.4 MB
  • 10 Networking/005 The Switch.mp4 23.2 MB
  • 21 Password Cracking/001 What is Password Cracking_.mp4 23.1 MB
  • 09 Data Manipulation/010 Base64 Encoding.mp4 22.4 MB
  • 09 Data Manipulation/003 Asymmetric Encryption.mp4 21.9 MB
  • 10 Networking/014 What is HA_.mp4 21.7 MB
  • 10 Networking/002 The OSI Model.mp4 21.6 MB
  • 06 Operating System Internals/012 A Quick Word About AntiVirus.mp4 21.2 MB
  • 09 Data Manipulation/011 Hex Encoding.mp4 21.0 MB
  • 15 Python Course/015 Configuration Files.mp4 21.0 MB
  • 06 Operating System Internals/009 Extra information on Memory.mp4 20.6 MB
  • 14 Program Theory/002 What is a Linker_.mp4 20.3 MB
  • 19 Exploitation/003 Looking for 0 days.mp4 20.3 MB
  • 15 Python Course/005 Type Casting.mp4 20.0 MB
  • 17 Scope Identification/004 Prepping.mp4 19.9 MB
  • 25 Job Hunting/013 The Interview Process - Prepping for the On Site Final Interview.mp4 19.7 MB
  • 22 Covering Your Tracks/001 Why Cover Your Tracks_.mp4 19.4 MB
  • 03 Penetration Testing Process/007 Routine Assessments Part 4- Monthly Assessments_.mp4 19.2 MB
  • 05 The Linux Operating System/018 Linux Run Levels.mp4 19.2 MB
  • 09 Data Manipulation/008 SHA Hashing.mp4 19.1 MB
  • 03 Penetration Testing Process/004 Routine Assessments Part 1 - What Are Routine Assessments_.mp4 19.0 MB
  • 14 Program Theory/001 What is a Compiler_.mp4 18.8 MB
  • 20 Post Exploitation/024 Web Servers.mp4 18.7 MB
  • 09 Data Manipulation/014 Lossless vs Lossy Compression.mp4 17.7 MB
  • 03 Penetration Testing Process/011 Specialties_!.mp4 17.7 MB
  • 19 Exploitation/002 Misconfigurations.mp4 17.7 MB
  • 05 The Linux Operating System/001 Where is the GUI_!.mp4 17.6 MB
  • 08 Kerberos/001 What is Kerberos_.mp4 17.5 MB
  • 12 Firewalls/001 What is a Firewall_.mp4 17.5 MB
  • 15 Python Course/001 Why Python_.mp4 17.3 MB
  • 09 Data Manipulation/002 Symmetric Encryption.mp4 17.1 MB
  • 15 Python Course/011 Tuples.mp4 17.1 MB
  • 10 Networking/012 What is an IDS.mp4 17.1 MB
  • 18 Reconnaissance/001 What is Reconnaissance_.mp4 16.9 MB
  • 23 Reporting/002 The Audience.mp4 16.6 MB
  • 20 Post Exploitation/021 Duel Homed Machines.mp4 16.5 MB
  • 15 Python Course/006 Operators.mp4 16.4 MB
  • 08 Kerberos/003 The Authentication Server.mp4 16.1 MB
  • 06 Operating System Internals/006 What is Memory & How does it work_.mp4 15.9 MB
  • 19 Exploitation/018 Faulty Redirects.mp4 15.8 MB
  • 06 Operating System Internals/008 The Heap.mp4 15.8 MB
  • 16 Assembly Course/011 Bit Operators.mp4 15.5 MB
  • 09 Data Manipulation/001 What is Encryption.mp4 15.5 MB
  • 09 Data Manipulation/012 URL Encoding.mp4 15.1 MB
  • 19 Exploitation/009 Metasploit - Hands On.mp4 14.8 MB
  • 03 Penetration Testing Process/012 The CIA Triangle.mp4 14.7 MB
  • 03 Penetration Testing Process/001 Module Overview - Penetration Testing Process.mp4 14.6 MB
  • 10 Networking/015 Proxys.mp4 14.0 MB
  • 23 Reporting/004 Remediation Options.mp4 13.4 MB
  • 09 Data Manipulation/013 What is Compression_.mp4 13.3 MB
  • 10 Networking/016 The DMZ.mp4 13.0 MB
  • 25 Job Hunting/002 Professional Email.mp4 13.0 MB
  • 06 Operating System Internals/011 Taking a look at ASLR.mp4 12.9 MB
  • 12 Firewalls/003 Stateful Inspecting Firewalls.mp4 12.6 MB
  • 09 Data Manipulation/006 What is Hashing_.mp4 11.8 MB
  • 15 Python Course/020 Python Hands On.mp4 11.7 MB
  • 17 Scope Identification/003 Briefing Stake Holders.mp4 11.4 MB
  • 20 Post Exploitation/003 What is Persistence_.mp4 11.3 MB
  • 10 Networking/004 UDP.mp4 11.1 MB
  • 06 Operating System Internals/005 The CPU Flags.mp4 11.1 MB
  • 11 VPNs/001 What is a VPN.mp4 10.9 MB
  • 09 Data Manipulation/007 MD5 Hashing.mp4 10.9 MB
  • 06 Operating System Internals/003 What is a CPU_.mp4 10.5 MB
  • 09 Data Manipulation/015 LZ77 & LZ78 Compression Algorithms.mp4 10.3 MB
  • 23 Reporting/005 Working With The Blue Team.mp4 10.0 MB
  • 09 Data Manipulation/004 RSA Encryption.mp4 9.9 MB
  • 17 Scope Identification/005 Scope Identification Hands On.mp4 9.9 MB
  • 12 Firewalls/004 Web Application Firewalls.mp4 9.8 MB
  • 13 Configuring PFSense Firewalls/006 PFsense Hands On.mp4 9.5 MB
  • 08 Kerberos/002 Kerberos Realms.mp4 9.5 MB
  • 09 Data Manipulation/009 What is Encoding_.mp4 9.1 MB
  • 16 Assembly Course/001 Why Assembly_.mp4 8.4 MB
  • 09 Data Manipulation/016 Data Manipulation - Hands On.mp4 8.2 MB
  • 09 Data Manipulation/005 AES Encryption.mp4 8.1 MB
  • 25 Job Hunting/016 Congratulations!.mp4 8.0 MB
  • 21 Password Cracking/005 Password Cracking Hands On.mp4 6.1 MB
  • 10 Networking/007 What is a Protocol_.mp4 5.9 MB
  • 16 Assembly Course/012 Assembly Hands On.mp4 5.9 MB
  • 12 Firewalls/002 Packet Filtering Firewalls.mp4 5.6 MB
  • 02 The 3 Teams/001 Module Overview - The 3 Teams.mp4 4.5 MB
  • 22 Covering Your Tracks/008 Covering Your Tracks Hands On.mp4 3.4 MB
  • 06 Operating System Internals/064 Debugger.pptx 455.3 kB
  • 10 Networking/100 The Switch.pptx 414.7 kB
  • 04 The Windows Operating System/022 Windows UAC.pptx 167.9 kB
  • 04 The Windows Operating System/026 SID.pptx 138.8 kB
  • 05 The Linux Operating System/042 Linux File Permissions.pptx 137.3 kB
  • 06 Operating System Internals/055 The Kernel.pptx 122.7 kB
  • 06 Operating System Internals/058 Registers.pptx 122.4 kB
  • 04 The Windows Operating System/029 PE Files and DLLs.pptx 121.1 kB
  • 05 The Linux Operating System/047 Processes.pptx 119.9 kB
  • 23 Reporting/242 Report Template.docx 114.6 kB
  • 09 Data Manipulation/089 Base64.pptx 112.6 kB
  • 05 The Linux Operating System/049 Open FIles.pptx 110.4 kB
  • 05 The Linux Operating System/037 The Linux File System.pptx 110.2 kB
  • 10 Networking/096 What is Networking.pptx 110.1 kB
  • 03 Penetration Testing Process/007 Penetration Testing Methodology.pptx 109.0 kB
  • 10 Networking/097 OSI Model.pptx 105.9 kB
  • 05 The Linux Operating System/050 Symbolic Links.pptx 105.3 kB
  • 06 Operating System Internals/056 One Ring to Rule Them All.pptx 104.8 kB
  • 08 Kerberos/079 The Ticket Granting Server.pptx 104.7 kB
  • 11 VPNs/114 What is a IPSEC.pptx 104.6 kB
  • 04 The Windows Operating System/027 Tokens.pptx 104.5 kB
  • 04 The Windows Operating System/020 The Windows File System.pptx 104.2 kB
  • 06 Operating System Internals/066 AntiVirus.pptx 104.1 kB
  • 06 Operating System Internals/063 More on Memory.pptx 104.1 kB
  • 09 Data Manipulation/082 Asymmetric Encryption.pptx 103.9 kB
  • 06 Operating System Internals/065 ASLR.pptx 103.8 kB
  • 11 VPNs/115 What is a IKE.pptx 103.3 kB
  • 03 Penetration Testing Process/006 Penetration Testing Process - Module Overview.pptx 103.1 kB
  • 10 Networking/105 DHCP.pptx 102.8 kB
  • 19 Exploitation/199 Broken Auth.pptx 102.8 kB
  • 10 Networking/098 TCPIP.pptx 102.7 kB
  • 04 The Windows Operating System/028 Windows Pipes.pptx 102.5 kB
  • 05 The Linux Operating System/053 Run Levels.pptx 102.2 kB
  • 05 The Linux Operating System/048 Inodes.pptx 101.9 kB
  • 21 Password Cracking/232 Rainbow Tables.pptx 101.7 kB
  • 03 Penetration Testing Process/011 Quarterly Assessments.pptx 101.4 kB
  • 10 Networking/104 DNS.pptx 101.4 kB
  • 21 Password Cracking/229 What is Password Cracking.pptx 101.2 kB
  • 03 Penetration Testing Process/017 CIA Triangle.pptx 101.0 kB
  • 06 Operating System Internals/061 The Stack.pptx 100.9 kB
  • 03 Penetration Testing Process/016 Specialties.pptx 100.7 kB
  • 06 Operating System Internals/057 What is a CPU.pptx 100.5 kB
  • 16 Assembly Course/158 Bit Operators.pptx 100.3 kB
  • 03 Penetration Testing Process/013 Constant Assessments.pptx 99.8 kB
  • 02 The 3 Teams/004 The Blue Team.pptx 99.8 kB
  • 02 The 3 Teams/003 The Red Team.pptx 99.7 kB
  • 17 Scope Identification/160 Goal and Scope Identification.pptx 99.6 kB
  • 25 Job Hunting/267 The Offer.pptx 99.5 kB
  • 08 Kerberos/078 The Authentication Sever.pptx 99.4 kB
  • 23 Reporting/244 Buisness Risk on Findings.pptx 99.3 kB
  • 02 The 3 Teams/005 The Purple Team.pptx 99.3 kB
  • 09 Data Manipulation/081 Symmetric Encryption.pptx 99.2 kB
  • 22 Covering Your Tracks/234 Why Cover Your Tracks.pptx 99.1 kB
  • 06 Operating System Internals/059 Flags.pptx 98.7 kB
  • 09 Data Manipulation/092 What is Compression.pptx 98.5 kB
  • 03 Penetration Testing Process/010 Yearly Assessments.pptx 98.5 kB
  • 06 Operating System Internals/060 Memory.pptx 98.4 kB
  • 03 Penetration Testing Process/012 Monthly Assessments.pptx 98.4 kB
  • 23 Reporting/243 The Audience.pptx 98.4 kB
  • 12 Firewalls/116 What is a Firewall.pptx 98.4 kB
  • 14 Program Theory/126 What is a Compiler.pptx 98.3 kB
  • 10 Networking/112 Quick Talk on Databases.pptx 98.3 kB
  • 10 Networking/103 ICMP.pptx 98.1 kB
  • 10 Networking/106 ARP.pptx 98.1 kB
  • 10 Networking/108 What is an IPS.pptx 98.1 kB
  • 17 Scope Identification/161 Stability Considerations.pptx 98.0 kB
  • 09 Data Manipulation/090 Hex.pptx 98.0 kB
  • 10 Networking/107 What is an IDS.pptx 97.9 kB
  • 08 Kerberos/076 What is Kerberos.pptx 97.8 kB
  • 18 Reconnaissance/179 Vuln Scanners.pptx 97.8 kB
  • 10 Networking/101 Routers and Gateways.pptx 97.8 kB
  • 05 The Linux Operating System/036 The GUI.pptx 97.8 kB
  • 20 Post Exploitation/203 What is Persistence.pptx 97.7 kB
  • 06 Operating System Internals/062 The Heap.pptx 97.6 kB
  • 07 Active Directory/067 What is Active Directory.pptx 97.4 kB
  • 25 Job Hunting/262 The Screening Call.pptx 97.3 kB
  • 19 Exploitation/184 Misconfigurations.pptx 97.1 kB
  • 25 Job Hunting/265 Prepping for the on site Interview.pptx 97.0 kB
  • 04 The Windows Operating System/025 API Calls.pptx 97.0 kB
  • 12 Firewalls/118 Stateful Inspection Firewalls.pptx 96.8 kB
  • 03 Penetration Testing Process/009 What Are Routine Assessments.pptx 96.8 kB
  • 09 Data Manipulation/080 What is Encryption.pptx 96.8 kB
  • 09 Data Manipulation/088 What is Encoding.pptx 96.6 kB
  • 09 Data Manipulation/091 URL.pptx 96.5 kB
  • 08 Kerberos/077 Kerberos Realm.pptx 96.5 kB
  • 09 Data Manipulation/085 What is Hashing.pptx 96.5 kB
  • 14 Program Theory/127 What is a Linker.pptx 96.5 kB
  • 12 Firewalls/117 Packet Filtering Firewalls.pptx 96.3 kB
  • 10 Networking/109 What is HA.pptx 96.3 kB
  • 17 Scope Identification/162 Briefing Stake Holders.pptx 96.2 kB
  • 09 Data Manipulation/093 Lossless vs Lossy.pptx 96.0 kB
  • 15 Python Course/147 Hands On Python.pptx 95.9 kB
  • 25 Job Hunting/266 Onsite Interview.pptx 95.8 kB
  • 18 Reconnaissance/165 What is Recon.pptx 95.7 kB
  • 09 Data Manipulation/094 LZ77 and LZ78.pptx 95.6 kB
  • 17 Scope Identification/164 Scope Identification Hands On.pptx 95.4 kB
  • 21 Password Cracking/233 Password Cracking Hands On.pptx 95.2 kB
  • 23 Reporting/246 Working With The Blue Team.pptx 95.2 kB
  • 12 Firewalls/119 Web Application Firewalls.pptx 95.0 kB
  • 10 Networking/110 Proxys.pptx 95.0 kB
  • 19 Exploitation/185 0Days.pptx 94.9 kB
  • 09 Data Manipulation/083 RSA.pptx 94.9 kB
  • 09 Data Manipulation/087 SHA.pptx 94.8 kB
  • 16 Assembly Course/148 Why ASM.pptx 94.8 kB
  • 09 Data Manipulation/084 AES.pptx 94.8 kB
  • 09 Data Manipulation/086 MD5.pptx 94.8 kB
  • 11 VPNs/113 What is a VPN.pptx 94.8 kB
  • 19 Exploitation/191 Metasploit Hands On.pptx 94.7 kB
  • 23 Reporting/245 Remediation Options.pptx 94.7 kB
  • 13 Configuring PFSense Firewalls/125 PFSense Hands On.pptx 94.5 kB
  • 16 Assembly Course/159 Assembly Hands On.pptx 94.4 kB
  • 02 The 3 Teams/002 The 3 Teams.pptx 93.7 kB
  • 10 Networking/102 What is a Protocol.pptx 93.7 kB
  • 09 Data Manipulation/095 Data Manipulation Hands On.pptx 93.7 kB
  • 15 Python Course/128 Why Python.pptx 93.5 kB
  • 10 Networking/111 DMZ.pptx 93.4 kB
  • 10 Networking/099 UDP.pptx 93.3 kB
  • 19 Exploitation/011 SQL Injection & SQLMap.en.srt 44.4 kB
  • 25 Job Hunting/006 Analyzing the Job Post.en.srt 39.8 kB
  • 03 Penetration Testing Process/008 Metrics.xlsx 37.6 kB
  • 17 Scope Identification/163 Assessment Document Template.docx 34.7 kB
  • 04 The Windows Operating System/002 Windows at a Glance.en.srt 31.9 kB
  • 18 Reconnaissance/008 Active Recon - Port Scanning.en.srt 31.4 kB
  • 03 Penetration Testing Process/015 Budget Sample.xlsx 28.4 kB
  • 16 Assembly Course/005 Arithmetic.en.srt 26.4 kB
  • 03 Penetration Testing Process/014 Assessment Template.xlsx 25.0 kB
  • 03 Penetration Testing Process/015 Budget Template.xlsx 24.5 kB
  • 19 Exploitation/005 Metasploit - Exploits and Payloads.en.srt 24.4 kB
  • 16 Assembly Course/002 Hello World.en.srt 24.2 kB
  • 04 The Windows Operating System/012 Windows Internals - PE Files & DLLs.en.srt 23.6 kB
  • 23 Reporting/001 The Format.en.srt 23.5 kB
  • 04 The Windows Operating System/006 Windows Internals - Permissions.en.srt 23.2 kB
  • 19 Exploitation/012 XSS.en.srt 20.8 kB
  • 20 Post Exploitation/013 Unquoted Service Path.en.srt 20.6 kB
  • 19 Exploitation/006 Metasploit - The Meterpreter.en.srt 20.3 kB
  • 05 The Linux Operating System/006 Linux Command Line - Working with Data.en.srt 20.3 kB
  • 20 Post Exploitation/009 File Permissions.en.srt 20.2 kB
  • 20 Post Exploitation/028 Pivoting.en.srt 20.2 kB
  • 20 Post Exploitation/001 Stabilizing Shells.en.srt 20.2 kB
  • 15 Python Course/014 Inheritance.en.srt 20.1 kB
  • 25 Job Hunting/003 Certifications.en.srt 20.0 kB
  • 25 Job Hunting/004 Personal Brand.en.srt 19.9 kB
  • 25 Job Hunting/005 Searching for the Job.en.srt 19.8 kB
  • 25 Job Hunting/253 Resume.docx 19.5 kB
  • 20 Post Exploitation/010 MySQL.en.srt 19.3 kB
  • 04 The Windows Operating System/018 Windows Command Line - Managing Windows.en.srt 19.3 kB
  • 25 Job Hunting/012 The Interview Process - The Technical Screening Interview.en.srt 19.2 kB
  • 03 Penetration Testing Process/010 Building & Working with an Enterprise Budget.en.srt 18.9 kB
  • 05 The Linux Operating System/012 Linux Processes.en.srt 18.9 kB
  • 18 Reconnaissance/013 Active Recon - Working with NC.en.srt 18.6 kB
  • 07 Active Directory/008 Setting up Group Policies.en.srt 18.3 kB
  • 25 Job Hunting/015 The Interview Process - The Offer.en.srt 18.2 kB
  • 25 Job Hunting/009 Salary Requirements.en.srt 17.9 kB
  • 04 The Windows Operating System/003 The Windows File System.en.srt 17.7 kB
  • 15 Python Course/007 If_Else.en.srt 17.6 kB
  • 03 Penetration Testing Process/003 Metrics & Why They Are Important.en.srt 17.4 kB
  • 19 Exploitation/014 Local File Inclusion.en.srt 17.3 kB
  • 20 Post Exploitation/027 SSH Tunneling.en.srt 17.3 kB
  • 04 The Windows Operating System/008 Windows Internals - API Calls.en.srt 16.9 kB
  • 16 Assembly Course/008 Reading Files.en.srt 16.9 kB
  • 20 Post Exploitation/008 Common Configuration Issues.en.srt 16.9 kB
  • 06 Operating System Internals/001 The Kernel.en.srt 16.4 kB
  • 04 The Windows Operating System/004 Windows Logs.en.srt 16.3 kB
  • 15 Python Course/013 Classes.en.srt 16.1 kB
  • 20 Post Exploitation/005 Linux Persistence.en.srt 16.0 kB
  • 15 Python Course/018 Sockets.en.srt 15.8 kB
  • 25 Job Hunting/011 The Interview Process - Prepping for the Technical Interviews.en.srt 15.4 kB
  • 19 Exploitation/007 Metasploit - Adding an Exploit to Metasploit.en.srt 15.2 kB
  • 16 Assembly Course/004 Saving States.en.srt 15.2 kB
  • 20 Post Exploitation/017 Pulling Hashes.en.srt 15.2 kB
  • 20 Post Exploitation/007 OS Version.en.srt 15.1 kB
  • 19 Exploitation/001 Finding Exploits.en.srt 15.1 kB
  • 16 Assembly Course/007 Logic Control.en.srt 14.8 kB
  • 10 Networking/003 TCP_IP.en.srt 14.8 kB
  • 13 Configuring PFSense Firewalls/002 The Firewall UI.en.srt 14.7 kB
  • 15 Python Course/010 Lists.en.srt 14.5 kB
  • 07 Active Directory/004 The AD Tree.en.srt 14.5 kB
  • 05 The Linux Operating System/007 Linux Command Line - Working with File Permissions.en.srt 14.4 kB
  • 25 Job Hunting/008 The Future Company.en.srt 14.4 kB
  • 04 The Windows Operating System/001 Installing & Using VirtualBox for Lab Virtualization.en.srt 14.2 kB
  • 20 Post Exploitation/004 Windows Persistence.en.srt 14.1 kB
  • 03 Penetration Testing Process/006 Routine Assessments Part 3 - Quarterly Assessments_.en.srt 14.1 kB
  • 07 Active Directory/003 Install AD DS.en.srt 14.0 kB
  • 18 Reconnaissance/003 Passive Recon - Google.en.srt 13.9 kB
  • 25 Job Hunting/010 The Interview Process - The Screening Call.en.srt 13.8 kB
  • 05 The Linux Operating System/004 Linux Command Line - Working with Files and Directories.en.srt 13.6 kB
  • 18 Reconnaissance/012 Active Recon - Sparta.en.srt 13.5 kB
  • 11 VPNs/002 What is IPSEC_.en.srt 13.3 kB
  • 03 Penetration Testing Process/002 Penetration Testing Methodology.en.srt 13.2 kB
  • 02 The 3 Teams/002 The Red Team.en.srt 13.2 kB
  • 15 Python Course/009 The Dictionary.en.srt 13.2 kB
  • 03 Penetration Testing Process/008 Routine Assessments Part 5 - Constant Assessments_.en.srt 13.0 kB
  • 22 Covering Your Tracks/005 Clearing Command History.en.srt 12.8 kB
  • 19 Exploitation/017 Broken Authentication and Session Management.en.srt 12.8 kB
  • 04 The Windows Operating System/016 Windows Command Line - Working with Pipes.en.srt 12.8 kB
  • 20 Post Exploitation/011 Sudo.en.srt 12.8 kB
  • 25 Job Hunting/001 The Resume.en.srt 12.8 kB
  • 10 Networking/001 What is Networking_.en.srt 12.7 kB
  • 18 Reconnaissance/007 Passive Recon - Job Posting.en.srt 12.7 kB
  • 06 Operating System Internals/004 The CPU Registers.en.srt 12.6 kB
  • 04 The Windows Operating System/005 Windows Internals - UAC.en.srt 12.6 kB
  • 19 Exploitation/004 Metasploit - What is Metasploit_.en.srt 12.4 kB
  • 10 Networking/009 DNS.en.srt 12.4 kB
  • 13 Configuring PFSense Firewalls/003 Configuring a DMZ.en.srt 12.1 kB
  • 19 Exploitation/010 The OWASP Top 10.en.srt 12.1 kB
  • 17 Scope Identification/002 Stability Considerations.en.srt 12.0 kB
  • 15 Python Course/008 Loops.en.srt 12.0 kB
  • 20 Post Exploitation/002 Breaking Out Of The Jail Shell.en.srt 11.9 kB
  • 18 Reconnaissance/014 Active Recon - Banner Grabbing.en.srt 11.9 kB
  • 19 Exploitation/008 Metasploit - MSFVenom.en.srt 11.9 kB
  • 20 Post Exploitation/022 Network Traffic.en.srt 11.8 kB
  • 18 Reconnaissance/009 Active Recon - DNS.en.srt 11.5 kB
  • 13 Configuring PFSense Firewalls/001 Installing PFSense.en.srt 11.4 kB
  • 19 Exploitation/015 Remote File Inclusion.en.srt 11.3 kB
  • 04 The Windows Operating System/010 Windows Internals - Tokens.en.srt 11.3 kB
  • 24 Attacking Active Directory (Realistic Scenario)/006 Getting Domain Admin.en.srt 11.1 kB
  • 18 Reconnaissance/006 Passive Recon - Netcraft.en.srt 11.1 kB
  • 15 Python Course/019 Threading.en.srt 11.0 kB
  • 25 Job Hunting/014 The Interview Process - The Onsite.en.srt 11.0 kB
  • 20 Post Exploitation/012 Relative Path Sudo Binary.en.srt 10.9 kB
  • 03 Penetration Testing Process/009 Routine Assessments Part 6 - Building an Assessment Plan.en.srt 10.9 kB
  • 04 The Windows Operating System/015 Windows Command Line - Working with Files and Directories.en.srt 10.8 kB
  • 20 Post Exploitation/015 LinuxPrivChecker.en.srt 10.8 kB
  • 13 Configuring PFSense Firewalls/004 Configuring a VPN.en.srt 10.7 kB
  • 18 Reconnaissance/005 Passive Recon - Whois.en.srt 10.5 kB
  • 02 The 3 Teams/004 The Purple Team.en.srt 10.5 kB
  • 04 The Windows Operating System/007 Windows Internals - Alternate Data Streams.en.srt 10.4 kB
  • 15 Python Course/017 Error Handling.en.srt 10.4 kB
  • 20 Post Exploitation/023 ARP Poisoning.en.srt 10.4 kB
  • 07 Active Directory/002 Basic Windows Server Configuration.en.srt 10.4 kB
  • 20 Post Exploitation/014 Service Misconfigurations.en.srt 10.3 kB
  • 11 VPNs/003 What is IKE_.en.srt 10.2 kB
  • 15 Python Course/016 Logging.en.srt 10.2 kB
  • 08 Kerberos/004 The Ticket Granting Server.en.srt 10.1 kB
  • 17 Scope Identification/001 Goal & Scope Identification.en.srt 10.1 kB
  • 18 Reconnaissance/016 Active Recon - Browsing.en.srt 10.1 kB
  • 04 The Windows Operating System/014 Windows Command Line - Navigation.en.srt 10.0 kB
  • 15 Python Course/003 Hello World.en.srt 10.0 kB
  • 24 Attacking Active Directory (Realistic Scenario)/004 Finding New Access.en.srt 9.9 kB
  • 21 Password Cracking/003 Hashcat.en.srt 9.7 kB
  • 07 Active Directory/007 Adding Machine to the Domain.en.srt 9.7 kB
  • 15 Python Course/004 Variables.en.srt 9.6 kB
  • 05 The Linux Operating System/014 Working with Open Files.en.srt 9.6 kB
  • 18 Reconnaissance/002 Installing Kali.en.srt 9.5 kB
  • 04 The Windows Operating System/009 Windows Internals - The SID.en.srt 9.5 kB
  • 16 Assembly Course/009 Writing Files.en.srt 9.4 kB
  • 10 Networking/006 Routers & Gateways.en.srt 9.4 kB
  • 20 Post Exploitation/026 Password Spraying.en.srt 9.3 kB
  • 15 Python Course/012 Modules.en.srt 9.3 kB
  • 18 Reconnaissance/010 Active Recon - Nikto.en.srt 9.2 kB
  • 23 Reporting/003 Business Risks on Findings.en.srt 9.2 kB
  • 16 Assembly Course/010 Op Code.en.srt 9.2 kB
  • 10 Networking/008 ICMP.en.srt 9.2 kB
  • 10 Networking/010 DHCP.en.srt 9.1 kB
  • 07 Active Directory/005 OU's and their Permissions.en.srt 9.0 kB
  • 05 The Linux Operating System/015 Symbolic Links.en.srt 8.8 kB
  • 19 Exploitation/013 Insecure Direct Object Reference.en.srt 8.7 kB
  • 06 Operating System Internals/007 The Stack.en.srt 8.7 kB
  • 07 Active Directory/001 What is Active Directory.en.srt 8.5 kB
  • 18 Reconnaissance/004 Passive Recon - Shodan.en.srt 8.4 kB
  • 22 Covering Your Tracks/003 Clearing Linux Logs.en.srt 8.4 kB
  • 05 The Linux Operating System/002 The Linux File System.en.srt 8.4 kB
  • 06 Operating System Internals/002 One Ring to Rule Them All.en.srt 8.4 kB
  • 10 Networking/002 The OSI Model.en.srt 8.2 kB
  • 22 Covering Your Tracks/004 Quick Talk on Logging.en.srt 8.2 kB
  • 03 Penetration Testing Process/005 Routine Assessments Part 2 - Yearly Assessments.en.srt 8.2 kB
  • 04 The Windows Operating System/011 Windows Internals - Named Pipes.en.srt 8.2 kB
  • 25 Job Hunting/013 The Interview Process - Prepping for the On Site Final Interview.en.srt 8.1 kB
  • 05 The Linux Operating System/010 Linux Command Line - Hex.en.srt 8.1 kB
  • 19 Exploitation/016 The Authenticated Unauthenticated Pages.en.srt 8.1 kB
  • 06 Operating System Internals/012 A Quick Word About AntiVirus.en.srt 8.0 kB
  • 09 Data Manipulation/003 Asymmetric Encryption.en.srt 8.0 kB
  • 18 Reconnaissance/015 Active Recon - Vulnerability Scanners.en.srt 7.9 kB
  • 21 Password Cracking/004 Rainbow Tables.en.srt 7.8 kB
  • 06 Operating System Internals/010 Debuggers.en.srt 7.8 kB
  • 21 Password Cracking/002 John The Ripper.en.srt 7.7 kB
  • 21 Password Cracking/001 What is Password Cracking_.en.srt 7.7 kB
  • 16 Assembly Course/003 Variables.en.srt 7.6 kB
  • 18 Reconnaissance/011 Active Recon - Dirb.en.srt 7.5 kB
  • 02 The 3 Teams/003 The Blue Team.en.srt 7.5 kB
  • 25 Job Hunting/002 Professional Email.en.srt 7.3 kB
  • 03 Penetration Testing Process/007 Routine Assessments Part 4- Monthly Assessments_.en.srt 7.3 kB
  • 13 Configuring PFSense Firewalls/005 Backup & Logging.en.srt 7.3 kB
  • 20 Post Exploitation/019 SSH Keys.en.srt 7.2 kB
  • 16 Assembly Course/006 Loops.en.srt 7.2 kB
  • 14 Program Theory/002 What is a Linker_.en.srt 7.2 kB
  • 04 The Windows Operating System/013 Windows Command Line - Accessing the Command Line.en.srt 7.2 kB
  • 22 Covering Your Tracks/001 Why Cover Your Tracks_.en.srt 7.2 kB
  • 15 Python Course/005 Type Casting.en.srt 7.2 kB
  • 20 Post Exploitation/006 What is Privilege Escalation_.en.srt 7.1 kB
  • 20 Post Exploitation/018 Pass The Hash.en.srt 7.1 kB
  • 07 Active Directory/006 Managing Users and Groups.en.srt 7.1 kB
  • 10 Networking/013 What is an IPS.en.srt 7.0 kB
  • 10 Networking/014 What is HA_.en.srt 7.0 kB
  • 10 Networking/011 ARP.en.srt 7.0 kB
  • 09 Data Manipulation/008 SHA Hashing.en.srt 6.9 kB
  • 19 Exploitation/003 Looking for 0 days.en.srt 6.9 kB
  • 15 Python Course/015 Configuration Files.en.srt 6.7 kB
  • 03 Penetration Testing Process/004 Routine Assessments Part 1 - What Are Routine Assessments_.en.srt 6.7 kB
  • 03 Penetration Testing Process/011 Specialties_!.en.srt 6.6 kB
  • 23 Reporting/002 The Audience.en.srt 6.6 kB
  • 09 Data Manipulation/011 Hex Encoding.en.srt 6.5 kB
  • 12 Firewalls/001 What is a Firewall_.en.srt 6.5 kB
  • 10 Networking/017 Quick Talk on Databases.en.srt 6.5 kB
  • 09 Data Manipulation/010 Base64 Encoding.en.srt 6.4 kB
  • 18 Reconnaissance/017 Active Recon - Manual vs Automated.en.srt 6.4 kB
  • 04 The Windows Operating System/017 Windows Command Line - Standard I_O_E.en.srt 6.2 kB
  • 06 Operating System Internals/009 Extra information on Memory.en.srt 6.2 kB
  • 05 The Linux Operating System/003 Linux Command Line - Navigation.en.srt 6.2 kB
  • 05 The Linux Operating System/001 Where is the GUI_!.en.srt 6.2 kB
  • 18 Reconnaissance/001 What is Reconnaissance_.en.srt 6.2 kB
  • 19 Exploitation/002 Misconfigurations.en.srt 6.2 kB
  • 15 Python Course/002 Installing Python.en.srt 6.2 kB
  • 15 Python Course/006 Operators.en.srt 6.1 kB
  • 05 The Linux Operating System/013 What are INodes_.en.srt 6.1 kB
  • 10 Networking/005 The Switch.en.srt 6.1 kB
  • 05 The Linux Operating System/011 Linux Command Line - Network Connections Recap.en.srt 6.1 kB
  • 15 Python Course/001 Why Python_.en.srt 6.1 kB
  • 20 Post Exploitation/025 Account Directory Attacks.en.srt 6.0 kB
  • 19 Exploitation/018 Faulty Redirects.en.srt 6.0 kB
  • 14 Program Theory/001 What is a Compiler_.en.srt 5.7 kB
  • 24 Attacking Active Directory (Realistic Scenario)/005 Moving Up In The World!.en.srt 5.7 kB
  • 05 The Linux Operating System/018 Linux Run Levels.en.srt 5.6 kB
  • 05 The Linux Operating System/008 Linux Command Line - Man Pages.en.srt 5.6 kB
  • 05 The Linux Operating System/005 Linux Command Line - Standard I_O_E Recap.en.srt 5.6 kB
  • 08 Kerberos/001 What is Kerberos_.en.srt 5.6 kB
  • 10 Networking/015 Proxys.en.srt 5.5 kB
  • 15 Python Course/011 Tuples.en.srt 5.5 kB
  • 24 Attacking Active Directory (Realistic Scenario)/002 Exploitation.en.srt 5.3 kB
  • 10 Networking/012 What is an IDS.en.srt 5.3 kB
  • 23 Reporting/004 Remediation Options.en.srt 5.3 kB
  • 05 The Linux Operating System/019 Linux Logs.en.srt 5.3 kB
  • 03 Penetration Testing Process/001 Module Overview - Penetration Testing Process.en.srt 5.3 kB
  • 09 Data Manipulation/002 Symmetric Encryption.en.srt 5.2 kB
  • 06 Operating System Internals/006 What is Memory & How does it work_.en.srt 5.2 kB
  • 22 Covering Your Tracks/006 Persistent Backdoors.en.srt 5.2 kB
  • 09 Data Manipulation/001 What is Encryption.en.srt 5.1 kB
  • 06 Operating System Internals/008 The Heap.en.srt 5.1 kB
  • 22 Covering Your Tracks/002 Clearing Windows Logs.en.srt 5.0 kB
  • 16 Assembly Course/011 Bit Operators.en.srt 5.0 kB
  • 17 Scope Identification/004 Prepping.en.srt 5.0 kB
  • 08 Kerberos/003 The Authentication Server.en.srt 5.0 kB
  • 09 Data Manipulation/013 What is Compression_.en.srt 4.9 kB
  • 24 Attacking Active Directory (Realistic Scenario)/003 Post Exploitation.en.srt 4.9 kB
  • 09 Data Manipulation/006 What is Hashing_.en.srt 4.9 kB
  • 19 Exploitation/009 Metasploit - Hands On.en.srt 4.8 kB
  • 09 Data Manipulation/014 Lossless vs Lossy Compression.en.srt 4.8 kB
  • 20 Post Exploitation/016 Im Root Now What_.en.srt 4.8 kB
  • 24 Attacking Active Directory (Realistic Scenario)/001 Reconnaissance.en.srt 4.7 kB
  • 06 Operating System Internals/011 Taking a look at ASLR.en.srt 4.7 kB
  • 03 Penetration Testing Process/012 The CIA Triangle.en.srt 4.6 kB
  • 22 Covering Your Tracks/007 The Clean Up.en.srt 4.6 kB
  • 05 The Linux Operating System/017 Linux Pipes.en.srt 4.4 kB
  • 09 Data Manipulation/012 URL Encoding.en.srt 4.3 kB
  • 07 Active Directory/009 Cached Credentials.en.srt 4.1 kB
  • 12 Firewalls/003 Stateful Inspecting Firewalls.en.srt 4.1 kB
  • 05 The Linux Operating System/016 The ID's.en.srt 4.1 kB
  • 06 Operating System Internals/003 What is a CPU_.en.srt 4.0 kB
  • 15 Python Course/020 Python Hands On.en.srt 3.9 kB
  • 11 VPNs/001 What is a VPN.en.srt 3.9 kB
  • 10 Networking/016 The DMZ.en.srt 3.9 kB
  • 17 Scope Identification/003 Briefing Stake Holders.en.srt 3.8 kB
  • 09 Data Manipulation/007 MD5 Hashing.en.srt 3.8 kB
  • 17 Scope Identification/005 Scope Identification Hands On.en.srt 3.7 kB
  • 10 Networking/004 UDP.en.srt 3.7 kB
  • 20 Post Exploitation/024 Web Servers.en.srt 3.7 kB
  • 23 Reporting/005 Working With The Blue Team.en.srt 3.6 kB
  • 12 Firewalls/004 Web Application Firewalls.en.srt 3.5 kB
  • 06 Operating System Internals/005 The CPU Flags.en.srt 3.4 kB
  • 05 The Linux Operating System/009 Linux Command Line - Base64.en.srt 3.4 kB
  • 13 Configuring PFSense Firewalls/006 PFsense Hands On.en.srt 3.3 kB
  • 09 Data Manipulation/004 RSA Encryption.en.srt 3.3 kB
  • 16 Assembly Course/001 Why Assembly_.en.srt 3.2 kB
  • 20 Post Exploitation/021 Duel Homed Machines.en.srt 3.2 kB
  • 09 Data Manipulation/009 What is Encoding_.en.srt 3.1 kB
  • 09 Data Manipulation/015 LZ77 & LZ78 Compression Algorithms.en.srt 3.1 kB
  • 20 Post Exploitation/020 Checking Logs.en.srt 2.8 kB
  • 09 Data Manipulation/016 Data Manipulation - Hands On.en.srt 2.7 kB
  • 01 Welcome! Who Is This Guy_!/001 Introduction.en.srt 2.4 kB
  • 18 Reconnaissance/018 Reconnaissance Hands On.en.srt 2.4 kB
  • 09 Data Manipulation/005 AES Encryption.en.srt 2.4 kB
  • 08 Kerberos/002 Kerberos Realms.en.srt 2.4 kB
  • 15 Python Course/133 Operators.py 2.4 kB
  • 15 Python Course/134 IfElse.py 2.3 kB
  • 21 Password Cracking/005 Password Cracking Hands On.en.srt 2.3 kB
  • 16 Assembly Course/012 Assembly Hands On.en.srt 2.2 kB
  • 16 Assembly Course/152 Arithmetic.asm.zip 2.2 kB
  • 12 Firewalls/002 Packet Filtering Firewalls.en.srt 2.1 kB
  • 10 Networking/007 What is a Protocol_.en.srt 2.1 kB
  • 15 Python Course/136 Dictionary.py 2.0 kB
  • 02 The 3 Teams/001 Module Overview - The 3 Teams.en.srt 1.9 kB
  • 15 Python Course/141 Inheritance.py 1.7 kB
  • 15 Python Course/142 Configs.zip 1.6 kB
  • 16 Assembly Course/153 Loops.asm.zip 1.6 kB
  • 15 Python Course/137 Lists.py 1.6 kB
  • 16 Assembly Course/155 ReadingFiles.asm.zip 1.5 kB
  • 22 Covering Your Tracks/008 Covering Your Tracks Hands On.en.srt 1.5 kB
  • 16 Assembly Course/156 WritingFiles.asm.zip 1.4 kB
  • 15 Python Course/143 Logging.py 1.4 kB
  • 16 Assembly Course/151 SavingState.asm.zip 1.4 kB
  • 15 Python Course/140 Classes.py 1.4 kB
  • 15 Python Course/135 Loops.py 1.3 kB
  • 15 Python Course/144 ErrorHandling.py 1.3 kB
  • 15 Python Course/142 Configs.py 1.3 kB
  • 16 Assembly Course/154 Logic.asm.zip 1.3 kB
  • 16 Assembly Course/149 HelloWorld.asm.zip 1.2 kB
  • 15 Python Course/131 Variables.py 1.2 kB
  • 15 Python Course/145 SocketsServer.py 1.2 kB
  • 15 Python Course/138 Tuples.py 1.2 kB
  • 16 Assembly Course/150 DataTypes.asm.zip 1.1 kB
  • 04 The Windows Operating System/external-assets-links.txt 1.1 kB
  • 15 Python Course/132 TypeCasting.py 1.0 kB
  • 15 Python Course/141 Account.py 961 Bytes
  • 15 Python Course/145 SocketsClient.py 929 Bytes
  • 15 Python Course/140 Person.py 878 Bytes
  • 15 Python Course/146 Threading.py 845 Bytes
  • 20 Post Exploitation/226 spray.py 831 Bytes
  • 15 Python Course/141 CheckingAccount.py 822 Bytes
  • 20 Post Exploitation/external-assets-links.txt 822 Bytes
  • 15 Python Course/139 Modules.py 810 Bytes
  • 25 Job Hunting/016 Congratulations!.en.srt 682 Bytes
  • 18 Reconnaissance/external-assets-links.txt 662 Bytes
  • 15 Python Course/130 HelloWorld.py 583 Bytes
  • 09 Data Manipulation/external-assets-links.txt 544 Bytes
  • 19 Exploitation/195 idor.txt 496 Bytes
  • 19 Exploitation/external-assets-links.txt 494 Bytes
  • 21 Password Cracking/external-assets-links.txt 257 Bytes
  • 05 The Linux Operating System/external-assets-links.txt 209 Bytes
  • 06 Operating System Internals/external-assets-links.txt 136 Bytes
  • 15 Python Course/external-assets-links.txt 109 Bytes
  • 01 Welcome! Who Is This Guy_!/external-assets-links.txt 95 Bytes
  • 07 Active Directory/external-assets-links.txt 86 Bytes
  • 13 Configuring PFSense Firewalls/external-assets-links.txt 60 Bytes
  • 10 Networking/external-assets-links.txt 57 Bytes

随机展示

相关说明

本站不存储任何资源内容,只收集BT种子元数据(例如文件名和文件大小)和磁力链接(BT种子标识符),并提供查询服务,是一个完全合法的搜索引擎系统。 网站不提供种子下载服务,用户可以通过第三方链接或磁力链接获取到相关的种子资源。本站也不对BT种子真实性及合法性负责,请用户注意甄别!