MuerBT磁力搜索 BT种子搜索利器 免费下载BT种子,超5000万条种子数据

the-redteam-blueprint

磁力链接/BT种子名称

the-redteam-blueprint

磁力链接/BT种子简介

种子哈希:9724b2731d4dce0440c490ec7e13db424c18e8b7
文件大小: 16.29G
已经下载:1231次
下载速度:极快
收录时间:2021-03-20
最近下载:2025-09-30

移花宫入口

移花宫.com邀月.com怜星.com花无缺.comyhgbt.icuyhgbt.top

磁力链接下载

magnet:?xt=urn:btih:9724B2731D4DCE0440C490EC7E13DB424C18E8B7
推荐使用PIKPAK网盘下载资源,10TB超大空间,不限制资源,无限次数离线下载,视频在线观看

下载BT种子文件

磁力链接 迅雷下载 PIKPAK在线播放 世界之窗 91视频 含羞草 欲漫涩 逼哩逼哩 成人快手 51品茶 抖阴破解版 极乐禁地 91短视频 抖音Max TikTok成人版 PornHub 听泉鉴鲍 暗网Xvideo 草榴社区 哆哔涩漫 呦乐园 萝莉岛 悠悠禁区 拔萝卜 疯马秀

最近搜索

艺校 吹潮 性药 翘臀 狼 超顶 海南 大保健 妹妹 小逗逗 fc2-ppv-4522855 技巧 台正 户外 空姐制服 原图 initial d dsjh-010 周于希 sm 互操 书 绝叫 海月 情侣自拍 臀裙 超级清纯 强操 变性 西林 big eyes

文件列表

  • 04 The Windows Operating System/002 Windows at a Glance.mp4 420.0 MB
  • 19 Exploitation/011 SQL Injection & SQLMap.mp4 395.9 MB
  • 18 Reconnaissance/008 Active Recon - Port Scanning.mp4 321.0 MB
  • 25 Job Hunting/006 Analyzing the Job Post.mp4 301.2 MB
  • 20 Post Exploitation/001 Stabilizing Shells.mp4 268.4 MB
  • 04 The Windows Operating System/006 Windows Internals - Permissions.mp4 264.0 MB
  • 18 Reconnaissance/013 Active Recon - Working with NC.mp4 260.6 MB
  • 16 Assembly Course/005 Arithmetic.mp4 241.4 MB
  • 23 Reporting/001 The Format.mp4 234.6 MB
  • 20 Post Exploitation/007 OS Version.mp4 213.9 MB
  • 19 Exploitation/005 Metasploit - Exploits and Payloads.mp4 193.7 MB
  • 04 The Windows Operating System/016 Windows Command Line - Working with Pipes.mp4 192.0 MB
  • 20 Post Exploitation/009 File Permissions.mp4 188.6 MB
  • 20 Post Exploitation/008 Common Configuration Issues.mp4 175.5 MB
  • 20 Post Exploitation/002 Breaking Out Of The Jail Shell.mp4 175.1 MB
  • 16 Assembly Course/002 Hello World.mp4 173.7 MB
  • 07 Active Directory/008 Setting up Group Policies.mp4 167.2 MB
  • 19 Exploitation/001 Finding Exploits.mp4 163.9 MB
  • 19 Exploitation/014 Local File Inclusion.mp4 156.7 MB
  • 19 Exploitation/006 Metasploit - The Meterpreter.mp4 156.5 MB
  • 04 The Windows Operating System/015 Windows Command Line - Working with Files and Directories.mp4 155.4 MB
  • 25 Job Hunting/004 Personal Brand.mp4 152.6 MB
  • 20 Post Exploitation/014 Service Misconfigurations.mp4 149.1 MB
  • 04 The Windows Operating System/007 Windows Internals - Alternate Data Streams.mp4 147.0 MB
  • 18 Reconnaissance/012 Active Recon - Sparta.mp4 144.0 MB
  • 04 The Windows Operating System/001 Installing & Using VirtualBox for Lab Virtualization.mp4 143.4 MB
  • 04 The Windows Operating System/014 Windows Command Line - Navigation.mp4 142.7 MB
  • 04 The Windows Operating System/008 Windows Internals - API Calls.mp4 142.2 MB
  • 25 Job Hunting/005 Searching for the Job.mp4 142.0 MB
  • 04 The Windows Operating System/004 Windows Logs.mp4 141.8 MB
  • 25 Job Hunting/001 The Resume.mp4 140.2 MB
  • 04 The Windows Operating System/018 Windows Command Line - Managing Windows.mp4 139.1 MB
  • 16 Assembly Course/008 Reading Files.mp4 136.5 MB
  • 20 Post Exploitation/010 MySQL.mp4 131.5 MB
  • 20 Post Exploitation/013 Unquoted Service Path.mp4 130.6 MB
  • 20 Post Exploitation/028 Pivoting.mp4 130.2 MB
  • 18 Reconnaissance/003 Passive Recon - Google.mp4 127.7 MB
  • 25 Job Hunting/009 Salary Requirements.mp4 125.9 MB
  • 19 Exploitation/012 XSS.mp4 124.2 MB
  • 04 The Windows Operating System/003 The Windows File System.mp4 123.4 MB
  • 25 Job Hunting/003 Certifications.mp4 123.0 MB
  • 07 Active Directory/007 Adding Machine to the Domain.mp4 121.1 MB
  • 25 Job Hunting/012 The Interview Process - The Technical Screening Interview.mp4 121.0 MB
  • 18 Reconnaissance/002 Installing Kali.mp4 120.9 MB
  • 19 Exploitation/010 The OWASP Top 10.mp4 120.7 MB
  • 16 Assembly Course/007 Logic Control.mp4 117.3 MB
  • 20 Post Exploitation/017 Pulling Hashes.mp4 112.6 MB
  • 19 Exploitation/004 Metasploit - What is Metasploit_.mp4 111.3 MB
  • 05 The Linux Operating System/012 Linux Processes.mp4 111.0 MB
  • 18 Reconnaissance/006 Passive Recon - Netcraft.mp4 109.7 MB
  • 25 Job Hunting/008 The Future Company.mp4 107.6 MB
  • 18 Reconnaissance/007 Passive Recon - Job Posting.mp4 105.9 MB
  • 13 Configuring PFSense Firewalls/004 Configuring a VPN.mp4 103.8 MB
  • 04 The Windows Operating System/012 Windows Internals - PE Files & DLLs.mp4 103.1 MB
  • 13 Configuring PFSense Firewalls/001 Installing PFSense.mp4 102.5 MB
  • 13 Configuring PFSense Firewalls/003 Configuring a DMZ.mp4 100.5 MB
  • 18 Reconnaissance/005 Passive Recon - Whois.mp4 100.4 MB
  • 03 Penetration Testing Process/003 Metrics & Why They Are Important.mp4 99.9 MB
  • 20 Post Exploitation/004 Windows Persistence.mp4 98.9 MB
  • 16 Assembly Course/004 Saving States.mp4 98.1 MB
  • 19 Exploitation/008 Metasploit - MSFVenom.mp4 97.4 MB
  • 20 Post Exploitation/015 LinuxPrivChecker.mp4 97.2 MB
  • 20 Post Exploitation/027 SSH Tunneling.mp4 96.9 MB
  • 19 Exploitation/015 Remote File Inclusion.mp4 96.5 MB
  • 20 Post Exploitation/012 Relative Path Sudo Binary.mp4 96.3 MB
  • 13 Configuring PFSense Firewalls/002 The Firewall UI.mp4 95.6 MB
  • 18 Reconnaissance/014 Active Recon - Banner Grabbing.mp4 95.3 MB
  • 07 Active Directory/003 Install AD DS.mp4 94.6 MB
  • 19 Exploitation/007 Metasploit - Adding an Exploit to Metasploit.mp4 94.0 MB
  • 25 Job Hunting/011 The Interview Process - Prepping for the Technical Interviews.mp4 92.5 MB
  • 07 Active Directory/005 OU's and their Permissions.mp4 92.3 MB
  • 04 The Windows Operating System/013 Windows Command Line - Accessing the Command Line.mp4 91.6 MB
  • 18 Reconnaissance/010 Active Recon - Nikto.mp4 91.5 MB
  • 05 The Linux Operating System/006 Linux Command Line - Working with Data.mp4 91.5 MB
  • 18 Reconnaissance/016 Active Recon - Browsing.mp4 87.6 MB
  • 24 Attacking Active Directory (Realistic Scenario)/006 Getting Domain Admin.mp4 86.7 MB
  • 22 Covering Your Tracks/003 Clearing Linux Logs.mp4 86.1 MB
  • 20 Post Exploitation/006 What is Privilege Escalation_.mp4 84.8 MB
  • 03 Penetration Testing Process/010 Building & Working with an Enterprise Budget.mp4 84.7 MB
  • 20 Post Exploitation/022 Network Traffic.mp4 84.6 MB
  • 20 Post Exploitation/019 SSH Keys.mp4 83.6 MB
  • 07 Active Directory/002 Basic Windows Server Configuration.mp4 81.1 MB
  • 07 Active Directory/004 The AD Tree.mp4 80.8 MB
  • 05 The Linux Operating System/004 Linux Command Line - Working with Files and Directories.mp4 80.7 MB
  • 20 Post Exploitation/011 Sudo.mp4 80.2 MB
  • 04 The Windows Operating System/005 Windows Internals - UAC.mp4 80.1 MB
  • 18 Reconnaissance/017 Active Recon - Manual vs Automated.mp4 79.7 MB
  • 03 Penetration Testing Process/009 Routine Assessments Part 6 - Building an Assessment Plan.mp4 79.5 MB
  • 18 Reconnaissance/009 Active Recon - DNS.mp4 77.8 MB
  • 20 Post Exploitation/023 ARP Poisoning.mp4 77.1 MB
  • 16 Assembly Course/009 Writing Files.mp4 71.4 MB
  • 24 Attacking Active Directory (Realistic Scenario)/004 Finding New Access.mp4 71.4 MB
  • 15 Python Course/007 If_Else.mp4 70.2 MB
  • 16 Assembly Course/010 Op Code.mp4 68.0 MB
  • 18 Reconnaissance/011 Active Recon - Dirb.mp4 66.6 MB
  • 16 Assembly Course/003 Variables.mp4 66.0 MB
  • 18 Reconnaissance/004 Passive Recon - Shodan.mp4 65.4 MB
  • 20 Post Exploitation/005 Linux Persistence.mp4 64.8 MB
  • 05 The Linux Operating System/014 Working with Open Files.mp4 63.6 MB
  • 22 Covering Your Tracks/004 Quick Talk on Logging.mp4 63.3 MB
  • 22 Covering Your Tracks/005 Clearing Command History.mp4 60.4 MB
  • 15 Python Course/014 Inheritance.mp4 59.2 MB
  • 21 Password Cracking/003 Hashcat.mp4 59.2 MB
  • 25 Job Hunting/007 Applying for the Job.mp4 59.0 MB
  • 20 Post Exploitation/016 Im Root Now What_.mp4 58.1 MB
  • 04 The Windows Operating System/017 Windows Command Line - Standard I_O_E.mp4 54.8 MB
  • 24 Attacking Active Directory (Realistic Scenario)/005 Moving Up In The World!.mp4 54.1 MB
  • 15 Python Course/018 Sockets.mp4 52.1 MB
  • 22 Covering Your Tracks/002 Clearing Windows Logs.mp4 51.2 MB
  • 07 Active Directory/009 Cached Credentials.mp4 50.2 MB
  • 06 Operating System Internals/010 Debuggers.mp4 49.7 MB
  • 15 Python Course/002 Installing Python.mp4 49.4 MB
  • 10 Networking/003 TCP_IP.mp4 49.0 MB
  • 15 Python Course/010 Lists.mp4 48.6 MB
  • 16 Assembly Course/006 Loops.mp4 48.0 MB
  • 15 Python Course/009 The Dictionary.mp4 47.6 MB
  • 19 Exploitation/016 The Authenticated Unauthenticated Pages.mp4 47.4 MB
  • 06 Operating System Internals/001 The Kernel.mp4 47.1 MB
  • 05 The Linux Operating System/017 Linux Pipes.mp4 46.8 MB
  • 22 Covering Your Tracks/007 The Clean Up.mp4 46.7 MB
  • 25 Job Hunting/015 The Interview Process - The Offer.mp4 46.7 MB
  • 05 The Linux Operating System/007 Linux Command Line - Working with File Permissions.mp4 46.3 MB
  • 13 Configuring PFSense Firewalls/005 Backup & Logging.mp4 45.8 MB
  • 24 Attacking Active Directory (Realistic Scenario)/003 Post Exploitation.mp4 44.3 MB
  • 02 The 3 Teams/002 The Red Team.mp4 44.1 MB
  • 10 Networking/009 DNS.mp4 44.1 MB
  • 15 Python Course/013 Classes.mp4 43.9 MB
  • 04 The Windows Operating System/011 Windows Internals - Named Pipes.mp4 43.9 MB
  • 05 The Linux Operating System/010 Linux Command Line - Hex.mp4 43.9 MB
  • 06 Operating System Internals/004 The CPU Registers.mp4 43.3 MB
  • 04 The Windows Operating System/010 Windows Internals - Tokens.mp4 42.5 MB
  • 20 Post Exploitation/026 Password Spraying.mp4 42.1 MB
  • 19 Exploitation/017 Broken Authentication and Session Management.mp4 42.0 MB
  • 03 Penetration Testing Process/006 Routine Assessments Part 3 - Quarterly Assessments_.mp4 42.0 MB
  • 05 The Linux Operating System/011 Linux Command Line - Network Connections Recap.mp4 41.8 MB
  • 15 Python Course/003 Hello World.mp4 41.8 MB
  • 15 Python Course/019 Threading.mp4 41.6 MB
  • 21 Password Cracking/002 John The Ripper.mp4 41.6 MB
  • 24 Attacking Active Directory (Realistic Scenario)/002 Exploitation.mp4 40.7 MB
  • 11 VPNs/002 What is IPSEC_.mp4 40.1 MB
  • 15 Python Course/017 Error Handling.mp4 39.9 MB
  • 19 Exploitation/013 Insecure Direct Object Reference.mp4 39.2 MB
  • 05 The Linux Operating System/015 Symbolic Links.mp4 39.0 MB
  • 20 Post Exploitation/018 Pass The Hash.mp4 38.9 MB
  • 07 Active Directory/001 What is Active Directory.mp4 37.8 MB
  • 10 Networking/001 What is Networking_.mp4 37.2 MB
  • 08 Kerberos/004 The Ticket Granting Server.mp4 36.9 MB
  • 03 Penetration Testing Process/002 Penetration Testing Methodology.mp4 35.7 MB
  • 21 Password Cracking/004 Rainbow Tables.mp4 34.7 MB
  • 15 Python Course/008 Loops.mp4 34.2 MB
  • 15 Python Course/004 Variables.mp4 34.1 MB
  • 17 Scope Identification/002 Stability Considerations.mp4 33.9 MB
  • 25 Job Hunting/010 The Interview Process - The Screening Call.mp4 33.6 MB
  • 04 The Windows Operating System/009 Windows Internals - The SID.mp4 33.3 MB
  • 07 Active Directory/006 Managing Users and Groups.mp4 33.2 MB
  • 24 Attacking Active Directory (Realistic Scenario)/001 Reconnaissance.mp4 32.5 MB
  • 05 The Linux Operating System/019 Linux Logs.mp4 32.0 MB
  • 10 Networking/006 Routers & Gateways.mp4 31.8 MB
  • 05 The Linux Operating System/003 Linux Command Line - Navigation.mp4 31.6 MB
  • 18 Reconnaissance/018 Reconnaissance Hands On.mp4 31.5 MB
  • 20 Post Exploitation/025 Account Directory Attacks.mp4 31.5 MB
  • 03 Penetration Testing Process/008 Routine Assessments Part 5 - Constant Assessments_.mp4 31.4 MB
  • 05 The Linux Operating System/005 Linux Command Line - Standard I_O_E Recap.mp4 31.2 MB
  • 11 VPNs/003 What is IKE_.mp4 30.5 MB
  • 10 Networking/010 DHCP.mp4 29.9 MB
  • 05 The Linux Operating System/013 What are INodes_.mp4 29.7 MB
  • 10 Networking/008 ICMP.mp4 29.5 MB
  • 01 Welcome! Who Is This Guy_!/001 Introduction.mp4 28.8 MB
  • 15 Python Course/012 Modules.mp4 28.7 MB
  • 17 Scope Identification/001 Goal & Scope Identification.mp4 28.7 MB
  • 06 Operating System Internals/007 The Stack.mp4 27.7 MB
  • 06 Operating System Internals/002 One Ring to Rule Them All.mp4 27.7 MB
  • 05 The Linux Operating System/009 Linux Command Line - Base64.mp4 27.1 MB
  • 02 The 3 Teams/004 The Purple Team.mp4 27.0 MB
  • 03 Penetration Testing Process/005 Routine Assessments Part 2 - Yearly Assessments.mp4 26.9 MB
  • 05 The Linux Operating System/016 The ID's.mp4 26.9 MB
  • 15 Python Course/016 Logging.mp4 26.2 MB
  • 10 Networking/011 ARP.mp4 26.2 MB
  • 10 Networking/013 What is an IPS.mp4 25.9 MB
  • 25 Job Hunting/014 The Interview Process - The Onsite.mp4 25.6 MB
  • 18 Reconnaissance/015 Active Recon - Vulnerability Scanners.mp4 24.9 MB
  • 02 The 3 Teams/003 The Blue Team.mp4 24.9 MB
  • 23 Reporting/003 Business Risks on Findings.mp4 24.9 MB
  • 05 The Linux Operating System/008 Linux Command Line - Man Pages.mp4 24.4 MB
  • 10 Networking/017 Quick Talk on Databases.mp4 23.7 MB
  • 20 Post Exploitation/020 Checking Logs.mp4 23.6 MB
  • 05 The Linux Operating System/002 The Linux File System.mp4 23.5 MB
  • 22 Covering Your Tracks/006 Persistent Backdoors.mp4 23.4 MB
  • 10 Networking/005 The Switch.mp4 23.2 MB
  • 21 Password Cracking/001 What is Password Cracking_.mp4 23.1 MB
  • 09 Data Manipulation/010 Base64 Encoding.mp4 22.4 MB
  • 09 Data Manipulation/003 Asymmetric Encryption.mp4 21.9 MB
  • 10 Networking/014 What is HA_.mp4 21.7 MB
  • 10 Networking/002 The OSI Model.mp4 21.6 MB
  • 06 Operating System Internals/012 A Quick Word About AntiVirus.mp4 21.2 MB
  • 09 Data Manipulation/011 Hex Encoding.mp4 21.0 MB
  • 15 Python Course/015 Configuration Files.mp4 21.0 MB
  • 06 Operating System Internals/009 Extra information on Memory.mp4 20.6 MB
  • 14 Program Theory/002 What is a Linker_.mp4 20.3 MB
  • 19 Exploitation/003 Looking for 0 days.mp4 20.3 MB
  • 15 Python Course/005 Type Casting.mp4 20.0 MB
  • 17 Scope Identification/004 Prepping.mp4 19.9 MB
  • 25 Job Hunting/013 The Interview Process - Prepping for the On Site Final Interview.mp4 19.7 MB
  • 22 Covering Your Tracks/001 Why Cover Your Tracks_.mp4 19.4 MB
  • 03 Penetration Testing Process/007 Routine Assessments Part 4- Monthly Assessments_.mp4 19.2 MB
  • 05 The Linux Operating System/018 Linux Run Levels.mp4 19.2 MB
  • 09 Data Manipulation/008 SHA Hashing.mp4 19.1 MB
  • 03 Penetration Testing Process/004 Routine Assessments Part 1 - What Are Routine Assessments_.mp4 19.0 MB
  • 14 Program Theory/001 What is a Compiler_.mp4 18.8 MB
  • 20 Post Exploitation/024 Web Servers.mp4 18.7 MB
  • 09 Data Manipulation/014 Lossless vs Lossy Compression.mp4 17.7 MB
  • 03 Penetration Testing Process/011 Specialties_!.mp4 17.7 MB
  • 19 Exploitation/002 Misconfigurations.mp4 17.7 MB
  • 05 The Linux Operating System/001 Where is the GUI_!.mp4 17.6 MB
  • 08 Kerberos/001 What is Kerberos_.mp4 17.5 MB
  • 12 Firewalls/001 What is a Firewall_.mp4 17.5 MB
  • 15 Python Course/001 Why Python_.mp4 17.3 MB
  • 09 Data Manipulation/002 Symmetric Encryption.mp4 17.1 MB
  • 15 Python Course/011 Tuples.mp4 17.1 MB
  • 10 Networking/012 What is an IDS.mp4 17.1 MB
  • 18 Reconnaissance/001 What is Reconnaissance_.mp4 16.9 MB
  • 23 Reporting/002 The Audience.mp4 16.6 MB
  • 20 Post Exploitation/021 Duel Homed Machines.mp4 16.5 MB
  • 15 Python Course/006 Operators.mp4 16.4 MB
  • 08 Kerberos/003 The Authentication Server.mp4 16.1 MB
  • 06 Operating System Internals/006 What is Memory & How does it work_.mp4 15.9 MB
  • 19 Exploitation/018 Faulty Redirects.mp4 15.8 MB
  • 06 Operating System Internals/008 The Heap.mp4 15.8 MB
  • 16 Assembly Course/011 Bit Operators.mp4 15.5 MB
  • 09 Data Manipulation/001 What is Encryption.mp4 15.5 MB
  • 09 Data Manipulation/012 URL Encoding.mp4 15.1 MB
  • 19 Exploitation/009 Metasploit - Hands On.mp4 14.8 MB
  • 03 Penetration Testing Process/012 The CIA Triangle.mp4 14.7 MB
  • 03 Penetration Testing Process/001 Module Overview - Penetration Testing Process.mp4 14.6 MB
  • 10 Networking/015 Proxys.mp4 14.0 MB
  • 23 Reporting/004 Remediation Options.mp4 13.4 MB
  • 09 Data Manipulation/013 What is Compression_.mp4 13.3 MB
  • 10 Networking/016 The DMZ.mp4 13.0 MB
  • 25 Job Hunting/002 Professional Email.mp4 13.0 MB
  • 06 Operating System Internals/011 Taking a look at ASLR.mp4 12.9 MB
  • 12 Firewalls/003 Stateful Inspecting Firewalls.mp4 12.6 MB
  • 09 Data Manipulation/006 What is Hashing_.mp4 11.8 MB
  • 15 Python Course/020 Python Hands On.mp4 11.7 MB
  • 17 Scope Identification/003 Briefing Stake Holders.mp4 11.4 MB
  • 20 Post Exploitation/003 What is Persistence_.mp4 11.3 MB
  • 10 Networking/004 UDP.mp4 11.1 MB
  • 06 Operating System Internals/005 The CPU Flags.mp4 11.1 MB
  • 11 VPNs/001 What is a VPN.mp4 10.9 MB
  • 09 Data Manipulation/007 MD5 Hashing.mp4 10.9 MB
  • 06 Operating System Internals/003 What is a CPU_.mp4 10.5 MB
  • 09 Data Manipulation/015 LZ77 & LZ78 Compression Algorithms.mp4 10.3 MB
  • 23 Reporting/005 Working With The Blue Team.mp4 10.0 MB
  • 09 Data Manipulation/004 RSA Encryption.mp4 9.9 MB
  • 17 Scope Identification/005 Scope Identification Hands On.mp4 9.9 MB
  • 12 Firewalls/004 Web Application Firewalls.mp4 9.8 MB
  • 13 Configuring PFSense Firewalls/006 PFsense Hands On.mp4 9.5 MB
  • 08 Kerberos/002 Kerberos Realms.mp4 9.5 MB
  • 09 Data Manipulation/009 What is Encoding_.mp4 9.1 MB
  • 16 Assembly Course/001 Why Assembly_.mp4 8.4 MB
  • 09 Data Manipulation/016 Data Manipulation - Hands On.mp4 8.2 MB
  • 09 Data Manipulation/005 AES Encryption.mp4 8.1 MB
  • 25 Job Hunting/016 Congratulations!.mp4 8.0 MB
  • 21 Password Cracking/005 Password Cracking Hands On.mp4 6.1 MB
  • 10 Networking/007 What is a Protocol_.mp4 5.9 MB
  • 16 Assembly Course/012 Assembly Hands On.mp4 5.9 MB
  • 12 Firewalls/002 Packet Filtering Firewalls.mp4 5.6 MB
  • 02 The 3 Teams/001 Module Overview - The 3 Teams.mp4 4.5 MB
  • 22 Covering Your Tracks/008 Covering Your Tracks Hands On.mp4 3.4 MB
  • 06 Operating System Internals/064 Debugger.pptx 455.3 kB
  • 10 Networking/100 The Switch.pptx 414.7 kB
  • 04 The Windows Operating System/022 Windows UAC.pptx 167.9 kB
  • 04 The Windows Operating System/026 SID.pptx 138.8 kB
  • 05 The Linux Operating System/042 Linux File Permissions.pptx 137.3 kB
  • 06 Operating System Internals/055 The Kernel.pptx 122.7 kB
  • 06 Operating System Internals/058 Registers.pptx 122.4 kB
  • 04 The Windows Operating System/029 PE Files and DLLs.pptx 121.1 kB
  • 05 The Linux Operating System/047 Processes.pptx 119.9 kB
  • 23 Reporting/242 Report Template.docx 114.6 kB
  • 09 Data Manipulation/089 Base64.pptx 112.6 kB
  • 05 The Linux Operating System/049 Open FIles.pptx 110.4 kB
  • 05 The Linux Operating System/037 The Linux File System.pptx 110.2 kB
  • 10 Networking/096 What is Networking.pptx 110.1 kB
  • 03 Penetration Testing Process/007 Penetration Testing Methodology.pptx 109.0 kB
  • 10 Networking/097 OSI Model.pptx 105.9 kB
  • 05 The Linux Operating System/050 Symbolic Links.pptx 105.3 kB
  • 06 Operating System Internals/056 One Ring to Rule Them All.pptx 104.8 kB
  • 08 Kerberos/079 The Ticket Granting Server.pptx 104.7 kB
  • 11 VPNs/114 What is a IPSEC.pptx 104.6 kB
  • 04 The Windows Operating System/027 Tokens.pptx 104.5 kB
  • 04 The Windows Operating System/020 The Windows File System.pptx 104.2 kB
  • 06 Operating System Internals/066 AntiVirus.pptx 104.1 kB
  • 06 Operating System Internals/063 More on Memory.pptx 104.1 kB
  • 09 Data Manipulation/082 Asymmetric Encryption.pptx 103.9 kB
  • 06 Operating System Internals/065 ASLR.pptx 103.8 kB
  • 11 VPNs/115 What is a IKE.pptx 103.3 kB
  • 03 Penetration Testing Process/006 Penetration Testing Process - Module Overview.pptx 103.1 kB
  • 10 Networking/105 DHCP.pptx 102.8 kB
  • 19 Exploitation/199 Broken Auth.pptx 102.8 kB
  • 10 Networking/098 TCPIP.pptx 102.7 kB
  • 04 The Windows Operating System/028 Windows Pipes.pptx 102.5 kB
  • 05 The Linux Operating System/053 Run Levels.pptx 102.2 kB
  • 05 The Linux Operating System/048 Inodes.pptx 101.9 kB
  • 21 Password Cracking/232 Rainbow Tables.pptx 101.7 kB
  • 03 Penetration Testing Process/011 Quarterly Assessments.pptx 101.4 kB
  • 10 Networking/104 DNS.pptx 101.4 kB
  • 21 Password Cracking/229 What is Password Cracking.pptx 101.2 kB
  • 03 Penetration Testing Process/017 CIA Triangle.pptx 101.0 kB
  • 06 Operating System Internals/061 The Stack.pptx 100.9 kB
  • 03 Penetration Testing Process/016 Specialties.pptx 100.7 kB
  • 06 Operating System Internals/057 What is a CPU.pptx 100.5 kB
  • 16 Assembly Course/158 Bit Operators.pptx 100.3 kB
  • 03 Penetration Testing Process/013 Constant Assessments.pptx 99.8 kB
  • 02 The 3 Teams/004 The Blue Team.pptx 99.8 kB
  • 02 The 3 Teams/003 The Red Team.pptx 99.7 kB
  • 17 Scope Identification/160 Goal and Scope Identification.pptx 99.6 kB
  • 25 Job Hunting/267 The Offer.pptx 99.5 kB
  • 08 Kerberos/078 The Authentication Sever.pptx 99.4 kB
  • 23 Reporting/244 Buisness Risk on Findings.pptx 99.3 kB
  • 02 The 3 Teams/005 The Purple Team.pptx 99.3 kB
  • 09 Data Manipulation/081 Symmetric Encryption.pptx 99.2 kB
  • 22 Covering Your Tracks/234 Why Cover Your Tracks.pptx 99.1 kB
  • 06 Operating System Internals/059 Flags.pptx 98.7 kB
  • 09 Data Manipulation/092 What is Compression.pptx 98.5 kB
  • 03 Penetration Testing Process/010 Yearly Assessments.pptx 98.5 kB
  • 06 Operating System Internals/060 Memory.pptx 98.4 kB
  • 03 Penetration Testing Process/012 Monthly Assessments.pptx 98.4 kB
  • 23 Reporting/243 The Audience.pptx 98.4 kB
  • 12 Firewalls/116 What is a Firewall.pptx 98.4 kB
  • 14 Program Theory/126 What is a Compiler.pptx 98.3 kB
  • 10 Networking/112 Quick Talk on Databases.pptx 98.3 kB
  • 10 Networking/103 ICMP.pptx 98.1 kB
  • 10 Networking/106 ARP.pptx 98.1 kB
  • 10 Networking/108 What is an IPS.pptx 98.1 kB
  • 17 Scope Identification/161 Stability Considerations.pptx 98.0 kB
  • 09 Data Manipulation/090 Hex.pptx 98.0 kB
  • 10 Networking/107 What is an IDS.pptx 97.9 kB
  • 08 Kerberos/076 What is Kerberos.pptx 97.8 kB
  • 18 Reconnaissance/179 Vuln Scanners.pptx 97.8 kB
  • 10 Networking/101 Routers and Gateways.pptx 97.8 kB
  • 05 The Linux Operating System/036 The GUI.pptx 97.8 kB
  • 20 Post Exploitation/203 What is Persistence.pptx 97.7 kB
  • 06 Operating System Internals/062 The Heap.pptx 97.6 kB
  • 07 Active Directory/067 What is Active Directory.pptx 97.4 kB
  • 25 Job Hunting/262 The Screening Call.pptx 97.3 kB
  • 19 Exploitation/184 Misconfigurations.pptx 97.1 kB
  • 25 Job Hunting/265 Prepping for the on site Interview.pptx 97.0 kB
  • 04 The Windows Operating System/025 API Calls.pptx 97.0 kB
  • 12 Firewalls/118 Stateful Inspection Firewalls.pptx 96.8 kB
  • 03 Penetration Testing Process/009 What Are Routine Assessments.pptx 96.8 kB
  • 09 Data Manipulation/080 What is Encryption.pptx 96.8 kB
  • 09 Data Manipulation/088 What is Encoding.pptx 96.6 kB
  • 09 Data Manipulation/091 URL.pptx 96.5 kB
  • 08 Kerberos/077 Kerberos Realm.pptx 96.5 kB
  • 09 Data Manipulation/085 What is Hashing.pptx 96.5 kB
  • 14 Program Theory/127 What is a Linker.pptx 96.5 kB
  • 12 Firewalls/117 Packet Filtering Firewalls.pptx 96.3 kB
  • 10 Networking/109 What is HA.pptx 96.3 kB
  • 17 Scope Identification/162 Briefing Stake Holders.pptx 96.2 kB
  • 09 Data Manipulation/093 Lossless vs Lossy.pptx 96.0 kB
  • 15 Python Course/147 Hands On Python.pptx 95.9 kB
  • 25 Job Hunting/266 Onsite Interview.pptx 95.8 kB
  • 18 Reconnaissance/165 What is Recon.pptx 95.7 kB
  • 09 Data Manipulation/094 LZ77 and LZ78.pptx 95.6 kB
  • 17 Scope Identification/164 Scope Identification Hands On.pptx 95.4 kB
  • 21 Password Cracking/233 Password Cracking Hands On.pptx 95.2 kB
  • 23 Reporting/246 Working With The Blue Team.pptx 95.2 kB
  • 12 Firewalls/119 Web Application Firewalls.pptx 95.0 kB
  • 10 Networking/110 Proxys.pptx 95.0 kB
  • 19 Exploitation/185 0Days.pptx 94.9 kB
  • 09 Data Manipulation/083 RSA.pptx 94.9 kB
  • 09 Data Manipulation/087 SHA.pptx 94.8 kB
  • 16 Assembly Course/148 Why ASM.pptx 94.8 kB
  • 09 Data Manipulation/084 AES.pptx 94.8 kB
  • 09 Data Manipulation/086 MD5.pptx 94.8 kB
  • 11 VPNs/113 What is a VPN.pptx 94.8 kB
  • 19 Exploitation/191 Metasploit Hands On.pptx 94.7 kB
  • 23 Reporting/245 Remediation Options.pptx 94.7 kB
  • 13 Configuring PFSense Firewalls/125 PFSense Hands On.pptx 94.5 kB
  • 16 Assembly Course/159 Assembly Hands On.pptx 94.4 kB
  • 02 The 3 Teams/002 The 3 Teams.pptx 93.7 kB
  • 10 Networking/102 What is a Protocol.pptx 93.7 kB
  • 09 Data Manipulation/095 Data Manipulation Hands On.pptx 93.7 kB
  • 15 Python Course/128 Why Python.pptx 93.5 kB
  • 10 Networking/111 DMZ.pptx 93.4 kB
  • 10 Networking/099 UDP.pptx 93.3 kB
  • 19 Exploitation/011 SQL Injection & SQLMap.en.srt 44.4 kB
  • 25 Job Hunting/006 Analyzing the Job Post.en.srt 39.8 kB
  • 03 Penetration Testing Process/008 Metrics.xlsx 37.6 kB
  • 17 Scope Identification/163 Assessment Document Template.docx 34.7 kB
  • 04 The Windows Operating System/002 Windows at a Glance.en.srt 31.9 kB
  • 18 Reconnaissance/008 Active Recon - Port Scanning.en.srt 31.4 kB
  • 03 Penetration Testing Process/015 Budget Sample.xlsx 28.4 kB
  • 16 Assembly Course/005 Arithmetic.en.srt 26.4 kB
  • 03 Penetration Testing Process/014 Assessment Template.xlsx 25.0 kB
  • 03 Penetration Testing Process/015 Budget Template.xlsx 24.5 kB
  • 19 Exploitation/005 Metasploit - Exploits and Payloads.en.srt 24.4 kB
  • 16 Assembly Course/002 Hello World.en.srt 24.2 kB
  • 04 The Windows Operating System/012 Windows Internals - PE Files & DLLs.en.srt 23.6 kB
  • 23 Reporting/001 The Format.en.srt 23.5 kB
  • 04 The Windows Operating System/006 Windows Internals - Permissions.en.srt 23.2 kB
  • 19 Exploitation/012 XSS.en.srt 20.8 kB
  • 20 Post Exploitation/013 Unquoted Service Path.en.srt 20.6 kB
  • 19 Exploitation/006 Metasploit - The Meterpreter.en.srt 20.3 kB
  • 05 The Linux Operating System/006 Linux Command Line - Working with Data.en.srt 20.3 kB
  • 20 Post Exploitation/009 File Permissions.en.srt 20.2 kB
  • 20 Post Exploitation/028 Pivoting.en.srt 20.2 kB
  • 20 Post Exploitation/001 Stabilizing Shells.en.srt 20.2 kB
  • 15 Python Course/014 Inheritance.en.srt 20.1 kB
  • 25 Job Hunting/003 Certifications.en.srt 20.0 kB
  • 25 Job Hunting/004 Personal Brand.en.srt 19.9 kB
  • 25 Job Hunting/005 Searching for the Job.en.srt 19.8 kB
  • 25 Job Hunting/253 Resume.docx 19.5 kB
  • 20 Post Exploitation/010 MySQL.en.srt 19.3 kB
  • 04 The Windows Operating System/018 Windows Command Line - Managing Windows.en.srt 19.3 kB
  • 25 Job Hunting/012 The Interview Process - The Technical Screening Interview.en.srt 19.2 kB
  • 03 Penetration Testing Process/010 Building & Working with an Enterprise Budget.en.srt 18.9 kB
  • 05 The Linux Operating System/012 Linux Processes.en.srt 18.9 kB
  • 18 Reconnaissance/013 Active Recon - Working with NC.en.srt 18.6 kB
  • 07 Active Directory/008 Setting up Group Policies.en.srt 18.3 kB
  • 25 Job Hunting/015 The Interview Process - The Offer.en.srt 18.2 kB
  • 25 Job Hunting/009 Salary Requirements.en.srt 17.9 kB
  • 04 The Windows Operating System/003 The Windows File System.en.srt 17.7 kB
  • 15 Python Course/007 If_Else.en.srt 17.6 kB
  • 03 Penetration Testing Process/003 Metrics & Why They Are Important.en.srt 17.4 kB
  • 19 Exploitation/014 Local File Inclusion.en.srt 17.3 kB
  • 20 Post Exploitation/027 SSH Tunneling.en.srt 17.3 kB
  • 04 The Windows Operating System/008 Windows Internals - API Calls.en.srt 16.9 kB
  • 16 Assembly Course/008 Reading Files.en.srt 16.9 kB
  • 20 Post Exploitation/008 Common Configuration Issues.en.srt 16.9 kB
  • 06 Operating System Internals/001 The Kernel.en.srt 16.4 kB
  • 04 The Windows Operating System/004 Windows Logs.en.srt 16.3 kB
  • 15 Python Course/013 Classes.en.srt 16.1 kB
  • 20 Post Exploitation/005 Linux Persistence.en.srt 16.0 kB
  • 15 Python Course/018 Sockets.en.srt 15.8 kB
  • 25 Job Hunting/011 The Interview Process - Prepping for the Technical Interviews.en.srt 15.4 kB
  • 19 Exploitation/007 Metasploit - Adding an Exploit to Metasploit.en.srt 15.2 kB
  • 16 Assembly Course/004 Saving States.en.srt 15.2 kB
  • 20 Post Exploitation/017 Pulling Hashes.en.srt 15.2 kB
  • 20 Post Exploitation/007 OS Version.en.srt 15.1 kB
  • 19 Exploitation/001 Finding Exploits.en.srt 15.1 kB
  • 16 Assembly Course/007 Logic Control.en.srt 14.8 kB
  • 10 Networking/003 TCP_IP.en.srt 14.8 kB
  • 13 Configuring PFSense Firewalls/002 The Firewall UI.en.srt 14.7 kB
  • 15 Python Course/010 Lists.en.srt 14.5 kB
  • 07 Active Directory/004 The AD Tree.en.srt 14.5 kB
  • 05 The Linux Operating System/007 Linux Command Line - Working with File Permissions.en.srt 14.4 kB
  • 25 Job Hunting/008 The Future Company.en.srt 14.4 kB
  • 04 The Windows Operating System/001 Installing & Using VirtualBox for Lab Virtualization.en.srt 14.2 kB
  • 20 Post Exploitation/004 Windows Persistence.en.srt 14.1 kB
  • 03 Penetration Testing Process/006 Routine Assessments Part 3 - Quarterly Assessments_.en.srt 14.1 kB
  • 07 Active Directory/003 Install AD DS.en.srt 14.0 kB
  • 18 Reconnaissance/003 Passive Recon - Google.en.srt 13.9 kB
  • 25 Job Hunting/010 The Interview Process - The Screening Call.en.srt 13.8 kB
  • 05 The Linux Operating System/004 Linux Command Line - Working with Files and Directories.en.srt 13.6 kB
  • 18 Reconnaissance/012 Active Recon - Sparta.en.srt 13.5 kB
  • 11 VPNs/002 What is IPSEC_.en.srt 13.3 kB
  • 03 Penetration Testing Process/002 Penetration Testing Methodology.en.srt 13.2 kB
  • 02 The 3 Teams/002 The Red Team.en.srt 13.2 kB
  • 15 Python Course/009 The Dictionary.en.srt 13.2 kB
  • 03 Penetration Testing Process/008 Routine Assessments Part 5 - Constant Assessments_.en.srt 13.0 kB
  • 22 Covering Your Tracks/005 Clearing Command History.en.srt 12.8 kB
  • 19 Exploitation/017 Broken Authentication and Session Management.en.srt 12.8 kB
  • 04 The Windows Operating System/016 Windows Command Line - Working with Pipes.en.srt 12.8 kB
  • 20 Post Exploitation/011 Sudo.en.srt 12.8 kB
  • 25 Job Hunting/001 The Resume.en.srt 12.8 kB
  • 10 Networking/001 What is Networking_.en.srt 12.7 kB
  • 18 Reconnaissance/007 Passive Recon - Job Posting.en.srt 12.7 kB
  • 06 Operating System Internals/004 The CPU Registers.en.srt 12.6 kB
  • 04 The Windows Operating System/005 Windows Internals - UAC.en.srt 12.6 kB
  • 19 Exploitation/004 Metasploit - What is Metasploit_.en.srt 12.4 kB
  • 10 Networking/009 DNS.en.srt 12.4 kB
  • 13 Configuring PFSense Firewalls/003 Configuring a DMZ.en.srt 12.1 kB
  • 19 Exploitation/010 The OWASP Top 10.en.srt 12.1 kB
  • 17 Scope Identification/002 Stability Considerations.en.srt 12.0 kB
  • 15 Python Course/008 Loops.en.srt 12.0 kB
  • 20 Post Exploitation/002 Breaking Out Of The Jail Shell.en.srt 11.9 kB
  • 18 Reconnaissance/014 Active Recon - Banner Grabbing.en.srt 11.9 kB
  • 19 Exploitation/008 Metasploit - MSFVenom.en.srt 11.9 kB
  • 20 Post Exploitation/022 Network Traffic.en.srt 11.8 kB
  • 18 Reconnaissance/009 Active Recon - DNS.en.srt 11.5 kB
  • 13 Configuring PFSense Firewalls/001 Installing PFSense.en.srt 11.4 kB
  • 19 Exploitation/015 Remote File Inclusion.en.srt 11.3 kB
  • 04 The Windows Operating System/010 Windows Internals - Tokens.en.srt 11.3 kB
  • 24 Attacking Active Directory (Realistic Scenario)/006 Getting Domain Admin.en.srt 11.1 kB
  • 18 Reconnaissance/006 Passive Recon - Netcraft.en.srt 11.1 kB
  • 15 Python Course/019 Threading.en.srt 11.0 kB
  • 25 Job Hunting/014 The Interview Process - The Onsite.en.srt 11.0 kB
  • 20 Post Exploitation/012 Relative Path Sudo Binary.en.srt 10.9 kB
  • 03 Penetration Testing Process/009 Routine Assessments Part 6 - Building an Assessment Plan.en.srt 10.9 kB
  • 04 The Windows Operating System/015 Windows Command Line - Working with Files and Directories.en.srt 10.8 kB
  • 20 Post Exploitation/015 LinuxPrivChecker.en.srt 10.8 kB
  • 13 Configuring PFSense Firewalls/004 Configuring a VPN.en.srt 10.7 kB
  • 18 Reconnaissance/005 Passive Recon - Whois.en.srt 10.5 kB
  • 02 The 3 Teams/004 The Purple Team.en.srt 10.5 kB
  • 04 The Windows Operating System/007 Windows Internals - Alternate Data Streams.en.srt 10.4 kB
  • 15 Python Course/017 Error Handling.en.srt 10.4 kB
  • 20 Post Exploitation/023 ARP Poisoning.en.srt 10.4 kB
  • 07 Active Directory/002 Basic Windows Server Configuration.en.srt 10.4 kB
  • 20 Post Exploitation/014 Service Misconfigurations.en.srt 10.3 kB
  • 11 VPNs/003 What is IKE_.en.srt 10.2 kB
  • 15 Python Course/016 Logging.en.srt 10.2 kB
  • 08 Kerberos/004 The Ticket Granting Server.en.srt 10.1 kB
  • 17 Scope Identification/001 Goal & Scope Identification.en.srt 10.1 kB
  • 18 Reconnaissance/016 Active Recon - Browsing.en.srt 10.1 kB
  • 04 The Windows Operating System/014 Windows Command Line - Navigation.en.srt 10.0 kB
  • 15 Python Course/003 Hello World.en.srt 10.0 kB
  • 24 Attacking Active Directory (Realistic Scenario)/004 Finding New Access.en.srt 9.9 kB
  • 21 Password Cracking/003 Hashcat.en.srt 9.7 kB
  • 07 Active Directory/007 Adding Machine to the Domain.en.srt 9.7 kB
  • 15 Python Course/004 Variables.en.srt 9.6 kB
  • 05 The Linux Operating System/014 Working with Open Files.en.srt 9.6 kB
  • 18 Reconnaissance/002 Installing Kali.en.srt 9.5 kB
  • 04 The Windows Operating System/009 Windows Internals - The SID.en.srt 9.5 kB
  • 16 Assembly Course/009 Writing Files.en.srt 9.4 kB
  • 10 Networking/006 Routers & Gateways.en.srt 9.4 kB
  • 20 Post Exploitation/026 Password Spraying.en.srt 9.3 kB
  • 15 Python Course/012 Modules.en.srt 9.3 kB
  • 18 Reconnaissance/010 Active Recon - Nikto.en.srt 9.2 kB
  • 23 Reporting/003 Business Risks on Findings.en.srt 9.2 kB
  • 16 Assembly Course/010 Op Code.en.srt 9.2 kB
  • 10 Networking/008 ICMP.en.srt 9.2 kB
  • 10 Networking/010 DHCP.en.srt 9.1 kB
  • 07 Active Directory/005 OU's and their Permissions.en.srt 9.0 kB
  • 05 The Linux Operating System/015 Symbolic Links.en.srt 8.8 kB
  • 19 Exploitation/013 Insecure Direct Object Reference.en.srt 8.7 kB
  • 06 Operating System Internals/007 The Stack.en.srt 8.7 kB
  • 07 Active Directory/001 What is Active Directory.en.srt 8.5 kB
  • 18 Reconnaissance/004 Passive Recon - Shodan.en.srt 8.4 kB
  • 22 Covering Your Tracks/003 Clearing Linux Logs.en.srt 8.4 kB
  • 05 The Linux Operating System/002 The Linux File System.en.srt 8.4 kB
  • 06 Operating System Internals/002 One Ring to Rule Them All.en.srt 8.4 kB
  • 10 Networking/002 The OSI Model.en.srt 8.2 kB
  • 22 Covering Your Tracks/004 Quick Talk on Logging.en.srt 8.2 kB
  • 03 Penetration Testing Process/005 Routine Assessments Part 2 - Yearly Assessments.en.srt 8.2 kB
  • 04 The Windows Operating System/011 Windows Internals - Named Pipes.en.srt 8.2 kB
  • 25 Job Hunting/013 The Interview Process - Prepping for the On Site Final Interview.en.srt 8.1 kB
  • 05 The Linux Operating System/010 Linux Command Line - Hex.en.srt 8.1 kB
  • 19 Exploitation/016 The Authenticated Unauthenticated Pages.en.srt 8.1 kB
  • 06 Operating System Internals/012 A Quick Word About AntiVirus.en.srt 8.0 kB
  • 09 Data Manipulation/003 Asymmetric Encryption.en.srt 8.0 kB
  • 18 Reconnaissance/015 Active Recon - Vulnerability Scanners.en.srt 7.9 kB
  • 21 Password Cracking/004 Rainbow Tables.en.srt 7.8 kB
  • 06 Operating System Internals/010 Debuggers.en.srt 7.8 kB
  • 21 Password Cracking/002 John The Ripper.en.srt 7.7 kB
  • 21 Password Cracking/001 What is Password Cracking_.en.srt 7.7 kB
  • 16 Assembly Course/003 Variables.en.srt 7.6 kB
  • 18 Reconnaissance/011 Active Recon - Dirb.en.srt 7.5 kB
  • 02 The 3 Teams/003 The Blue Team.en.srt 7.5 kB
  • 25 Job Hunting/002 Professional Email.en.srt 7.3 kB
  • 03 Penetration Testing Process/007 Routine Assessments Part 4- Monthly Assessments_.en.srt 7.3 kB
  • 13 Configuring PFSense Firewalls/005 Backup & Logging.en.srt 7.3 kB
  • 20 Post Exploitation/019 SSH Keys.en.srt 7.2 kB
  • 16 Assembly Course/006 Loops.en.srt 7.2 kB
  • 14 Program Theory/002 What is a Linker_.en.srt 7.2 kB
  • 04 The Windows Operating System/013 Windows Command Line - Accessing the Command Line.en.srt 7.2 kB
  • 22 Covering Your Tracks/001 Why Cover Your Tracks_.en.srt 7.2 kB
  • 15 Python Course/005 Type Casting.en.srt 7.2 kB
  • 20 Post Exploitation/006 What is Privilege Escalation_.en.srt 7.1 kB
  • 20 Post Exploitation/018 Pass The Hash.en.srt 7.1 kB
  • 07 Active Directory/006 Managing Users and Groups.en.srt 7.1 kB
  • 10 Networking/013 What is an IPS.en.srt 7.0 kB
  • 10 Networking/014 What is HA_.en.srt 7.0 kB
  • 10 Networking/011 ARP.en.srt 7.0 kB
  • 09 Data Manipulation/008 SHA Hashing.en.srt 6.9 kB
  • 19 Exploitation/003 Looking for 0 days.en.srt 6.9 kB
  • 15 Python Course/015 Configuration Files.en.srt 6.7 kB
  • 03 Penetration Testing Process/004 Routine Assessments Part 1 - What Are Routine Assessments_.en.srt 6.7 kB
  • 03 Penetration Testing Process/011 Specialties_!.en.srt 6.6 kB
  • 23 Reporting/002 The Audience.en.srt 6.6 kB
  • 09 Data Manipulation/011 Hex Encoding.en.srt 6.5 kB
  • 12 Firewalls/001 What is a Firewall_.en.srt 6.5 kB
  • 10 Networking/017 Quick Talk on Databases.en.srt 6.5 kB
  • 09 Data Manipulation/010 Base64 Encoding.en.srt 6.4 kB
  • 18 Reconnaissance/017 Active Recon - Manual vs Automated.en.srt 6.4 kB
  • 04 The Windows Operating System/017 Windows Command Line - Standard I_O_E.en.srt 6.2 kB
  • 06 Operating System Internals/009 Extra information on Memory.en.srt 6.2 kB
  • 05 The Linux Operating System/003 Linux Command Line - Navigation.en.srt 6.2 kB
  • 05 The Linux Operating System/001 Where is the GUI_!.en.srt 6.2 kB
  • 18 Reconnaissance/001 What is Reconnaissance_.en.srt 6.2 kB
  • 19 Exploitation/002 Misconfigurations.en.srt 6.2 kB
  • 15 Python Course/002 Installing Python.en.srt 6.2 kB
  • 15 Python Course/006 Operators.en.srt 6.1 kB
  • 05 The Linux Operating System/013 What are INodes_.en.srt 6.1 kB
  • 10 Networking/005 The Switch.en.srt 6.1 kB
  • 05 The Linux Operating System/011 Linux Command Line - Network Connections Recap.en.srt 6.1 kB
  • 15 Python Course/001 Why Python_.en.srt 6.1 kB
  • 20 Post Exploitation/025 Account Directory Attacks.en.srt 6.0 kB
  • 19 Exploitation/018 Faulty Redirects.en.srt 6.0 kB
  • 14 Program Theory/001 What is a Compiler_.en.srt 5.7 kB
  • 24 Attacking Active Directory (Realistic Scenario)/005 Moving Up In The World!.en.srt 5.7 kB
  • 05 The Linux Operating System/018 Linux Run Levels.en.srt 5.6 kB
  • 05 The Linux Operating System/008 Linux Command Line - Man Pages.en.srt 5.6 kB
  • 05 The Linux Operating System/005 Linux Command Line - Standard I_O_E Recap.en.srt 5.6 kB
  • 08 Kerberos/001 What is Kerberos_.en.srt 5.6 kB
  • 10 Networking/015 Proxys.en.srt 5.5 kB
  • 15 Python Course/011 Tuples.en.srt 5.5 kB
  • 24 Attacking Active Directory (Realistic Scenario)/002 Exploitation.en.srt 5.3 kB
  • 10 Networking/012 What is an IDS.en.srt 5.3 kB
  • 23 Reporting/004 Remediation Options.en.srt 5.3 kB
  • 05 The Linux Operating System/019 Linux Logs.en.srt 5.3 kB
  • 03 Penetration Testing Process/001 Module Overview - Penetration Testing Process.en.srt 5.3 kB
  • 09 Data Manipulation/002 Symmetric Encryption.en.srt 5.2 kB
  • 06 Operating System Internals/006 What is Memory & How does it work_.en.srt 5.2 kB
  • 22 Covering Your Tracks/006 Persistent Backdoors.en.srt 5.2 kB
  • 09 Data Manipulation/001 What is Encryption.en.srt 5.1 kB
  • 06 Operating System Internals/008 The Heap.en.srt 5.1 kB
  • 22 Covering Your Tracks/002 Clearing Windows Logs.en.srt 5.0 kB
  • 16 Assembly Course/011 Bit Operators.en.srt 5.0 kB
  • 17 Scope Identification/004 Prepping.en.srt 5.0 kB
  • 08 Kerberos/003 The Authentication Server.en.srt 5.0 kB
  • 09 Data Manipulation/013 What is Compression_.en.srt 4.9 kB
  • 24 Attacking Active Directory (Realistic Scenario)/003 Post Exploitation.en.srt 4.9 kB
  • 09 Data Manipulation/006 What is Hashing_.en.srt 4.9 kB
  • 19 Exploitation/009 Metasploit - Hands On.en.srt 4.8 kB
  • 09 Data Manipulation/014 Lossless vs Lossy Compression.en.srt 4.8 kB
  • 20 Post Exploitation/016 Im Root Now What_.en.srt 4.8 kB
  • 24 Attacking Active Directory (Realistic Scenario)/001 Reconnaissance.en.srt 4.7 kB
  • 06 Operating System Internals/011 Taking a look at ASLR.en.srt 4.7 kB
  • 03 Penetration Testing Process/012 The CIA Triangle.en.srt 4.6 kB
  • 22 Covering Your Tracks/007 The Clean Up.en.srt 4.6 kB
  • 05 The Linux Operating System/017 Linux Pipes.en.srt 4.4 kB
  • 09 Data Manipulation/012 URL Encoding.en.srt 4.3 kB
  • 07 Active Directory/009 Cached Credentials.en.srt 4.1 kB
  • 12 Firewalls/003 Stateful Inspecting Firewalls.en.srt 4.1 kB
  • 05 The Linux Operating System/016 The ID's.en.srt 4.1 kB
  • 06 Operating System Internals/003 What is a CPU_.en.srt 4.0 kB
  • 15 Python Course/020 Python Hands On.en.srt 3.9 kB
  • 11 VPNs/001 What is a VPN.en.srt 3.9 kB
  • 10 Networking/016 The DMZ.en.srt 3.9 kB
  • 17 Scope Identification/003 Briefing Stake Holders.en.srt 3.8 kB
  • 09 Data Manipulation/007 MD5 Hashing.en.srt 3.8 kB
  • 17 Scope Identification/005 Scope Identification Hands On.en.srt 3.7 kB
  • 10 Networking/004 UDP.en.srt 3.7 kB
  • 20 Post Exploitation/024 Web Servers.en.srt 3.7 kB
  • 23 Reporting/005 Working With The Blue Team.en.srt 3.6 kB
  • 12 Firewalls/004 Web Application Firewalls.en.srt 3.5 kB
  • 06 Operating System Internals/005 The CPU Flags.en.srt 3.4 kB
  • 05 The Linux Operating System/009 Linux Command Line - Base64.en.srt 3.4 kB
  • 13 Configuring PFSense Firewalls/006 PFsense Hands On.en.srt 3.3 kB
  • 09 Data Manipulation/004 RSA Encryption.en.srt 3.3 kB
  • 16 Assembly Course/001 Why Assembly_.en.srt 3.2 kB
  • 20 Post Exploitation/021 Duel Homed Machines.en.srt 3.2 kB
  • 09 Data Manipulation/009 What is Encoding_.en.srt 3.1 kB
  • 09 Data Manipulation/015 LZ77 & LZ78 Compression Algorithms.en.srt 3.1 kB
  • 20 Post Exploitation/020 Checking Logs.en.srt 2.8 kB
  • 09 Data Manipulation/016 Data Manipulation - Hands On.en.srt 2.7 kB
  • 01 Welcome! Who Is This Guy_!/001 Introduction.en.srt 2.4 kB
  • 18 Reconnaissance/018 Reconnaissance Hands On.en.srt 2.4 kB
  • 09 Data Manipulation/005 AES Encryption.en.srt 2.4 kB
  • 08 Kerberos/002 Kerberos Realms.en.srt 2.4 kB
  • 15 Python Course/133 Operators.py 2.4 kB
  • 15 Python Course/134 IfElse.py 2.3 kB
  • 21 Password Cracking/005 Password Cracking Hands On.en.srt 2.3 kB
  • 16 Assembly Course/012 Assembly Hands On.en.srt 2.2 kB
  • 16 Assembly Course/152 Arithmetic.asm.zip 2.2 kB
  • 12 Firewalls/002 Packet Filtering Firewalls.en.srt 2.1 kB
  • 10 Networking/007 What is a Protocol_.en.srt 2.1 kB
  • 15 Python Course/136 Dictionary.py 2.0 kB
  • 02 The 3 Teams/001 Module Overview - The 3 Teams.en.srt 1.9 kB
  • 15 Python Course/141 Inheritance.py 1.7 kB
  • 15 Python Course/142 Configs.zip 1.6 kB
  • 16 Assembly Course/153 Loops.asm.zip 1.6 kB
  • 15 Python Course/137 Lists.py 1.6 kB
  • 16 Assembly Course/155 ReadingFiles.asm.zip 1.5 kB
  • 22 Covering Your Tracks/008 Covering Your Tracks Hands On.en.srt 1.5 kB
  • 16 Assembly Course/156 WritingFiles.asm.zip 1.4 kB
  • 15 Python Course/143 Logging.py 1.4 kB
  • 16 Assembly Course/151 SavingState.asm.zip 1.4 kB
  • 15 Python Course/140 Classes.py 1.4 kB
  • 15 Python Course/135 Loops.py 1.3 kB
  • 15 Python Course/144 ErrorHandling.py 1.3 kB
  • 15 Python Course/142 Configs.py 1.3 kB
  • 16 Assembly Course/154 Logic.asm.zip 1.3 kB
  • 16 Assembly Course/149 HelloWorld.asm.zip 1.2 kB
  • 15 Python Course/131 Variables.py 1.2 kB
  • 15 Python Course/145 SocketsServer.py 1.2 kB
  • 15 Python Course/138 Tuples.py 1.2 kB
  • 16 Assembly Course/150 DataTypes.asm.zip 1.1 kB
  • 04 The Windows Operating System/external-assets-links.txt 1.1 kB
  • 15 Python Course/132 TypeCasting.py 1.0 kB
  • 15 Python Course/141 Account.py 961 Bytes
  • 15 Python Course/145 SocketsClient.py 929 Bytes
  • 15 Python Course/140 Person.py 878 Bytes
  • 15 Python Course/146 Threading.py 845 Bytes
  • 20 Post Exploitation/226 spray.py 831 Bytes
  • 15 Python Course/141 CheckingAccount.py 822 Bytes
  • 20 Post Exploitation/external-assets-links.txt 822 Bytes
  • 15 Python Course/139 Modules.py 810 Bytes
  • 25 Job Hunting/016 Congratulations!.en.srt 682 Bytes
  • 18 Reconnaissance/external-assets-links.txt 662 Bytes
  • 15 Python Course/130 HelloWorld.py 583 Bytes
  • 09 Data Manipulation/external-assets-links.txt 544 Bytes
  • 19 Exploitation/195 idor.txt 496 Bytes
  • 19 Exploitation/external-assets-links.txt 494 Bytes
  • 21 Password Cracking/external-assets-links.txt 257 Bytes
  • 05 The Linux Operating System/external-assets-links.txt 209 Bytes
  • 06 Operating System Internals/external-assets-links.txt 136 Bytes
  • 15 Python Course/external-assets-links.txt 109 Bytes
  • 01 Welcome! Who Is This Guy_!/external-assets-links.txt 95 Bytes
  • 07 Active Directory/external-assets-links.txt 86 Bytes
  • 13 Configuring PFSense Firewalls/external-assets-links.txt 60 Bytes
  • 10 Networking/external-assets-links.txt 57 Bytes

随机展示

相关说明

本站不存储任何资源内容,只收集BT种子元数据(例如文件名和文件大小)和磁力链接(BT种子标识符),并提供查询服务,是一个完全合法的搜索引擎系统。 网站不提供种子下载服务,用户可以通过第三方链接或磁力链接获取到相关的种子资源。本站也不对BT种子真实性及合法性负责,请用户注意甄别!